Science.gov

Sample records for multiple access schemes

  1. Multiple Access Schemes for Lunar Missions

    NASA Technical Reports Server (NTRS)

    Deutsch, Leslie; Hamkins, Jon; Stocklin, Frank J.

    2010-01-01

    Two years ago, the NASA Coding, Modulation, and Link Protocol (CMLP) study was completed. The study, led by the authors of this paper, recommended codes, modulation schemes, and desired attributes of link protocols for all space communication links in NASA's future space architecture. Portions of the NASA CMLP team were reassembled to resolve one open issue: the use of multiple access (MA) communication from the lunar surface. The CMLP-MA team analyzed and simulated two candidate multiple access schemes that were identified in the original CMLP study: Code Division MA (CDMA) and Frequency Division MA (FDMA) based on a bandwidth-efficient Continuous Phase Modulation (CPM) with a superimposed Pseudo-Noise (PN) ranging signal (CPM/PN). This paper summarizes the results of the analysis and simulation of the CMLP-MA study and describes the final recommendations.

  2. A study of multiple access schemes in satellite control network

    NASA Astrophysics Data System (ADS)

    Mo, Zijian; Wang, Zhonghai; Xiang, Xingyu; Wang, Gang; Chen, Genshe; Nguyen, Tien; Pham, Khanh; Blasch, Erik

    2016-05-01

    Satellite Control Networks (SCN) have provided launch control for space lift vehicles; tracking, telemetry and commanding (TTC) for on-orbit satellites; and, test support for space experiments since the 1960s. Currently, SCNs encounter a new challenge: how to maintain the high reliability of services when sharing the spectrum with emerging commercial services. To achieve this goal, the capability of multiple satellites reception is deserved as an update/modernization of SCN in the future. In this paper, we conducts an investigation of multiple access techniques in SCN scenario, e.g., frequency division multiple access (FDMA) and coded division multiple access (CDMA). First, we introduce two upgrade options of SCN based on FDMA and CDMA techniques. Correspondingly, we also provide their performance analysis, especially the system improvement in spectrum efficiency and interference mitigation. Finally, to determine the optimum upgrade option, this work uses CRISP, i.e., Cost, Risk, Installation, Supportability and Performance, as the baseline approach for a comprehensive trade study of these two options. Extensive numerical and simulation results are presented to illustrate the theoretical development.

  3. Quantum Optimal Multiple Assignment Scheme for Realizing General Access Structure of Secret Sharing

    NASA Astrophysics Data System (ADS)

    Matsumoto, Ryutaroh

    The multiple assignment scheme is to assign one or more shares to single participant so that any kind of access structure can be realized by classical secret sharing schemes. We propose its quantum version including ramp secret sharing schemes. Then we propose an integer optimization approach to minimize the average share size.

  4. A signaling and decision scheme with application to multiple-access communication

    NASA Astrophysics Data System (ADS)

    Longwell, B. C.; Arozullah, M.; Black, B. A.

    A decision directed detection method using a quasi-orthogonal set of signaling waveforms for detection-signals in the presence of random access interference is presented. In this method the spectra of a number of users in a random access scheme are allowed to overlap and decision is made by sequential elimination of interference. This method can achieve a larger throughput than that of frequency division multiple access. Performance of this detection scheme is evaluated in terms of probability of error and error propagation. This proposed detector outperforms the optimal linear detector for the same signal set in terms of signal-to-noise ratio needed for a given probability of error and data rate per unit bandwidth. This scheme may have application wherever a number of users need to communicate over a common channel e.g., tactical military communication system.

  5. Color coded multiple access scheme for bidirectional multiuser visible light communications in smart home technologies

    NASA Astrophysics Data System (ADS)

    Tiwari, Samrat Vikramaditya; Sewaiwar, Atul; Chung, Yeon-Ho

    2015-10-01

    In optical wireless communications, multiple channel transmission is an attractive solution to enhancing capacity and system performance. A new modulation scheme called color coded multiple access (CCMA) for bidirectional multiuser visible light communications (VLC) is presented for smart home applications. The proposed scheme uses red, green and blue (RGB) light emitting diodes (LED) for downlink and phosphor based white LED (P-LED) for uplink to establish a bidirectional VLC and also employs orthogonal codes to support multiple users and devices. The downlink transmission for data user devices and smart home devices is provided using red and green colors from the RGB LEDs, respectively, while uplink transmission from both types of devices is performed using the blue color from P-LEDs. Simulations are conducted to verify the performance of the proposed scheme. It is found that the proposed bidirectional multiuser scheme is efficient in terms of data rate and performance. In addition, since the proposed scheme uses RGB signals for downlink data transmission, it provides flicker-free illumination that would lend itself to multiuser VLC system for smart home applications.

  6. A comparison of two multiple access schemes for satellite networks with error-prone transmission channels

    NASA Astrophysics Data System (ADS)

    Boettcher, Axel; Dippold, Michael

    1990-11-01

    Multiple access to the radio channel is an important feature for the efficiency of satellite packet data networks. In the case of mobile stations communicating via satellite, which is the scope of this paper, the performance of the various channel access methods is degraded by transmission errors due to multipath propagation and signal shadowing. Using the same channel and user models and the same method of analysis, the performance of two typical access schemes from different classes is compared: Slotted Aloha and a demand assignment (DAMA) technique. Slotted Aloha exhibits less delay than DAMA for a moderate data traffic, but DAMA supports more data traffic when the link quality is good. Under the influence of shadowing on the channel, Slotted Aloha degrades more slowly than DAMA due to the capture-effect.

  7. High security chaotic multiple access scheme for visible light communication systems with advanced encryption standard interleaving

    NASA Astrophysics Data System (ADS)

    Qiu, Junchao; Zhang, Lin; Li, Diyang; Liu, Xingcheng

    2016-06-01

    Chaotic sequences can be applied to realize multiple user access and improve the system security for a visible light communication (VLC) system. However, since the map patterns of chaotic sequences are usually well known, eavesdroppers can possibly derive the key parameters of chaotic sequences and subsequently retrieve the information. We design an advanced encryption standard (AES) interleaving aided multiple user access scheme to enhance the security of a chaotic code division multiple access-based visible light communication (C-CDMA-VLC) system. We propose to spread the information with chaotic sequences, and then the spread information is interleaved by an AES algorithm and transmitted over VLC channels. Since the computation complexity of performing inverse operations to deinterleave the information is high, the eavesdroppers in a high speed VLC system cannot retrieve the information in real time; thus, the system security will be enhanced. Moreover, we build a mathematical model for the AES-aided VLC system and derive the theoretical information leakage to analyze the system security. The simulations are performed over VLC channels, and the results demonstrate the effectiveness and high security of our presented AES interleaving aided chaotic CDMA-VLC system.

  8. An integrated voice and data multiple-access scheme for a land-mobile satellite system

    NASA Technical Reports Server (NTRS)

    Li, V. O. K.; Yan, T.-Y.

    1984-01-01

    An analytical study is performed of the satellite requirements for a land mobile satellite system (LMSS). The spacecraft (MSAT-X) would be in GEO and would be compatible with multiple access by mobile radios and antennas and fixed stations. The FCC has received a petition from NASA to reserve the 821-825 and 866-870 MHz frequencies for the LMSS, while communications with fixed earth stations would be in the Ku band. MSAT-X transponders would alter the frequencies of signal and do no processing in the original configuration considered. Channel use would be governed by an integrated demand-assigned, multiple access protocol, which would divide channels into reservation and information channels, governed by a network management center. Further analyses will cover tradeoffs between data and voice users, probability of blocking, and the performance impacts of on-board switching and variable bandwidth assignment. Initial calculations indicate that a large traffic volume can be handled with acceptable delays and voice blocking probabilities.

  9. Performance analysis of an adaptive multiple access scheme for the message service of a land mobile satellite experiment (MSAT-X)

    NASA Technical Reports Server (NTRS)

    Yan, T.-Y.; Li, V. O. K.

    1984-01-01

    This paper describes an Adaptive Mobile Access Protocol (AMAP) for the message service of MSAT-X., a proposed experimental mobile satellite communication network. Message lengths generated by the mobiles are assumed to be uniformly distributed. The mobiles are dispersed over a wide geographical area and the channel data rate is limited. AMAP is a reservation based multiple access scheme. The available bandwidth is divided into subchannels, which are divided into reservation and message channels. The ALOHA multiple access scheme is employed in the reservation channels, while the message channels are demand assigned. AMAP adaptively reallocates the reservation and message channels to optimize the total average message delay.

  10. Mixing stream and datagram traffic on satellite: A FIFO Order-based Demand Assignment (FODA) Time Division Multiple Access (TDMA) scheme

    NASA Astrophysics Data System (ADS)

    Beltrame, R.; Bonito, A. B.; Celandroni, N.; Ferro, E.

    1985-11-01

    A FIFO Order based Demand Assignment (FODA) access scheme was designed to handle packetized data and voice traffic in a multiple access satellite broadcast channel of Mbits band. The channel is shared by as many as 64 simultaneously active stations in a range of 255 addressable stations. A sophisticated traffic environment is assumed, including different types of service requirements and an arbitrary load distribution among the stations. The results of 2Mbit/sec simulation tests for an existing hardware environment are presented.

  11. Spectrally efficient localized carrier distribution scheme for multiple-user DFT-S OFDM RoF- PON wireless access systems.

    PubMed

    Tao, Li; Yu, Jianjun; Yang, Qi; Luo, Ming; He, Zhixue; Shao, Yufeng; Zhang, Junwen; Chi, Nan

    2012-12-31

    We propose a modified localized carrier distribution scheme based on multi-tone generation to generate 60 GHz mm-wave for different wireless users and it improves the carrier utilization efficiency by 33.3%. The principle of multiple-user discrete Fourier transform spread optical orthogonal frequency-division multiplexing (DFT-S OFDM) Radio-over-fiber (RoF) system is presented. This multiple-user system is applicable to passive optical network (PON). Then we demonstrate a 8 x 4.65 Gb/s multiple-user DFT-S OFDM RoF-PON wireless access system over 40 km fiber link and 60 GHz wireless link using two localized carrier distribution scheme with different spectral efficiency. Compared to conventional OFDM, 2.3 dB reduction of receiver power using DFT-S OFDM modulation scheme and the calculated BER performance for 8 wireless users clearly demonstrates the feasibility of this spectrally efficient multiple-user RoF-PON scheme.

  12. Chaotic communication scheme with multiplication

    NASA Astrophysics Data System (ADS)

    Bobreshov, A. M.; Karavaev, A. A.

    2007-05-01

    A new scheme of data transmission with nonlinear admixing is described, in which the two mutually inverse operations (multiplication and division) ensure multiplicative mixing of the informative and chaotic signals that provides a potentially higher degree of security. A special feature of the proposed scheme is the absence of limitations (related to the division by zero) imposed on the types of informative signals.

  13. Uplink Access Schemes for LTE-Advanced

    NASA Astrophysics Data System (ADS)

    Liu, Le; Inoue, Takamichi; Koyanagi, Kenji; Kakura, Yoshikazu

    The 3GPP LTE-Advanced has been attracting much attention recently, where the channel bandwidth would be beyond the maximum bandwidth of LTE, 20MHz. In LTE, single carrier-frequency division multiple access (SC-FDMA) was accepted as the uplink access scheme due to its advantage of very low cubic metric (CM). For LTE-A wideband transmission, multicarrier access would be more effective than single carrier access to make use of multi-user diversity and can maintain the physical channel structure of LTE, where the control information is transmitted on the edges of each 20MHz. In this paper, we discuss the access schemes in bandwidth under 20MHz as well as over 20MHz. In the case of bandwidth under 20MHz, we propose the access schemes allowing discontinuous resource allocation to enhance average throughput while maintaining cell-edge user throughput, that is, DFT-spread-OFDM with spectrum division control (SDC) and adaptive selection of SC-FDMA and OFDM (SC+OFDM). The number of discontinuous spectrums is denoted as spectrum division (SD). For DFT-S-OFDM, we define a parameter max SD as the upper limit of SD. We evaluate our proposed schemes in bandwidth under 20MHz and find that SC+OFDM as well as SDC with common max SD or UE-specific max SD can improve average throughput while their cell-edge user throughput can approach that of SC-FDMA. In the case of bandwidth over 20MHz, we consider key factors to decide a feasible access scheme for aggregating several 20MHz-wide bands.

  14. Performance enhancement of successive interference cancellation scheme based on spectral amplitude coding for optical code-division multiple-access systems using Hadamard codes

    NASA Astrophysics Data System (ADS)

    Eltaif, Tawfig; Shalaby, Hossam M. H.; Shaari, Sahbudin; Hamarsheh, Mohammad M. N.

    2009-04-01

    A successive interference cancellation scheme is applied to optical code-division multiple-access (OCDMA) systems with spectral amplitude coding (SAC). A detailed analysis of this system, with Hadamard codes used as signature sequences, is presented. The system can easily remove the effect of the strongest signal at each stage of the cancellation process. In addition, simulation of the prose system is performed in order to validate the theoretical results. The system shows a small bit error rate at a large number of active users compared to the SAC OCDMA system. Our results reveal that the proposed system is efficient in eliminating the effect of the multiple-user interference and in the enhancement of the overall performance.

  15. Mobile multiple access study

    NASA Technical Reports Server (NTRS)

    1977-01-01

    Multiple access techniques (FDMA, CDMA, TDMA) for the mobile user and attempts to identify the current best technique are discussed. Traffic loading is considered as well as voice and data modulation and spacecraft and system design. Emphasis is placed on developing mobile terminal cost estimates for the selected design. In addition, design examples are presented for the alternative techniques of multiple access in order to compare with the selected technique.

  16. Fade detector for the FODA-TDMA access scheme

    NASA Astrophysics Data System (ADS)

    Celandroni, Nedo; Ferro, Erina; Marzoli, Antonio

    1989-05-01

    The First in first out Ordered Demand Assignment-Time Division Multiple Access (FODA-TDMA) satellite access scheme designed for simultaneous transmissions of real time data, like packetized voice and slow-scan images (stream traffic) and data coming from standard EDP applications, such as bulk data tansfer, interactive computer access, mailing, data base enquiry and updating (datagram traffic) is described. When deep fades are experienced due to rain attenuation, the system is able to counter the fade. Techniques to detect the fade are presented.

  17. Multiple access capacity trade-offs for a Ka-band personal access satellite system

    NASA Technical Reports Server (NTRS)

    Dessouky, Khaled; Motamedi, Masoud

    1990-01-01

    System capability is critical to the economic viability of a personal satellite communication system. Ka band has significant potential to support a high capacity multiple access system because of the availability of bandwidth. System design tradeoffs are performed and multiple access schemes are compared with the design goal of achieving the highest capacity and efficiency. Conclusions regarding the efficiency of the different schemes and the achievable capacities are given.

  18. Harmonic generation with multiple wiggler schemes

    SciTech Connect

    Bonifacio, R.; De Salvo, L.; Pierini, P.

    1995-02-01

    In this paper the authors give a simple theoretical description of the basic physics of the single pass high gain free electron laser (FEL), describing in some detail the FEL bunching properties and the harmonic generation technique with a multiple-wiggler scheme or a high gain optical klystron configuration.

  19. An authentication scheme for secure access to healthcare services.

    PubMed

    Khan, Muhammad Khurram; Kumari, Saru

    2013-08-01

    Last few decades have witnessed boom in the development of information and communication technologies. Health-sector has also been benefitted with this advancement. To ensure secure access to healthcare services some user authentication mechanisms have been proposed. In 2012, Wei et al. proposed a user authentication scheme for telecare medical information system (TMIS). Recently, Zhu pointed out offline password guessing attack on Wei et al.'s scheme and proposed an improved scheme. In this article, we analyze both of these schemes for their effectiveness in TMIS. We show that Wei et al.'s scheme and its improvement proposed by Zhu fail to achieve some important characteristics necessary for secure user authentication. We find that security problems of Wei et al.'s scheme stick with Zhu's scheme; like undetectable online password guessing attack, inefficacy of password change phase, traceability of user's stolen/lost smart card and denial-of-service threat. We also identify that Wei et al.'s scheme lacks forward secrecy and Zhu's scheme lacks session key between user and healthcare server. We therefore propose an authentication scheme for TMIS with forward secrecy which preserves the confidentiality of air messages even if master secret key of healthcare server is compromised. Our scheme retains advantages of Wei et al.'s scheme and Zhu's scheme, and offers additional security. The security analysis and comparison results show the enhanced suitability of our scheme for TMIS.

  20. Performance of Multiple Pulse Multiple Delay Modulated UWB Signals in a Multiple Access Indoor Wireless Channel

    SciTech Connect

    Nekoogar, F

    2003-06-12

    In this paper, the performance of a two user UWB multiple access (UWB-MA) system based on multiple-pulse multiple-delay (MPMD) modulation scheme in an indoor wireless channel is evaluated by computer simulations. The indoor multipath propagation channel model used in this study is based on the modified statistical Saleh-Valenzuela model proposed by Foerester and Li from Intel. The simulation results indicate that the multipath performance of MPMD modulated signals in a multiple access system outperforms the nonmultipath case as the number of autocorrelation function (ACF) sampling points increases for each user. This is an unusual but important result, since MPMD receiver exploits multipath phenomenon in indoor wireless channels to increase the BER performance, hence the transmission rate in a UWB-MA system.

  1. Secure Dynamic access control scheme of PHR in cloud computing.

    PubMed

    Chen, Tzer-Shyong; Liu, Chia-Hui; Chen, Tzer-Long; Chen, Chin-Sheng; Bau, Jian-Guo; Lin, Tzu-Ching

    2012-12-01

    With the development of information technology and medical technology, medical information has been developed from traditional paper records into electronic medical records, which have now been widely applied. The new-style medical information exchange system "personal health records (PHR)" is gradually developed. PHR is a kind of health records maintained and recorded by individuals. An ideal personal health record could integrate personal medical information from different sources and provide complete and correct personal health and medical summary through the Internet or portable media under the requirements of security and privacy. A lot of personal health records are being utilized. The patient-centered PHR information exchange system allows the public autonomously maintain and manage personal health records. Such management is convenient for storing, accessing, and sharing personal medical records. With the emergence of Cloud computing, PHR service has been transferred to storing data into Cloud servers that the resources could be flexibly utilized and the operation cost can be reduced. Nevertheless, patients would face privacy problem when storing PHR data into Cloud. Besides, it requires a secure protection scheme to encrypt the medical records of each patient for storing PHR into Cloud server. In the encryption process, it would be a challenge to achieve accurately accessing to medical records and corresponding to flexibility and efficiency. A new PHR access control scheme under Cloud computing environments is proposed in this study. With Lagrange interpolation polynomial to establish a secure and effective PHR information access scheme, it allows to accurately access to PHR with security and is suitable for enormous multi-users. Moreover, this scheme also dynamically supports multi-users in Cloud computing environments with personal privacy and offers legal authorities to access to PHR. From security and effectiveness analyses, the proposed PHR access

  2. Ka-band geostationary satellite spacing requirements and access schemes

    NASA Technical Reports Server (NTRS)

    Caron, Mario; Hindson, Daniel J.

    1995-01-01

    Geostationary satellite systems for wideband personal communications applications have been proposed. This paper looks at the geostationary satellite spacing requirement to meet the ITU-R sharing criterion for FDMA and CDMA access schemes. CDMA capacity equation is first developed. Then the basis for the interference analysis between two systems with an overlapping coverage area is developed for the cases of identical and different access schemes and for bandwidth and power limited systems. An example of an interference analysis between two systems is fully carried out. The paper also points out the inherent problems when comparing systems with different access schemes. It is found that under certain scenarios, CDMA can allow a closer spacing between satellites.

  3. On board processing for future satellite communications systems: Comparison of FDM, TDM and hybrid accessing schemes

    NASA Technical Reports Server (NTRS)

    Berk, G.; Jean, P. N.; Rotholz, E.

    1982-01-01

    Several satellite uplink and downlink accessing schemes for customer premises service are compared. Four conceptual system designs are presented: satellite-routed frequency division multiple access (FDMA), satellite-switched time division multiple access (TDMA), processor-routed TDMA, and frequency-routed TDMA, operating in the 30/20 GHz band. The designs are compared on the basis of estimated satellite weight, system capacity, power consumption, and cost. The systems are analyzed for fixed multibeam coverage of the continental United States. Analysis shows that the system capacity is limited by the available satellite resources and by the terminal size and cost.

  4. An energy-efficient and elastic optical multiple access system based on coherent interleaved frequency division multiple access.

    PubMed

    Yoshida, Yuki; Maruta, Akihiro; Ishii, Kenji; Akiyama, Yuji; Yoshida, Tsuyoshi; Suzuki, Naoki; Koguchi, Kazuumi; Nakagawa, Junichi; Mizuochi, Takashi; Kitayama, Ken-ichi

    2013-05-20

    This paper proposes a novel bandwidth-elastic and energy-efficient passive optical network (PON) based on the coherent interleaved frequency division multiple access (IFDMA) scheme. We experimentally demonstrate the coherent IFDMA-PON uplink transmission up-to 30 Gbps over a 30 km standard single-mode fiber with 2 × optical network units (ONUs). A low-complexity digital carrier synchronization technique enables multiple access of the ONUs on the basis of 78.1 MHz narrow band orthogonal subcarriers without any guard-bands.

  5. Distinguishing Schemes and Tasks in Children's Development of Multiplicative Reasoning

    ERIC Educational Resources Information Center

    Tzur, Ron; Johnson, Heather L.; McClintock, Evan; Kenney, Rachael H.; Xin, Yan P.; Si, Luo; Woordward, Jerry; Hord, Casey; Jin, Xianyan

    2013-01-01

    We present a synthesis of findings from constructivist teaching experiments regarding six schemes children construct for reasoning multiplicatively and tasks to promote them. We provide a task-generating platform game, depictions of each scheme, and supporting tasks. Tasks must be distinguished from children's thinking, and learning situations…

  6. An effective and secure key-management scheme for hierarchical access control in E-medicine system.

    PubMed

    Odelu, Vanga; Das, Ashok Kumar; Goswami, Adrijit

    2013-04-01

    Recently several hierarchical access control schemes are proposed in the literature to provide security of e-medicine systems. However, most of them are either insecure against 'man-in-the-middle attack' or they require high storage and computational overheads. Wu and Chen proposed a key management method to solve dynamic access control problems in a user hierarchy based on hybrid cryptosystem. Though their scheme improves computational efficiency over Nikooghadam et al.'s approach, it suffers from large storage space for public parameters in public domain and computational inefficiency due to costly elliptic curve point multiplication. Recently, Nikooghadam and Zakerolhosseini showed that Wu-Chen's scheme is vulnerable to man-in-the-middle attack. In order to remedy this security weakness in Wu-Chen's scheme, they proposed a secure scheme which is again based on ECC (elliptic curve cryptography) and efficient one-way hash function. However, their scheme incurs huge computational cost for providing verification of public information in the public domain as their scheme uses ECC digital signature which is costly when compared to symmetric-key cryptosystem. In this paper, we propose an effective access control scheme in user hierarchy which is only based on symmetric-key cryptosystem and efficient one-way hash function. We show that our scheme reduces significantly the storage space for both public and private domains, and computational complexity when compared to Wu-Chen's scheme, Nikooghadam-Zakerolhosseini's scheme, and other related schemes. Through the informal and formal security analysis, we further show that our scheme is secure against different attacks and also man-in-the-middle attack. Moreover, dynamic access control problems in our scheme are also solved efficiently compared to other related schemes, making our scheme is much suitable for practical applications of e-medicine systems.

  7. A chaos secure communication scheme based on multiplication modulation

    NASA Astrophysics Data System (ADS)

    Fallahi, Kia; Leung, Henry

    2010-02-01

    A secure spread spectrum communication scheme using multiplication modulation is proposed. The proposed system multiplies the message by chaotic signal. The scheme does not need to know the initial condition of the chaotic signals and the receiver is based on an extended Kalman filter (EKF). This signal encryption scheme lends itself to cheap implementation and can therefore be used effectively for ensuring security and privacy in commercial consumer electronics products. To illustrate the effectiveness of the proposed scheme, a numerical example based on Genesio-Tesi system and also Chen dynamical system is presented and the results are compared.

  8. Quantum internet using code division multiple access.

    PubMed

    Zhang, Jing; Liu, Yu-xi; Ozdemir, Sahin Kaya; Wu, Re-Bing; Gao, Feifei; Wang, Xiang-Bin; Yang, Lan; Nori, Franco

    2013-01-01

    A crucial open problem inS large-scale quantum networks is how to efficiently transmit quantum data among many pairs of users via a common data-transmission medium. We propose a solution by developing a quantum code division multiple access (q-CDMA) approach in which quantum information is chaotically encoded to spread its spectral content, and then decoded via chaos synchronization to separate different sender-receiver pairs. In comparison to other existing approaches, such as frequency division multiple access (FDMA), the proposed q-CDMA can greatly increase the information rates per channel used, especially for very noisy quantum channels.

  9. Quantum internet using code division multiple access

    NASA Astrophysics Data System (ADS)

    Zhang, Jing; Liu, Yu-Xi; Özdemir, Şahin Kaya; Wu, Re-Bing; Gao, Feifei; Wang, Xiang-Bin; Yang, Lan; Nori, Franco

    2013-07-01

    A crucial open problem inS large-scale quantum networks is how to efficiently transmit quantum data among many pairs of users via a common data-transmission medium. We propose a solution by developing a quantum code division multiple access (q-CDMA) approach in which quantum information is chaotically encoded to spread its spectral content, and then decoded via chaos synchronization to separate different sender-receiver pairs. In comparison to other existing approaches, such as frequency division multiple access (FDMA), the proposed q-CDMA can greatly increase the information rates per channel used, especially for very noisy quantum channels.

  10. Quantum internet using code division multiple access

    PubMed Central

    Zhang, Jing; Liu, Yu-xi; Özdemir, Şahin Kaya; Wu, Re-Bing; Gao, Feifei; Wang, Xiang-Bin; Yang, Lan; Nori, Franco

    2013-01-01

    A crucial open problem inS large-scale quantum networks is how to efficiently transmit quantum data among many pairs of users via a common data-transmission medium. We propose a solution by developing a quantum code division multiple access (q-CDMA) approach in which quantum information is chaotically encoded to spread its spectral content, and then decoded via chaos synchronization to separate different sender-receiver pairs. In comparison to other existing approaches, such as frequency division multiple access (FDMA), the proposed q-CDMA can greatly increase the information rates per channel used, especially for very noisy quantum channels. PMID:23860488

  11. Multiple-access channels without synchronization

    NASA Technical Reports Server (NTRS)

    Mceliece, R. J.; Posner, E. C.

    1977-01-01

    This paper discusses models for multiple-access communications which take into account the fact that the channel users may not be able to synchronize their transmissions. It is shown that for a broad class of such channels, the capacity region is the same as it would be with user synchronization. Some open problems are discussed.

  12. An optimized quantum information splitting scheme with multiple controllers

    NASA Astrophysics Data System (ADS)

    Jiang, Min

    2016-12-01

    We propose an efficient scheme for splitting multi-qudit information with cooperative control of multiple agents. Each controller is assigned one controlling qudit, and he can monitor the state sharing of all multi-qudit information. Compared with the existing schemes, our scheme requires less resource consumption and approaches higher communication efficiency. In addition, our proposal involves only generalized Bell-state measurement, single-qudit measurement, one-qudit gates and a unitary-reduction operation, which makes it flexible and achievable for physical implementation.

  13. Transparent data service with multiple wireless access

    NASA Technical Reports Server (NTRS)

    Dean, Richard A.; Levesque, Allen H.

    1993-01-01

    The rapid introduction of digital wireless networks is an important part of the emerging digital communications scene. The introduction of Digital Cellular, LEO and GEO Satellites, and Personal Communications Services poses both a challenge and an opportunity for the data user. On the one hand wireless access will introduce significant new portable data services such as personal notebooks, paging, E-mail, and fax that will put the information age in the user's pocket. On the other hand the challenge of creating a seamless and transparent environment for the user in multiple access environments and across multiple network connections is formidable. A summary of the issues associated with developing techniques and standards that can support transparent and seamless data services is presented. The introduction of data services into the radio world represents a unique mix of RF channel problems, data protocol issues, and network issues. These problems require that experts from each of these disciplines fuse the individual technologies to support these services.

  14. Experimental demonstration of block interleaved frequency division multiple access for bidirectional visible light communications

    NASA Astrophysics Data System (ADS)

    Lin, Bangjiang; Yang, Hui; Ye, Weiping; Tang, Xuan; Ghassemlooy, Zabih

    2017-01-01

    We propose a power efficient multiple access scheme for visible light communications (VLC) based on the block interleaved frequency division multiple access (B-IFDMA) which provides large frequency-diversity, flexible bandwidth allocation, low complexity of channel equalization, and user separation. Bidirectional B-IFDMA VLC transmission is experimentally demonstrated to verify its feasibility. The impact of the number of subcarriers per block on the transmission performance under wireless optical channel is investigated.

  15. An Effective Massive Sensor Network Data Access Scheme Based on Topology Control for the Internet of Things

    PubMed Central

    Yi, Meng; Chen, Qingkui; Xiong, Neal N.

    2016-01-01

    This paper considers the distributed access and control problem of massive wireless sensor networks’ data access center for the Internet of Things, which is an extension of wireless sensor networks and an element of its topology structure. In the context of the arrival of massive service access requests at a virtual data center, this paper designs a massive sensing data access and control mechanism to improve the access efficiency of service requests and makes full use of the available resources at the data access center for the Internet of things. Firstly, this paper proposes a synergistically distributed buffer access model, which separates the information of resource and location. Secondly, the paper divides the service access requests into multiple virtual groups based on their characteristics and locations using an optimized self-organizing feature map neural network. Furthermore, this paper designs an optimal scheduling algorithm of group migration based on the combination scheme between the artificial bee colony algorithm and chaos searching theory. Finally, the experimental results demonstrate that this mechanism outperforms the existing schemes in terms of enhancing the accessibility of service requests effectively, reducing network delay, and has higher load balancing capacity and higher resource utility rate. PMID:27827878

  16. An Effective Massive Sensor Network Data Access Scheme Based on Topology Control for the Internet of Things.

    PubMed

    Yi, Meng; Chen, Qingkui; Xiong, Neal N

    2016-11-03

    This paper considers the distributed access and control problem of massive wireless sensor networks' data access center for the Internet of Things, which is an extension of wireless sensor networks and an element of its topology structure. In the context of the arrival of massive service access requests at a virtual data center, this paper designs a massive sensing data access and control mechanism to improve the access efficiency of service requests and makes full use of the available resources at the data access center for the Internet of things. Firstly, this paper proposes a synergistically distributed buffer access model, which separates the information of resource and location. Secondly, the paper divides the service access requests into multiple virtual groups based on their characteristics and locations using an optimized self-organizing feature map neural network. Furthermore, this paper designs an optimal scheduling algorithm of group migration based on the combination scheme between the artificial bee colony algorithm and chaos searching theory. Finally, the experimental results demonstrate that this mechanism outperforms the existing schemes in terms of enhancing the accessibility of service requests effectively, reducing network delay, and has higher load balancing capacity and higher resource utility rate.

  17. An axisymmetric multiple-relaxation-time lattice Boltzmann scheme

    NASA Astrophysics Data System (ADS)

    Xie, Wenjun

    2015-01-01

    A multiple-relaxation-time (MRT) lattice Boltzmann (LB) scheme developed for axisymmetric flows recovers the complete continuity and Navier-Stokes equations. This scheme follows the strategy of the standard D2Q9 model by using a single particle distribution function and a simple "collision-streaming" updating rule. The extra terms related to axisymmetry in the macroscopic equations are recovered by adding source terms into the LB equation, which are simple and involve no gradients. The compressible effect retained in the Navier-Stokes equations is recovered by introducing a term related to the reversed transformation matrix for MRT collision operator, so as to produce a correct bulk viscosity, making it suitable for compressible flows with high frequency and low Mach number. The validity of the scheme is demonstrated by testing the Hagen-Poiseuille flow and 3D Womersley flow, as well as the standing acoustic waves in a closed cylindrical chamber. The numerical experiments show desirable stability at low viscosities, enabling to simulate a standing ultrasound field in centimeters space.

  18. Optical multiple access techniques for on-board routing

    NASA Technical Reports Server (NTRS)

    Mendez, Antonio J.; Park, Eugene; Gagliardi, Robert M.

    1992-01-01

    The purpose of this research contract was to design and analyze an optical multiple access system, based on Code Division Multiple Access (CDMA) techniques, for on board routing applications on a future communication satellite. The optical multiple access system was to effect the functions of a circuit switch under the control of an autonomous network controller and to serve eight (8) concurrent users at a point to point (port to port) data rate of 180 Mb/s. (At the start of this program, the bit error rate requirement (BER) was undefined, so it was treated as a design variable during the contract effort.) CDMA was selected over other multiple access techniques because it lends itself to bursty, asynchronous, concurrent communication and potentially can be implemented with off the shelf, reliable optical transceivers compatible with long term unattended operations. Temporal, temporal/spatial hybrids and single pulse per row (SPR, sometimes termed 'sonar matrices') matrix types of CDMA designs were considered. The design, analysis, and trade offs required by the statement of work selected a temporal/spatial CDMA scheme which has SPR properties as the preferred solution. This selected design can be implemented for feasibility demonstration with off the shelf components (which are identified in the bill of materials of the contract Final Report). The photonic network architecture of the selected design is based on M(8,4,4) matrix codes. The network requires eight multimode laser transmitters with laser pulses of 0.93 ns operating at 180 Mb/s and 9-13 dBm peak power, and 8 PIN diode receivers with sensitivity of -27 dBm for the 0.93 ns pulses. The wavelength is not critical, but 830 nm technology readily meets the requirements. The passive optical components of the photonic network are all multimode and off the shelf. Bit error rate (BER) computations, based on both electronic noise and intercode crosstalk, predict a raw BER of (10 exp -3) when all eight users are

  19. Attitude determination using an adaptive multiple model filtering Scheme

    NASA Technical Reports Server (NTRS)

    Lam, Quang; Ray, Surendra N.

    1995-01-01

    Attitude determination has been considered as a permanent topic of active research and perhaps remaining as a forever-lasting interest for spacecraft system designers. Its role is to provide a reference for controls such as pointing the directional antennas or solar panels, stabilizing the spacecraft or maneuvering the spacecraft to a new orbit. Least Square Estimation (LSE) technique was utilized to provide attitude determination for the Nimbus 6 and G. Despite its poor performance (estimation accuracy consideration), LSE was considered as an effective and practical approach to meet the urgent need and requirement back in the 70's. One reason for this poor performance associated with the LSE scheme is the lack of dynamic filtering or 'compensation'. In other words, the scheme is based totally on the measurements and no attempts were made to model the dynamic equations of motion of the spacecraft. We propose an adaptive filtering approach which employs a bank of Kalman filters to perform robust attitude estimation. The proposed approach, whose architecture is depicted, is essentially based on the latest proof on the interactive multiple model design framework to handle the unknown of the system noise characteristics or statistics. The concept fundamentally employs a bank of Kalman filter or submodel, instead of using fixed values for the system noise statistics for each submodel (per operating condition) as the traditional multiple model approach does, we use an on-line dynamic system noise identifier to 'identify' the system noise level (statistics) and update the filter noise statistics using 'live' information from the sensor model. The advanced noise identifier, whose architecture is also shown, is implemented using an advanced system identifier. To insure the robust performance for the proposed advanced system identifier, it is also further reinforced by a learning system which is implemented (in the outer loop) using neural networks to identify other unknown

  20. Quality of Recovery Evaluation of the Protection Schemes for Fiber-Wireless Access Networks

    NASA Astrophysics Data System (ADS)

    Fu, Minglei; Chai, Zhicheng; Le, Zichun

    2016-03-01

    With the rapid development of fiber-wireless (FiWi) access network, the protection schemes have got more and more attention due to the risk of huge data loss when failures occur. However, there are few studies on the performance evaluation of the FiWi protection schemes by the unified evaluation criterion. In this paper, quality of recovery (QoR) method was adopted to evaluate the performance of three typical protection schemes (MPMC scheme, OBOF scheme and RPMF scheme) against the segment-level failure in FiWi access network. The QoR models of the three schemes were derived in terms of availability, quality of backup path, recovery time and redundancy. To compare the performance of the three protection schemes comprehensively, five different classes of network services such as emergency service, prioritized elastic service, conversational service, etc. were utilized by means of assigning different QoR weights. Simulation results showed that, for the most service cases, RPMF scheme was proved to be the best solution to enhance the survivability when planning the FiWi access network.

  1. A broadcasting multiple blind signature scheme based on quantum GHZ entanglement

    NASA Astrophysics Data System (ADS)

    Tian, Yuan; Chen, Hong; Gao, Yan; Zhuang, Honglin; Lian, Haigang; Han, Zhengping; Yu, Peng; Kong, Xiangze; Wen, Xiaojun

    2014-09-01

    Using the correlation of the GHZ triplet states, a broadcasting multiple blind signature scheme is proposed. Different from classical multiple signature and current quantum signature schemes, which could only deliver either multiple signature or unconditional security, our scheme guarantees both by adopting quantum key preparation, quantum encryption algorithm and quantum entanglement. Our proposed scheme has the properties of multiple signature, blindness, non-disavowal, non-forgery and traceability. To the best of our knowledge, we are the first to propose the broadcasting multiple blind signature of quantum cryptography.

  2. An efficient and secure attribute based signcryption scheme with LSSS access structure.

    PubMed

    Hong, Hanshu; Sun, Zhixin

    2016-01-01

    Attribute based encryption (ABE) and attribute based signature (ABS) provide flexible access control with authentication for data sharing between users, but realizing both functions will bring about too much computation burden. In this paper, we combine the advantages of CP-ABE with ABS and propose a ciphertext policy attribute based signcryption scheme. In our scheme, only legal receivers can decrypt the ciphertext and verify the signature signed by data owner. Furthermore, we use linear secret sharing scheme instead of tree structure to avoid the frequent calls of recursive algorithm. By security and performance analysis, we prove that our scheme is secure as well as gains higher efficiency.

  3. Improving access to maternity services: an overview of cash transfer and voucher schemes in South Asia.

    PubMed

    Jehan, Kate; Sidney, Kristi; Smith, Helen; de Costa, Ayesha

    2012-06-01

    In Nepal, India, Bangladesh and Pakistan, policy focused on improving access to maternity services has led to measures to reduce cost barriers impeding women's access to care. Specifically, these include cash transfer or voucher schemes designed to stimulate demand for services, including antenatal, delivery and post-partum care. In spite of their popularity, however, little is known about the impact or effectiveness of these schemes. This paper provides an overview of five major interventions: the Aama (Mothers') Programme (cash transfer element) in Nepal; the Janani Suraksha Yojana (Safe Motherhood Scheme) in India; the Chiranjeevi Yojana (Scheme for Long Life) in India; the Maternal Health Voucher Scheme in Bangladesh and the Sehat (Health) Voucher Scheme in Pakistan. It reviews the aims, rationale, implementation challenges, known outcomes, potential and limitations of each scheme based on current available data. Increased use of maternal health services has been reported since the schemes began, though evidence of improvements in maternal health outcomes has not been established due to a lack of controlled studies. Areas for improvement in these schemes, identified in this review, include the need for more efficient operational management, clear guidelines, financial transparency, plans for sustainability, evidence of equity and, above all, proven impact on quality of care and maternal mortality and morbidity.

  4. Poll-before-Data Multiple Access

    DTIC Science & Technology

    1999-01-01

    MACA [6], MACAW [1], IEEE 802.11 [5], and FAMA [2], [4] are just a few examples. All of these MAC protocols, and most protocols based on collision...Shenker and L. Zhang, “ MACAW : A Media Access Protocol for Wireless LAN’s” Proc. ACM SIGCOMM 94, London, UK, Aug. 31 - Sep. 2, 1994. [2] C. L. Fullmer and

  5. Advanced multiple access concepts in mobile satellite systems

    NASA Technical Reports Server (NTRS)

    Ananasso, Fulvio

    1990-01-01

    Some multiple access strategies for Mobile Satellite Systems (MSS) are discussed. These strategies were investigated in the context of three separate studies conducted for the International Maritime Satellite Organization (INMARSAT) and the European Space Agency (ESA). Satellite-Switched Frequency Division Multiple Access (SS-FDMA), Code Division Multiple Access (CDMA), and Frequency-Addressable Beam architectures are addressed, discussing both system and technology aspects and outlining advantages and drawbacks of either solution with associated relevant hardware issues. An attempt is made to compare the considered option from the standpoint of user terminal/space segment complexity, synchronization requirements, spectral efficiency, and interference rejection.

  6. Contemplation on marking scheme for Type X multiple choice questions, and an illustration of a practically applicable scheme

    PubMed Central

    Siddiqui, Nazeem Ishrat; Bhavsar, Vinayak H.; Bhavsar, Arnav V.; Bose, Sukhwant

    2016-01-01

    Ever since its inception 100 years back, multiple choice items have been widely used as a method of assessment. It has certain inherent limitations such as inability to test higher cognitive skills, element of guesswork while answering, and issues related with marking schemes. Various marking schemes have been proposed in the past but they are not balanced, skewed, and complex, which are based on mathematical calculations which are typically not within the grasp of medical personnel. Type X questions has many advantages being easy to construct, can test multiple concepts/application/facets of a topic, cognitive skill of various level of hierarchy can be tested, and unlike Type K items, they are free from complicated coding. In spite of these advantages, they are not in common use due to complicated marking schemes. This is the reason we explored the aspects of methods of evaluation of multiple correct options multiple choice questions and came up with the simple, practically applicable, nonstringent but logical scoring system for the same. The rationale of the illustrated marking scheme is that it takes into consideration the distracter recognition ability of the examinee rather than relying on the ability only to select the correct response. Thus, examinee's true knowledge is tested, and he is rewarded accordingly for selecting a correct answer and omitting a distracter. The scheme also penalizes for not recognizing a distracter thus controlling guessing behavior. It is emphasized that if the illustrated scoring scheme is adopted, then Type X questions would come in common practice. PMID:27127312

  7. Design of pulse waveform for waveform division multiple access UWB wireless communication system.

    PubMed

    Yin, Zhendong; Wang, Zhirui; Liu, Xiaohui; Wu, Zhilu

    2014-01-01

    A new multiple access scheme, Waveform Division Multiple Access (WDMA) based on the orthogonal wavelet function, is presented. After studying the correlation properties of different categories of single wavelet functions, the one with the best correlation property will be chosen as the foundation for combined waveform. In the communication system, each user is assigned to different combined orthogonal waveform. Demonstrated by simulation, combined waveform is more suitable than single wavelet function to be a communication medium in WDMA system. Due to the excellent orthogonality, the bit error rate (BER) of multiuser with combined waveforms is so close to that of single user in a synchronous system. That is to say, the multiple access interference (MAI) is almost eliminated. Furthermore, even in an asynchronous system without multiuser detection after matched filters, the result is still pretty ideal and satisfactory by using the third combination mode that will be mentioned in the study.

  8. One electron-controlled multiple-valued dynamic random-access-memory

    NASA Astrophysics Data System (ADS)

    Kye, H. W.; Song, B. N.; Lee, S. E.; Kim, J. S.; Shin, S. J.; Choi, J. B.; Yu, Y.-S.; Takahashi, Y.

    2016-02-01

    We propose a new architecture for a dynamic random-access-memory (DRAM) capable of storing multiple values by using a single-electron transistor (SET). The gate of a SET is designed to be connected to a plurality of DRAM unit cells that are arrayed at intersections of word lines and bitlines. In this SET-DRAM hybrid scheme, the multiple switching characteristics of SET enables multiple value data stored in a DRAM unit cell, and this increases the storage functionality of the device. Moreover, since refreshing data requires only a small amount of SET driving current, this enables device operating with low standby power consumption.

  9. Subcarrier multiplexing multiple-input multiple-output quantum key distribution scheme with orthogonal quantum states

    NASA Astrophysics Data System (ADS)

    Xiao, Hailin; Zhang, Zhongshan

    2017-01-01

    Quantum key distribution (QKD) system is presently being developed for providing high-security transmission in future free-space optical communication links. However, current QKD technique restricts quantum secure communication to a low bit rate. To improve the QKD bit rate, we propose a subcarrier multiplexing multiple-input multiple-output quantum key distribution (SCM-MQKD) scheme with orthogonal quantum states. Specifically, we firstly present SCM-MQKD system model and drive symmetrical SCM-MQKD system into decoherence-free subspaces. We then utilize bipartite Werner and isotropic states to construct multiple parallel single photon with orthogonal quantum states that are invariant for unitary operations. Finally, we derive the density matrix and the capacity of SCM-MQKD system, respectively. Theoretical analysis and numerical results show that the capacity of SCM-MQKD system will increase {log _2}(N^2+1) times than that of single-photon QKD system.

  10. A novel protection scheme for Ethernet PON FTTH access network

    NASA Astrophysics Data System (ADS)

    P'ng, W. T.; Abdullah, M. K.; Khatun, S.; Ahmad-Anas, S. B.; Shaari, S.

    2008-03-01

    Massive deployment of FTTH fiber network causes protection to FTTH network a crucial need. Most FTTH access networks are protected from failure by having redundant network equipments. These are not economical approaches, as the redundant systems are not efficiently utilized by the network. In this paper, the authors propose a protection method where redundant equipments are not required and protection is provided to end user through sharing of bandwidth during the failure time. A protection control unit and an optical switch is employed connecting four Optical Line Terminations (OLTs) with each one serving only 32 Optical Network Units (ONUs). Protection control unit collects information of ONUs served by each OLT and when an OLT fails, it will instruct an active OLT to serve its original ONUs together with the ONUs served by the failed OLT. It also provides information of ONUs served and inform the involved 64 ONUs of their new timeslot allocation. Then, the signal is switched from failed OLT's line to the instructed active OLT. The results show that through sharing of bandwidth, adequate protection is provided without redundant equipment for more than one OLT failure.

  11. Promoting Mathematics Accessibility through Multiple Representations Jigsaws

    ERIC Educational Resources Information Center

    Cleaves, Wendy Pelletier

    2008-01-01

    The ability to examine problems using varied approaches is one of the most important characteristics of good problem solvers. Other characteristics include independence, flexibility in thinking, determination, and a willingness to take risks. By using multiple representations, students are being asked to show the same information in varied ways.…

  12. Assessment methodology of protection schemes for next generation optical access networks

    NASA Astrophysics Data System (ADS)

    Mas Machuca, Carmen; Wosinska, Lena; Chen, Jiajia

    2015-12-01

    Optical access networks are evolving towards next generation solutions offering much higher bandwidth per end point. Moreover, the uninterrupted access to the network services is becoming crucial and therefore operators are now considering protecting their access networks. However, the cost factor is still very important due to the relatively low cost sharing in access segment. For this purpose, this paper proposes an assessment methodology that can be used to compare different protection schemes and help to identify the suitable solution for a given scenario. The assessment criteria includes some reliability measures such as Failure Impact Factor (FIF) and connection availability, as well as cost parameters such as the investment required in greenfield and brownfield scenarios and the increase in power consumption compared to the unprotected network. The proposed criteria have been used to compare 7 representative protection schemes shown in literature, which differ mainly in the number of protected network elements and the technology used for protection (fiber, wireless, etc.). The considered protection schemes have been applied to a hybrid wavelength division multiplexing/time division multiplexing Passive Optical Network (Hybrid PON) architecture in an urban area. It has been shown that it is difficult to identify the absolute best scheme with respect to all the considered criteria. However, depending on the requirements from the operator regarding the targeted reliability performance in the network, an appropriate protection scheme can be recommended for either a greenfield or a brownfield scenario.

  13. An efficient key-management scheme for hierarchical access control in e-medicine system.

    PubMed

    Wu, Shuhua; Chen, Kefei

    2012-08-01

    In e-medicine system, the sharing of patients' medical histories scattered among medical institutions through the Internet is highly desirable. The most immediate cryptographic need certainly is an efficient key management method to solve dynamic access problems in a user hierarchy. In this paper, we propose a practical solution for dynamic access problem in a user hierarchy based on hybrid cryptosystems. When compared with Nikooghadam et al.'s scheme proposed most recently, the time complexity and the required storage space is reduced significantly. Moreover, it provides provable security, and is easy to implement. Therefore, our scheme is more suitable for e-medicine system.

  14. An EMI-aware prioritized wireless access scheme for e-Health applications in hospital environments.

    PubMed

    Phunchongharn, Phond; Niyato, Dusit; Hossain, Ekram; Camorlinga, Sergio

    2010-09-01

    Wireless communications technologies can support efficient healthcare services in medical and patient-care environments. However, using wireless communications in a healthcare environment raises two crucial issues. First, the RF transmission can cause electromagnetic interference (EMI) to biomedical devices, which could critically malfunction. Second, the different types of electronic health (e-Health) applications require different quality of service (QoS). In this paper, we introduce an innovative wireless access scheme, called EMI-aware prioritized wireless access, to address these issues. First, the system architecture for the proposed scheme is introduced. Then, an EMI-aware handshaking protocol is proposed for e-Health applications in a hospital environment. This protocol provides safety to the biomedical devices from harmful interference by adapting transmit power of wireless devices based on the EMI constraints. A prioritized wireless access scheme is proposed for channel access by two different types of applications with different priorities. A Markov chain model is presented to study the queuing behavior of the proposed system. Then, this queuing model is used to optimize the performance of the system given the QoS requirements. Finally, the performance of the proposed wireless access scheme is evaluated through extensive simulations.

  15. Detectability models and waveform design for multiple access Low-Probability-of-Intercept networks

    NASA Astrophysics Data System (ADS)

    Mills, Robert F.

    1994-04-01

    Increased connectivity demands in the tactical battlefield have led to the development of multiple access low probability-of-intercept (LPI) communication networks. Most detectability studies of LPI networks have focused on the individual network links, in which detectability calculations are carried out for a single network emitter. This report, however, presents a different approach to network detectability analysis: it is assumed that the interceptor does not attempt to distinguish one emitter from another, but rather decides only if a network is operating or not. What distinguishes this approach from conventional link intercept analysis is that detection decisions are based on energy received from multiple sources. The following multiple access schemes are considered: frequency division, time division, direct sequence code division, and frequency hop code division. The wideband radiometer and its hybrids, such as the channelized radiometer, are used as potential network intercept receivers.

  16. Molecular Code Division Multiple Access: Gaussian Mixture Modeling

    NASA Astrophysics Data System (ADS)

    Zamiri-Jafarian, Yeganeh

    Communications between nano-devices is an emerging research field in nanotechnology. Molecular Communication (MC), which is a bio-inspired paradigm, is a promising technique for communication in nano-network. In MC, molecules are administered to exchange information among nano-devices. Due to the nature of molecular signals, traditional communication methods can't be directly applied to the MC framework. The objective of this thesis is to present novel diffusion-based MC methods when multi nano-devices communicate with each other in the same environment. A new channel model and detection technique, along with a molecular-based access method, are proposed in here for communication between asynchronous users. In this work, the received molecular signal is modeled as a Gaussian mixture distribution when the MC system undergoes Brownian noise and inter-symbol interference (ISI). This novel approach demonstrates a suitable modeling for diffusion-based MC system. Using the proposed Gaussian mixture model, a simple receiver is designed by minimizing the error probability. To determine an optimum detection threshold, an iterative algorithm is derived which minimizes a linear approximation of the error probability function. Also, a memory-based receiver is proposed to improve the performance of the MC system by considering previously detected symbols in obtaining the threshold value. Numerical evaluations reveal that theoretical analysis of the bit error rate (BER) performance based on the Gaussian mixture model match simulation results very closely. Furthermore, in this thesis, molecular code division multiple access (MCDMA) is proposed to overcome the inter-user interference (IUI) caused by asynchronous users communicating in a shared propagation environment. Based on the selected molecular codes, a chip detection scheme with an adaptable threshold value is developed for the MCDMA system when the proposed Gaussian mixture model is considered. Results indicate that the

  17. Distributed reservation-based code division multiple access

    NASA Astrophysics Data System (ADS)

    Wieselthier, J. E.; Ephremides, A.

    1984-11-01

    The use of spread spectrum signaling, motivated primarily by its antijamming capabilities in military applications, leads naturally to the use of Code Division Multiple Access (CDMA) techniques that permit the successful simultaneous transmission by a number of users over a wideband channel. In this paper we address some of the major issues that are associated with the design of multiple access protocols for spread spectrum networks. We then propose, analyze, and evaluate a distributed reservation-based multiple access protocol that does in fact exploit CDMA properties. Especially significant is the fact that no acknowledgment or feedback information from the destination is required (thus facilitating communication with a radio-silent mode), nor is any form of coordination among the users necessary.

  18. Fiber-based multiple-access frequency synchronization via 1f-2f dissemination

    NASA Astrophysics Data System (ADS)

    Zhu, Xi; Wang, Bo; Gao, Chao; Wang, Li-Jun

    2016-09-01

    Considering the reference frequency dissemination requirements of the Square Kilometre Array telescope (SKA) project, on the basis of the 1f-2f precision frequency synchronization scheme, we propose and demonstrate a fiber-based multiple-access frequency synchronization scheme. The dissemination reference frequency can be recovered at arbitrary nodes along the entire fiber link. It can be applied to antennas close proximity to the SKA central station, and will lead to a better SKA frequency synchronization network. As a performance test, we recover the disseminated 100-MHz reference frequency at an arbitrary node chosen as being 5 km away from the transmitting site. Relative frequency stabilities of 2.0×10-14/s and 1.6×10-16/104s are obtained. We also experimentally verify the feasibility of a frequency dissemination link with three access points. Project supported by the National Key Scientific Instrument and Equipment Development Project of China (Grant No. 2013YQ09094303).

  19. Low Density Parity Check Code for the Single Carrier Frequency Division Multiple Access

    NASA Astrophysics Data System (ADS)

    Islam, Mohammad Rakibul; Kim, Jinsang

    A new encoding technique for low density parity check (LDPC) code at the uplink of 3rd Generation Partnership Project Long Term Evolution (3GPP LTE) is proposed. The concept of approximate lower triangulation (ALT) is used where the parity check matrix is preprocessed and encoded in O(n) complexity. This encoding technique is applied in the uplink of LTE system where single carrier frequency division multiple access (SC-FDMA) is used as the multiple access scheme. As the encoding is performed in a O(n) complexity, it will outperform the existing LDPC encoding which is not used in LTE uplink due to its high encoding complexity. The proposed encoding is simulated in the SCFDMA scenario and the BER curve is shown.

  20. Access to Treatment for Diabetes and Hypertension in Rural Cambodia: Performance of Existing Social Health Protection Schemes

    PubMed Central

    Bigdeli, Maryam; Jacobs, Bart; Men, Chean Rithy; Nilsen, Kristine; Van Damme, Wim

    2016-01-01

    Background Non-communicable diseases (NCD) pose challenges to Cambodia’s health system. Medicines for NCD are on the National Essential Medicines List but no clinical guidelines support their utilization. Two social health protection schemes aimed at the informal sector population exist (Health Equity Funds and Insurance) together with two disease-specific interventions (a Peer Educator Network and Chronic Diseases Clinics) targeted at NCD patients. This study examines performance of these various schemes in relation to NCD. Methods Cross-sectional household survey among 709 individuals self-reporting diabetes and/or hypertension in three geographical locations in rural Cambodia using a structured questionnaire investigating diagnostic and treatment pathways, health seeking behaviour, health expenditures, and financial coping mechanisms. Results Two third of respondents with NCD were female and 55% did not belong to any scheme. The majority (59%) were diagnosed in the private sector and only 56% were on allopathic treatment that was mainly sought in the private sector (49%). Outpatient treatment cost was higher in the private sector and when using multiple providers of care. The majority were indebted, 11% due to health-related expenses. Contrary to social health protection schemes, disease-specific interventions offered better access to allopathic treatment and provided medicines in accordance with NEML. Conclusion The benefit packages of existing social health protection schemes and services in the public health sector should be adjusted to cater for the needs of people living with NCD in rural Cambodia. Initiatives that offer active disease management strategies and promote patients and community participation appear more successful in increasing treatment adherence and decreasing the risk of financial hardship. PMID:26815916

  1. Multiple-image encryption scheme based on cascaded fractional Fourier transform.

    PubMed

    Kong, Dezhao; Shen, Xueju; Xu, Qinzu; Xin, Wang; Guo, Haiqiong

    2013-04-20

    A multiple-image encryption scheme based on cascaded fractional Fourier transform is proposed. In the scheme, images are successively coded into the amplitude and phase of the input by cascading stages, which ends up with an encrypted image and a series of keys. The scheme takes full advantage of multikeys and the cascaded relationships of all stages, and it not only realizes image encryption but also achieves higher safety and more diverse applications. So multiuser authentication and hierarchical encryption are achieved. Numerical simulation verifies the feasibility of the method and demonstrates the security of the scheme and decryption characteristics. Finally, flexibility and variability of the scheme in application are discussed, and the simple photoelectric mixed devices to realize the scheme are proposed.

  2. Optimal channel access protocol with multiple reception capacity

    NASA Astrophysics Data System (ADS)

    Chlamtac, Imrica; Farago, Andras

    1994-04-01

    A multiple access packet communication model is analyzed in which the users can receive packets on more than one common channel. For this type of system, a new channel access protocol is presented. We prove that under heavy homogeneous load the protocol guarantees the maximum achievable throughput among all possible protocols. The general model can be applied to different systems, according to various realizations of the logical channels. For example, in packet radio networks the channels can be realized by different carrier frequencies (FDMA) or by different codes (CDMA). The simplicity and optimality of the protocol make it attractive for practical applications.

  3. Distributed magnetic field positioning system using code division multiple access

    NASA Technical Reports Server (NTRS)

    Prigge, Eric A. (Inventor)

    2003-01-01

    An apparatus and methods for a magnetic field positioning system use a fundamentally different, and advantageous, signal structure and multiple access method, known as Code Division Multiple Access (CDMA). This signal architecture, when combined with processing methods, leads to advantages over the existing technologies, especially when applied to a system with a large number of magnetic field generators (beacons). Beacons at known positions generate coded magnetic fields, and a magnetic sensor measures a sum field and decomposes it into component fields to determine the sensor position and orientation. The apparatus and methods can have a large `building-sized` coverage area. The system allows for numerous beacons to be distributed throughout an area at a number of different locations. A method to estimate position and attitude, with no prior knowledge, uses dipole fields produced by these beacons in different locations.

  4. Unifications and extensions of the multiple access communications problem

    NASA Astrophysics Data System (ADS)

    Molle, M. L.

    1981-08-01

    Multiple access protocols permit a broadcast communications channel to be shared by a large number of stations under distributed control. It is assumed that only one message at a time can be transmitted successfully over the common channel. A local optimality condition for synchronous multiple access protocols was derived and it is shown that many known protocols are special cases of this condition. A survey of much of the recent work on infinite population tree algorithms that use the history of channel activity to carry out short-range dynamic scheduling is included. An approach is presented for deriving upper bounds on the maximum stable throughput with finite average delay for infinite population protocols.

  5. Alternative multiple-access techniques for mobile satellite systems

    NASA Technical Reports Server (NTRS)

    Smith, Patrick O.; Geraniotis, Evaggelos

    1989-01-01

    The use of Code Division Multiple Access (CDMA) to satisfy the diverse requirements of a generic (land, maritime, aeronautical) mobile satellite system (MSS) network design is discussed. Comparisons between CDMA and Frequency Division Multiple Access (FDMA) show that a CDMA network design can support significantly more voice channel allocations than FDMA when relatively simple CDMA correlation receivers are employed, provided that there is sufficient space segment equivalent isotropically radiated power (EIRP). The use of more advanced CDMA receivers can improve the spectral and power efficiency. Although the use of CDMA may not gain immediate and widespread support in the international MSS community, provision for the use of CDMA for a domestic system in the U.S., and possibly for a regional system throughout North America, is likely.

  6. A Temporal Credential-Based Mutual Authentication with Multiple-Password Scheme for Wireless Sensor Networks

    PubMed Central

    Zhang, Ruisheng; Liu, Qidong

    2017-01-01

    Wireless sensor networks (WSNs), which consist of a large number of sensor nodes, have become among the most important technologies in numerous fields, such as environmental monitoring, military surveillance, control systems in nuclear reactors, vehicle safety systems, and medical monitoring. The most serious drawback for the widespread application of WSNs is the lack of security. Given the resource limitation of WSNs, traditional security schemes are unsuitable. Approaches toward withstanding related attacks with small overhead have thus recently been studied by many researchers. Numerous studies have focused on the authentication scheme for WSNs, but most of these works cannot achieve the security performance and overhead perfectly. Nam et al. proposed a two-factor authentication scheme with lightweight sensor computation for WSNs. In this paper, we review this scheme, emphasize its drawbacks, and propose a temporal credential-based mutual authentication with a multiple-password scheme for WSNs. Our scheme uses multiple passwords to achieve three-factor security performance and generate a session key between user and sensor nodes. The security analysis phase shows that our scheme can withstand related attacks, including a lost password threat, and the comparison phase shows that our scheme involves a relatively small overhead. In the comparison of the overhead phase, the result indicates that more than 95% of the overhead is composed of communication and not computation overhead. Therefore, the result motivates us to pay further attention to communication overhead than computation overhead in future research. PMID:28135288

  7. A Temporal Credential-Based Mutual Authentication with Multiple-Password Scheme for Wireless Sensor Networks.

    PubMed

    Liu, Xin; Zhang, Ruisheng; Liu, Qidong

    2017-01-01

    Wireless sensor networks (WSNs), which consist of a large number of sensor nodes, have become among the most important technologies in numerous fields, such as environmental monitoring, military surveillance, control systems in nuclear reactors, vehicle safety systems, and medical monitoring. The most serious drawback for the widespread application of WSNs is the lack of security. Given the resource limitation of WSNs, traditional security schemes are unsuitable. Approaches toward withstanding related attacks with small overhead have thus recently been studied by many researchers. Numerous studies have focused on the authentication scheme for WSNs, but most of these works cannot achieve the security performance and overhead perfectly. Nam et al. proposed a two-factor authentication scheme with lightweight sensor computation for WSNs. In this paper, we review this scheme, emphasize its drawbacks, and propose a temporal credential-based mutual authentication with a multiple-password scheme for WSNs. Our scheme uses multiple passwords to achieve three-factor security performance and generate a session key between user and sensor nodes. The security analysis phase shows that our scheme can withstand related attacks, including a lost password threat, and the comparison phase shows that our scheme involves a relatively small overhead. In the comparison of the overhead phase, the result indicates that more than 95% of the overhead is composed of communication and not computation overhead. Therefore, the result motivates us to pay further attention to communication overhead than computation overhead in future research.

  8. Code division multiple access signaling for modulated reflector technology

    DOEpatents

    Briles, Scott D [Los Alamos, NM

    2012-05-01

    A method and apparatus for utilizing code division multiple access in modulated reflectance transmissions comprises the steps of generating a phase-modulated reflectance data bit stream; modifying the modulated reflectance data bit stream; providing the modified modulated reflectance data bit stream to a switch that connects an antenna to an infinite impedance in the event a "+1" is to be sent, or connects the antenna to ground in the event a "0" or a "-1" is to be sent.

  9. Next generation communications satellites: Multiple access and network studies

    NASA Technical Reports Server (NTRS)

    Stern, T. E.; Schwartz, M.; Meadows, H. E.; Ahmadi, H. K.; Gadre, J. G.; Gopal, I. S.; Matsmo, K.

    1980-01-01

    Following an overview of issues involved in the choice of promising system architectures for efficient communication with multiple small inexpensive Earth stations serving hetergeneous user populations, performance evaluation via analysis and simulation for six SS/TDMA (satellite-switched/time-division multiple access) system architectures is discussed. These configurations are chosen to exemplify the essential alternatives available in system design. Although the performance evaluation analyses are of fairly general applicability, whenever possible they are considered in the context of NASA's 30/20 GHz studies. Packet switched systems are considered, with the assumption that only a part of transponder capacit is devoted to packets, the integration of circuit and packet switched traffic being reserved for further study. Three types of station access are distinguished: fixed (FA), demand (DA), and random access (RA). Similarly, switching in the satellite can be assigned on a fixed (FS) or demand (DS) basis, or replaced by a buffered store-and-forward system (SF) onboard the satellite. Since not all access/switching combinations are practical, six systems are analyzed in detail: three FS SYSTEMS, FA/FS, DA/ES, RA/FS; one DS system, DA/DS; and two SF systems, FA/SF, DA/SF. Results are presented primarily in terms of delay-throughput characteristics.

  10. Analysis of an FBMC/OQAM scheme for asynchronous access in wireless communications

    NASA Astrophysics Data System (ADS)

    Mattera, Davide; Tanda, Mario; Bellanger, Maurice

    2015-12-01

    The OFDM/OQAM transceiver belongs to the filter-bank-based multicarrier (FBMC) family and, unlike OFDM schemes, it is particularly able to meet the requirements of the physical layer of cognitive radio networks such as high level of adjacent channel leakage ratio and asynchronous communications. The paper proposes and analyzes a new implementation structure, named frequency spreading, for the OFDM/OQAM transceiver. On flat channels, it is equivalent to the standard one in terms of input-output relations, though more complex. On multipath channels, it offers a crucial advantage in terms of equalization, which is performed in the frequency domain, leading to high performance and no additional delay. With its flexibility and level of performance, the analyzed scheme has the potential to outperform OFDM in the asynchronous access context and in cognitive radio networks.

  11. Improvement of a quantum broadcasting multiple blind signature scheme based on quantum teleportation

    NASA Astrophysics Data System (ADS)

    Zhang, Wei; Qiu, Daowen; Zou, Xiangfu

    2016-06-01

    Recently, a broadcasting multiple blind signature scheme based on quantum teleportation has been proposed for the first time. It is claimed to have unconditional security and properties of quantum multiple signature and quantum blind signature. In this paper, we analyze the security of the protocol and show that each signatory can learn the signed message by a single-particle measurement and the signed message can be modified at random by any attacker according to the scheme. Furthermore, there are some participant attacks and external attacks existing in the scheme. Finally, we present an improved scheme and show that it can resist all of the mentioned attacks. Additionally, the secret keys can be used again and again, making it more efficient and practical.

  12. A multi-label image annotation scheme based on improved SVM multiple kernel learning

    NASA Astrophysics Data System (ADS)

    Jin, Cong; Jin, Shu-Wei

    2017-02-01

    Multi-label image annotation (MIA) has been widely studied during recent years and many MIA schemes have been proposed. However, the most existing schemes are not satisfactory. In this paper, an improved multiple kernel learning (IMKL) method of support vector machine (SVM) is proposed to improve the classification accuracy of SVM, then a novel MIA scheme based on IMKL is presented, which uses the discriminant loss to control the number of top semantic labels, and the feature selection approach is also used for improving the performance of MIA. The experiment results show that proposed MIA scheme achieves higher the performance than the existing other MIA schemes, its performance is satisfactory for large image dataset.

  13. The FODA-TDMA satellite access scheme - Presentation, study of the system, and results

    NASA Astrophysics Data System (ADS)

    Celandroni, Nedo; Ferro, Erina

    1991-12-01

    A description is given of FODA-TDMA, a satellite access scheme designed for mixed traffic. The study of the system is presented and the choice of some parameters is justified. A simplified analytic solution is found, describing the steady-state behavior of the system. Some results of the simulation tests for an already existing hardware environment are also presented for the channel speeds of 2 and 8 Mb/s, considering both the stationary and the transient cases. The results of the experimentation at 2 Mb/s on the satellite Eutelsat-F2 are also presented and compared with the results of the simulation.

  14. Intensity distribution based space and time division multiple access technique for hybrid-LOS indoor optical wireless communication

    NASA Astrophysics Data System (ADS)

    Miyamoto, Shinichi; Kawamoto, Kenji; Sampei, Seiichi

    2010-02-01

    This paper proposes a space division and time division multiple access (SD/TDMA) technique based on intensity distributions for hybrid line-of-sight (hybrid-LOS) indoor optical wireless communication system. At first, a novel signal discrimination scheme for the spatially multiplexed optical signals is proposed and it is applied to a space division multiple access (SDMA) in hybrid-LOS system. In the proposed scheme, multiple terminals simultaneously transmit their optical signals to access point (AP) using on-off-keying (OOK) modulation, and the spatially multiplexed optical signals are received by a photodetectors array (PD-array), where multiple PDs are disposed to observe the spatial intensity distribution of optical signals. Because the terminals transmit their data using OOK modulation, the spatial intensity distribution observed by the AP equipped with PD-array is subject to the data transmitted from individual terminals, and the AP can identify the terminals transmitting the optical signal by determining the transmitted intensity distribution. Of course, the transmitted intensity distributions are not orthogonal signal and the discriminability of transmitted intensity distributions is much related to the differences of intensity distributions. This implies that the number of terminals that can simultaneously access to the AP will be limited and it is determined by the differences of the candidate intensity distributions. In order to enhance the discriminability of the transmitted intensity distributions, the proposed signal discrimination scheme is further applied to the SD/TDMA. In the SD/TDMA, the discriminability required to enable SDMA is ensured by introducing a scheduling algorithm in which terminals with higher discriminatory of transmitted intensity distributions are allocated to the same time slot. Numerical results show that SD/TDMA using proposed signal discrimination scheme increases the throughput and the number of terminals that can access to

  15. Multitasking for flows about multiple body configurations using the chimera grid scheme

    NASA Technical Reports Server (NTRS)

    Dougherty, F. C.; Morgan, R. L.

    1987-01-01

    The multitasking of a finite-difference scheme using multiple overset meshes is described. In this chimera, or multiple overset mesh approach, a multiple body configuration is mapped using a major grid about the main component of the configuration, with minor overset meshes used to map each additional component. This type of code is well suited to multitasking. Both steady and unsteady two dimensional computations are run on parallel processors on a CRAY-X/MP 48, usually with one mesh per processor. Flow field results are compared with single processor results to demonstrate the feasibility of running multiple mesh codes on parallel processors and to show the increase in efficiency.

  16. Resident space object tracking using an interacting multiple model mixing scheme

    NASA Astrophysics Data System (ADS)

    Lam, Quang M.

    2014-06-01

    A multiple model estimation scheme is proposed to enhance the robustness of a resident space object (RSO) tracker subject to its maneuverability uncertainties (unplanned or unknown jet firing activities) and other system variations. The concept is based on the Interacting Multiple Model (IMM) estimation scheme. Within the IMM framework, two Extended Kalman Filter (EKF) models: (i) a 6 State (Position and Velocity of a constant orbiting RSO) EKF and (ii) a 9 state (Position, Velocity, and Acceleration of a maneuvering RSO) EKF are designed and implemented to achieve RSO maneuvering detection and enhanced tracking accuracy. The IMM estimation scheme is capable of providing enhanced state vector estimation accuracy and consistent prediction of the RSO maneuvering status, thus offering an attractive design feature for future Space Situational Awareness (SSA) missions. The design concept is illustrated using the Matlab/Based Simulation testing environment.

  17. A Novel Multiple-Access Correlation-Delay-Shift-Keying

    NASA Astrophysics Data System (ADS)

    Duan, J. Y.; Jiang, G. P.; Yang, H.

    In Correlation-Delay-Shift-Keying (CDSK), the reference signal and the information-bearing signal are added together during a certain time delay. Because the reference signal is not strictly orthogonal to the information-bearing signal, the cross-correlation between the adjacent chaotic signal (Intra-signal Interference, ISI) will be introduced into the demodulation at the receiver. Therefore, the Bit-Error Ratio (BER) of CDSK is higher than that of Differential-Chaos-Shift-Keying (DCSK). To avoid the ISI component and enhance the BER performance of CDSK in multiuser scenario, Multiple-Access CDSK with No Intra-signal Interference (MA-CDSK-NII) is proposed. By constructing the repeated chaotic generator and applying the Walsh code sequence to modulate the reference signal, in MA-CDSK-NII, the ISI component will be eliminated during the demodulation. Gaussian approximation method is adopted here to obtain the exact performance analysis of MA-CDSK-NII over additive white Gaussian noise (AWGN) channel and Rayleigh multipath fading channels. Results show that, due to no ISI component and lower transmitting power, the BER performance of MA-CDSK-NII can be better than that of multiple-access CDSK and Code-Shifted Differential-Chaos-Shift-Keying (CS-DCSK).

  18. FODA: a novel efficient multiple access protocol for highly dynamic self-organizing networks

    NASA Astrophysics Data System (ADS)

    Li, Hantao; Liu, Kai; Zhang, Jun

    2005-11-01

    Based on the concept of contention reservation for polling transmission and collision prevention strategy for collision resolution, a fair on-demand access (FODA) protocol for supporting node mobility and multihop architecture in highly dynamic self-organizing networks is proposed. In the protocol, a distributed clustering network architecture formed by self-organizing algorithm and a main idea of reserving channel resources to get polling service are adopted, so that the hidden terminal (HT) and exposed terminal (ET) problems existed in traffic transmission due to multihop architecture and wireless transmission can be eliminated completely. In addition, an improved collision prevention scheme based on binary countdown algorithm (BCA), called fair collision prevention (FCP) algorithm, is proposed to greatly eliminate unfair phenomena existed in contention access of newly active ordinary nodes and completely resolve access collisions. Finally, the performance comparison of the FODA protocol with carrier sense multiple access with collision avoidance (CSMA/CA) and polling protocols by OPNET simulation are presented. Simulation results show that the FODA protocol can overcome the disadvantages of CSMA/CA and polling protocols, and achieve higher throughput, lower average message delay and less average message dropping rate.

  19. Chip-interleaved optical code division multiple access relying on a photon-counting iterative successive interference canceller for free-space optical channels.

    PubMed

    Zhou, Xiaolin; Zheng, Xiaowei; Zhang, Rong; Hanzo, Lajos

    2013-07-01

    In this paper, we design a novel Poisson photon-counting based iterative successive interference cancellation (SIC) scheme for transmission over free-space optical (FSO) channels in the presence of both multiple access interference (MAI) as well as Gamma-Gamma atmospheric turbulence fading, shot-noise and background light. Our simulation results demonstrate that the proposed scheme exhibits a strong MAI suppression capability. Importantly, an order of magnitude of BER improvements may be achieved compared to the conventional chip-level optical code-division multiple-access (OCDMA) photon-counting detector.

  20. Performance of a space-time block coded code division multiple access system over Nakagami-m fading channels

    NASA Astrophysics Data System (ADS)

    Yu, Xiangbin; Dong, Tao; Xu, Dazhuan; Bi, Guangguo

    2010-09-01

    By introducing an orthogonal space-time coding scheme, multiuser code division multiple access (CDMA) systems with different space time codes are given, and corresponding system performance is investigated over a Nakagami-m fading channel. A low-complexity multiuser receiver scheme is developed for space-time block coded CDMA (STBC-CDMA) systems. The scheme can make full use of the complex orthogonality of space-time block coding to simplify the high decoding complexity of the existing scheme. Compared to the existing scheme with exponential decoding complexity, it has linear decoding complexity. Based on the performance analysis and mathematical calculation, the average bit error rate (BER) of the system is derived in detail for integer m and non-integer m, respectively. As a result, a tight closed-form BER expression is obtained for STBC-CDMA with an orthogonal spreading code, and an approximate closed-form BER expression is attained for STBC-CDMA with a quasi-orthogonal spreading code. Simulation results show that the proposed scheme can achieve almost the same performance as the existing scheme with low complexity. Moreover, the simulation results for average BER are consistent with the theoretical analysis.

  1. Frequency-Domain Equalization for Broadband Single-Carrier Multiple Access

    NASA Astrophysics Data System (ADS)

    Adachi, Fumiyuki; Tomeba, Hiromichi; Takeda, Kazuki

    Single-carrier (SC) multiple access is a promising uplink multiple access technique because of its low peak-to-average power ratio (PAPR) property and high frequency diversity gain that is achievable through simple one-tap frequency-domain equalization (FDE) in a strong frequency-selective channel. The multiple access capability can be obtained by combining either frequency division multiple access (FDMA) or code division multiple access (CDMA) with SC transmission. In this article, we review the recent research on the SC multiple access techniques with one-tap FDE. After introducing the principle of joint FDE/antenna diversity combining, we review various SC multiple access techniques with one-tap FDE, i.e., SC-FDMA, SC-CDMA, block spread CDMA, and delay-time/CDMA.

  2. Diffuse optical tomography based on multiple access coding

    NASA Astrophysics Data System (ADS)

    Wang, Xuefeng; Wang, Yuanqing; Su, Jinshan; Xu, Fan

    2016-04-01

    Diffuse optical tomography (DOT) has the advantages of being a non-invasive, non-radiation emitting and low-cost biological tissue imaging method, and many recent studies have employed this technology. By improving the spatial resolution and developing a new method for constantly improving the flexibility of the experimental device, the system can perform data acquisition rapidly and conveniently. We propose a method for rapid data acquisition based on multiple access coding; it can acquire data in parallel, and the system can greatly improve the temporal resolution of the data acquisition step in diffuse optical tomography thereafter. We simulate the encoding and decoding process of the source-detector pair and successfully isolate the source signal from mixed signals. The DOT image reconstruction highlight the effectiveness of the system.

  3. Comparative performance study of one or multiple receivers schemes for FSO links over gamma-gamma turbulence channels

    NASA Astrophysics Data System (ADS)

    Stassinakis, Argyris N.; Nistazakis, Hector E.; Tombras, George S.

    2012-06-01

    Terrestrial free space optical telecommunication systems offer license-free very high bandwidth access characteristics with significantly low installation and operational cost. On the other hand, the performance of such a system depends strongly on the weather conditions in the area between the transmitter and the receiver due to the fact that the transmission media is the atmosphere. A very significant phenomenon which decreases a FSO links' performance is atmospheric turbulence. In order to counterbalance this reduction, in this work, we consider a free space optical system with a multiple receivers' scheme and diversity in space that operates under weak to strong atmospheric turbulence conditions modeled by the gamma-gamma distribution. We derive closed form mathematical expressions for the estimation of the outage probability and the average bit error rate of the multiple receivers' system. Additionally, we compare the performance capabilities of the single point to point link with those of the spatial diversity scheme under the assumption that the total aperture surface of the receivers of the latter is the same as the aperture surface of the single receiver of the former. Moreover, we demonstrate numerical results for a variety of common practical cases for both cases, with and without, spatial diversity.

  4. Multiple-image encryption scheme with a single-pixel detector

    NASA Astrophysics Data System (ADS)

    Yuan, Sheng; Liu, Xuemei; Zhou, Xin; Li, Zhongyang

    2016-08-01

    A multiple-image encryption (MIE) scheme with a single-pixel detector has been proposed according to the principle of ghost imaging. In this scheme, each of the spatially coherent laser beams is modified by a set of phase-mask keys and illuminates on a secret image. All of the transmitted lights are recorded together by a single-pixel (bucket) detector to obtain a ciphertext, but anyone of the secret images can be decrypted from the ciphertext independently without any mutually overlapped despite some noise in them. The MIE scheme will bring convenience for data storage and transmission, especially in the case that different secret images need to be distributed to different authorized users, because the ciphertext is a real-valued function and this scheme can effectively avoid the secret images being extracted mutually. The basic principle of the MIE scheme is described theoretically and verified by computer simulations. Finally, the feasibility, robustness and encryption capacity are also tested numerically.

  5. Dynamic Key Management Schemes for Secure Group Access Control Using Hierarchical Clustering in Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Tsaur, Woei-Jiunn; Pai, Haw-Tyng

    2008-11-01

    The applications of group computing and communication motivate the requirement to provide group access control in mobile ad hoc networks (MANETs). The operation in MANETs' groups performs a decentralized manner and accommodated membership dynamically. Moreover, due to lack of centralized control, MANETs' groups are inherently insecure and vulnerable to attacks from both within and outside the groups. Such features make access control more challenging in MANETs. Recently, several researchers have proposed group access control mechanisms in MANETs based on a variety of threshold signatures. However, these mechanisms cannot actually satisfy MANETs' dynamic environments. This is because the threshold-based mechanisms cannot be achieved when the number of members is not up to the threshold value. Hence, by combining the efficient elliptic curve cryptosystem, self-certified public key cryptosystem and secure filter technique, we construct dynamic key management schemes based on hierarchical clustering for securing group access control in MANETs. Specifically, the proposed schemes can constantly accomplish secure group access control only by renewing the secure filters of few cluster heads, when a cluster head joins or leaves a cross-cluster. In such a new way, we can find that the proposed group access control scheme can be very effective for securing practical applications in MANETs.

  6. Adaptive Code Division Multiple Access Protocol for Wireless Network-on-Chip Architectures

    NASA Astrophysics Data System (ADS)

    Vijayakumaran, Vineeth

    Massive levels of integration following Moore's Law ushered in a paradigm shift in the way on-chip interconnections were designed. With higher and higher number of cores on the same die traditional bus based interconnections are no longer a scalable communication infrastructure. On-chip networks were proposed enabled a scalable plug-and-play mechanism for interconnecting hundreds of cores on the same chip. Wired interconnects between the cores in a traditional Network-on-Chip (NoC) system, becomes a bottleneck with increase in the number of cores thereby increasing the latency and energy to transmit signals over them. Hence, there has been many alternative emerging interconnect technologies proposed, namely, 3D, photonic and multi-band RF interconnects. Although they provide better connectivity, higher speed and higher bandwidth compared to wired interconnects; they also face challenges with heat dissipation and manufacturing difficulties. On-chip wireless interconnects is one other alternative proposed which doesn't need physical interconnection layout as data travels over the wireless medium. They are integrated into a hybrid NOC architecture consisting of both wired and wireless links, which provides higher bandwidth, lower latency, lesser area overhead and reduced energy dissipation in communication. However, as the bandwidth of the wireless channels is limited, an efficient media access control (MAC) scheme is required to enhance the utilization of the available bandwidth. This thesis proposes using a multiple access mechanism such as Code Division Multiple Access (CDMA) to enable multiple transmitter-receiver pairs to send data over the wireless channel simultaneously. It will be shown that such a hybrid wireless NoC with an efficient CDMA based MAC protocol can significantly increase the performance of the system while lowering the energy dissipation in data transfer. In this work it is shown that the wireless NoC with the proposed CDMA based MAC protocol

  7. Fourth Annual International Acquisitions Workshop: Access to Multiple Media Worldwide

    NASA Technical Reports Server (NTRS)

    1994-01-01

    Topics discussed during the workshop include: (1) Multinational-Multiple media collections and activities spanning many countries; (2) Multiple media in North American trade and commerce; (3) African spotlight; (4) Europe-Multiple media in national libraries and services; (5) Scandinavian spotlight; (6) Internet update; (7) Multiple media in US federal agencies; (8) Open-source multiple media in US federal agencies; and (9) Multiple media at US federal technical agencies-NIST and NOAA.

  8. Access to DIII-D data located in multiple files and multiple locations

    SciTech Connect

    McHarg, B.B. Jr.

    1993-10-01

    The General Atomics DIII-D tokamak fusion experiment is now collecting over 80 MB of data per discharge once every 10 min, and that quantity is expected to double within the next year. The size of the data files, even in compressed format, is becoming increasingly difficult to handle. Data is also being acquired now on a variety of UNIX systems as well as MicroVAX and MODCOMP computer systems. The existing computers collect all the data into a single shot file, and this data collection is taking an ever increasing amount of time as the total quantity of data increases. Data is not available to experimenters until it has been collected into the shot file, which is in conflict with the substantial need for data examination on a timely basis between shots. The experimenters are also spread over many different types of computer systems (possibly located at other sites). To improve data availability and handling, software has been developed to allow individual computer systems to create their own shot files locally. The data interface routine PTDATA that is used to access DIII-D data has been modified so that a user`s code on any computer can access data from any computer where that data might be located. This data access is transparent to the user. Breaking up the shot file into separate files in multiple locations also impacts software used for data archiving, data management, and data restoration.

  9. A novel generation scheme of ultra-short pulse trains with multiple wavelengths

    NASA Astrophysics Data System (ADS)

    Su, Yulong; Hu, Hui; Feng, Huan; Li, Lu; Han, Biao; Wen, Yu; Wang, Yishan; Si, Jinhai; Xie, Xiaoping; Wang, Weiqiang

    2017-04-01

    We demonstrate a novel scheme based on active mode locking combined with four-wave mixing (FWM) to generate ultra-short pulse trains at high repetition rate with multiple wavelengths for applications in various fields. The obtained six wavelengths display high uniformity both in temporal and frequency domain. Pulses at each wavelength are mode locked with pulse duration of 44.37 ps, signal-to-noise ratio (SNR) of 47.89 dB, root-mean-square (RMS) timing jitter of 552.7 fs, and the time-bandwidth product of 0.68 at repetition rate of 1 GHz. The experimental results show this scheme has promising usage in optical communications, optical networks, and fiber sensing.

  10. Proceedings of the Mobile Satellite System Architectures and Multiple Access Techniques Workshop

    NASA Technical Reports Server (NTRS)

    Dessouky, Khaled

    1989-01-01

    The Mobile Satellite System Architectures and Multiple Access Techniques Workshop served as a forum for the debate of system and network architecture issues. Particular emphasis was on those issues relating to the choice of multiple access technique(s) for the Mobile Satellite Service (MSS). These proceedings contain articles that expand upon the 12 presentations given in the workshop. Contrasting views on Frequency Division Multiple Access (FDMA), Code Division Multiple Access (CDMA), and Time Division Multiple Access (TDMA)-based architectures are presented, and system issues relating to signaling, spacecraft design, and network management constraints are addressed. An overview article that summarizes the issues raised in the numerous discussion periods of the workshop is also included.

  11. HiCoDG: A Hierarchical Data-Gathering Scheme Using Cooperative Multiple Mobile Elements †

    PubMed Central

    Van Le, Duc; Oh, Hoon; Yoon, Seokhoon

    2014-01-01

    In this paper, we study mobile element (ME)-based data-gathering schemes in wireless sensor networks. Due to the physical speed limits of mobile elements, the existing data-gathering schemes that use mobile elements can suffer from high data-gathering latency. In order to address this problem, this paper proposes a new hierarchical and cooperative data-gathering (HiCoDG) scheme that enables multiple mobile elements to cooperate with each other to collect and relay data. In HiCoDG, two types of mobile elements are used: the mobile collector (MC) and the mobile relay (MR). MCs collect data from sensors and forward them to the MR, which will deliver them to the sink. In this work, we also formulated an integer linear programming (ILP) optimization problem to find the optimal trajectories for MCs and the MR, such that the traveling distance of MEs is minimized. Two variants of HiCoDG, intermediate station (IS)-based and cooperative movement scheduling (CMS)-based, are proposed to facilitate cooperative data forwarding from MCs to the MR. An analytical model for estimating the average data-gathering latency in HiCoDG was also designed. Simulations were performed to compare the performance of the IS and CMS variants, as well as a multiple traveling salesman problem (mTSP)-based approach. The simulation results show that HiCoDG outperforms mTSP in terms of latency. The results also show that CMS can achieve the lowest latency with low energy consumption. PMID:25526356

  12. HiCoDG: a hierarchical data-gathering scheme using cooperative multiple mobile elements.

    PubMed

    Van Le, Duc; Oh, Hoon; Yoon, Seokhoon

    2014-12-17

    In this paper, we study mobile element (ME)-based data-gathering schemes in wireless sensor networks. Due to the physical speed limits of mobile elements, the existing data-gathering schemes that use mobile elements can suffer from high data-gathering latency. In order to address this problem, this paper proposes a new hierarchical and cooperative data-gathering (HiCoDG) scheme that enables multiple mobile elements to cooperate with each other to collect and relay data. In HiCoDG, two types of mobile elements are used: the mobile collector (MC) and the mobile relay (MR). MCs collect data from sensors and forward them to the MR, which will deliver them to the sink. In this work, we also formulated an integer linear programming (ILP) optimization problem to find the optimal trajectories for MCs and the MR, such that the traveling distance of MEs is minimized. Two variants of HiCoDG, intermediate station (IS)-based and cooperative movement scheduling (CMS)-based, are proposed to facilitate cooperative data forwarding from MCs to the MR. An analytical model for estimating the average data-gathering latency in HiCoDG was also designed. Simulations were performed to compare the performance of the IS and CMS variants, as well as a multiple traveling salesman problem (mTSP)-based approach. The simulation results show that HiCoDG outperforms mTSP in terms of latency. The results also show that CMS can achieve the lowest latency with low energy consumption.

  13. Performance analysis of commercial multiple-input-multiple-output access point in distributed antenna system.

    PubMed

    Fan, Yuting; Aighobahi, Anthony E; Gomes, Nathan J; Xu, Kun; Li, Jianqiang

    2015-03-23

    In this paper, we experimentally investigate the throughput of IEEE 802.11n 2x2 multiple-input-multiple-output (MIMO) signals in a radio-over-fiber-based distributed antenna system (DAS) with different fiber lengths and power imbalance. Both a MIMO-supported access point (AP) and a spatial-diversity-supported AP were separately employed in the experiments. Throughput measurements were carried out with wireless users at different locations in a typical office environment. For the different fiber length effect, the results indicate that MIMO signals can maintain high throughput when the fiber length difference between the two remote antenna units (RAUs) is under 100 m and falls quickly when the length difference is greater. For the spatial diversity signals, high throughput can be maintained even when the difference is 150 m. On the other hand, the separation of the MIMO antennas allows additional freedom in placing the antennas in strategic locations for overall improved system performance, although it may also lead to received power imbalance problems. The results show that the throughput performance drops in specific positions when the received power imbalance is above around 13 dB. Hence, there is a trade-off between the extent of the wireless coverage for moderate bit-rates and the area over which peak bit-rates can be achieved.

  14. Has the Rajiv Aarogyasri Community Health Insurance Scheme of Andhra Pradesh Addressed the Educational Divide in Accessing Health Care?

    PubMed Central

    Rao, Mala; Singh, Prabal Vikram; Katyal, Anuradha; Samarth, Amit; Bergkvist, Sofi; Renton, Adrian; Netuveli, Gopalakrishnan

    2016-01-01

    Background Equity of access to healthcare remains a major challenge with families continuing to face financial and non-financial barriers to services. Lack of education has been shown to be a key risk factor for 'catastrophic' health expenditure (CHE), in many countries including India. Consequently, ways to address the education divide need to be explored. We aimed to assess whether the innovative state-funded Rajiv Aarogyasri Community Health Insurance Scheme of Andhra Pradesh state launched in 2007, has achieved equity of access to hospital inpatient care among households with varying levels of education. Methods We used the National Sample Survey Organization 2004 survey as our baseline and the same survey design to collect post-intervention data from 8623 households in the state in 2012. Two outcomes, hospitalisation and CHE for inpatient care, were estimated using education as a measure of socio-economic status and transforming levels of education into ridit scores. We derived relative indices of inequality by regressing the outcome measures on education, transformed as a ridit score, using logistic regression models with appropriate weights and accounting for the complex survey design. Findings Between 2004 and 2012, there was a 39% reduction in the likelihood of the most educated person being hospitalised compared to the least educated, with reductions observed in all households as well as those that had used the Aarogyasri. For CHE the inequality disappeared in 2012 in both groups. Sub-group analyses by economic status, social groups and rural-urban residence showed a decrease in relative indices of inequality in most groups. Nevertheless, inequalities in hospitalisation and CHE persisted across most groups. Conclusion During the time of the Aarogyasri scheme implementation inequalities in access to hospital care were substantially reduced but not eliminated across the education divide. Universal access to education and schemes such as Aarogyasri have the

  15. China’s new cooperative medical scheme and equity in access to health care: evidence from a longitudinal household survey

    PubMed Central

    2013-01-01

    Introduction China's New Cooperative Medical Scheme (NCMS) was brought to life in 2003 in response to the deterioration in access to health services in rural areas. Despite its fast expansion, the scheme’s impacts on access to health care have raised growing concerns, in particular regarding whether and to what extent the scheme has reduced inequity in access to health care in rural China. Methods This study examines income-related inequity in access to health care from 2004 (before the national rollout of NCMS) to 2009 (after the expansion of NCMS across the rural China) by estimating Concentration Indices over both formal health care (outpatient care, prevention care) and informal health care use (folk doctor care). Data were drawn from a longitudinal household survey dataset - China Health and Nutrition Survey (CHNS). Results The study suggested that the level of inequity remained the same for outpatient care, and an increased favouring-poor gap in terms of folk doctor care was observed. In terms of preventive care, a favouring-rich inequity was observed both in 2004 and 2009, but the effects of inequity were narrowed. The NCMS had some effects in reducing income-related health inequity in folk doctor care and preventive care, but the contribution was rather small. The study also found that the rural better-off had started to seek for commercial insurance to cover possible financial risks from the burden of diseases. Conclusion The study concludes that the impacts of the NCMS on improving access to formal care for the poor are limited. Without a more comprehensive insurance package that effectively targets the rural poor, the intended equity goals expected from the scheme will be difficult to realize. PMID:23522336

  16. 47 CFR 76.2000 - Exclusive access to multiple dwelling units generally.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 4 2011-10-01 2011-10-01 false Exclusive access to multiple dwelling units... to multiple dwelling units generally. (a) Prohibition. No cable operator or other provider of MVPD... rule, MDU shall include a multiple dwelling unit building (such as an apartment building,...

  17. 47 CFR 76.2000 - Exclusive access to multiple dwelling units generally.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Exclusive access to multiple dwelling units... to multiple dwelling units generally. (a) Prohibition. No cable operator or other provider of MVPD... rule, MDU shall include a multiple dwelling unit building (such as an apartment building,...

  18. 47 CFR 76.2000 - Exclusive access to multiple dwelling units generally.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 4 2014-10-01 2014-10-01 false Exclusive access to multiple dwelling units... to multiple dwelling units generally. (a) Prohibition. No cable operator or other provider of MVPD... rule, MDU shall include a multiple dwelling unit building (such as an apartment building,...

  19. 47 CFR 76.2000 - Exclusive access to multiple dwelling units generally.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 4 2013-10-01 2013-10-01 false Exclusive access to multiple dwelling units... to multiple dwelling units generally. (a) Prohibition. No cable operator or other provider of MVPD... rule, MDU shall include a multiple dwelling unit building (such as an apartment building,...

  20. 47 CFR 76.2000 - Exclusive access to multiple dwelling units generally.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 47 Telecommunication 4 2012-10-01 2012-10-01 false Exclusive access to multiple dwelling units... to multiple dwelling units generally. (a) Prohibition. No cable operator or other provider of MVPD... rule, MDU shall include a multiple dwelling unit building (such as an apartment building,...

  1. Optical Multiple Access Network (OMAN) for advanced processing satellite applications

    NASA Technical Reports Server (NTRS)

    Mendez, Antonio J.; Gagliardi, Robert M.; Park, Eugene; Ivancic, William D.; Sherman, Bradley D.

    1991-01-01

    An OMAN breadboard for exploring advanced processing satellite circuit switch applications is introduced. Network architecture, hardware trade offs, and multiple user interference issues are presented. The breadboard test set up and experimental results are discussed.

  2. A double-moment multiple-phase four-class bulk ice scheme, Part 1: Description

    NASA Technical Reports Server (NTRS)

    Ferrier, Brad Shoenberg

    1994-01-01

    A detailed ice-phase bulk microphysical scheme has been developed for simulating the hydrometeor distributions of convective and stratiform precipitation in different large-scale environmental conditions. The proposed scheme involves 90 distinct microphysical processes, which predict the mixing ratios and the number concentrations of small ice crystals, snow, graupel, and frozen drops/hail, as well as the mixing ratios of liquid water on wet precipitation ice (snow, graupel, frozen drops). The number of adjustable coefficients has been significantly reduced in comparison with other bulk schemes. Additional improvements have been made to the parameterization in the following areas: (1) representing small ice crystals with nonzero terminal fall velocities and dispersive size distributions, (2) accurate and computationally efficient calculations of precipitation collection processes, (3) reformulating the collection equation to prevent unrealistically large accretion rates, (4) more realistic conversion by riming between different classes of precipitation ice, (5) preventing unrealistically large rates of raindrop freezing and freezing of liquid water on ice, (6) detailed treatment of various rime-splintering ice multiplication mechanisms, (7) a simple representation of the Hobbs-Rangno ice enhancement process, (8) aggregation of small ice crystals and snow, and (9) allowing explicit competition between cloud water condensation and ice deposition rates rather than using saturation adjustment techniques. For the purposes of conserving the higher moments of the particle distributions, preserving the spectral widths (or slopes) of the particle spectra is shown to be more important than strict conservation of particle number concentration when parameterizing changes in ice-particle number concentrations due to melting, vapor transfer processes (sublimation of dry ice, evaporation from wet ice), and conversion between different hydrometeor species. The microphysical scheme

  3. GSFC conceptual design study for an inter-satellite Optical Multiple Access communication system

    NASA Technical Reports Server (NTRS)

    Fox, Neil; Maynard, Will; Clarke, Ernest; Bruno, Ronald

    1991-01-01

    System and terminal level specifications for an inter-satellite Optical Multiple Access (OMA) communication system are presented, as well as the resulting hardware designs for both OMA relay and OMA user terminals. The OMA relay terminal design uses a mechanical innovation which moves multiple fiber optic pickups in the focal plane, thereby providing simultaneous links with multiple OMA user terminals via a single telescope. Thus, with such a terminal on a relay satellite, multiple access service can be provided with a minimum of impact on the relay satellite.

  4. Novel Scheme of Carrier Tri-reuse and Distribution Fiber Protection Based on Round Shift Method in Optical Access Network

    NASA Astrophysics Data System (ADS)

    Chen, Haibin; Gan, Chaoqin; Yin, Maojun; Ni, Cuiping

    2015-06-01

    A novel architecture of optical access network based on round shift method is proposed. Round shift method is composed by round service mode of carriers and cycle characteristic of 2×N arrayed waveguide grating (AWG). By utilizing the round service mode, every carrier is tri-reused to provide service for three different optical network units. Besides, in remote node, the 2×3N AWG can be replaced by three 2×N AWGs and AWGs' channel spacing is increased. So, the demand on RN's AWGs is decreased. Furthermore, based on the cycle characteristic of 2×N AWG, a 1+1 protection scheme is presented to provide independent protection for distribution fibers. Simulation and analysis show the proposed scheme works well.

  5. An Integrated Approach for Accessing Multiple Datasets through LANCE

    NASA Astrophysics Data System (ADS)

    Murphy, K. J.; Teague, M.; Conover, H.; Regner, K.; Beaumont, B.; Masuoka, E.; Vollmer, B.; Theobald, M.; Durbin, P.; Michael, K.; Boller, R. A.; Schmaltz, J. E.; Davies, D.; Horricks, K.; Ilavajhala, S.; Thompson, C. K.; Bingham, A.

    2011-12-01

    The NASA/GSFC Land Atmospheres Near-real time Capability for EOS (LANCE) provides imagery for approximately 40 data products from MODIS, AIRS, AMSR-E and OMI to support the applications community in the study of a variety of phenomena. Thirty-six of these products are available within 2.5 hours of observation at the spacecraft. The data set includes the population density data provided by the EOSDIS Socio-Economic Data and Applications Center (SEDAC). The purpose of this paper is to describe the variety of tools that have been developed by LANCE to support user access to the imagery. The long-standing Rapid Response system has been integrated into LANCE and is a major vehicle for the distribution of the imagery to end users. There are presently approximately 10,000 anonymous users per month accessing these imagery. The products are grouped into 14 applications categories such as Smoke Plumes, Pollution, Fires, Agriculture and the selection of any category will make relevant subsets of the 40 products available as possible overlays in an interactive Web Client utilizing Web Mapping Service (WMS) to support user investigations (http://lance2.modaps.eosdis.nasa.gov/wms/). For example, selecting Severe Storms will include 6 products for MODIS, OMI, AIRS, and AMSR-E plus the SEDAC population density data. The client and WMS were developed using open-source technologies such as OpenLayers and MapServer and provides a uniform, browser-based access to data products. All overlays are downloadable in PNG, JPEG, or GeoTiff form up to 200MB per request. The WMS was beta-tested with the user community and substantial performance improvements were made through the use of such techniques as tile-caching. LANCE established a partnership with Physical Oceanography Distributed Active Archive Center (PO DAAC) to develop an alternative presentation for the 40 data products known as the State of the Earth (SOTE). This provides a Google Earth-based interface to the products grouped in

  6. Concept for Multiple-Access Free-Space Laser Communications

    NASA Technical Reports Server (NTRS)

    Wilson, Keith

    2004-01-01

    A design concept for a proposed airborne or spaceborne free-space optical-communication terminal provides for simultaneous reception of signals from multiple other opticalcommunication terminals aboard aircraft or spacecraft that carry scientific instruments and fly at lower altitudes. The concept reflects the need for rapid acquisition and tracking of the signals coming from the lower-altitude terminals as they move across the field of view.

  7. Transmission access and pricing with multiple separate energy forward markets

    SciTech Connect

    Gribik, P.R.; Angelidis, G.A.; Kovacs, R.R.

    1999-08-01

    California`s congestion management protocols provide comparable access and prices to all users of the transmission system (power exchange and bilateral contract parties). The users implicitly bid for capacity on major transmission paths between zones. The Independent System Operator (ISO) allocates the available transmission capacity on these paths so that it maximizes the value of this capacity as measured by the users` bids. Everyone scheduling flow on a congested path is charged the marginal-cost-based price for using the path. The ISO keeps each party`s portfolio of generation and load individually in balance when adjusting schedules to relieve congestion on interzonal paths. By keeping the portfolios of the different parties separate, the ISO clears its transmission market without arranging energy trades between parties. Parties are responsible for arranging their own trades. The ISO does not become involved in the energy forward markets.

  8. Access Scheme for Controlling Mobile Agents and its Application to Share Medical Information.

    PubMed

    Liao, Yu-Ting; Chen, Tzer-Shyong; Chen, Tzer-Long; Chung, Yu-Fang; Chen, Yu- Xin; Hwang, Jen-Hung; Wang, Huihui; Wei, Wei

    2016-05-01

    This study is showing the advantage of mobile agents to conquer heterogeneous system environments and contribute to a virtual integrated sharing system. Mobile agents will collect medical information from each medical institution as a method to achieve the medical purpose of data sharing. Besides, this research also provides an access control and key management mechanism by adopting Public key cryptography and Lagrange interpolation. The safety analysis of the system is based on a network attacker's perspective. The achievement of this study tries to improve the medical quality, prevent wasting medical resources and make medical resources access to appropriate configuration.

  9. Next generation communications satellites: multiple access and network studies

    NASA Technical Reports Server (NTRS)

    Meadows, H. E.; Schwartz, M.; Stern, T. E.; Ganguly, S.; Kraimeche, B.; Matsuo, K.; Gopal, I.

    1982-01-01

    Efficient resource allocation and network design for satellite systems serving heterogeneous user populations with large numbers of small direct-to-user Earth stations are discussed. Focus is on TDMA systems involving a high degree of frequency reuse by means of satellite-switched multiple beams (SSMB) with varying degrees of onboard processing. Algorithms for the efficient utilization of the satellite resources were developed. The effect of skewed traffic, overlapping beams and batched arrivals in packet-switched SSMB systems, integration of stream and bursty traffic, and optimal circuit scheduling in SSMB systems: performance bounds and computational complexity are discussed.

  10. Mof-Tree: A Spatial Access Method To Manipulate Multiple Overlapping Features.

    ERIC Educational Resources Information Center

    Manolopoulos, Yannis; Nardelli, Enrico; Papadopoulos, Apostolos; Proietti, Guido

    1997-01-01

    Investigates the manipulation of large sets of two-dimensional data representing multiple overlapping features, and presents a new access method, the MOF-tree. Analyzes storage requirements and time with respect to window query operations involving multiple features. Examines both the pointer-based and pointerless MOF-tree representations.…

  11. Multiple Access in Ultra-Wideband Communications Using Multiple Pulses and the Use of Least Squares Filters

    SciTech Connect

    Nekoogar, F

    2003-06-19

    Multiple access (MA) in UWB communication has recently been studied in the context of multiple transmitted-reference short duration chirp pulses in the presence of additive white Gaussian noise (AWGN). The transmitted-reference (TR) receiver was extended in previous studies using multiple orthogonal pulses. Improved performance was observed in simulations by sampling the receiver autocorrelation function (ACF) at both zero- and non-zero lags. Sampling of non-zero ACF lags of orthogonal pulses is a novel approach. Method of using least squares filtering techniques for further tolerance against noise and interference for the TR method is proposed.

  12. Unreasonable effectiveness of learning neural networks: From accessible states and robust ensembles to basic algorithmic schemes

    PubMed Central

    Borgs, Christian; Chayes, Jennifer T.; Ingrosso, Alessandro; Lucibello, Carlo; Saglietti, Luca; Zecchina, Riccardo

    2016-01-01

    In artificial neural networks, learning from data is a computationally demanding task in which a large number of connection weights are iteratively tuned through stochastic-gradient-based heuristic processes over a cost function. It is not well understood how learning occurs in these systems, in particular how they avoid getting trapped in configurations with poor computational performance. Here, we study the difficult case of networks with discrete weights, where the optimization landscape is very rough even for simple architectures, and provide theoretical and numerical evidence of the existence of rare—but extremely dense and accessible—regions of configurations in the network weight space. We define a measure, the robust ensemble (RE), which suppresses trapping by isolated configurations and amplifies the role of these dense regions. We analytically compute the RE in some exactly solvable models and also provide a general algorithmic scheme that is straightforward to implement: define a cost function given by a sum of a finite number of replicas of the original cost function, with a constraint centering the replicas around a driving assignment. To illustrate this, we derive several powerful algorithms, ranging from Markov Chains to message passing to gradient descent processes, where the algorithms target the robust dense states, resulting in substantial improvements in performance. The weak dependence on the number of precision bits of the weights leads us to conjecture that very similar reasoning applies to more conventional neural networks. Analogous algorithmic schemes can also be applied to other optimization problems. PMID:27856745

  13. Implementation of an optimal stomatal conductance scheme in the Australian Community Climate Earth Systems Simulator (ACCESS1.3b)

    NASA Astrophysics Data System (ADS)

    Kala, J.; De Kauwe, M. G.; Pitman, A. J.; Lorenz, R.; Medlyn, B. E.; Wang, Y.-P.; Lin, Y.-S.; Abramowitz, G.

    2015-12-01

    We implement a new stomatal conductance scheme, based on the optimality approach, within the Community Atmosphere Biosphere Land Exchange (CABLEv2.0.1) land surface model. Coupled land-atmosphere simulations are then performed using CABLEv2.0.1 within the Australian Community Climate and Earth Systems Simulator (ACCESSv1.3b) with prescribed sea surface temperatures. As in most land surface models, the default stomatal conductance scheme only accounts for differences in model parameters in relation to the photosynthetic pathway but not in relation to plant functional types. The new scheme allows model parameters to vary by plant functional type, based on a global synthesis of observations of stomatal conductance under different climate regimes over a wide range of species. We show that the new scheme reduces the latent heat flux from the land surface over the boreal forests during the Northern Hemisphere summer by 0.5-1.0 mm day-1. This leads to warmer daily maximum and minimum temperatures by up to 1.0 °C and warmer extreme maximum temperatures by up to 1.5 °C. These changes generally improve the climate model's climatology of warm extremes and improve existing biases by 10-20 %. The bias in minimum temperatures is however degraded but, overall, this is outweighed by the improvement in maximum temperatures as there is a net improvement in the diurnal temperature range in this region. In other regions such as parts of South and North America where ACCESSv1.3b has known large positive biases in both maximum and minimum temperatures (~ 5 to 10 °C), the new scheme degrades this bias by up to 1 °C. We conclude that, although several large biases remain in ACCESSv1.3b for temperature extremes, the improvements in the global climate model over large parts of the boreal forests during the Northern Hemisphere summer which result from the new stomatal scheme, constrained by a global synthesis of experimental data, provide a valuable advance in the long-term development

  14. A comparison of Frequency Domain Multiple Access (FDMA) and Time Domain Multiple Access (TDMA) approaches to satellite service for low data rate Earth stations

    NASA Technical Reports Server (NTRS)

    Stevens, G.

    1983-01-01

    A technological and economic assessment is made of providing low data rate service to small earth stations by satellite at Ka-band. Various Frequency Domain Multiple Access (FDMA) and Time Domain Multiple Access (TDMA) scenarios are examined and compared on the basis of cost to the end user. Very small stations (1 to 2 meters in diameter) are found not to be viable alternatives to available terrestrial services. However, medium size (3 to 5 meters) earth stations appear to be very competitive if a minimum throughput of about 1.5 Mbs is maintained. This constrains the use of such terminals to large users and shared use by smaller users. No advantage was found to the use of FDMA. TDMA had a slight advantage from a total system viewpoint and a very significant advantage in the space segment (about 1/3 the required payload weight for an equivalent capacity).

  15. A Novel Read Scheme for Large Size One-Resistor Resistive Random Access Memory Array

    NASA Astrophysics Data System (ADS)

    Zackriya, Mohammed; Kittur, Harish M.; Chin, Albert

    2017-02-01

    The major issue of RRAM is the uneven sneak path that limits the array size. For the first time record large One-Resistor (1R) RRAM array of 128x128 is realized, and the array cells at the worst case still have good Low-/High-Resistive State (LRS/HRS) current difference of 378 nA/16 nA, even without using the selector device. This array has extremely low read current of 9.7 μA due to both low-current RRAM device and circuit interaction, where a novel and simple scheme of a reference point by half selected cell and a differential amplifier (DA) were implemented in the circuit design.

  16. A Novel Read Scheme for Large Size One-Resistor Resistive Random Access Memory Array

    PubMed Central

    Zackriya, Mohammed; Kittur, Harish M.; Chin, Albert

    2017-01-01

    The major issue of RRAM is the uneven sneak path that limits the array size. For the first time record large One-Resistor (1R) RRAM array of 128x128 is realized, and the array cells at the worst case still have good Low-/High-Resistive State (LRS/HRS) current difference of 378 nA/16 nA, even without using the selector device. This array has extremely low read current of 9.7 μA due to both low-current RRAM device and circuit interaction, where a novel and simple scheme of a reference point by half selected cell and a differential amplifier (DA) were implemented in the circuit design. PMID:28186147

  17. Teaching Individuals with Profound Multiple Disabilities to Access Preferred Stimuli with Multiple Microswitches

    ERIC Educational Resources Information Center

    Tam, Gee May; Phillips, Katrina J.; Mudford, Oliver C.

    2011-01-01

    We replicated and extended previous research on microswitch facilitated choice making by individuals with profound multiple disabilities. Following an assessment of stimulus preferences, we taught 6 adults with profound multiple disabilities to emit 2 different responses to activate highly preferred stimuli. All participants learnt to activate…

  18. Joint source-channel coding for a quantum multiple access channel

    NASA Astrophysics Data System (ADS)

    Wilde, Mark M.; Savov, Ivan

    2012-11-01

    Suppose that two senders each obtain one share of the output of a classical, bivariate, correlated information source. They would like to transmit the correlated source to a receiver using a quantum multiple access channel. In prior work, Cover, El Gamal and Salehi provided a combined source-channel coding strategy for a classical multiple access channel which outperforms the simpler ‘separation’ strategy where separate codebooks are used for the source coding and the channel coding tasks. In this paper, we prove that a coding strategy similar to the Cover-El Gamal-Salehi strategy and a corresponding quantum simultaneous decoder allow for the reliable transmission of a source over a quantum multiple access channel, as long as a set of information inequalities involving the Holevo quantity hold.

  19. Cometary cores with multiple structure from the oort cloud and the general scheme of origin of unusually active comets

    SciTech Connect

    Davydov, V.D.

    1986-03-01

    A newly conceived scheme is constructed which synthesizes consistent solutions to several principal problems concerning multiple-core comets: a power mechanism, a place and epoch of formation of the multiple core structure, the qualitative differences between current structure and younger structure, the origin of two types of cometary orbits, and a trigger mechanism for recent ignition of cometary activity of a multiple core. This scheme uses a new explanation of the ejection of dust (including icy dust) from various cometary cores as evidence that the material of multiple-core comets may be collisionally ablated at the expense of the comet-centered orbital energy of a multitude of massive boulders (see Kosm. Issled., No. 6 (1984)). Natural mechanisms are shown which preserve this important feature of multiple cores. The concept consists of the following elements: evolution of a system of satellites of the core toward a colli sionless structure; preservation of internal kinetic energy in the collisionless system over astro nomically lengthy time scales; tidal initiation of a collisional mechanism with the first revolution of the ancient multiple core in the zone of visibility. It is possible that such revoltions correspond to the existence of especially active comets in nearly parabolic orbits. Multiple structure in the core of active short-period comets might be descended from a nearly parabolic comet (if the theory holds on perturbational multistage transformation of near-parabolic orbits into contemporary short-period orbits).

  20. A Busy-Tone-Multiple-Access-Type Scheme for Packet-Radio Networks,

    DTIC Science & Technology

    1981-06-01

    is applied in each of the L distinct channels. In addition a node that senses activity on the subchannel Z (where lstL), transmits a signal over a...transmission. From the above description, it is clear that the probability of completed transmission at a node i that uses the subchannel Z for...transmission is given here by : Sm Ps 1- - (12) mCB(i) 11m𔄀 where B(i) is the collection of all nodes in A(i) that use the subchannel I for transmission and 6

  1. Joint Power and Multiple Access Control for Wireless Mesh Network with Rose Projection Method

    PubMed Central

    Tang, Meiqin; Shang, Lili; Xin, Yalin; Liu, Xiaohua; Wei, Xinjiang

    2014-01-01

    This paper investigates the utility maximization problem for the downlink of the multi-interface multichannel wireless mesh network with orthogonal frequency division multiple access. A cross-layer joint power and multiple access control algorithm are proposed. Rosen projection matrix is combined with Solodov projection techniques to build a three-memory gradient Rosen projection method, which is applied to solve this optimization problem. The convergence analysis is given and simulations show that the proposed solution achieves significant throughput compared with existing approaches. PMID:24883384

  2. Joint power and multiple access control for wireless mesh network with Rose projection method.

    PubMed

    Tang, Meiqin; Shang, Lili; Xin, Yalin; Liu, Xiaohua; Wei, Xinjiang

    2014-01-01

    This paper investigates the utility maximization problem for the downlink of the multi-interface multichannel wireless mesh network with orthogonal frequency division multiple access. A cross-layer joint power and multiple access control algorithm are proposed. Rosen projection matrix is combined with Solodov projection techniques to build a three-memory gradient Rosen projection method, which is applied to solve this optimization problem. The convergence analysis is given and simulations show that the proposed solution achieves significant throughput compared with existing approaches.

  3. Mitigation of timing offset effect in IM/DD based OFDMA-PON uplink multiple access.

    PubMed

    Jung, Sun-Young; Jung, Sang-Min; Park, Hyoung-Joon; Han, Sang-Kook

    2015-06-01

    In orthogonal frequency division multiple access based passive optical network (OFDMA-PON) uplink, synchronization between optical network units (ONUs) is very important to maintain orthogonality. The synchronization among uplink signals is considered as one of the main challenges in OFDMA-PON due to optical path difference. In this paper, the performance degradation according to timing offset between ONUs is experimentally analyzed. And we propose and demonstrate timing offset effect reduction in asynchronous multiple access by using CP extension and filter bank based multicarrier (FBMC) system in intensity modulation/direct detection (IM/DD) based OFDMA-PON uplink transmission.

  4. Channel access schemes and fiber optic configurations for integrated-services local area networks. Ph.D. Thesis

    NASA Technical Reports Server (NTRS)

    Nassehi, M. Mehdi

    1987-01-01

    Local Area Networks are in common use for data communications and have enjoyed great success. Recently, there is a growing interest in using a single network to support many applications in addition to traditional data traffic. These additional applications introduce new requirements in terms of volume of traffic and real-time delivery of data which are not met by existing networks. To satisfy these requirements, a high-bandwidth tranmission medium, such as fiber optics, and a distributed channel access scheme for the efficient sharing of the bandwidth among the various applications are needed. As far as the throughput-delay requirements of the various application are concerned, a network structure along with a distributed channel access are proposed which incorporate appropriate scheduling policies for the transmission of outstanding messages on the network. A dynamic scheduling policy was devised which outperforms all existing policies in terms of minimizing the expected cost per message. A broadcast mechanism was devised for the efficient dissemination of all relevant information. Fiber optic technology is considered for the high-bandwidth transmisison medium.

  5. Multi-pulse multi-delay (MPMD) multiple access modulation for UWB

    DOEpatents

    Dowla, Farid U.; Nekoogar, Faranak

    2007-03-20

    A new modulation scheme in UWB communications is introduced. This modulation technique utilizes multiple orthogonal transmitted-reference pulses for UWB channelization. The proposed UWB receiver samples the second order statistical function at both zero and non-zero lags and matches the samples to stored second order statistical functions, thus sampling and matching the shape of second order statistical functions rather than just the shape of the received pulses.

  6. A Random-Access Multiple-Program System for the U of M Language Laboratory.

    ERIC Educational Resources Information Center

    Mills, David L.

    1969-01-01

    The operational characteristics of a modern equipment facility (random-access multiple-program system) being planned and constructed for the University of Michigan language laboratory and how it compares with the system it is to replace are summarized in this article. A technical description of the structural makeup of the system precedes an…

  7. Lexical access changes in patients with multiple sclerosis: a two-year follow-up study.

    PubMed

    Sepulcre, Jorge; Peraita, Herminia; Goni, Joaquin; Arrondo, Gonzalo; Martincorena, Inigo; Duque, Beatriz; Velez de Mendizabal, Nieves; Masdeu, Joseph C; Villoslada, Pablo

    2011-02-01

    The aim of the study was to analyze lexical access strategies in patients with multiple sclerosis (MS) and their changes over time. We studied lexical access strategies during semantic and phonemic verbal fluency tests and also confrontation naming in a 2-year prospective cohort of 45 MS patients and 20 healthy controls. At baseline, switching lexical access strategy (both in semantic and in phonemic verbal fluency tests) and confrontation naming were significantly impaired in MS patients compared with controls. After 2 years follow-up, switching score decreased, and cluster size increased over time in semantic verbal fluency tasks, suggesting a failure in the retrieval of lexical information rather than an impairment of the lexical pool. In conclusion, these findings underline the significant presence of lexical access problems in patients with MS and could point out their key role in the alterations of high-level communications abilities in MS.

  8. Dynamical downscaling of regional climate over eastern China using RSM with multiple physics scheme ensembles

    NASA Astrophysics Data System (ADS)

    Peishu, Zong; Jianping, Tang; Shuyu, Wang; Lingyun, Xie; Jianwei, Yu; Yunqian, Zhu; Xiaorui, Niu; Chao, Li

    2016-06-01

    The parameterization of physical processes is one of the critical elements to properly simulate the regional climate over eastern China. It is essential to conduct detailed analyses on the effect of physical parameterization schemes on regional climate simulation, to provide more reliable regional climate change information. In this paper, we evaluate the 25-year (1983-2007) summer monsoon climate characteristics of precipitation and surface air temperature by using the regional spectral model (RSM) with different physical schemes. The ensemble results using the reliability ensemble averaging (REA) method are also assessed. The result shows that the RSM model has the capacity to reproduce the spatial patterns, the variations, and the temporal tendency of surface air temperature and precipitation over eastern China. And it tends to predict better climatology characteristics over the Yangtze River basin and the South China. The impact of different physical schemes on RSM simulations is also investigated. Generally, the CLD3 cloud water prediction scheme tends to produce larger precipitation because of its overestimation of the low-level moisture. The systematic biases derived from the KF2 cumulus scheme are larger than those from the RAS scheme. The scale-selective bias correction (SSBC) method improves the simulation of the temporal and spatial characteristics of surface air temperature and precipitation and advances the circulation simulation capacity. The REA ensemble results show significant improvement in simulating temperature and precipitation distribution, which have much higher correlation coefficient and lower root mean square error. The REA result of selected experiments is better than that of nonselected experiments, indicating the necessity of choosing better ensemble samples for ensemble.

  9. Electro-optical time gating based on Mach-Zehnder modulator for multiple access interference elimination in optical code-division multiple access networks

    NASA Astrophysics Data System (ADS)

    Chen, Yinfang; Wang, Rong; Fang, Tao; Pu, Tao; Xiang, Peng; Zheng, Jilin; Zhu, Huatao

    2014-05-01

    An electro-optical time gating technique, which is based on an electrical return-to-zero (RZ) pulse driven Mach-Zehnder modulator (MZM) for eliminating multiple access interference (MAI) in optical code-division multiple access (OCDMA) networks is proposed. This technique is successfully simulated in an eight-user two-dimensional wavelength-hopping time-spreading system, as well as in a three-user temporal phase encoding system. Results show that in both systems the MAI noise is efficiently removed and the average received power penalty improved. Both achieve error-free transmissions at a bit rate of 2.5 Gb/s. In addition, we also individually discuss effects of parameters in two systems, such as the extinction ratio of the MZM, the duty cycle of the driven RZ pulse, and the time misalignment between the driven pulse and the decoded autocorrelation peak, on the output bit error rate performance. Our work shows that employing a common MZM as a thresholder provides another probability and an interesting cost-effective choice for a smart size, low energy, and less complex thresholding technique for integrated detection in OCDMA networks.

  10. Simplified Learning Scheme For Analog Neural Network

    NASA Technical Reports Server (NTRS)

    Eberhardt, Silvio P.

    1991-01-01

    Synaptic connections adjusted one at a time in small increments. Simplified gradient-descent learning scheme for electronic neural-network processor less efficient than better-known back-propagation scheme, but offers two advantages: easily implemented in circuitry because data-access circuitry separated from learning circuitry; and independence of data-access circuitry makes possible to implement feedforward as well as feedback networks, including those of multiple-attractor type. Important in such applications as recognition of patterns.

  11. An Innovative Approach to Scheme Learning Map Considering Tradeoff Multiple Objectives

    ERIC Educational Resources Information Center

    Lin, Yu-Shih; Chang, Yi-Chun; Chu, Chih-Ping

    2016-01-01

    An important issue in personalized learning is to provide learners with customized learning according to their learning characteristics. This paper focused attention on scheming learning map as follows. The learning goal can be achieved via different pathways based on alternative materials, which have the relationships of prerequisite, dependence,…

  12. Study of spread spectrum multiple access systems for satellite communications with overlay on current services

    NASA Technical Reports Server (NTRS)

    Ha, Tri T.; Pratt, Timothy

    1989-01-01

    The feasibility of using spread spectrum techniques to provide a low-cost multiple access system for a very large number of low data terminals was investigated. Two applications of spread spectrum technology to very small aperture terminal (VSAT) satellite communication networks are presented. Two spread spectrum multiple access systems which use a form of noncoherent M-ary FSK (MFSK) as the primary modulation are described and the throughput analyzed. The analysis considers such factors as satellite power constraints and adjacent satellite interference. Also considered is the effect of on-board processing on the multiple access efficiency and the feasibility of overlaying low data rate spread spectrum signals on existing satellite traffic as a form of frequency reuse is investigated. The use of chirp is examined for spread spectrum communications. In a chirp communication system, each data bit is converted into one or more up or down sweeps of frequency, which spread the RF energy across a broad range of frequencies. Several different forms of chirp communication systems are considered, and a multiple-chirp coded system is proposed for overlay service. The mutual interference problem is examined in detail and a performance analysis undertaken for the case of a chirp data channel overlaid on a video channel.

  13. A collaborative approach to improving patient access in general practice: impact of three different pilot schemes in 12 general practices in Greenwich

    PubMed Central

    Lawless, Melanie; Wright, Ellen; Davidson, Jackie

    2016-01-01

    Abstract Background With rising patient demand and expectations, many practices are struggling to respond to the demand for appointments. Objective To investigate different approaches to improving access to general practice and assess the impact on (i) patient experience, (ii) practice staff experience and (iii) activity in A&E and walk-in centres. Method Greenwich CCG piloted three approaches in 12 volunteer practices. The schemes were:(1) Systematic GP telephone triage of all appointment requests.(2) Analysis and comparison of practice data including demand and capacity to identify opportunities for improvement.(3) Online consultations. Qualitative and quantitative evaluation was undertaken. Results Overall results were inconclusive and no one pilot scheme was overwhelmingly successful in improving patient experience of access or reducing practice workload. Scheme 1 telephone triage: In some cases, overall demand on clinician time through the day reduced as face-to-face consultations were replaced with shorter telephone consultations. However, in other practices, total consulting time went up when telephone consultations took longer than the suggested average 5 min. Scheme 2 practice analysis and benchmarking: The pilot practices implemented no significant changes. Scheme 3 online consultations: Take up was low, with users as a percentage of total list size dropping significantly to even lower levels in the second half of the pilot – from 3.13% in the first three months to 1.20% in the second three months. Conclusion As the pilots did not improve the overall patient experience of access or practice workload, the pilot schemes were not rolled out by the CCG. From the CCG’s point of view, it was valuable to test out the effect of a scheme before committing further resources. PMID:28250835

  14. Multiple-access phased array antenna simulator for a digital beam forming system investigation

    NASA Technical Reports Server (NTRS)

    Kerczewski, Robert J.; Yu, John; Walton, Joanne C.; Perl, Thomas D.; Andro, Monty; Alexovich, Robert E.

    1992-01-01

    Future versions of data relay satellite systems are currently being planned by NASA. Being given consideration for implementation are on-board digital beamforming techniques which will allow multiple users to simultaneously access a single S-band phased array antenna system. To investigate the potential performance of such a system, a laboratory simulator has been developed at NASA's Lewis Research Center. This paper describes the system simulator, and in particular, the requirements, design, and performance of a key subsystem, the phased array antenna simulator, which provides realistic inputs to the digital processor including multiple signals, noise, and nonlinearities.

  15. Fairness for Non-Orthogonal Multiple Access in 5G Systems

    NASA Astrophysics Data System (ADS)

    Timotheou, Stelios; Krikidis, Ioannis

    2015-10-01

    In non-orthogonal multiple access (NOMA) downlink, multiple data flows are superimposed in the power domain and user decoding is based on successive interference cancellation. NOMA's performance highly depends on the power split among the data flows and the associated power allocation (PA) problem. In this letter, we study NOMA from a fairness standpoint and we investigate PA techniques that ensure fairness for the downlink users under i) instantaneous channel state information (CSI) at the transmitter, and ii) average CSI. Although the formulated problems are non-convex, we have developed low-complexity polynomial algorithms that yield the optimal solution in both cases considered.

  16. Multiple-access phased array antenna simulator for a digital beam-forming system investigation

    NASA Technical Reports Server (NTRS)

    Kerczewski, Robert J.; Yu, John; Walton, Joanne C.; Perl, Thomas D.; Andro, Monty; Alexovich, Robert E.

    1992-01-01

    Future versions of data relay satellite systems are currently being planned by NASA. Being given consideration for implementation are on-board digital beamforming techniques which will allow multiple users to simultaneously access a single S-band phased array antenna system. To investigate the potential performance of such a system, a laboratory simulator has been developed at NASA's Lewis Research Center. This paper describes the system simulator, and in particular, the requirements, design and performance of a key subsystem, the phased array antenna simulator, which provides realistic inputs to the digital processor including multiple signals, noise, and nonlinearities.

  17. A Review on Spectral Amplitude Coding Optical Code Division Multiple Access

    NASA Astrophysics Data System (ADS)

    Kaur, Navpreet; Goyal, Rakesh; Rani, Monika

    2017-03-01

    This manuscript deals with analysis of Spectral Amplitude Coding Optical Code Division Multiple Access (SACOCDMA) system. The major noise source in optical CDMA is co-channel interference from other users known as multiple access interference (MAI). The system performance in terms of bit error rate (BER) degrades as a result of increased MAI. It is perceived that number of users and type of codes used for optical system directly decide the performance of system. MAI can be restricted by efficient designing of optical codes and implementing them with unique architecture to accommodate more number of users. Hence, it is a necessity to design a technique like spectral direct detection (SDD) technique with modified double weight code, which can provide better cardinality and good correlation property.

  18. Code division multiple-access techniques in optical fiber networks. II - Systems performance analysis

    NASA Astrophysics Data System (ADS)

    Salehi, Jawad A.; Brackett, Charles A.

    1989-08-01

    A technique based on optical orthogonal codes was presented by Salehi (1989) to establish a fiber-optic code-division multiple-access (FO-CDMA) communications system. The results are used to derive the bit error rate of the proposed FO-CDMA system as a function of data rate, code length, code weight, number of users, and receiver threshold. The performance characteristics for a variety of system parameters are discussed. A means of reducing the effective multiple-access interference signal by placing an optical hard-limiter at the front end of the desired optical correlator is presented. Performance calculations are shown for the FO-CDMA with an ideal optical hard-limiter, and it is shown that using a optical hard-limiter would, in general, improve system performance.

  19. Coherent direct sequence optical code multiple access encoding-decoding efficiency versus wavelength detuning.

    PubMed

    Pastor, D; Amaya, W; García-Olcina, R; Sales, S

    2007-07-01

    We present a simple theoretical model of and the experimental verification for vanishing of the autocorrelation peak due to wavelength detuning on the coding-decoding process of coherent direct sequence optical code multiple access systems based on a superstructured fiber Bragg grating. Moreover, the detuning vanishing effect has been explored to take advantage of this effect and to provide an additional degree of multiplexing and/or optical code tuning.

  20. Error correction coding for frequency-hopping multiple-access spread spectrum communication systems

    NASA Technical Reports Server (NTRS)

    Healy, T. J.

    1982-01-01

    A communication system which would effect channel coding for frequency-hopped multiple-access is described. It is shown that in theory coding can increase the spectrum utilization efficiency of a system with mutual interference to 100 percent. Various coding strategies are discussed and some initial comparisons are given. Some of the problems associated with implementing the type of system described here are discussed.

  1. Field of view extension using frequency division multiple access technique: numerical analysis

    NASA Astrophysics Data System (ADS)

    Kavehvash, Zahra; Mehrany, Khashayar; Bagheri, Saeed

    2011-06-01

    Integral imaging could be considered as one of the prospective methods for recording and displaying 3D images based on its distinct features. Some of the most important challenges with this approach are the field of view and resolution limitation. In this work we investigate using frequency division multiple access (FDMA) idea for solving this problem. Simulation results show an increase of more than ten percent in the performance of the 3D reconstructed images using the proposed method.

  2. Turbulence mitigation scheme based on multiple-user detection in an orbital-angular-momentum multiplexed system

    NASA Astrophysics Data System (ADS)

    Zou, Li; Wang, Le; Zhao, Sheng-Mei; Chen, Han-Wu

    2016-11-01

    Atmospheric turbulence (AT) induced crosstalk can significantly impair the performance of a free-space optical (FSO) communication link using orbital angular momentum (OAM) multiplexing. In this paper, we propose a multiple-user detection (MUD) turbulence mitigation scheme in an OAM-multiplexed FSO communication link. First, we present a MUD equivalent communication model for an OAM-multiplexed FSO communication link under AT. In the equivalent model, each input bit stream represents one user’s information. The deformed OAM spatial modes caused by AT, instead of the pure OAM spatial modes, are used as information carriers, and the overlapping between the deformed OAM spatial modes are computed as the correlation coefficients between the users. Then, we present a turbulence mitigation scheme based on MUD idea to enhance AT tolerance of the OAM-multiplexed FSO communication link. In the proposed scheme, the crosstalk caused by AT is used as a useful component to deduce users’ information. The numerical results show that the performance of the OAM-multiplexed communication link has greatly improved by the proposed scheme. When the turbulence strength is 1 × 10-15 m-2/3, the transmission distance is 1000 m and the channel signal-to-noise ratio (SNR) is 26 dB, the bit-error-rate (BER) performance of four spatial multiplexed OAM modes lm = +1,+2,+3,+4 are all close to 10-5, and there is a 2-3 fold increase in the BER performance in comparison with those results without the proposed scheme. In addition, the proposed scheme is more effective for an OAM-multiplexed FSO communication link with a larger OAM mode topological charge interval. The proposed scheme is a promising direction for compensating the interference caused by AT in the OAM-multiplexed FSO communication link. Project supported by the National Natural Science Foundation of China (Grant Nos. 61271238 and 61475075), the Open Research Fund of Key Lab of Broadband Wireless Communication and Sensor Network

  3. Persons with Multiple Disabilities Exercise Adaptive Response Schemes with the Help of Technology-Based Programs: Three Single-Case Studies

    ERIC Educational Resources Information Center

    Lancioni, Giulio E.; Singh, Nirbhay N.; O'Reilly, Mark F.; Sigafoos, Jeff; Oliva, Doretta; Campodonico, Francesca; Lang, Russell

    2012-01-01

    The present three single-case studies assessed the effectiveness of technology-based programs to help three persons with multiple disabilities exercise adaptive response schemes independently. The response schemes included (a) left and right head movements for a man who kept his head increasingly static on his wheelchair's headrest (Study I), (b)…

  4. Transitory flow in a complex hydroelectric scheme with multiple intakes and water tanks

    NASA Astrophysics Data System (ADS)

    Bucur, D. M.; Ghergu, C. M.; Tănase, N. O.; Isbăşoiu, E. C.

    2010-08-01

    This paper analyzes the free surface level variation in the surge tank and in the secondary shafts of a complex hydro electrical scheme with two headraces and four secondary intakes. An analysis of the transient operating regimes of the hydropower plant must take in account the complex flow in the surge tank and in all the secondary catchments. Important operation restrictions and different transport capacities of the headraces must be considered. The study is completed with the mathematical model of the phenomenon and with the numerical simulation of the regimes. It is pointed out which are the operating regimes and the maneuvers that can cause malfunctions or undesirable incidents.

  5. Solvable biological evolution models with general fitness functions and multiple mutations in parallel mutation-selection scheme

    NASA Astrophysics Data System (ADS)

    Saakian, David B.; Hu, Chin-Kun; Khachatryan, H.

    2004-10-01

    In a recent paper [Phys. Rev. E 69, 046121 (2004)], we used the Suzuki-Trottere formalism to study a quasispecies biological evolution model in a parallel mutation-selection scheme with a single-peak fitness function and a point mutation. In the present paper, we extend such a study to evolution models with more general fitness functions or multiple mutations in the parallel mutation-selection scheme. We give some analytical equations to define the error thresholds for some general cases of mean-field-like or symmetric mutation schemes and fitness functions. We derive some equations for the dynamics in the case of a point mutation and polynomial fitness functions. We derive exact dynamics for two-point mutations, asymmetric mutations, and the four-value spin model with a single-peak fitness function. The same method is applied for the model with a royal road fitness function. We derive the steady-state distribution for the single-peak fitness function.

  6. Pentagraph image fusion scheme for motion blur prevention using multiple monochromatic images.

    PubMed

    Volfman, Alon A; Mendlovic, David; Raz, Ariel

    2016-04-10

    This paper introduces the pentagraph image fusion (PIF) scheme for motion-related blur prevention in images. The PIF algorithm processes five monochromatic images into a single, low-noise, no-blur color image. The images are acquired using a new photography scheme, sequential filter photography (SFP), where instead of using a stationary Bayer pattern color filter array in front of the image sensor, a tunable color filter array is used. Using this approach, several monochromatic images are captured one by one and later fused into one color image. The SFP introduces various advantages such as higher resolution, better SNR, and the ability to control both exposure time and color filter separately for each image. The PIF algorithm harnesses all the advantages of SFP for the first time, to the best of our knowledge, in the field of blur-free image acquisition. Five images are taken with controllable exposure time and color filter, three images for the color bands, and two high-signal panchromatic images. These images are fused together to be a single, low-noise, no-blur color image. The algorithm presents a generic approach of dealing with both local and global motion blur and does not require any user intervention.

  7. Optical multiple-image encryption in diffractive-imaging-based scheme using spectral fusion and nonlinear operation.

    PubMed

    Qin, Yi; Gong, Qiong; Wang, Zhipeng; Wang, Hongjuan

    2016-11-14

    We report a new method for multiple-image encryption in diffractive-imaging-based encryption (DIBE) scheme. The discrete cosine transformation (DCT) spectra of the primary images are extracted, compacted and then nonlinear-transformed before being sent to the DIBE, where they are encoded into a single intensity pattern. With the help of a suggested phase retrieval algorithm, the original images can be recovered with high quality. Furthermore, due to the introduction of the nonlinear operation, the proposal is demonstrated to be robust to the currently available cryptographic attacks. The proposal probes a new way for multiple-image encryption in DIBE, and its effectiveness and feasibility have been supported by numerical simulations.

  8. The rigorous stochastic matrix multiplication scheme for the calculations of reduced equilibrium density matrices of open multilevel quantum systems

    NASA Astrophysics Data System (ADS)

    Chen, Xin

    2014-04-01

    Understanding the roles of the temporary and spatial structures of quantum functional noise in open multilevel quantum molecular systems attracts a lot of theoretical interests. I want to establish a rigorous and general framework for functional quantum noises from the constructive and computational perspectives, i.e., how to generate the random trajectories to reproduce the kernel and path ordering of the influence functional with effective Monte Carlo methods for arbitrary spectral densities. This construction approach aims to unify the existing stochastic models to rigorously describe the temporary and spatial structure of Gaussian quantum noises. In this paper, I review the Euclidean imaginary time influence functional and propose the stochastic matrix multiplication scheme to calculate reduced equilibrium density matrices (REDM). In addition, I review and discuss the Feynman-Vernon influence functional according to the Gaussian quadratic integral, particularly its imaginary part which is critical to the rigorous description of the quantum detailed balance. As a result, I establish the conditions under which the influence functional can be interpreted as the average of exponential functional operator over real-valued Gaussian processes for open multilevel quantum systems. I also show the difference between the local and nonlocal phonons within this framework. With the stochastic matrix multiplication scheme, I compare the normalized REDM with the Boltzmann equilibrium distribution for open multilevel quantum systems.

  9. The rigorous stochastic matrix multiplication scheme for the calculations of reduced equilibrium density matrices of open multilevel quantum systems

    SciTech Connect

    Chen, Xin

    2014-04-21

    Understanding the roles of the temporary and spatial structures of quantum functional noise in open multilevel quantum molecular systems attracts a lot of theoretical interests. I want to establish a rigorous and general framework for functional quantum noises from the constructive and computational perspectives, i.e., how to generate the random trajectories to reproduce the kernel and path ordering of the influence functional with effective Monte Carlo methods for arbitrary spectral densities. This construction approach aims to unify the existing stochastic models to rigorously describe the temporary and spatial structure of Gaussian quantum noises. In this paper, I review the Euclidean imaginary time influence functional and propose the stochastic matrix multiplication scheme to calculate reduced equilibrium density matrices (REDM). In addition, I review and discuss the Feynman-Vernon influence functional according to the Gaussian quadratic integral, particularly its imaginary part which is critical to the rigorous description of the quantum detailed balance. As a result, I establish the conditions under which the influence functional can be interpreted as the average of exponential functional operator over real-valued Gaussian processes for open multilevel quantum systems. I also show the difference between the local and nonlocal phonons within this framework. With the stochastic matrix multiplication scheme, I compare the normalized REDM with the Boltzmann equilibrium distribution for open multilevel quantum systems.

  10. Energy-Efficient Deadline-Aware Data-Gathering Scheme Using Multiple Mobile Data Collectors.

    PubMed

    Dasgupta, Rumpa; Yoon, Seokhoon

    2017-04-01

    In wireless sensor networks, the data collected by sensors are usually forwarded to the sink through multi-hop forwarding. However, multi-hop forwarding can be inefficient due to the energy hole problem and high communications overhead. Moreover, when the monitored area is large and the number of sensors is small, sensors cannot send the data via multi-hop forwarding due to the lack of network connectivity. In order to address those problems of multi-hop forwarding, in this paper, we consider a data collection scheme that uses mobile data collectors (MDCs), which visit sensors and collect data from them. Due to the recent breakthroughs in wireless power transfer technology, MDCs can also be used to recharge the sensors to keep them from draining their energy. In MDC-based data-gathering schemes, a big challenge is how to find the MDCs' traveling paths in a balanced way, such that their energy consumption is minimized and the packet-delay constraint is satisfied. Therefore, in this paper, we aim at finding the MDCs' paths, taking energy efficiency and delay constraints into account. We first define an optimization problem, named the delay-constrained energy minimization (DCEM) problem, to find the paths for MDCs. An integer linear programming problem is formulated to find the optimal solution. We also propose a two-phase path-selection algorithm to efficiently solve the DCEM problem. Simulations are performed to compare the performance of the proposed algorithms with two heuristics algorithms for the vehicle routing problem under various scenarios. The simulation results show that the proposed algorithms can outperform existing algorithms in terms of energy efficiency and packet delay.

  11. Utility of the Beta-Multinomial Distribution in Multiple Classification Scheme.

    ERIC Educational Resources Information Center

    Peng, Chao-Ying Joanne

    This study is an attempt to answer the following research question: can the reliability of a criterion-referenced test be accurately determined according to a multiple classification of the student's performance? Specifically, the study pursues the beta-multinomial model, which postulates the probability distribution of an examinee's degree of…

  12. Investigation of in-band transmission of both spectral amplitude coding/optical code division multiple-access and wavelength division multiplexing signals

    NASA Astrophysics Data System (ADS)

    Ashour, Isaac A. M.; Shaari, Sahbudin; Shalaby, Hossam M. H.; Menon, P. Susthitha

    2011-06-01

    The transmission of both optical code division multiple-access (OCDMA) and wavelength division multiplexing (WDM) users on the same band is investigated. Code pulses of spectral amplitude coding (SAC)/optical code division multiple-access (CDMA) are overlaid onto a multichannel WDM system. Notch filters are utilized in order to suppress the WDM interference signals for detection of optical broadband CDMA signals. Modified quadratic congruence (MQC) codes are used as the signature codes for the SAC/OCDMA system. The proposed system is simulated and its performance in terms of both the bit-error rate and Q-factor are determined. In addition, eavesdropper probability of error-free code detection is evaluated. Our results are compared to traditional nonhybrid systems. It is concluded that the proposed hybrid scheme still achieves acceptable performance. In addition, it provides enhanced data confidentiality as compared to the scheme with SAC/OCDMA only. It is also shown that the performance of the proposed system is limited by the interference of the WDM signals. Furthermore, the simulation illustrates the tradeoff between the performance and confidentiality for authorized users.

  13. Multiple number and letter comparison: directionality and accessibility in numeric and alphabetic memories.

    PubMed

    Jou, Jerwen

    2003-01-01

    In 3 experiments, subjects made comparativejudgments on a set of 2 numbers or letters, 3 numbers or letters, or 5 numbers or letters. Numeric and alphabetic serial order memories were contrasted. Three aspects of serial order memory processes were identified: computational complexity, directionality, and accessibility. Computational complexity is the number of algorithmic steps involved in identifying a target. Directional bias is measured as the speed differences in identifying serial targets of equal computational complexity in a stimulus array. Memory accessibility is measured as the numeric and alphabetic serial position effects. Subjects had a slight directional bias favoring backward ordering for single digits but no bias in 2-digit number ordering, in contrast to a strong forward directional advantage in letter ordering. The speed of number access was found to steadily and evenly decrease along the numeric scale, in contrast to a systematic pattern of variations in alphabet access along the alphabetic scale. Finally, the middle item effect (the middle item in a multi-item array is identified most slowly) found in Jou's (1997) multiple-letter comparison study was generalized to numbers.

  14. Spatial-phase code-division multiple-access system with multiplexed Fourier holography switching for reconfigurable optical interconnection.

    PubMed

    Takasago, K; Takekawa, M; Shirakawa, A; Kannari, F

    2000-05-10

    A new, to our knowledge, space-variant optical interconnection system based on a spatial-phase code-division multiple-access technique with multiplexed Fourier holography is described. In this technique a signal beam is spread over wide spatial frequencies by an M-sequence pseudorandom phase code. At a receiver side a selected signal beam is properly decoded, and at the same time its spatial pattern is shaped with a Fourier hologram, which is recorded by light that is encoded with the same M-sequence phase mask as the desired signal beam and by light whose spatial beam pattern is shaped to a signal routing pattern. Using the multiplexed holography, we can simultaneously route multisignal flows into individually specified receiver elements. The routing pattern can also be varied by means of switching the encoding phase code or replacing the hologram. We demonstrated a proof-of-principle experiment with a doubly multiplexed hologram that enables simultaneous routing of two signal beams. Using a numerical model, we showed that the proposed scheme can manage more than 250 routing patterns for one signal flow with one multiplexed hologram at a signal-to-noise ratio of ~5.

  15. An establishment of vascular access through superior vena cava for a patient with multiple central venous stenosis or occlusion.

    PubMed

    Diao, Yong Shu; Feng, Yan Huan; Liu, Chun Cheng; Cui, Tian Lei; Fu, Ping

    2016-05-01

    The patency of vascular access is of vital importance to dialysis patients. Access dysfunction is largely caused by vessel stenosis and thrombosis. Nephrologists usually find themselves helpless when all treatments fail and the vascular access seems to have exhausted. Here we report a successful establishment of vascular access through superior vena cava for a critical patient with multiple central venous stenosis or occlusion. To our knowledge, it is the first case ever reported on the successful establishment of vascular access through superior vena cava under such a complicated condition of vascular exhaustion.

  16. An efficient sparse matrix multiplication scheme for the CYBER 205 computer

    NASA Technical Reports Server (NTRS)

    Lambiotte, Jules J., Jr.

    1988-01-01

    This paper describes the development of an efficient algorithm for computing the product of a matrix and vector on a CYBER 205 vector computer. The desire to provide software which allows the user to choose between the often conflicting goals of minimizing central processing unit (CPU) time or storage requirements has led to a diagonal-based algorithm in which one of four types of storage is selected for each diagonal. The candidate storage types employed were chosen to be efficient on the CYBER 205 for diagonals which have nonzero structure which is dense, moderately sparse, very sparse and short, or very sparse and long; however, for many densities, no diagonal type is most efficient with respect to both resource requirements, and a trade-off must be made. For each diagonal, an initialization subroutine estimates the CPU time and storage required for each storage type based on results from previously performed numerical experimentation. These requirements are adjusted by weights provided by the user which reflect the relative importance the user places on the two resources. The adjusted resource requirements are then compared to select the most efficient storage and computational scheme.

  17. Analysis of multiple access techniques in multi-satellite and multi-spot mobile satellite systems

    NASA Technical Reports Server (NTRS)

    Corazza, Giovanni E.; Ferrarelli, Carlo; Vatalaro, Francesco

    1995-01-01

    In this paper the analysis of mobile satellite systems adopting constellations of multi-spot satellites over non-geostationary orbits is addressed. A link design procedure is outlined, taking into account system spectrum efficiency, probability of bit error and outage probability. A semi-analytic approach to the evaluation of outage probability in the presence of fading and imperfect power control is described, and applied to single channel per carrier (SCPC) and code division multiple access (CDMA) techniques. Some results are shown for the Globalstar, Iridium and Odyssey orbital configurations.

  18. Design and performance evaluation of a wideband FM spread-spectrum multiple-access system

    NASA Technical Reports Server (NTRS)

    Wachsman, R. H.; Ghais, A. F.

    1971-01-01

    The system described performs the tracking and communications functions of a tracking and data relay satellite system (TDRS). The spread-spectrum signal format is achieved through wide deviation FM by a sinusoidal subcarrier unique to each multiple-access user. A compound phase-locked loop tracks carrier and subcarrier and demodulates data and ranging signals. Design parameters of user and ground terminals for TDRS are given. Acquisition procedures are described. Performance analyses are presented including the effects of noise, RFI, multipath and other users.

  19. A Code Phase Division Multiple Access (CPDMA) technique for VSAT satellite communications

    NASA Technical Reports Server (NTRS)

    Bruno, R.; Mcomber, R.; Weinberg, A.

    1991-01-01

    A reference concept and implementation relevant to the application of Code Phase Division Multiple Access (CPDMA) to a high capacity satellite communication system providing 16 Kbps single hop channels between Very Small Aperture Terminals (VSAT's) is described. The description includes a potential implementation of an onboard CPDMA bulk demodulator/converter utilizing programmable charge coupled device (CCD) technology projected to be available in the early 1990's. A high level description of the system architecture and operations, identification of key functional and performance requirements of the system elements, and analysis results of end-to-end system performance relative to key figures of merit such as spectral efficiency are also provided.

  20. The Effects of Noncontingent Access to Single-versus Multiple-Stimulus Sets on Self-Injurious Behavior.

    ERIC Educational Resources Information Center

    DeLeon, Iser G.; Anders, Bonita M.; Rodriguez-Catter, Vanessa; Neidert, Pamela L.

    2000-01-01

    The automatically reinforced self-injury of a girl (age 11) with autism was treated by providing noncontingent access to a single set of preferred toys during 30-minute sessions. Rotating toy sets after 10 minutes or providing access to multiple toy sets resulted in reductions that lasted the entire 30 minutes. (Contains four references.)…

  1. 39% access time improvement, 11% energy reduction, 32 kbit 1-read/1-write 2-port static random-access memory using two-stage read boost and write-boost after read sensing scheme

    NASA Astrophysics Data System (ADS)

    Yamamoto, Yasue; Moriwaki, Shinichi; Kawasumi, Atsushi; Miyano, Shinji; Shinohara, Hirofumi

    2016-04-01

    We propose novel circuit techniques for 1 clock (1CLK) 1 read/1 write (1R/1W) 2-port static random-access memories (SRAMs) to improve read access time (tAC) and write margins at low voltages. Two-stage read boost (TSR-BST) and write word line boost (WWL-BST) after the read sensing schemes have been proposed. TSR-BST reduces the worst read bit line (RBL) delay by 61% and RBL amplitude by 10% at V DD = 0.5 V, which improves tAC by 39% and reduces energy dissipation by 11% at V DD = 0.55 V. WWL-BST after read sensing scheme improves minimum operating voltage (V min) by 140 mV. A 32 kbit 1CLK 1R/1W 2-port SRAM with TSR-BST and WWL-BST has been developed using a 40 nm CMOS.

  2. A high capacity multiple watermarking scheme based on Fourier descriptor and Sudoku

    NASA Astrophysics Data System (ADS)

    Zhang, Li; Zheng, Huimin

    2015-12-01

    Digital watermark is a type of technology to hide some significant information which is mainly used to protect digital data. A high capacity multiple watermarking method is proposed, which adapts the Fourier descriptor to pre-process the watermarks, while a Sudoku puzzle is used as a reference matrix in embedding process and a key in extraction process. It can dramatically reduce the required capacity by applying Fourier descriptor. Meanwhile, the security of watermarks can be guaranteed due to the Sudoku puzzle. Unlike previous algorithms applying Sudoku puzzle in spatial domain, the proposed algorithm works in transformed domain by applying LWT2.In addition, the proposed algorithm can detect the temper location accurately. The experimental results demonstrated that the goals mentioned above have been achieved.

  3. Spreading and Interleaving Design for Synchronous Interleave-Division Multiple-Access

    NASA Astrophysics Data System (ADS)

    Song, Guanghui; Cheng, Jun; Watanabe, Yoichiro

    A K-user interleave-division multiple-access (IDMA) system with symbol-synchronous and equal-power users is considered. In this IDMA system, the spreading, interleaving, and multiple-access channel (MAC) are jointly considered as an equivalent channel, referred to as an IDMA channel. Given channel signal-to-noise ratio (SNR), the sum capacity of the IDMA channel is only determined by a K-user spread-interleave (SI) matrix. First, it is shown that to maximize the sum capacity of the IDMA channel, rows or columns of its K-user SI matrix should be pairwise orthogonal. The optimal K-user SI matrix is constructed. Second, for the IDMA system with each user employing the same spreading sequence followed by random interleaving, it is shown that, as the number of users approaches infinity, the sum capacity of the IDMA channel converges to a determinate value, which is achieved by a balanced spreading sequence. Moreover, when both the number of users and the data length approach infinity, this determinate value of sum capacity is achieved by an arbitrary spreading sequence. Furthermore, for a finite number of users, an optimal spreading sequence is derived by minimizing an expected column correlation of the K-user SI matrix. It shows that this optimal spreading sequence provides the maximum ergodic sum capacity.

  4. Efficient traffic grooming with dynamic ONU grouping for multiple-OLT-based access network

    NASA Astrophysics Data System (ADS)

    Zhang, Shizong; Gu, Rentao; Ji, Yuefeng; Wang, Hongxiang

    2015-12-01

    Fast bandwidth growth urges large-scale high-density access scenarios, where the multiple Passive Optical Networking (PON) system clustered deployment can be adopted as an appropriate solution to fulfill the huge bandwidth demands, especially for a future 5G mobile network. However, the lack of interaction between different optical line terminals (OLTs) results in part of the bandwidth resources waste. To increase the bandwidth efficiency, as well as reduce bandwidth pressure at the edge of a network, we propose a centralized flexible PON architecture based on Time- and Wavelength-Division Multiplexing PON (TWDM PON). It can provide flexible affiliation for optical network units (ONUs) and different OLTs to support access network traffic localization. Specifically, a dynamic ONU grouping algorithm (DGA) is provided to obtain the minimal OLT outbound traffic. Simulation results show that DGA obtains an average 25.23% traffic gain increment under different OLT numbers within a small ONU number situation, and the traffic gain will increase dramatically with the increment of the ONU number. As the DGA can be deployed easily as an application running above the centralized control plane, the proposed architecture can be helpful to improve the network efficiency for future traffic-intensive access scenarios.

  5. A carrier sensed multiple access protocol for high data base rate ring networks

    NASA Technical Reports Server (NTRS)

    Foudriat, E. C.; Maly, Kurt J.; Overstreet, C. Michael; Khanna, S.; Paterra, Frank

    1990-01-01

    The results of the study of a simple but effective media access protocol for high data rate networks are presented. The protocol is based on the fact that at high data rates networks can contain multiple messages simultaneously over their span, and that in a ring, nodes used to detect the presence of a message arriving from the immediate upstream neighbor. When an incoming signal is detected, the node must either abort or truncate a message it is presently sending. Thus, the protocol with local carrier sensing and multiple access is designated CSMA/RN. The performance of CSMA/RN with TTattempt and truncate is studied using analytic and simulation models. Three performance factors, wait or access time, service time and response or end-to-end travel time are presented. The service time is basically a function of the network rate, it changes by a factor of 1 between no load and full load. Wait time, which is zero for no load, remains small for load factors up to 70 percent of full load. Response time, which adds travel time while on the network to wait and service time, is mainly a function of network length, especially for longer distance networks. Simulation results are shown for CSMA/RN where messages are removed at the destination. A wide range of local and metropolitan area network parameters including variations in message size, network length, and node count are studied. Finally, a scaling factor based upon the ratio of message to network length demonstrates that the results, and hence, the CSMA/RN protocol, are applicable to wide area networks.

  6. Adaptation of AMO-FBMC-OQAM in optical access network for accommodating asynchronous multiple access in OFDM-based uplink transmission

    NASA Astrophysics Data System (ADS)

    Jung, Sun-Young; Jung, Sang-Min; Han, Sang-Kook

    2015-01-01

    Exponentially expanding various applications in company with proliferation of mobile devices make mobile traffic exploded annually. For future access network, bandwidth efficient and asynchronous signals converged transmission technique is required in optical network to meet a huge bandwidth demand, while integrating various services and satisfying multiple access in perceived network resource. Orthogonal frequency division multiplexing (OFDM) is highly bandwidth efficient parallel transmission technique based on orthogonal subcarriers. OFDM has been widely studied in wired-/wireless communication and became a Long term evolution (LTE) standard. Consequently, OFDM also has been actively researched in optical network. However, OFDM is vulnerable frequency and phase offset essentially because of its sinc-shaped side lobes, therefore tight synchronism is necessary to maintain orthogonality. Moreover, redundant cyclic prefix (CP) is required in dispersive channel. Additionally, side lobes act as interference among users in multiple access. Thus, it practically hinders from supporting integration of various services and multiple access based on OFDM optical transmission In this paper, adaptively modulated optical filter bank multicarrier system with offset QAM (AMO-FBMC-OQAM) is introduced and experimentally investigated in uplink optical transmission to relax multiple access interference (MAI), while improving bandwidth efficiency. Side lobes are effectively suppressed by using FBMC, therefore the system becomes robust to path difference and imbalance among optical network units (ONUs), which increase bandwidth efficiency by reducing redundancy. In comparison with OFDM, a signal performance and an efficiency of frequency utilization are improved in the same experimental condition. It enables optical network to effectively support heterogeneous services and multiple access.

  7. Accessibility

    EPA Pesticide Factsheets

    Federal laws, including Section 508 of the Rehabilitation Act, mandate that people with disabilities have access to the same information that someone without a disability would have. 508 standards cover electronic and information technology (EIT) products.

  8. Visit to general practitioners as a proxy for accessing chronic benefits by members of medical schemes, South Africa

    PubMed Central

    Gantsho, Monwabisi

    2012-01-01

    Abstract Background Prescribed Minimum Benefits is a list of conditions that all medical schemes need to cover in full, and includes a select of chronic conditions. Chronic conditions affect people's lifestyles and require ongoing management over a period of years for long-term survival. Objectives This study examined the association between prevalence of selected chronic diseases and health service use, in particular visits to general practitioners (GPs) by medical scheme members. Method This was a retrospective study on medical schemes data. The median imputation method was employed to deal with missing and unreported chronic diseases prevalence. Multivariate logistic regression analysis was employed to assess effects of chronic disease prevalence, age stratum and scheme size on GP visits per annum. Results The study showed that prevalence of asthma was significantly associated with more than three GP visits (OR = 1.081; 95% CI = 1.008–1.159), as was prevalence of type 2 diabetes (OR = 1.087; 95% CI = 1.027–1.152), whilst prevalence of hyperlipidaemia (OR = 0.92; 95% CI = 0.875–0.97) was more likely to be associated with less than three GP visits. Prevalence of hypertension was associated with more than three GP visits per year (OR = 1.132; 95% CI = 1.017–1.26). Conclusion This study shows that scheme size, prevalence of chronic diseases such as asthma, type 2 diabetes, hyperlipidaemia and hypertension are related to GP visits. GPs and managed care programmes employed by schemes should give special attention to certain disease states with high prevalence rates in an effort to better manage them.

  9. Code-division multiple-access multiuser demodulator by using quantum fluctuations

    NASA Astrophysics Data System (ADS)

    Otsubo, Yosuke; Inoue, Jun-ichi; Nagata, Kenji; Okada, Masato

    2014-07-01

    We examine the average-case performance of a code-division multiple-access (CDMA) multiuser demodulator in which quantum fluctuations are utilized to demodulate the original message within the context of Bayesian inference. The quantum fluctuations are built into the system as a transverse field in the infinite-range Ising spin glass model. We evaluate the performance measurements by using statistical mechanics. We confirm that the CDMA multiuser modulator using quantum fluctuations achieve roughly the same performance as the conventional CDMA multiuser modulator through thermal fluctuations on average. We also find that the relationship between the quality of the original information retrieval and the amplitude of the transverse field is somehow a "universal feature" in typical probabilistic information processing, viz., in image restoration, error-correcting codes, and CDMA multiuser demodulation.

  10. Multiple carcinomas in the hemodialysis access induced ischemic hand of a renal transplant patient.

    PubMed

    Van Hoek, Frank; Van Tits, Herm W; Van Lijnschoten, Ineke; De Haas, Boudewijn D; Scheltinga, Marc R

    2010-01-01

    Long term immunosuppression following organ transplantation promotes the onset of skin cancers. A renal transplant patient developed multiple hyperkeratotic nodi in the left hand and digital pain following prolonged immunosuppression. Several skin abnormalities were observed in an ischemic and atrophic left hand in the presence of a patent Cimino-Brescia arteriovenous fistula previously used for hemodialysis. Severe hand ischemia was confirmed by digital plethysmography. Pathological examination of all 7 excised skin lesions indicated manifestations of well differentiated squamous cell carcinomas (SCC). Severe loco-regional ischemia due to an intact hemodialysis access may enhance the toxic effects of chronic immunosuppressive medication. Oxidative stress may act as a co-carcinogenic factor for the development of SCC in renal transplant patients receiving immunosuppressive agents.

  11. Analysis of the TDRS multiple access system for possible use as an attitude control system sensor

    NASA Technical Reports Server (NTRS)

    Blevins, Bruce Allyn; Sank, Victor J.

    1993-01-01

    A member of the constellation of TDR satellites (TDRS) has experienced a failure of its prime earth sensor. Failure of the remaining earth sensor could result in the inability of the satellite to control its attitude and provide user services. Loss of the satellite would be a serious event. The multiple access (MA) antenna array on the TDRS has been proposed for use as a backup sensor for the attitude control system. This paper describes our analysis of the performance of the MA array as an interferometer used for accurate attitude determination. A least squares fit of a plane to the MA phase information appears to represent the TDRS body roll and pitch within about 0.1 deg. This is sufficient for SGL pointing and MA and SSA user services. Analytic improvements that include ionospheric correction may yield sufficient accuracy for KSA user services.

  12. Non-orthogonal multiple access with phase pre-distortion in visible light communication.

    PubMed

    Guan, Xun; Yang, Qing; Hong, Yang; Chan, Calvin Chun-Kit

    2016-10-31

    Non-orthogonal multiple access (NOMA) offers a good balance between throughput and fairness for visible light communication (VLC). This work presents a phase pre-distortion method to improve the symbol error rate performance of NOMA uplink with successive interference cancellation (SIC) decoding in VLC. Both theoretical analysis and experimental evaluation have shown that the proposed phase pre-distortion method improves the bit-error-rate (BER) performance for NOMA under both low and high relative power ratios. Specifically, at low relative power ratios, the proposed method can eliminate the possible BER floors and alleviate the power ratio requirement by 2 dB at the BER of 3.8 × 10-3.

  13. Satellite-matrix-switched, time-division-multiple-access network simulator

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.; Andro, Monty; Nagy, Lawrence A.; Budinger, James M.; Shalkhauser, Mary JO

    1990-01-01

    A versatile experimental Ka-band network simulator has been implemented at the NASA Lewis Research Center to demonstrate and evaluate a satellite-matrix-switched, time-division-multiple-access (SMS-TDMA) network and to evaluate future digital ground terminals and radiofrequency (RF) components. The simulator was implemented by using proof-of-concept RF components developed under NASA contracts and digital ground terminal and link simulation hardware developed at Lewis. This simulator provides many unique capabilities such as satellite range delay and variation simulation and rain fade simulation. All network parameters (e.g., signal-to-noise ratio, satellite range variation rate, burst density, and rain fade) are controlled and monitored by a central computer. The simulator is presently configured as a three-ground-terminal SMS-TDMA network.

  14. Outline of a multiple-access communication network based on adaptive arrays

    NASA Technical Reports Server (NTRS)

    Zohar, S.

    1982-01-01

    Attention is given to a narrow-band communication system consisting of a central station trying to receive signals simultaneously from K spatially distinct mobile users sharing the same frequencies. One example of such a system is a group of aircraft and ships transmitting messages to a communication satellite. A reasonable approach to such a multiple access system may be based on equipping the central station with an n-element antenna array where n is equal to or greater than K. The array employs K sets of n weights to segregate the signals received from the K users. The weights are determined by direct computation based on position information transmitted by the users. A description is presented of an improved technique which makes it possible to reduce significantly the number of required computer operations in comparison to currently known techniques.

  15. Satellite-matrix-switched, time-division-multiple-access network simulator

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.; Andro, Monty; Nagy, Lawrence A.; Budinger, James M.; Shalkhauser, Mary JO

    1989-01-01

    A versatile experimental Ka-band network simulator has been implemented at the NASA Lewis Research Center to demonstrate and evaluate a satellite-matrix-switched, time-division-multiple-access (SMS-TDMA) network and to evaluate future digital ground terminals and radiofrequency (RF) components. The simulator was implemented by using proof-of-concept RF components developed under NASA contracts and digital ground terminal and link simulation hardware developed at Lewis. This simulator provides many unique capabilities such as satellite range delay and variation simulation and rain fade simulation. All network parameters (e.g., signal-to-noise ratio, satellite range variation rate, burst density, and rain fade) are controlled and monitored by a central computer. The simulator is presently configured as a three-ground-terminal SMS-TDMA network.

  16. Multiple user access and testing for PreNotiS: a fast mobile event reporting solution

    NASA Astrophysics Data System (ADS)

    Chan, Michael; Kumar, Abhinav; Akopian, David; Agaian, Sos S.

    2011-06-01

    The PreNotiS (preventive notification system) was proposed to address the current lack in consumer prevention and disaster informatics systems. The underscore of this letter is to propose PreNotiS as a provision of trusted proxies of information sourcing to be integral to the disaster informatics framework. To promote loose coupling among subsystems, PreNotiS has evolved into a model-view-controller (MVC) architecture via object-oriented incremental prototyping. The MVC specifies how all subsystems and how they interact with each other. A testing framework is also proposed for the PreNotiS to verify multiple concurrent user access which might be observable during disasters. The framework relies on conceptually similar self-test modules to help with serviceability.

  17. System and method for integrating and accessing multiple data sources within a data warehouse architecture

    DOEpatents

    Musick, Charles R.; Critchlow, Terence; Ganesh, Madhaven; Slezak, Tom; Fidelis, Krzysztof

    2006-12-19

    A system and method is disclosed for integrating and accessing multiple data sources within a data warehouse architecture. The metadata formed by the present method provide a way to declaratively present domain specific knowledge, obtained by analyzing data sources, in a consistent and useable way. Four types of information are represented by the metadata: abstract concepts, databases, transformations and mappings. A mediator generator automatically generates data management computer code based on the metadata. The resulting code defines a translation library and a mediator class. The translation library provides a data representation for domain specific knowledge represented in a data warehouse, including "get" and "set" methods for attributes that call transformation methods and derive a value of an attribute if it is missing. The mediator class defines methods that take "distinguished" high-level objects as input and traverse their data structures and enter information into the data warehouse.

  18. Code-division multiple-access multiuser demodulator by using quantum fluctuations.

    PubMed

    Otsubo, Yosuke; Inoue, Jun-Ichi; Nagata, Kenji; Okada, Masato

    2014-07-01

    We examine the average-case performance of a code-division multiple-access (CDMA) multiuser demodulator in which quantum fluctuations are utilized to demodulate the original message within the context of Bayesian inference. The quantum fluctuations are built into the system as a transverse field in the infinite-range Ising spin glass model. We evaluate the performance measurements by using statistical mechanics. We confirm that the CDMA multiuser modulator using quantum fluctuations achieve roughly the same performance as the conventional CDMA multiuser modulator through thermal fluctuations on average. We also find that the relationship between the quality of the original information retrieval and the amplitude of the transverse field is somehow a "universal feature" in typical probabilistic information processing, viz., in image restoration, error-correcting codes, and CDMA multiuser demodulation.

  19. Multiple Coaxial Catheter System for Reliable Access in Interventional Stroke Therapy

    SciTech Connect

    Kulcsar, Zsolt Yilmaz, Hasan; Bonvin, Christophe; Lovblad, Karl O.; Ruefenacht, Daniel A.

    2010-12-15

    In some patients with acute cerebral vessel occlusion, navigating mechanical thrombectomy systems is difficult due to tortuous anatomy of the aortic arch, carotid arteries, or vertebral arteries. Our purpose was to describe a multiple coaxial catheter system used for mechanical revascularization that helps navigation and manipulations in tortuous vessels. A triple or quadruple coaxial catheter system was built in 28 consecutive cases presenting with acute ischemic stroke. All cases were treated by mechanical thrombectomy with the Penumbra System. In cases of unsuccessful thrombo-aspiration, additional thrombolysis or angioplasty with stent placement was used for improving recanalization. The catheter system consisted of an outermost 8-Fr and an intermediate 6-Fr guiding catheter, containing the inner Penumbra reperfusion catheters. The largest, 4.1-Fr, reperfusion catheter was navigated over a Prowler Select Plus microcatheter. The catheter system provided access to reach the cerebral lesions and provided stability for the mechanically demanding manipulations of thromboaspiration and stent navigation in all cases. Apart from their mechanical role, the specific parts of the system could also provide access to different types of interventions, like carotid stenting through the 8-Fr guiding catheter and intracranial stenting and thrombolysis through the Prowler Select Plus microcatheter. In this series, there were no complications related to the catheter system. In conclusion, building up a triple or quadruple coaxial system proved to be safe and efficient in our experience for the mechanical thrombectomy treatment of acute ischemic stroke.

  20. Massive MIMO for Wireless Sensing With a Coherent Multiple Access Channel

    NASA Astrophysics Data System (ADS)

    Jiang, Feng; Chen, Jie; Swindlehurst, A. Lee; Lopez-Salcedo, Jose A.

    2015-06-01

    We consider the detection and estimation of a zero-mean Gaussian signal in a wireless sensor network with a coherent multiple access channel, when the fusion center (FC) is configured with a large number of antennas and the wireless channels between the sensor nodes and FC experience Rayleigh fading. For the detection problem, we study the Neyman-Pearson (NP) Detector and Energy Detector (ED), and find optimal values for the sensor transmission gains. For the NP detector which requires channel state information (CSI), we show that detection performance remains asymptotically constant with the number of FC antennas if the sensor transmit power decreases proportionally with the increase in the number of antennas. Performance bounds show that the benefit of multiple antennas at the FC disappears as the transmit power grows. The results of the NP detector are also generalized to the linear minimum mean squared error estimator. For the ED which does not require CSI, we derive optimal gains that maximize the deflection coefficient of the detector, and we show that a constant deflection can be asymptotically achieved if the sensor transmit power scales as the inverse square root of the number of FC antennas. Unlike the NP detector, for high sensor power the multi-antenna ED is observed to empirically have significantly better performance than the single-antenna implementation. A number of simulation results are included to validate the analysis.

  1. Suppression of optical beat interference-noise in orthogonal frequency division multiple access-passive optical network link using self-homodyne balanced detection

    NASA Astrophysics Data System (ADS)

    Won, Yong-Yuk; Jung, Sang-Min; Han, Sang-Kook

    2014-08-01

    A new technique, which reduces optical beat interference (OBI) noise in orthogonal frequency division multiple access-passive optical network (OFDMA-PON) links, is proposed. A self-homodyne balanced detection, which uses a single laser for the optical line terminal (OLT) as well as for the optical network unit (ONU), reduces OBI noise and also improves the signal to noise ratio (SNR) of the discrete multi-tone (DMT) signal. The proposed scheme is verified by transmitting quadrature phase shift keying (QPSK)-modulated DMT signal over a 20-km single mode fiber. The optical signal to noise ratio (OSNR), that is required for BER of 10-5, is reduced by 2 dB in the balanced detection compared with a single channel due to the cancellation of OBI noise in conjunction with the local laser.

  2. The impact of changing the land surface scheme in ACCESS(v1.0/1.1) on the surface climatology

    NASA Astrophysics Data System (ADS)

    Kowalczyk, Eva A.; Stevens, Lauren E.; Law, Rachel M.; Harman, Ian N.; Dix, Martin; Franklin, Charmaine N.; Wang, Ying-Ping

    2016-08-01

    The Community Atmosphere Biosphere Land Exchange (CABLE) model has been coupled to the UK Met Office Unified Model (UM) within the existing framework of the Australian Community Climate and Earth System Simulator (ACCESS), replacing the Met Office Surface Exchange Scheme (MOSES). Here we investigate how features of the CABLE model impact on present-day surface climate using ACCESS atmosphere-only simulations. The main differences attributed to CABLE include a warmer winter and a cooler summer in the Northern Hemisphere (NH), earlier NH spring runoff from snowmelt, and smaller seasonal and diurnal temperature ranges. The cooler NH summer temperatures in canopy-covered regions are more consistent with observations and are attributed to two factors. Firstly, CABLE accounts for aerodynamic and radiative interactions between the canopy and the ground below; this placement of the canopy above the ground eliminates the need for a separate bare ground tile in canopy-covered areas. Secondly, CABLE simulates larger evapotranspiration fluxes and a slightly larger daytime cloud cover fraction. Warmer NH winter temperatures result from the parameterization of cold climate processes in CABLE in snow-covered areas. In particular, prognostic snow density increases through the winter and lowers the diurnally resolved snow albedo; variable snow thermal conductivity prevents early winter heat loss but allows more heat to enter the ground as the snow season progresses; liquid precipitation freezing within the snowpack delays the building of the snowpack in autumn and accelerates snow melting in spring. Overall we find that the ACCESS simulation of surface air temperature benefits from the specific representation of the turbulent transport within and just above the canopy in the roughness sublayer as well as the more complex snow scheme in CABLE relative to MOSES.

  3. An Ultrasonic Multiple-Access Ranging Core Based on Frequency Shift Keying Towards Indoor Localization.

    PubMed

    Segers, Laurent; Van Bavegem, David; De Winne, Sam; Braeken, An; Touhafi, Abdellah; Steenhaut, Kris

    2015-07-30

    This paper describes a new approach and implementation methodology for indoor ranging based on the time difference of arrival using code division multiple access with ultrasound signals. A novel implementation based on a field programmable gate array using finite impulse response filters and an optimized correlation demodulator implementation for ultrasound orthogonal signals is developed. Orthogonal codes are modulated onto ultrasound signals using frequency shift keying with carrier frequencies of 24.5 kHz and 26 kHz. This implementation enhances the possibilities for real-time, embedded and low-power tracking of several simultaneous transmitters. Due to the high degree of parallelism offered by field programmable gate arrays, up to four transmitters can be tracked simultaneously. The implementation requires at most 30% of the available logic gates of a Spartan-6 XC6SLX45 device and is evaluated on accuracy and precision through several ranging topologies. In the first topology, the distance between one transmitter and one receiver is evaluated. Afterwards, ranging analyses are applied between two simultaneous transmitters and one receiver. Ultimately, the position of the receiver against four transmitters using trilateration is also demonstrated. Results show enhanced distance measurements with distances ranging from a few centimeters up to 17 m, while keeping a centimeter-level accuracy.

  4. Carrier Estimation Using Classic Spectral Estimation Techniques for the Proposed Demand Assignment Multiple Access Service

    NASA Technical Reports Server (NTRS)

    Scaife, Bradley James

    1999-01-01

    In any satellite communication, the Doppler shift associated with the satellite's position and velocity must be calculated in order to determine the carrier frequency. If the satellite state vector is unknown then some estimate must be formed of the Doppler-shifted carrier frequency. One elementary technique is to examine the signal spectrum and base the estimate on the dominant spectral component. If, however, the carrier is spread (as in most satellite communications) this technique may fail unless the chip rate-to-data rate ratio (processing gain) associated with the carrier is small. In this case, there may be enough spectral energy to allow peak detection against a noise background. In this thesis, we present a method to estimate the frequency (without knowledge of the Doppler shift) of a spread-spectrum carrier assuming a small processing gain and binary-phase shift keying (BPSK) modulation. Our method relies on an averaged discrete Fourier transform along with peak detection on spectral match filtered data. We provide theory and simulation results indicating the accuracy of this method. In addition, we will describe an all-digital hardware design based around a Motorola DSP56303 and high-speed A/D which implements this technique in real-time. The hardware design is to be used in NMSU's implementation of NASA's demand assignment, multiple access (DAMA) service.

  5. An Ultrasonic Multiple-Access Ranging Core Based on Frequency Shift Keying Towards Indoor Localization

    PubMed Central

    Segers, Laurent; Van Bavegem, David; De Winne, Sam; Braeken, An; Touhafi, Abdellah; Steenhaut, Kris

    2015-01-01

    This paper describes a new approach and implementation methodology for indoor ranging based on the time difference of arrival using code division multiple access with ultrasound signals. A novel implementation based on a field programmable gate array using finite impulse response filters and an optimized correlation demodulator implementation for ultrasound orthogonal signals is developed. Orthogonal codes are modulated onto ultrasound signals using frequency shift keying with carrier frequencies of 24.5 kHz and 26 kHz. This implementation enhances the possibilities for real-time, embedded and low-power tracking of several simultaneous transmitters. Due to the high degree of parallelism offered by field programmable gate arrays, up to four transmitters can be tracked simultaneously. The implementation requires at most 30% of the available logic gates of a Spartan-6 XC6SLX45 device and is evaluated on accuracy and precision through several ranging topologies. In the first topology, the distance between one transmitter and one receiver is evaluated. Afterwards, ranging analyses are applied between two simultaneous transmitters and one receiver. Ultimately, the position of the receiver against four transmitters using trilateration is also demonstrated. Results show enhanced distance measurements with distances ranging from a few centimeters up to 17 m, while keeping a centimeter-level accuracy. PMID:26263986

  6. Satellite range delay simulator for a matrix-switched time division multiple-access network simulator

    NASA Technical Reports Server (NTRS)

    Nagy, Lawrence A.

    1989-01-01

    The Systems Integration, Test, and Evaluation (SITE) facility at NASA Lewis Research Center is presently configured as a satellite-switched time division multiple access (SS-TDMA) network simulator. The purpose of SITE is to demonstrate and evaluate advanced communication satellite technologies, presently embodied by POC components developed under NASA contracts in addition to other hardware, such as ground terminals, designed and built in-house at NASA Lewis. Each ground terminal in a satellite communications system will experience a different aspect of the satellite's motion due mainly to daily tidal effects and station keeping, hence a different duration and rate of variation in the range delay. As a result of this and other effects such as local oscillator instability, each ground terminal must constantly adjust its transmit burst timing so that data bursts from separate ground terminals arrive at the satellite in their assigned time slots, preventing overlap and keeping the system in synchronism. On the receiving end, ground terminals must synchronize their local clocks using reference transmissions received through the satellite link. A feature of the SITE facility is its capability to simulate the varying propagation delays and associated Doppler frequency shifts that the ground terminals in the network have to cope with. Delay is achieved by means of two NASA Lewis designed and built range delay simulator (RDS) systems, each independently controlled locally with front panel switches or remotely by an experiment control and monitor (EC/M) computer.

  7. Interference suppression for code-division multiple-access communications in an underwater acoustic channel.

    PubMed

    Yang, T C; Yang, Wen-Bin

    2009-07-01

    In a code-division multiple-access communications network, the signal from a nearby user often creates a strong interference for the signal from a distant user. This is known as the near-far problem. Power control of source levels is ineffective in an underwater acoustic channel due to the slow sound speed. Interference rejection based on code orthogonality is ineffective using matched-filter processing due to the fact that multipath arrivals effectively destroy the code orthogonality and that the signal arrival times between different users are not synchronized. An algorithm, called hyperspace cancellation by coordinate zeroing, is used in this paper to remove/suppress interference. Using a fast Walsh-Hadamard transform (FWHT) based on the interferer's code sequence, the interference signal is enhanced and removed by coordinate zeroing. The residual signal is transformed back using an inverse FWHT. The filtered data, with the interference signal largely removed, are processed using the desired signal code sequence. Two methods previously developed for direct-sequence spread-spectrum communications in an underwater channel are used to extract the transmitted symbols. Low bit error rate (<10(-2)) is found with the at-sea data for signal-to-interference ratio as low as -8 to -11 dB.

  8. Accessing the genomic information of unculturable oceanic picoeukaryotes by combining multiple single cells

    PubMed Central

    Mangot, Jean-François; Logares, Ramiro; Sánchez, Pablo; Latorre, Fran; Seeleuthner, Yoann; Mondy, Samuel; Sieracki, Michael E.; Jaillon, Olivier; Wincker, Patrick; Vargas, Colomban de; Massana, Ramon

    2017-01-01

    Pico-sized eukaryotes play key roles in the functioning of marine ecosystems, but we still have a limited knowledge on their ecology and evolution. The MAST-4 lineage is of particular interest, since it is widespread in surface oceans, presents ecotypic differentiation and has defied culturing efforts so far. Single cell genomics (SCG) are promising tools to retrieve genomic information from these uncultured organisms. However, SCG are based on whole genome amplification, which normally introduces amplification biases that limit the amount of genomic data retrieved from a single cell. Here, we increase the recovery of genomic information from two MAST-4 lineages by co-assembling short reads from multiple Single Amplified Genomes (SAGs) belonging to evolutionary closely related cells. We found that complementary genomic information is retrieved from different SAGs, generating co-assembly that features >74% of genome recovery, against about 20% when assembled individually. Even though this approach is not aimed at generating high-quality draft genomes, it allows accessing to the genomic information of microbes that would otherwise remain unreachable. Since most of the picoeukaryotes still remain uncultured, our work serves as a proof-of-concept that can be applied to other taxa in order to extract genomic data and address new ecological and evolutionary questions. PMID:28128359

  9. Accessing the genomic information of unculturable oceanic picoeukaryotes by combining multiple single cells.

    PubMed

    Mangot, Jean-François; Logares, Ramiro; Sánchez, Pablo; Latorre, Fran; Seeleuthner, Yoann; Mondy, Samuel; Sieracki, Michael E; Jaillon, Olivier; Wincker, Patrick; Vargas, Colomban de; Massana, Ramon

    2017-01-27

    Pico-sized eukaryotes play key roles in the functioning of marine ecosystems, but we still have a limited knowledge on their ecology and evolution. The MAST-4 lineage is of particular interest, since it is widespread in surface oceans, presents ecotypic differentiation and has defied culturing efforts so far. Single cell genomics (SCG) are promising tools to retrieve genomic information from these uncultured organisms. However, SCG are based on whole genome amplification, which normally introduces amplification biases that limit the amount of genomic data retrieved from a single cell. Here, we increase the recovery of genomic information from two MAST-4 lineages by co-assembling short reads from multiple Single Amplified Genomes (SAGs) belonging to evolutionary closely related cells. We found that complementary genomic information is retrieved from different SAGs, generating co-assembly that features >74% of genome recovery, against about 20% when assembled individually. Even though this approach is not aimed at generating high-quality draft genomes, it allows accessing to the genomic information of microbes that would otherwise remain unreachable. Since most of the picoeukaryotes still remain uncultured, our work serves as a proof-of-concept that can be applied to other taxa in order to extract genomic data and address new ecological and evolutionary questions.

  10. Persons with Multiple Disabilities Use Forehead and Smile Responses to Access or Choose among Technology-Aided Stimulation Events

    ERIC Educational Resources Information Center

    Lancioni, Giulio E.; Singh, Nirbhay N.; O'Reilly, Mark F.; Sigafoos, Jeff; Alberti, Gloria; Bellini, Domencio; Oliva, Doretta; Boccasini, Adele; La Martire, Maria L.; Signorino, Mario

    2013-01-01

    A variety of technology-aided programs have been developed to help persons with congenital or acquired multiple disabilities access preferred stimuli or choose among stimulus options. The application of those programs may pose problems when the participants have very limited behavior repertoires and are unable to use conventional responses and…

  11. Multiple Intimate Partner Violence Experiences: Knowledge, Access, Utilization and Barriers to Utilization of Resources by Women of the African Diaspora

    PubMed Central

    Sabri, Bushra; Huerta, Julia; Alexander, Kamila A.; St.Vil, Noelle M.; Campbell, Jacquelyn C.; Callwood, Gloria B.

    2016-01-01

    Objective This study examined knowledge, access, utilization, and barriers to use of resources among Black women exposed to multiple types of intimate partner violence in Baltimore, Maryland and the U.S. Virgin Islands (USVI). Methods We analyzed quantitative survey data collected by 163 women recruited from primary care, prenatal or family planning clinics in Baltimore and the USVI. In addition we analyzed qualitative data from in-depth interviews with 11 women. Quantitative data were analyzed using descriptive statistics and qualitative data were analyzed using thematic analysis. Results A substantial proportion of Black women with multiple types of violence experiences lacked knowledge of, did not have access to, and did not use resources. Barriers to resource use were identified at the individual, relationship, and community levels. Conclusion There is need for programs to develop awareness, promote access and utilization of resources, and eliminate barriers to resource use among abused Black women. PMID:26548679

  12. Does China's new cooperative medical scheme promote rural elders' access to healthcare services in relation to chronic conditions?

    PubMed Central

    Dai, Baozhen

    2015-01-01

    Background This study examined use of healthcare services by elderly people with a long-term condition living in rural China and participating in that country's New Cooperative Medical Scheme (NCMS). Methods Data were taken from the 2009 China Health and Nutrition Survey. Results The study results showed that education level and annual income were low among rural elders (aged ≥65 years); the illiteracy rate was 58.0% (200/345) and 67.6% (92/136) had an annual income of less than 5000 Chinese yuan renminbi. The elders had low rates of treatment and use of preventive healthcare services while the prevalence of chronic disease was highest among them when compared to other age groups. Among the few elders who received preventive healthcare, most received it at village clinics. Conclusions Preventive healthcare services and chronic disease management are urgently needed by rural elders in China. NCMS should initiate payments to township health centers to enable them to undertake community outreach and education campaigns among rural residents, and train village doctors in standard chronic condition management and prevention, with prioritization of the provision of prevention and management of chronic conditions by village clinics. PMID:25091022

  13. Persons with multiple disabilities exercise adaptive response schemes with the help of technology-based programs: three single-case studies.

    PubMed

    Lancioni, Giulio E; Singh, Nirbhay N; O'Reilly, Mark F; Sigafoos, Jeff; Oliva, Doretta; Campodonico, Francesca; Lang, Russell

    2012-01-01

    The present three single-case studies assessed the effectiveness of technology-based programs to help three persons with multiple disabilities exercise adaptive response schemes independently. The response schemes included (a) left and right head movements for a man who kept his head increasingly static on his wheelchair's headrest (Study I), (b) left- and right-arm movements for a woman who tended to hold both arms/hands tight against her body (Study II), and (c) touching object cues on a computer screen for a girl who rarely used her residual vision for orienting/guiding her hand responses. The technology involved microswitches/sensors to detect the response schemes and a computer/control system to record their occurrences and activate preferred stimuli contingent on them. Results showed large increases in the response schemes targeted for each of the three participants during the intervention phases of the studies. The importance of using technology-based programs as tools for enabling persons with profound and multiple disabilities to practice relevant responses independently was discussed.

  14. Helping members of a community-based health insurance scheme access quality inpatient care through development of a preferred provider system in rural Gujarat.

    PubMed

    Ranson, M Kent; Sinha, Tara; Gandhi, Fenil; Jayswal, Rupal; Mills, Anne J

    2006-01-01

    We describe and analyse the experience of piloting a preferred provider system (PPS) for rural members of Vimo SEWA, a fixed-indemnity, community-based health insurance (CBHI) scheme run by the Self-Employed Women's Association (SEWA). The objectives of the PPS were (i) to facilitate access to hospitalization by providing financial benefits at the time of service utilization; (ii) to shift the burden of compiling a claim away from members and towards Vimo SEWA staff; and (iii) to direct members to inpatient facilities of acceptable quality. The PPS was launched between August and October 2004, in 8 subdistricts covering 15,000 insured. The impact of the scheme was analysed using data from a household survey of claimants and qualitative data from in-depth interviews and focus group discussions. The PPS appears to have been successful in terms of two of the three primary objectives--it has transferred much of the burden of compiling a health Insurance claim onto Vimo SEWA staff, and it has directed members to inpatient facilities with acceptable levels of technical quality (defined in terms of structural Indicators). However, even under the PPS, user fees pose a financial barrier, as the insured have to mobilize funds to cover the costs of medicines, supplies, registration fee, etc. before receipt of cash payment from Vimo SEWA. Other barriers to the success of the PPS were the geographic Inaccessibility of some of the selected hospitals, lack of awareness about the PPS among members and a variety of administrative problems. This pilot project provides useful lessons relating to strategic purchasing by CBHI schemes and, more broadly, managed care in India. In particular, the pragmatic approach taken to assessing hospitals and identifying preferred providers is likely to be useful elsewhere.

  15. Multiple perspectives on the accessibility of e-learning in Canadian colleges and universities.

    PubMed

    Asuncion, Jennison V; Fichten, Catherine S; Ferraro, Vittoria; Chwojka, Caroline; Barile, Maria; Nguyen, Mai Nhu; Wolforth, Joan

    2010-01-01

    An exploratory study identified and compared the views of 77 campus disability service providers, 38 professors, and 45 e-learning professionals from Canadian colleges and universities regarding their experiences with e-learning and its accessibility to students with disabilities. Findings indicate that all groups saw benefit in having someone who makes e-learning accessible to students with disabilities on campus and that problems related to e-learning accessibility were most likely to go to campus disability service providers and least likely to e-learning professionals. Only half of the participants indicated that professors are taught about e-learning accessibility, that there is someone on campus who makes e-learning accessible, that accessibility is a criterion for selecting new types of e-learning, and that their school has e-learning accessibility guidelines or policies. These findings suggest that important e-learning accessibility problems remain. Recommendations for colleges and universities on how to increase e-learning accessibility are provided.

  16. Signal extraction in a power-recycled michelson interferometer with fabry-perot arm cavities by use of a multiple-carrier frontal modulation scheme.

    PubMed

    Sigg, D; Mavalvala, N; Giaime, J; Fritschel, P; Shoemaker, D

    1998-08-20

    We present a signal extraction scheme for longitudinal sensing and control of an interferometric gravitational-wave detector based on a multiple-frequency heterodyne detection technique. Gravitational-wave detectors use multiple-mirror resonant optical systems where resonance conditions must be satisfied for multiple degrees of freedom that are optically coupled. The multiple-carrier longitudinal-sensing technique provides sensitive signals for all interferometric lengths to be controlled and successfully decouples them. The feasibility of the technique is demonstrated on a tabletop-scale power-recycled Michelson interferometer with Fabry-Perot arm cavities, and the experimentally measured values of the length-sensing signals are in good agreement with theoretical calculations.

  17. Improved Iterative Decoding of Network-Channel Codes for Multiple-Access Relay Channel

    PubMed Central

    Majumder, Saikat; Verma, Shrish

    2015-01-01

    Cooperative communication using relay nodes is one of the most effective means of exploiting space diversity for low cost nodes in wireless network. In cooperative communication, users, besides communicating their own information, also relay the information of other users. In this paper we investigate a scheme where cooperation is achieved using a common relay node which performs network coding to provide space diversity for two information nodes transmitting to a base station. We propose a scheme which uses Reed-Solomon error correcting code for encoding the information bit at the user nodes and convolutional code as network code, instead of XOR based network coding. Based on this encoder, we propose iterative soft decoding of joint network-channel code by treating it as a concatenated Reed-Solomon convolutional code. Simulation results show significant improvement in performance compared to existing scheme based on compound codes. PMID:27347526

  18. Improved Iterative Decoding of Network-Channel Codes for Multiple-Access Relay Channel.

    PubMed

    Majumder, Saikat; Verma, Shrish

    2015-01-01

    Cooperative communication using relay nodes is one of the most effective means of exploiting space diversity for low cost nodes in wireless network. In cooperative communication, users, besides communicating their own information, also relay the information of other users. In this paper we investigate a scheme where cooperation is achieved using a common relay node which performs network coding to provide space diversity for two information nodes transmitting to a base station. We propose a scheme which uses Reed-Solomon error correcting code for encoding the information bit at the user nodes and convolutional code as network code, instead of XOR based network coding. Based on this encoder, we propose iterative soft decoding of joint network-channel code by treating it as a concatenated Reed-Solomon convolutional code. Simulation results show significant improvement in performance compared to existing scheme based on compound codes.

  19. Public Funding and Open Access to Research: A Review of Canadian Multiple Sclerosis Research

    PubMed Central

    Stephenson, Carol; Stephenson, Erin; Chaves, Debbie

    2017-01-01

    Background Multiple sclerosis (MS), a progressive demyelinating disease of the brain and spinal cord, is the leading cause of nontraumatic neurological damage in young adults. Canada has one of the highest reported incidents of MS, with estimates between 55 and 240 per 100,000 individuals. Between 2009 and 2014, the MS Society of Canada provided over Can $90 million to researchers and, since 2013, has encouraged researchers to make both current and previous research products openly available. Objective The goal of the study was to determine the open access (OA) cost implications and repository policies of journals frequently used by a sample of MS researchers. This study benchmarked current publishing preferences by MS Society of Canada researchers by examining the OA full-text availability of journal articles written by researchers funded between 2009 and 2014. Methods Researchers were identified from the 2009 to 2014 annual MS Society of Canada Research Summaries. Articles were identified through searches in Web of Science, Scopus, Medline and Embase (both via OVID). Journal level analysis included comparison of OA policies, including article processing charges (APCs) and repository policies. Data were analyzed using descriptive statistics. Results There were 758 articles analyzed in this study, of which 288 (38.0%) were OA articles. The majority of authors were still relying on journal policies for deposit in PubMed Central or availability on publisher websites for OA. Gold OA journals accounted for 10.2% of the journals in this study and were associated with significantly lower APCs (US $1900) than in hybrid journals (US $3000). Review of the journal self-archiving options highlighted the complexity of stipulations that authors would have to navigate to legally deposit a version of their article. Conclusions This study found that there are currently researcher- and publisher-imposed barriers to both the gold and green roads to OA. These results provide a

  20. Data Management for Flexible Access - Implementation and Lessons Learned from work with Multiple User Communities

    NASA Astrophysics Data System (ADS)

    Benedict, K. K.; Scott, S.; Hudspeth, W. B.

    2012-12-01

    There is no shortage of community-specific and generic data discovery and download platforms and protocols (e.g. CUAHSI HIS, DataONE, GeoNetwork Open Source, GeoPortal, OGC CSW, OAI PMH), documentation standards (e.g. FGDC, ISO 19115, EML, Dublin Core), data access and visualization standards and models (e.g. OGC WxS, OpenDAP), and general-purpose web service models (i.e. REST & SOAP) upon which Geo-informatics cyberinfrastructure (CI) may be built. When attempting to develop a robust platform that may service a wide variety of users and use cases the challenge is one of identifying which existing platform (if any) may support those current needs while also allowing for future expansion for additional capabilities. In the case of the implementation of a data storage, discovery and delivery platform to support the multiple projects at the Earth Data Analysis Center at UNM, no single platform or protocol met the joint requirements of two initial applications (the New Mexico Resource Geographic Information System [http://rgis.unm.edu] and the New Mexico EPSCoR Data Portal [http://nmepscor.org/dataportal]) and furthermore none met anticipated additional requirements as new applications of the platform emerged. As a result of this assessment three years ago EDAC embarked on the development of the Geographic Storage, Transformation, and Retrieval Engine (GSToRE) platform as a general purpose platform upon which n-tiered geospatially enabled data intensive applications could be built. When initially released in 2010 the focus was on the publication of dynamically generated Open Geospatial Consortium services based upon a PostgreSQL/PostGIS backend database. The identification of additional service interface requirements (implementation of the DataONE API and CUAHSI WaterML services), use cases provided by the NM EPSCoR education working group, and expanded metadata publication needs have led to a significant update to the underlying data management tier for GSToRE - the

  1. Secure Communications in High Speed Fiber Optical Networks Using Code Division Multiple Access (CDMA) Transmission

    SciTech Connect

    Han, I; Bond, S; Welty, R; Du, Y; Yoo, S; Reinhardt, C; Behymer, E; Sperry, V; Kobayashi, N

    2004-02-12

    This project is focused on the development of advanced components and system technologies for secure data transmission on high-speed fiber optic data systems. This work capitalizes on (1) a strong relationship with outstanding faculty at the University of California-Davis who are experts in high speed fiber-optic networks, (2) the realization that code division multiple access (CDMA) is emerging as a bandwidth enhancing technique for fiber optic networks, (3) the realization that CDMA of sufficient complexity forms the basis for almost unbreakable one-time key transmissions, (4) our concepts for superior components for implementing CDMA, (5) our expertise in semiconductor device processing and (6) our Center for Nano and Microtechnology, which is where the majority of the experimental work was done. Here we present a novel device concept, which will push the limits of current technology, and will simultaneously solve system implementation issues by investigating new state-of-the-art fiber technologies. This will enable the development of secure communication systems for the transmission and reception of messages on deployed commercial fiber optic networks, through the CDMA phase encoding of broad bandwidth pulses. CDMA technology has been developed as a multiplexing technology, much like wavelength division multiplexing (WDM) or time division multiplexing (TDM), to increase the potential number of users on a given communication link. A novel application of the techniques created for CDMA is to generate secure communication through physical layer encoding. Physical layer encoding devices are developed which utilize semiconductor waveguides with fast carrier response times to phase encode spectral components of a secure signal. Current commercial technology, most commonly a spatial light modulator, allows phase codes to be changed at rates of only 10's of Hertz ({approx}25ms response). The use of fast (picosecond to nanosecond) carrier dynamics of semiconductors, as

  2. A satellite mobile communication system based on Band-Limited Quasi-Synchronous Code Division Multiple Access (BLQS-CDMA)

    NASA Technical Reports Server (NTRS)

    Degaudenzi, R.; Elia, C.; Viola, R.

    1990-01-01

    Discussed here is a new approach to code division multiple access applied to a mobile system for voice (and data) services based on Band Limited Quasi Synchronous Code Division Multiple Access (BLQS-CDMA). The system requires users to be chip synchronized to reduce the contribution of self-interference and to make use of voice activation in order to increase the satellite power efficiency. In order to achieve spectral efficiency, Nyquist chip pulse shaping is used with no detection performance impairment. The synchronization problems are solved in the forward link by distributing a master code, whereas carrier forced activation and closed loop control techniques have been adopted in the return link. System performance sensitivity to nonlinear amplification and timing/frequency synchronization errors are analyzed.

  3. Nonadditivity of quantum and classical capacities for entanglement breaking multiple-access channels and the butterfly network

    SciTech Connect

    Grudka, Andrzej; Horodecki, Pawel

    2010-06-15

    We analyze quantum network primitives which are entanglement breaking. We show superadditivity of quantum and classical capacity regions for quantum multiple-access channels and the quantum butterfly network. Since the effects are especially visible at high noise they suggest that quantum information effects may be particularly helpful in the case of the networks with occasional high noise rates. The present effects provide a qualitative borderline between superadditivities of bipartite and multipartite systems.

  4. Weighted sum-rate maximization for multi-user SIMO multiple access channels in cognitive radio networks

    NASA Astrophysics Data System (ADS)

    He, Peter; Zhao, Lian; Lu, Jianhua

    2013-12-01

    In this article, an efficient distributed and parallel algorithm is proposed to maximize the sum-rate and optimize the input distribution policy for the multi-user single input multiple output multiple access channel (MU-SIMO MAC) system with concurrent access within a cognitive radio (CR) network. The single input means that every user has a single antenna and multiple output means that base station(s) has multiple antennas. The main features are: (i) the power distribution for the users is updated by using variable scale factors which effectively and efficiently maximize the objective function at each iteration; (ii) distributed and parallel computation is employed to expedite convergence of the proposed distributed algorithm; and (iii) a novel water-filling with mixed constraints is investigated, and used as a fundamental block of the proposed algorithm. Due to sufficiently exploiting the structure of the proposed model, the proposed algorithm owns fast convergence. Numerical results verify that the proposed algorithm is effective and fast convergent. Using the proposed approach, for the simulated range, the required number of iterations for convergence is two and this number is not sensitive to the increase of the number of users. This feature is quite desirable for large scale systems with dense active users. In addition, it is also worth noting that the proposed algorithm is a monotonic feasible operator to the iteration. Thus, the stop criterion for computation could be easily set up.

  5. MSA-PAD: DNA multiple sequence alignment framework based on PFAM accessed domain information.

    PubMed

    Balech, Bachir; Vicario, Saverio; Donvito, Giacinto; Monaco, Alfonso; Notarangelo, Pasquale; Pesole, Graziano

    2015-08-01

    Here we present the MSA-PAD application, a DNA multiple sequence alignment framework that uses PFAM protein domain information to align DNA sequences encoding either single or multiple protein domains. MSA-PAD has two alignment options: gene and genome mode.

  6. Hop-Reservation Multiple Access (HRMA) for Ad-Hoc Networks

    DTIC Science & Technology

    1999-01-01

    5] and MACAW [6]. III. CORRECTNESS OF HRMA The following theorem proves that HRMA eliminates hidden- terminal interference problems. To prove this...Bharghavan, A. Demers, S. Shenker, and L. Zhang, “ MACAW : A Me- dia Access Protocol for Wireless LAN’s,” in Proc. ACM SIGCOMM ’94, pp. 212–25, London

  7. A chimera grid scheme. [multiple overset body-conforming mesh system for finite difference adaptation to complex aircraft configurations

    NASA Technical Reports Server (NTRS)

    Steger, J. L.; Dougherty, F. C.; Benek, J. A.

    1983-01-01

    A mesh system composed of multiple overset body-conforming grids is described for adapting finite-difference procedures to complex aircraft configurations. In this so-called 'chimera mesh,' a major grid is generated about a main component of the configuration and overset minor grids are used to resolve all other features. Methods for connecting overset multiple grids and modifications of flow-simulation algorithms are discussed. Computational tests in two dimensions indicate that the use of multiple overset grids can simplify the task of grid generation without an adverse effect on flow-field algorithms and computer code complexity.

  8. A no-key-exchange secure image sharing scheme based on Shamir's three-pass cryptography protocol and the multiple-parameter fractional Fourier transform.

    PubMed

    Lang, Jun

    2012-01-30

    In this paper, we propose a novel secure image sharing scheme based on Shamir's three-pass protocol and the multiple-parameter fractional Fourier transform (MPFRFT), which can safely exchange information with no advance distribution of either secret keys or public keys between users. The image is encrypted directly by the MPFRFT spectrum without the use of phase keys, and information can be shared by transmitting the encrypted image (or message) three times between users. Numerical simulation results are given to verify the performance of the proposed algorithm.

  9. Multi-pulse frequency shifted (MPFS) multiple access modulation for ultra wideband

    DOEpatents

    Nekoogar, Faranak [San Ramon, CA; Dowla, Farid U [Castro Valley, CA

    2012-01-24

    The multi-pulse frequency shifted technique uses mutually orthogonal short duration pulses o transmit and receive information in a UWB multiuser communication system. The multiuser system uses the same pulse shape with different frequencies for the reference and data for each user. Different users have a different pulse shape (mutually orthogonal to each other) and different transmit and reference frequencies. At the receiver, the reference pulse is frequency shifted to match the data pulse and a correlation scheme followed by a hard decision block detects the data.

  10. Hybrid bidirectional radio-over-fiber-based orthogonal frequency division multiple access-passive optical network supporting 60/120 GHz using offset quadrate phase shift keying

    NASA Astrophysics Data System (ADS)

    Zhang, Chongfu; Chen, Chen; Qiu, Kun

    2015-09-01

    A hybrid bidirectional orthogonal frequency division multiple access-passive optical network (OFDMA-PON) based on offset quadrate phase shift keying (OQPSK) to support 60- and 120-GHz radio-over-fiber system is proposed. The system can support wired/wireless applications and enable the dynamic bandwidth allocation according to a subscriber's application. It is successfully achieved by using the millimeter waves (MMWs) generation and the carrier-reuse technique. In the proposed scheme, the MMW bands used for downlink (DL) and uplink transmissions are generated at the optical line terminal by the dual-arm Mach-Zehnder modulators. Both 60- and 120-GHz MMWs are obtained for the transmission of the high bit-rate services in source-free optical network units (ONUs), only using a single 15-GHz sinusoidal wave source. The Rayleigh backscattering effect is considered in the proposed OQPSK-based OFDMA-PON. For DL transmission over a 30-km single-mode fiber, the power penalties are less than 0.8 and 1 dB for the OQPSK-OFDM wired data at 10 Gb/s and the OQPSK-OFDM wireless data at 5 Gb/s, respectively.

  11. A New Improving Quantum Secret Sharing Scheme

    NASA Astrophysics Data System (ADS)

    Xu, Ting-Ting; Li, Zhi-Hui; Bai, Chen-Ming; Ma, Min

    2017-01-01

    An improving quantum secret sharing scheme (IQSS scheme) was introduced by Nascimento et al. (Phys. Rev. A 64, 042311 (2001)), which was analyzed by the improved quantum access structure. In this paper, we propose a new improving quantum secret sharing scheme, and more quantum access structures can be realized by this scheme than the previous one. For example, we prove that any threshold and hypercycle quantum access structures can be realized by the new scheme.

  12. A New Improving Quantum Secret Sharing Scheme

    NASA Astrophysics Data System (ADS)

    Xu, Ting-Ting; Li, Zhi-Hui; Bai, Chen-Ming; Ma, Min

    2017-04-01

    An improving quantum secret sharing scheme (IQSS scheme) was introduced by Nascimento et al. (Phys. Rev. A 64, 042311 (2001)), which was analyzed by the improved quantum access structure. In this paper, we propose a new improving quantum secret sharing scheme, and more quantum access structures can be realized by this scheme than the previous one. For example, we prove that any threshold and hypercycle quantum access structures can be realized by the new scheme.

  13. BioZone Exploting Source-Capability Information for Integrated Access to Multiple Bioinformatics Data Sources

    SciTech Connect

    Liu, L; Buttler, D; Paques, H; Pu, C; Critchlow

    2002-01-28

    Modern Bioinformatics data sources are widely used by molecular biologists for homology searching and new drug discovery. User-friendly and yet responsive access is one of the most desirable properties for integrated access to the rapidly growing, heterogeneous, and distributed collection of data sources. The increasing volume and diversity of digital information related to bioinformatics (such as genomes, protein sequences, protein structures, etc.) have led to a growing problem that conventional data management systems do not have, namely finding which information sources out of many candidate choices are the most relevant and most accessible to answer a given user query. We refer to this problem as the query routing problem. In this paper we introduce the notation and issues of query routing, and present a practical solution for designing a scalable query routing system based on multi-level progressive pruning strategies. The key idea is to create and maintain source-capability profiles independently, and to provide algorithms that can dynamically discover relevant information sources for a given query through the smart use of source profiles. Compared to the keyword-based indexing techniques adopted in most of the search engines and software, our approach offers fine-granularity of interest matching, thus it is more powerful and effective for handling queries with complex conditions.

  14. BioZoom: Exploiting Source-Capability Information for Integrated Access to Multiple Bioinformatics Data Sources

    SciTech Connect

    Liu, L; Buttler, D; Critchlow, T J; Han, W; Paques, H; Pu, C; Rocco, D

    2003-01-09

    Modern Bioinformatics data sources are widely used by molecular biologists for homology searching and new drug discovery. User-friendly and yet responsive access is one of the most desirable properties for integrated access to the rapidly growing, heterogeneous, and distributed collection of data sources. The increasing volume and diversity of digital information related to bioinformatics (such as genomes, protein sequences, protein structures, etc.) have led to a growing problem that conventional data management systems do not have, namely finding which information sources out of many candidate choices are the most relevant and most accessible to answer a given user query. We refer to this problem as the query routing problem. In this paper we introduce the notation and issues of query routing, and present a practical solution for designing a scalable query routing system based on multi-level progressive pruning strategies. The key idea is to create and maintain source-capability profiles independently, and to provide algorithms that can dynamically discover relevant information sources for a given query through the smart use of source profiles. Compared to the keyword-based indexing techniques adopted in most of the search engines and software, our approach offers fine-granularity of interest matching, thus it is more powerful and effective for handling queries with complex conditions.

  15. Resolving the problem of multiple accessions of the same transcript deposited across various public databases.

    PubMed

    Weirick, Tyler; John, David; Uchida, Shizuka

    2016-02-26

    Maintaining the consistency of genomic annotations is an increasingly complex task because of the iterative and dynamic nature of assembly and annotation, growing numbers of biological databases and insufficient integration of annotations across databases. As information exchange among databases is poor, a 'novel' sequence from one reference annotation could be annotated in another. Furthermore, relationships to nearby or overlapping annotated transcripts are even more complicated when using different genome assemblies. To better understand these problems, we surveyed current and previous versions of genomic assemblies and annotations across a number of public databases containing long noncoding RNA. We identified numerous discrepancies of transcripts regarding their genomic locations, transcript lengths and identifiers. Further investigation showed that the positional differences between reference annotations of essentially the same transcript could lead to differences in its measured expression at the RNA level. To aid in resolving these problems, we present the algorithm 'Universal Genomic Accession Hash (UGAHash)' and created an open source web tool to encourage the usage of the UGAHash algorithm. The UGAHash web tool (http://ugahash.uni-frankfurt.de) can be accessed freely without registration. The web tool allows researchers to generate Universal Genomic Accessions for genomic features or to explore annotations deposited in the public databases of the past and present versions. We anticipate that the UGAHash web tool will be a valuable tool to check for the existence of transcripts before judging the newly discovered transcripts as novel.

  16. On the Performance of Non-Orthogonal Multiple Access in 5G Systems with Randomly Deployed Users

    NASA Astrophysics Data System (ADS)

    Ding, Zhiguo; Yang, Zheng; Fan, Pingzhi; Poor, H. Vincent

    2014-12-01

    In this letter, the performance of non-orthogonal multiple access (NOMA) is investigated in a cellular downlink scenario with randomly deployed users. The developed analytical results show that NOMA can achieve superior performance in terms of ergodic sum rates; however, the outage performance of NOMA depends critically on the choices of the users' targeted data rates and allocated power. In particular, a wrong choice of the targeted data rates and allocated power can lead to a situation in which the user's outage probability is always one, i.e. the user's targeted quality of service will never be met.

  17. Access to environmental stimulation via eyelid responses for persons with acquired brain injury and multiple disabilities: a new microswitch arrangement.

    PubMed

    Lancioni, Giulio E; Singh, Nirbhay N; O'Reilly, Mark F; Sigafoos, Jeff; Ricci, Irene; Buonocunto, Francesca; Sacco, Valentina

    2012-04-01

    This study assessed a new microswitch arrangement for eyelid responses using an optic sensor placed above the cheekbone and a small sticker on the person's eyelid. This new arrangement, which was designed to avoid interference of the microswitch with the person's visual functioning, was tested on three adults with acquired brain injury and multiple (consciousness, communication, and motor) disabilities. The study was carried out according to a non-concurrent multiple baseline design across participants. Data showed the new microswitch arrangement was suitable for all three participants, who increased their responding during the intervention phase of the study when their responses allowed them to access preferred stimulation. Practical implications of the findings are discussed.

  18. Code-division multiple-access protocol for active RFID systems

    NASA Astrophysics Data System (ADS)

    Mazurek, Gustaw; Szabatin, Jerzy

    2008-01-01

    Most of the Radio Frequency Identification (RFID) systems operating in HF and UHF bands employ narrowband modulations (FSK or ASK) with Manchester coding. However, these simple transmission schemes are vulnerable to narrowband interference (NBI) generated by other radio systems working in the same frequency band, and also suffer from collision problem and need special anti-collision procedures. This becomes especially important when operating in a noisy, crowded industrial environment. In this paper we show the performance of RFID system with DS-CDMA transmission in comparison to a standard system with FSK modulation defined in ISO 18000-7. Our simulation results show that without any bandwidth expansion the immunity against NBI can be improved by 8 dB and the system capacity can be 7 times higher when using DS-CDMA transmission instead of FSK modulation with Manchester coding.

  19. Cache oblivious storage and access heuristics for blocked matrix-matrix multiplication

    SciTech Connect

    Bock, Nicolas; Rubensson, Emanuel H; Niklasson, Anders M N; Challacombe, Matt; Salek, Pawel

    2008-01-01

    The authors investigate effects of ordering in blocked matrix-matrix multiplication. They find that submatrices do not have to be stored contiguously in memory in order to achieve near optimal performance. They also find a good choice of execution order of submatrix operations can lead to a speedup of up to four times for small block sizes.

  20. Multiple Providers and Access to Primary Education: The Case of Bangladesh

    ERIC Educational Resources Information Center

    Zia-Us-Sabur; Ahmed, Manzoor

    2010-01-01

    Even though most children in Bangladesh are enrolled in school, the country faces enormous challenges in ensuring that children complete primary education, and learn an acceptable amount. Multiple providers--state, quasi-state, and non-state--have helped to raise the initial enrolment rate and improve the gender balance. The critical question is…

  1. A licence to vape: Is it time to trial of a nicotine licensing scheme to allow Australian adults controlled access to electronic cigarettes devices and refill solutions containing nicotine?

    PubMed

    Gartner, Coral; Hall, Wayne

    2015-06-01

    Australia has some of the most restrictive laws concerning use of nicotine in e-cigarettes. The only current legal option for Australians to legally possess and use nicotine for vaping is with a medical prescription and domestic supply is limited to compounding pharmacies that prepare medicines for specific patients. An alternative regulatory option that could be implemented under current drugs and poisons regulations is a 'nicotine licensing' scheme utilising current provisions for 'dangerous poisons'. This commentary discusses how such a scheme could be used to trial access to nicotine solutions for vaping outside of a 'medicines framework' in Australia.

  2. Ultrasonic Multiple-Access Ranging System Using Spread Spectrum and MEMS Technology for Indoor Localization

    PubMed Central

    Segers, Laurent; Tiete, Jelmer; Braeken, An; Touhafi, Abdellah

    2014-01-01

    Indoor localization of persons and objects poses a great engineering challenge. Previously developed localization systems demonstrate the use of wideband techniques in ultrasound ranging systems. Direct sequence and frequency hopping spread spectrum ultrasound signals have been proven to achieve a high level of accuracy. A novel ranging method using the frequency hopping spread spectrum with finite impulse response filtering will be investigated and compared against the direct sequence spread spectrum. In the first setup, distances are estimated in a single-access environment, while in the second setup, two senders and one receiver are used. During the experiments, the micro-electromechanical systems are used as ultrasonic sensors, while the senders were implemented using field programmable gate arrays. Results show that in a single-access environment, the direct sequence spread spectrum method offers slightly better accuracy and precision performance compared to the frequency hopping spread spectrum. When two senders are used, measurements point out that the frequency hopping spread spectrum is more robust to near-far effects than the direct sequence spread spectrum. PMID:24553084

  3. Performance of a Frequency-Hopped Real-Time Remote Control System in a Multiple Access Scenario

    NASA Astrophysics Data System (ADS)

    Cervantes, Frank

    A recent trend is observed in the context of the radio-controlled aircrafts and automobiles within the hobby grade category and Unmanned Aerial Vehicles (UAV) applications moving to the well-known Industrial, Scientific and Medical (ISM) band. Based on this technological fact, the present thesis evaluates an individual user performance by featuring a multiple-user scenario where several point-to-point co-located real-time Remote Control (RC) applications operate using Frequency Hopping Spread Spectrum (FHSS) as a medium access technique in order to handle interference efficiently. Commercial-off-the-shelf wireless transceivers ready to operate in the ISM band are considered as the operational platform supporting the above-mentioned applications. The impact of channel impairments and of different critical system engineering issues, such as working with real clock oscillators and variable packet duty cycle, are considered. Based on the previous, simulation results allowed us to evaluate the range of variation for those parameters for an acceptable system performance under Multiple Access (MA) environments.

  4. GLONASS-R: GNSS reflectometry with a Frequency Division Multiple Access-based satellite navigation system

    NASA Astrophysics Data System (ADS)

    Hobiger, T.; Haas, R.; Löfgren, J. S.

    2014-04-01

    The information from reflected Global Navigation Satellite System (GNSS) signals can become a valuable data source, from which geophysical properties can be deduced. This approach, called GNSS Reflectometry (GNSS-R), can be used to develop instruments that act like an altimeter when arrival times of direct and reflected signals are compared. Current GNSS-R systems usually entirely rely on signals from the Global Positioning Service (GPS), and field experiments could demonstrate that information from such systems can measure sea level with an accuracy of a few centimeters. However, the usage of the Russian GLONASS system has the potential to simplify the processing scheme and to allow handling of direct and reflected signals like a bistatic radar. Thus, such a system has been developed and deployed for test purposes at the Onsala Space Observatory, Sweden, that has an operational GPS-based GNSS-R system. Over a period of 2 weeks in October 2013, GPS-based GNSS-R sea level monitoring and measurements with the newly developed GLONASS-R system were carried out in parallel. In addition, data from colocated tide gauge measurements were available for comparison. It can be shown that precision and accuracy of the GLONASS-based GNSS-R system is comparable to, or even better than, conventional GPS-based GNSS-R solutions. Moreover, the simplicity of the newly developed GLONASS-R system allows to make it a cheap and valuable tool for various remote sensing applications.

  5. ECR Browser: A Tool For Visualizing And Accessing Data From Comparisons Of Multiple Vertebrate Genomes

    SciTech Connect

    Loots, G G; Ovcharenko, I; Stubbs, L; Nobrega, M A

    2004-01-06

    The increasing number of vertebrate genomes being sequenced in draft or finished form provide a unique opportunity to study and decode the language of DNA sequence through comparative genome alignments. However, novel tools and strategies are required to accommodate this increasing volume of genomic information and to facilitate experimental annotation of genome function. Here we present the ECR Browser, a tool that provides an easy and dynamic access to whole genome alignments of human, mouse, rat and fish sequences. This web-based tool (http://ecrbrowser.dcode.org) provides the starting point for discovery of novel genes, identification of distant gene regulatory elements and prediction of transcription factor binding sites. The genome alignment portal of the ECR Browser also permits fast and automated alignment of any user-submitted sequence to the genome of choice. The interconnection of the ECR browser with other DNA sequence analysis tools creates a unique portal for studying and exploring vertebrate genomes.

  6. Access to Care for Multiple Sclerosis in Times of Economic Crisis in Greece – the HOPE II Study

    PubMed Central

    Souliotis, Kyriakos; Alexopoulou, Elena; Papageorgiou, Manto; Politi, Anastasia; Litsa, Panagiota; Contiades, Xenophon

    2016-01-01

    Background: While there is currently no cure for multiple sclerosis (MS), treatment with biologic disease-modifying drugs (bDMDs) can reduce the impact of the condition on the lives of patients. In Greece, the regulatory change in the distribution system of bDMDs, limited their administration through the designated pharmacies of the National Organization for Healthcare Services Provision (EOPYY) or the National Health System (ESY) hospitals, thus potentially impacting access to MS treatment. In this context, the aim of this paper was to assess the barriers to bDMDs, by recording MS patients’ experiences. Methods: A survey research was conducted between January and February 2014 in Athens and 5 other major Greek cities with the methods of personal and telephone interview. A structured questionnaire was used to elicit socio-economic and medical information, information related to obstacles in accessing bDMDs and medical treatment, from MS patients that visited EOPYY pharmacies during the study period. Results: During the last year 69% of 179 participants reported that the distribution system of bDMDs has improved. Thirteen percent of participants encountered problems in accessing their medication, and 16.9% of participants in accessing their physician, with the obstacles being more pronounced for non-Athens residents. Frequent obstacles to bDMDs were the distance from EOPYY pharmacies and difficulties in obtaining a diagnosis from an EOPYY/ESY physician, while obstacles to medical care were delays in appointment booking and travel difficulties. Conclusion: Even though the major weaknesses of the distribution system of bDMDs have improved, further amelioration of the system could be achieved through the home delivery of medicines to patients living in remote areas, and through the development of a national MS registry. PMID:26927393

  7. An experimental investigation of an air cooling scheme for the multichip modules of the multiplicity and vertex detector

    SciTech Connect

    Bernardin, J.D.; Bosze, E.; Boissevain, J.; Simon-Gillo, J.

    1997-07-01

    This report presents a summary of an experimental investigation of an electronics air cooling system for the multiplicity and vertex detector (MVD), a device used to determine and characterize the collision location of two accelerated heavy ions. Measurements of the flow rates of the cooling air and the temperatures of the air and electronic components were used to assess and optimize the performance of the proposed air cooling system, identify potential assembly problems and system limitations, and provide the necessary information for designing and sizing the final MVD cooling system components.

  8. Post-Coma Persons with Extensive Multiple Disabilities Use Microswitch Technology to Access Selected Stimulus Events or Operate a Radio Device

    ERIC Educational Resources Information Center

    Lancioni, Giulio E.; Singh, Nirbhay N.; O'Reilly, Mark F.; Sigafoos, Jeff; Alberti, Gloria; Oliva, Doretta; Megna, Gianfranco; Iliceto, Carla; Damiani, Sabino; Ricci, Irene; Spica, Antonella

    2011-01-01

    The present two studies extended research evidence on the use of microswitch technology by post-coma persons with multiple disabilities. Specifically, Study I examined whether three adults with a diagnosis of minimally conscious state and multiple disabilities could use microswitches as tools to access brief, selected stimulus events. Study II…

  9. Locally accessible conformations of proteins: multiple molecular dynamics simulations of crambin.

    PubMed Central

    Caves, L. S.; Evanseck, J. D.; Karplus, M.

    1998-01-01

    Multiple molecular dynamics (MD) simulations of crambin with different initial atomic velocities are used to sample conformations in the vicinity of the native structure. Individual trajectories of length up to 5 ns sample only a fraction of the conformational distribution generated by ten independent 120 ps trajectories at 300 K. The backbone atom conformational space distribution is analyzed using principal components analysis (PCA). Four different major conformational regions are found. In general, a trajectory samples only one region and few transitions between the regions are observed. Consequently, the averages of structural and dynamic properties over the ten trajectories differ significantly from those obtained from individual trajectories. The nature of the conformational sampling has important consequences for the utilization of MD simulations for a wide range of problems, such as comparisons with X-ray or NMR data. The overall average structure is significantly closer to the X-ray structure than any of the individual trajectory average structures. The high frequency (less than 10 ps) atomic fluctuations from the ten trajectories tend to be similar, but the lower frequency (100 ps) motions are different. To improve conformational sampling in molecular dynamics simulations of proteins, as in nucleic acids, multiple trajectories with different initial conditions should be used rather than a single long trajectory. PMID:9541397

  10. Uncorrelated multiple conductive filament nucleation and rupture in ultra-thin high-κ dielectric based resistive random access memory

    NASA Astrophysics Data System (ADS)

    Wu, Xing; Li, Kun; Raghavan, Nagarajan; Bosman, Michel; Wang, Qing-Xiao; Cha, Dongkyu; Zhang, Xi-Xiang; Pey, Kin-Leong

    2011-08-01

    Resistive switching in transition metal oxides could form the basis for next-generation non-volatile memory (NVM). It has been reported that the current in the high-conductivity state of several technologically relevant oxide materials flows through localized filaments, but these filaments have been characterized only individually, limiting our understanding of the possibility of multiple conductive filaments nucleation and rupture and the correlation kinetics of their evolution. In this study, direct visualization of uncorrelated multiple conductive filaments in ultra-thin HfO2-based high-κ dielectric resistive random access memory (RRAM) device has been achieved by high-resolution transmission electron microscopy (HRTEM), along with electron energy loss spectroscopy (EELS), for nanoscale chemical analysis. The locations of these multiple filaments are found to be spatially uncorrelated. The evolution of these microstructural changes and chemical properties of these filaments will provide a fundamental understanding of the switching mechanism for RRAM in thin oxide films and pave way for the investigation into improving the stability and scalability of switching memory devices.

  11. IPAT: a freely accessible software tool for analyzing multiple patent documents with inbuilt landscape visualizer.

    PubMed

    Ajay, Dara; Gangwal, Rahul P; Sangamwar, Abhay T

    2015-01-01

    Intelligent Patent Analysis Tool (IPAT) is an online data retrieval tool, operated based on text mining algorithm to extract specific patent information in a predetermined pattern into an Excel sheet. The software is designed and developed to retrieve and analyze technology information from multiple patent documents and generate various patent landscape graphs and charts. The software is C# coded in visual studio 2010, which extracts the publicly available patent information from the web pages like Google Patent and simultaneously study the various technology trends based on user-defined parameters. In other words, IPAT combined with the manual categorization will act as an excellent technology assessment tool in competitive intelligence and due diligence for predicting the future R&D forecast.

  12. Simultaneous detection of multiple debris via a cascade of numerical evaluations and a voting scheme for lines in an image sequence

    NASA Astrophysics Data System (ADS)

    Fujita, Koki; Ichimura, Naoyuki; Hanada, Toshiya

    2017-04-01

    This paper presents a novel method to simultaneously detect multiple trajectories of space debris in an observation image sequence to establish a reliable model for space debris environment in Geosynchronous Earth Orbit (GEO). The debris in GEO often appear faintly in image sequences due to the high altitude. A simple but steady way to detect such faint debris is to decrease a threshold value of binarization applied to an image sequence during preprocessing. However, a low threshold value of binarization leads to extracting a large number of objects other than debris that become obstacles to detect debris trajectories. In order to detect debris from binarized image frames with massive obstacles, this work proposes a method that utilizes a cascade of numerical evaluations and a voting scheme to evaluate characteristics of the line segments obtained by connecting two image objects in different image frames, which are the candidates of debris trajectories. In the proposed method, the line segments corresponding to objects other than debris are filtered out using three types of characteristics, namely displacement, direction, and continuity. First, the displacement and direction of debris motion are evaluated to remove irrelevant trajectories. Then, the continuity of the remaining line segments is checked to find debris by counting the number of image objects appearing on or close to the line segments. Since checking the continuity can be regarded as a voting scheme, the proposed cascade algorithm can take advantage of the properties of voting method such as the Hough transform, i.e., the robustness against heavy noises and clutters, and ability of detecting multiple trajectories simultaneously. The experimental tests using real image sequences obtained in a past observation campaign demonstrate the effectiveness of the proposed method.

  13. Using multiple hydrogen bonding cross-linkers to access reversibly responsive three dimensional graphene oxide architecture

    NASA Astrophysics Data System (ADS)

    Han, Junkai; Shen, Yongtao; Feng, Wei

    2016-07-01

    Three-dimensional (3D) graphene materials have attracted a lot of attention for efficiently utilizing inherent properties of graphene sheets. However, 3D graphene materials reported in the previous literature are constructed through covalent or weak non-covalent interactions, causing permanent structure/property changes. In this paper, a novel 3D graphene material of dynamic interactions between lamellas with 2-ureido-4[1H]-pyrimidinone as a supra-molecular motif has been synthesized. This 3D graphene material shows enhanced sheet interactions while the cross-linking takes place. With proper solvent stimulation, the integrated 3D graphene material can disassemble as isolated sheets. The driving force for the 3D structure assembly or disassembly is considered to be the forming or breaking of the multiple hydrogen bonding pairs. Furthermore, the 3D material is used as an intelligent dye adsorber to adsorb methylene blue and release it. The controllable and reversible characteristic of this 3D graphene material may open an avenue to the synthesis and application of novel intelligent materials.Three-dimensional (3D) graphene materials have attracted a lot of attention for efficiently utilizing inherent properties of graphene sheets. However, 3D graphene materials reported in the previous literature are constructed through covalent or weak non-covalent interactions, causing permanent structure/property changes. In this paper, a novel 3D graphene material of dynamic interactions between lamellas with 2-ureido-4[1H]-pyrimidinone as a supra-molecular motif has been synthesized. This 3D graphene material shows enhanced sheet interactions while the cross-linking takes place. With proper solvent stimulation, the integrated 3D graphene material can disassemble as isolated sheets. The driving force for the 3D structure assembly or disassembly is considered to be the forming or breaking of the multiple hydrogen bonding pairs. Furthermore, the 3D material is used as an

  14. Replica Analysis of Multiuser Detection for Code Division Multiple Access with M-Ary Phase-Shift Keying

    NASA Astrophysics Data System (ADS)

    Kato, Hiroyuki; Okada, Masato; Miyoshi, Seiji

    2013-07-01

    We analyze the performance of the maximizer of the posterior marginals (MPM) detector for code division multiple access (CDMA) multiuser detection with M-ary phase shift keying (M-ary PSK) in the large system limit by the replica method. The obtained theory agrees with computer simulation reasonably well. We also derive the theory in the case of the large M limit and discuss the dependence of the properties of M-ary PSK CDMA communication on M. We show that the waterfall phenomenon occurs for both the finite and infinite values of M. We also show that a value of M for which the decoded phase information on the original user symbol becomes minimum exists. Furthermore, we discuss the relationship between the theory based on the replica method and that based on self-consistent signal-to-noise analysis (SCSNA).

  15. Habit formation and multiple means to goal attainment: repeated retrieval of target means causes inhibited access to competitors.

    PubMed

    Danner, Unna N; Aarts, Henk; de Vries, Nanne K

    2007-10-01

    Three studies examined the cognitive processes underlying the formation of goal-directed habits in a multiple means context. Repeated retrieval of target means upon goal activation was expected to result in inhibition of competing means for the same goal. In all studies, participants studied goal-means combinations and subsequently practiced the retrieval of certain means to attain the goals in a retrieval paradigm. Study 1 tested accessibility of the different means in a goal-means verification task and showed that competing means were not inhibited after a single retrieval but only upon repeated retrieval (three or nine times). Studies 2 and 3 extended these findings in a means-recognition task and demonstrated that inhibition occurred in the absence of explicit intent or instructions to suppress the competitors. These inhibitory effects of competing means are discussed against the background of current social cognition research on the processes underlying goal-means networks and the formation of habits.

  16. Students with multiple disabilities using technology-based programs to choose and access stimulus events alone or with caregiver participation.

    PubMed

    Lancioni, Giulio E; Singh, Nirbhay N; O'Reilly, Mark F; Sigafoos, Jeff; Oliva, Doretta; Cingolani, Eleonora

    2009-01-01

    The first of these two studies extended preliminary evidence on the use of technology-based programs for enabling students with severe and profound multiple disabilities to choose and access environmental stimuli on their own. Each of the three participants had two microswitches linked to specific sets of stimuli through a computer system. The activation of one of the microswitches triggered the computer system to present a sample of one of the stimuli. If the student chose it, the computer system turned it on for a specific time interval. The second study tested a new technology that allowed the students to choose and access the chosen stimuli with the involvement of the caregiver. The two participants had three microswitches linked to a computer system. The participants' choice of a stimulus alerted the caregiver who then got involved in the stimulation process. The results of both studies showed that the participants learned to activate the basic microswitches consistently, had high percentages of choice for the stimulus samples presented by the computer but with wide differences across stimuli, and largely maintained this performance at a 2-month post-intervention check. These findings were analyzed in terms of the usability of the two types of programs, the role they may play within educational and living contexts, and their innovative technical dimensions.

  17. Persons with multiple disabilities use forehead and smile responses to access or choose among technology-aided stimulation events.

    PubMed

    Lancioni, Giulio E; Singh, Nirbhay N; O'Reilly, Mark F; Sigafoos, Jeff; Alberti, Gloria; Bellini, Domenico; Oliva, Doretta; Boccasini, Adele; La Martire, Maria L; Signorino, Mario

    2013-05-01

    A variety of technology-aided programs have been developed to help persons with congenital or acquired multiple disabilities access preferred stimuli or choose among stimulus options. The application of those programs may pose problems when the participants have very limited behavior repertoires and are unable to use conventional responses and microswitches. The present two studies assessed non-conventional response-microswitch solutions for three of those participants. Study I included two participants who were exposed to a program in which forehead skin movement was the response required to access preferred stimulation. The microswitch was an optic sensor combined with a small black sticker on the forehead. Study II included one participant who was exposed to a program in which a smile response was required to choose among stimuli. The microswitch for monitoring the smile was a new camera-based technology. The results of the two studies showed that the response-microswitch solutions were suitable for the participants and enabled them to perform successfully. Implications of the studies for people with limited motor behavior and issues for future research were discussed.

  18. Simulation scheme of dusk scene using piece-wise multiple regression based on time-series color-block images

    NASA Astrophysics Data System (ADS)

    Liu, Chen-Chung; Yang, Chih-Chao

    2010-09-01

    Dusk and dawn are usually the most beautiful moments of the day, and are almost always too short for busy people nowadays to witness their coming. In this work, an efficient strategy for simulating a dusk scene of an outdoor scene image taken at other times before the sunset is presented. The strategy is a hybrid approach combining the piece-wise multiple regression (PMR) of data, discrete cosine transformation (DCT), and a look-up table algorithm. The process begins using a series of color-block images taken in the afternoon of a day. The best fitting functions of PMR for these color block images exist on separate planes (red, green, and blue) in the DCT domain individually. The reference databases of the DCT coefficients varying with respect to time are then established according to the best fitting functions of PMR. Finally, the dusk scene of an outdoor scene taken in the afternoon is synthesized by querying the reference database. The experiment results show that the presented algorithm can precisely simulate the desired dusk scene from a scene image taken in the afternoon.

  19. A novel IPTV program multiplex access system to EPON

    NASA Astrophysics Data System (ADS)

    Xu, Xian; Liu, Deming; He, Wei; Lu, Xi

    2007-11-01

    With the rapid development of high speed networks, such as Ethernet Passive Optical Network (EPON), traffic patterns in access networks have evolved from traditional text-oriented service to the mixed text-, voice- and video- based services, leading to so called "Triple Play". For supporting IPTV service in EPON access network infrastructure, in this article we propose a novel IPTV program multiplex access system to EPON, which enables multiple IPTV program source servers to seamlessly access to IPTV service access port of optical line terminal (OLT) in EPON. There are two multiplex schemes, namely static multiplex scheme and dynamic multiplex scheme, in implementing the program multiplexing. Static multiplex scheme is to multiplex all the IPTV programs and forward them to the OLT, regardless of the need of end-users. While dynamic multiplex scheme can dynamically multiplex and forward IPTV programs according to what the end-users actually demand and those watched by no end-user would not be multiplexed. By comparing these two schemes, a reduced traffic of EPON can be achieved by using dynamic multiplex scheme, especially when most end-users are watching the same few IPTV programs. Both schemes are implemented in our system, with their hardware and software designs described.

  20. A secure double-image sharing scheme based on Shamir's three-pass protocol and 2D Sine Logistic modulation map in discrete multiple-parameter fractional angular transform domain

    NASA Astrophysics Data System (ADS)

    Sui, Liansheng; Duan, Kuaikuai; Liang, Junli

    2016-05-01

    A secure double-image sharing scheme is proposed by using the Shamir's three-pass protocol in the discrete multiple-parameter fractional angular transform domain. First, an enlarged image is formed by assembling two plain images successively in the horizontal direction and scrambled in the chaotic permutation process, in which the sequences of chaotic pairs are generated by the two-dimensional Sine Logistic modulation map. Second, the scrambled image is divided into two components which are used to constitute a complex image. One component is normalized and regarded as the phase part of the complex image as well as other is considered as the amplitude part. Finally, the complex image is shared between the sender and the receiver by using the Shamir's three-pass protocol, in which the discrete multiple-parameter fractional angular transform is used as the encryption function due to its commutative property. The proposed double-image sharing scheme has an obvious advantage that the key management is convenient without distributing the random phase mask keys in advance. Moreover, the security of the image sharing scheme is enhanced with the help of extra parameters of the discrete multiple-parameter fractional angular transform. To the best of our knowledge, this is the first report on integrating the Shamir's three-pass protocol with double-image sharing scheme in the information security field. Simulation results and security analysis verify the feasibility and effectiveness of the proposed scheme.

  1. High precision three-dimensional iterative indoor localization algorithm using code division multiple access modulation based on visible light communication

    NASA Astrophysics Data System (ADS)

    Guan, Weipeng; Wu, Yvxiang; Wen, Shangsheng; Yang, Chen; Chen, Hao; Zhang, Zhaoze; Chen, Yingcong

    2016-10-01

    To solve the problem of positioning accuracy affected by mutual interference among multiple reference points in the traditional visible light communication positioning system, an iterative algorithm of received signal strength (RSS) based on code division multiple access (CDMA) coding is proposed. Every light-emitting diode (LED) source broadcasts a unique CDMA modulation identification (ID) code, which is associated with geographic position. The mobile terminal receives a mixed light signal from each LED reference point. By using the orthogonality of the spreading codes, the corresponding ID position information and the intensity attenuation factor of each LED reference point source can be available. According to the ID information and signal attenuation intensity, the location area of each LED and the distance between the receiver end and each LED can be determined. The three-dimensional (3-D) position of the receiver can be obtained by using the iterative algorithm of RSS triangulation. The experimental results show that the proposed algorithm can achieve a positioning accuracy of 5.25 cm in a two-dimensional (2-D) positioning system. And in the 3-D positioning system, the maximum positioning error is 10.27 cm, the minimum positioning error is 0.45 cm, the average positioning error is 3.97 cm, and the proportion of the positioning error exceeding 5 cm is <25%. With a very good positioning accuracy, this system is simple and does not require synchronization processing. What is more, it can be applied to both the 2-D and 3-D localization systems, which has a broad application prospect.

  2. Libraries and the Pickle (PCLE) of Content Management Schemes: Survey of Pending Copyright Policy Battles and Their Implications for School Libraries, Free Speech, Access to Information, and Democracy.

    ERIC Educational Resources Information Center

    Minow, Mary; Wilson, Cicely Reed

    2003-01-01

    Explains the copyright policy battles now pending in Congress and the courts, with a discussion of what they mean for free speech, access to information, and democratic culture in school libraries. (MES)

  3. Variable weight Khazani-Syed code using hybrid fixed-dynamic technique for optical code division multiple access system

    NASA Astrophysics Data System (ADS)

    Anas, Siti Barirah Ahmad; Seyedzadeh, Saleh; Mokhtar, Makhfudzah; Sahbudin, Ratna Kalos Zakiah

    2016-10-01

    Future Internet consists of a wide spectrum of applications with different bit rates and quality of service (QoS) requirements. Prioritizing the services is essential to ensure that the delivery of information is at its best. Existing technologies have demonstrated how service differentiation techniques can be implemented in optical networks using data link and network layer operations. However, a physical layer approach can further improve system performance at a prescribed received signal quality by applying control at the bit level. This paper proposes a coding algorithm to support optical domain service differentiation using spectral amplitude coding techniques within an optical code division multiple access (OCDMA) scenario. A particular user or service has a varying weight applied to obtain the desired signal quality. The properties of the new code are compared with other OCDMA codes proposed for service differentiation. In addition, a mathematical model is developed for performance evaluation of the proposed code using two different detection techniques, namely direct decoding and complementary subtraction.

  4. Satellite range delay simulator for a matrix-switched time division multiple-access network simulation system

    NASA Technical Reports Server (NTRS)

    Nagy, Lawrence A.

    1990-01-01

    The Systems Integration, Test, and Evaluation (SITE) facility at NASA Lewis Research Center is presently configured as a satellite-switched time division multiple access (SS-TDMA) network simulator. The purpose of SITE is to demonstrate and evaluate advanced communication satellite technologies, presently embodied by POC components developed under NASA contracts in addition to other hardware, such as ground terminals, designed and built in-house at NASA Lewis. Each ground terminal in a satellite communications system will experience a different aspect of the satellite's motion due mainly to daily tidal effects and station keeping, hence a different duration and rate of variation in the range delay. As a result of this and other effects such as local oscillator instability, each ground terminal must constantly adjust its transmit burst timing so that data bursts from separate ground terminals arrive at the satellite in their assigned time slots, preventing overlap and keeping the system in synchronism. On the receiving end, ground terminals must synchronize their local clocks using reference transmissions received through the satellite link. A feature of the SITE facility is its capability to simulate the varying propagation delays and associated Doppler frequency shifts that the ground terminals in the network have to cope with. Delay is ahcieved by means of two NASA Lewis designed and built range delay simulator (RDS) systems, each independently controlled locally with front panel switches or remotely by an experiment control and monitor (EC/M) computer.

  5. Comparison of nutrient intakes from two selected diet plans considered healthful versus the cutoff points for green lights as defined by the UK's multiple traffic light scheme.

    PubMed

    Green, H; Fern, E

    2016-02-01

    This study compared nutrient intakes from 7-day menus for the US MyPlate and DASH Eating Plan versus the cutoff points for green lights defined by the UK's multiple traffic light (MTL) scheme. For both diets, the foods achieved green lights for saturated fat and salt, and for beverages for total fat, saturated fat and salt. The other nutrients achieved amber lights but were within the range of the two diets. By contrast, the MTL threshold for salt in beverages was outside the range of the diets. The values for salt in beverages in the MyPlate and Dash diet plans were 0.06±0.07 and 0.19±0.01 (s.d.) g/100 ml, which are both considerably lower compared with the cutoff of 0.3 g/100 ml for an MTL green light. Adjusting the green MTL threshold values to the median values for a healthful diet could help make MTL labelling a more valid way of helping consumers choose a healthful diet.

  6. Persons with Multiple Disabilities Accessing Stimulation and Requesting Social Contact via Microswitch and VOCA Devices: New Research Evaluation and Social Validation

    ERIC Educational Resources Information Center

    Lancioni, Giulio E.; O'Reilly, Mark F.; Singh, Nirbhay N.; Sigafoos, Jeff; Didden, Robert; Oliva, Doretta; Campodonico, Francesca; de Pace, Claudia; Chiapparino, Claudia; Groeneweg, Jop

    2009-01-01

    The first of these two studies assessed whether 11 participants with multiple disabilities of 5.3-18.2 (M = 10.7) years of age would succeed in combining a microswitch for accessing preferred environmental stimuli and a Voice Output Communication Aid (VOCA) for requesting social contact. The second study conducted a social validation assessment of…

  7. Identification and Classification of Orthogonal Frequency Division Multiple Access (OFDMA) Signals Used in Next Generation Wireless Systems

    DTIC Science & Technology

    2012-03-01

    interoperability for microwave access ZCC zero-terminating convolutional coding xv EXECUTIVE SUMMARY Many developing regions of the world that...consolidated and revised into the IEEE 802.16-2009 standard, which is the basis for mobile worldwide interoperability for microwave access (WiMAX...interoperability for microwave access (WiMAX) is based on the IEEE 802.16-2004 standard and mobile WiMAX is based on the IEEE 802.16e-2005 standard. Although

  8. Post-coma persons with extensive multiple disabilities use microswitch technology to access selected stimulus events or operate a radio device.

    PubMed

    Lancioni, Giulio E; Singh, Nirbhay N; O'Reilly, Mark F; Sigafoos, Jeff; Alberti, Gloria; Oliva, Doretta; Megna, Gianfranco; Iliceto, Carla; Damiani, Sabino; Ricci, Irene; Spica, Antonella

    2011-01-01

    The present two studies extended research evidence on the use of microswitch technology by post-coma persons with multiple disabilities. Specifically, Study I examined whether three adults with a diagnosis of minimally conscious state and multiple disabilities could use microswitches as tools to access brief, selected stimulus events. Study II assessed whether an adult, who had emerged from a minimally conscious state but was affected by multiple disabilities, could manage the use of a radio device via a microswitch-aided program. Results showed that the participants of Study I had a significant increase of microswitch responding during the intervention phases. The participant of Study II learned to change radio stations and seemed to spend different amounts of session time on the different stations available (suggesting preferences among the programs characterizing them). The importance of microswitch technology for assisting post-coma persons with multiple disabilities to positively engage with their environment was discussed.

  9. Household trends in access to improved water sources and sanitation facilities in Vietnam and associated factors: findings from the Multiple Indicator Cluster Surveys, 2000-2011.

    PubMed

    Tuyet-Hanh, Tran Thi; Lee, Jong-Koo; Oh, Juhwan; Van Minh, Hoang; Ou Lee, Chul; Hoan, Le Thi; Nam, You-Seon; Long, Tran Khanh

    2016-01-01

    Background Despite progress made by the Millennium Development Goal (MDG) number 7.C, Vietnam still faces challenges with regard to the provision of access to safe drinking water and basic sanitation. Objective This paper describes household trends in access to improved water sources and sanitation facilities separately, and analyses factors associated with access to improved water sources and sanitation facilities in combination. Design Secondary data from the Vietnam Multiple Indicator Cluster Survey in 2000, 2006, and 2011 were analyzed. Descriptive statistics and tests of significance describe trends over time in access to water and sanitation by location, demographic and socio-economic factors. Binary logistic regressions (2000, 2006, and 2011) describe associations between access to water and sanitation, and geographic, demographic, and socio-economic factors. Results There have been some outstanding developments in access to improved water sources and sanitation facilities from 2000 to 2011. In 2011, the proportion of households with access to improved water sources and sanitation facilities reached 90% and 77%, respectively, meeting the 2015 MDG targets for safe drinking water and basic sanitation set at 88% and 75%, respectively. However, despite these achievements, in 2011, only 74% of households overall had access to combined improved drinking water and sanitation facilities. There were also stark differences between regions. In 2011, only 47% of households had access to both improved water and sanitation facilities in the Mekong River Delta compared with 94% in the Red River Delta. In 2011, households in urban compared to rural areas were more than twice as likely (odds ratio [OR]: 2.2; 95% confidence interval [CI]: 1.9-2.5) to have access to improved water and sanitation facilities in combination, and households in the highest compared with the lowest wealth quintile were over 40 times more likely (OR: 42.3; 95% CI: 29.8-60.0). Conclusions More efforts

  10. Multiple boron-boron bonds in neutral molecules: an insight from the extended transition state method and the natural orbitals for chemical valence scheme.

    PubMed

    Mitoraj, Mariusz P; Michalak, Artur

    2011-03-21

    We have analyzed the character of B═B and B≡B bonds in the neutral molecules of general form: LHB═BHL (2-L) and LB≡BL (3-L), for various ancillary ligands L attached to the boron center, based on a recently developed method that combines the extended transition state scheme with the theory of natural orbitals for chemical valence (ETS-NOCV). In the case of molecules with the B═B bond, 2-L, we have included L = PMe(3), PF(3), PCl(3), PH(3), C(3)H(4)N(2)═C(NHCH)(2), whereas for molecules containing the B≡B connection, 3-L, the following ligands were considered L = CO, PMe(3), PCl(3), (Me(2)NCH(2)CH(2)O)(2)Ge. The results led us to conclude that use of phosphorus ligands leads to strengthening of the B═B bond by 6.4 kcal/mol (for 2-PMe(3)), by 4.4 (for 2-PF(3)) and by 9.2 (for 2-PH(3)), when compared to a molecule developed on the experimental basis, 2-C(3)H(4)N(2) (ΔE(total) = -118.3 kcal/mol). The ETS scheme has shown that all contributions, that is, (i) orbital interaction ΔE(orb), (ii) Pauli repulsion ΔE(Pauli), and (iii) electrostatic stabilization ΔE(elstat), are important in determining the trend in the B═B bond energies, ΔE(total). ETS-NOCV results revealed that both σ(B═B) and π(B═B) contributions are responsible for the changes in ΔE(orb) values. All considered molecules of the type LB≡BL, 3-L, exhibit a stronger B≡B bond when compared to a double B═B connection in 2-L (|ΔE(total)| is lower by 11.8-42.5 kcal/mol, depending on the molecule). The main reason is a lower Pauli repulsion contribution noted for 3-CO, 3-PMe(3), and 3-PCl(3) molecules. In addition, in the case of 3-PMe(3) and 3-PCl(3), the orbital interaction term is more stabilizing; however, the effect is less pronounced compared to the drop in the Pauli repulsion term. In all of the systems with double and triple boron-boron bonds, the electronic factor (ΔE(orb)) dominates over the electrostatic contribution (ΔE(elstat)). Finally, the strongest B

  11. An energy-efficient SIMD DSP with multiple VLIW configurations and an advanced memory access unit for LTE-A modem LSIs

    NASA Astrophysics Data System (ADS)

    Tomono, Mitsuru; Ito, Makiko; Nomura, Yoshitaka; Mouri, Makoto; Hirose, Yoshio

    2015-12-01

    Energy efficiency is the most important factor in the design of wireless modem LSIs for mobile handset systems. We have developed an energy-efficient SIMD DSP for LTE-A modem LSIs. Our DSP has mainly two hardware features in order to reduce energy consumption. The first one is multiple VLIW configurations to minimize accesses to instruction memories. The second one is an advanced memory access unit to realize complex memory accesses required for wireless baseband processing. With these features, performance of our DSP is about 1.7 times faster than a base DSP on average for standard LTE-A Libraries. Our DSP achieves about 20% improvement in energy efficiency compared to a base DSP for LTE-A modem LSIs.

  12. Non-orthogonal optical multicarrier access based on filter bank and SCMA.

    PubMed

    Liu, Bo; Zhang, Lijia; Xin, Xiangjun

    2015-10-19

    This paper proposes a novel non-orthogonal optical multicarrier access system based on filter bank and sparse code multiple access (SCMA). It offers released frequency offset and better spectral efficiency for multicarrier access. An experiment of 73.68 Gb/s filter bank-based multicarrier (FBMC) SCMA system with 60 km single mode fiber link is performed to demonstrate the feasibility. The comparison between fast Fourier transform (FFT) based multicarrier and the proposed scheme is also investigated in the experiment.

  13. Use of Multiple Parallel Interface Strategies To Create a Seamless Accessible Interface for Next-Generation Information Systems.

    ERIC Educational Resources Information Center

    Vanderheiden, Gregg C.

    Information systems in public places such as community centers and libraries require some means to provide access to individuals with physical, visual, and, if sound is involved, hearing impairments. This paper proposes a seamless adaptable human interface protocol that would allow users to incrementally modify the command and presentation aspects…

  14. Multiple Motives, Conflicting Conceptions: Parsing the Contexts of Differentiated Access to Scientific Information in the Federal Government

    ERIC Educational Resources Information Center

    Oltmann, Shannon M.

    2012-01-01

    Scientific information, used by the U.S. federal government to formulate public policy in many arenas, is frequently contested and sometimes altered, blocked from publication, deleted from reports, or restricted in some way. This dissertation examines how and why restricted access to science policy (RASP) occurs through a comparative case study.…

  15. Design and Performance of Overlap FFT Filter-Bank for Dynamic Spectrum Access Applications

    NASA Astrophysics Data System (ADS)

    Tanabe, Motohiro; Umehira, Masahiro

    An OFDMA-based (Orthogonal Frequency Division Multiple Access-based) channel access scheme for dynamic spectrum access has the drawbacks of large PAPR (Peak to Average Power Ratio) and large ACI (Adjacent Channel Interference). To solve these problems, a flexible channel access scheme using an overlap FFT filter-bank was proposed based on single carrier modulation for dynamic spectrum access. In order to apply the overlap FFT filter-bank for dynamic spectrum access, it is necessary to clarify the performance of the overlap FFT filter-bank according to the design parameters since its frequency characteristics are critical for dynamic spectrum access applications. This paper analyzes the overlap FFT filter-bank and evaluates its performance such as frequency characteristics and ACI performance according to the design parameters.

  16. Design and Evaluation of a Virtual Quadrant Receiver for 4-ary Pulse Position Modulation/Optical Code Division Multiple Access (4-ary PPM/O-CDMA)

    SciTech Connect

    Mendez, A J; Hernandez, V J; Gagliardi, R M; Bennett, C V

    2006-12-29

    M-ary pulse position modulation (M-ary PPM) is an alternative to on-off-keying (OOK) that transmits multiple bits as a single symbol occupying a frame of M slots. PPM does not require thresholding as in OOK signaling, instead performing a comparison test among all slots in a frame to make the slot decision. Combining PPM with optical code division multiple access (PPM/O-CDMA) adds the benefit of supporting multiple concurrent, asynchronous bursty PPM users. While the advantages of PPM/O-CDMA are well known, implementing a receiver that performs comparison test can be difficult. This paper describes the design of a novel array receiver for M-ary PPM/O-CDMA (M = 4) where the received signal is mapped onto an xy-plane whose quadrants define the PPM slot decision by means of an associated control law. The receiver does not require buffering or nonlinear operations. In this paper we describe a planar lightwave circuit (PLCs) implementation of the receiver. We give detailed numerical simulations that test the concept and investigate the effects of multi-access interference (MAI) and optical beat interference (OBI) on the slot decisions. These simulations provide guidelines for subsequent experimental measurements that will be described.

  17. An application of the edge effect in measuring accessibility to multiple food retailer types in Southwestern Ontario, Canada

    PubMed Central

    2011-01-01

    Background Trends in food retailing associated with the consolidation of smaller-format retailers into fewer, larger-format supercentres have left some rural areas with fewer sources of nutritious, affordable food. Access to nutritious, affordable food is essential for good dietary habits and combating health issues such as type-2 diabetes, obesity, and cardiovascular disease. Many studies on food environments use inaccurate or incomplete methods for locating food retailers, which may be responsible for mischaracterising food deserts. This study uses databases of every residence in and every food retailer in and around Middlesex County, Ontario, Canada. Residences were geocoded to their precise address, and network analysis techniques were performed in a geographic information system (GIS) to determine distances between every residence and different types of food retailers (grocery stores, fast food, fruit and vegetable sources, grocery stores plus fruit and vegetable sources, variety stores), both when considering and neglecting facilities outside the area of study, to account for a deficiency in analysis termed the 'edge effect'. Results Analysis of household accessibility to food outlets by neighbourhood socioeconomic distress level indicated that residents in the most distressed neighbourhoods tended to have better accessibility to all types of food retailers. In the most distressed neighbourhoods, 79 percent of residences were within walking distance of a grocery store, compared to only 10 percent in the least distressed neighbourhoods. When the edge effect was neglected, 37 percent of distance estimates proved inaccurate. Average accessibility to all food retailer types improved dramatically when food outlets adjacent to the study area were considered, thereby controlling for the edge effect. Conclusion By neglecting to consider food retailers just outside study area boundaries, previous studies may significantly over-report the actual distance necessary to

  18. Security Enhanced Anonymous Multiserver Authenticated Key Agreement Scheme Using Smart Cards and Biometrics

    PubMed Central

    Choi, Younsung; Nam, Junghyun; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Won, Dongho

    2014-01-01

    An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user's biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register many times. To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics. Chuang and Chen claimed that their scheme not only supports multiple servers but also achieves various security requirements. However, we show that this scheme is vulnerable to a masquerade attack, a smart card attack, a user impersonation attack, and a DoS attack and does not achieve perfect forward secrecy. We also propose a security enhanced anonymous multiserver authenticated key agreement scheme which addresses all the weaknesses identified in Chuang and Chen's scheme. PMID:25276847

  19. Security enhanced anonymous multiserver authenticated key agreement scheme using smart cards and biometrics.

    PubMed

    Choi, Younsung; Nam, Junghyun; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Won, Dongho

    2014-01-01

    An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user's biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register many times. To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics. Chuang and Chen claimed that their scheme not only supports multiple servers but also achieves various security requirements. However, we show that this scheme is vulnerable to a masquerade attack, a smart card attack, a user impersonation attack, and a DoS attack and does not achieve perfect forward secrecy. We also propose a security enhanced anonymous multiserver authenticated key agreement scheme which addresses all the weaknesses identified in Chuang and Chen's scheme.

  20. Compact Spreader Schemes

    SciTech Connect

    Placidi, M.; Jung, J. -Y.; Ratti, A.; Sun, C.

    2014-07-25

    This paper describes beam distribution schemes adopting a novel implementation based on low amplitude vertical deflections combined with horizontal ones generated by Lambertson-type septum magnets. This scheme offers substantial compactness in the longitudinal layouts of the beam lines and increased flexibility for beam delivery of multiple beam lines on a shot-to-shot basis. Fast kickers (FK) or transverse electric field RF Deflectors (RFD) provide the low amplitude deflections. Initially proposed at the Stanford Linear Accelerator Center (SLAC) as tools for beam diagnostics and more recently adopted for multiline beam pattern schemes, RFDs offer repetition capabilities and a likely better amplitude reproducibility when compared to FKs, which, in turn, offer more modest financial involvements both in construction and operation. Both solutions represent an ideal approach for the design of compact beam distribution systems resulting in space and cost savings while preserving flexibility and beam quality.

  1. Compact spreader schemes

    NASA Astrophysics Data System (ADS)

    Placidi, M.; Jung, J.-Y.; Ratti, A.; Sun, C.

    2014-12-01

    This paper describes beam distribution schemes adopting a novel implementation based on low amplitude vertical deflections combined with horizontal ones generated by Lambertson-type septum magnets. This scheme offers substantial compactness in the longitudinal layouts of the beam lines and increased flexibility for beam delivery of multiple beam lines on a shot-to-shot basis. Fast kickers (FK) or transverse electric field RF Deflectors (RFD) provide the low amplitude deflections. Initially proposed at the Stanford Linear Accelerator Center (SLAC) as tools for beam diagnostics and more recently adopted for multiline beam pattern schemes, RFDs offer repetition capabilities and a likely better amplitude reproducibility when compared to FKs, which, in turn, offer more modest financial involvements both in construction and operation. Both solutions represent an ideal approach for the design of compact beam distribution systems resulting in space and cost savings while preserving flexibility and beam quality.

  2. A New TH-CDMA Scheme for Dispersive Infrared Channel and Its Performance Evaluation

    NASA Astrophysics Data System (ADS)

    Hamdi, Mazda; Nasiri-Kenari, Masoumeh

    2011-04-01

    Infrared indoor wireless communications using nondirected links are subject to severe multipath distortion which causes intersymbol interference (ISI). To lessen multipath distortion effect and thereby to improve the system performance, in this paper, we consider a new time-hopping based multiple access scheme for this channel, in which one pulse is transmitted in each bit interval. The position of the pulse is determined based on the output of a low rate error correcting code along with the user's dedicated PN code. We evaluate the multiple access performance of the system for correlation receiver considering background noise, dark current, and thermal noise. We compare the performance of our proposed multiple access scheme with those of the previously introduced code division multiple access schemes for infrared communications, like CDMA and Frame Time Hopping (FTH). Our results show that, for the same bandwidth and bit rate, the proposed system substantially excels the other methods in term of bit error rate, or equivalently the number of the users supported at a fixed bit error rate.

  3. An analysis of delay-locked loop tracking binary Markovian sequence in the presence of multiple access interference and channel noise

    NASA Astrophysics Data System (ADS)

    Nagata, Keisuke; Fujisaka, Hisato; Kamio, Takeshi; Haeiwa, Kazuhisa

    This paper presents an analysis of delay-locked loops in direct spreading code division multiple access systems with Markovian spreading sequences. The established analysis with piecewise constant approximation is similar to the mean field analysis which estimates macroscopic characteristics of a spatially-distributed probabilistic system from the local interaction between the elements of the system with low computational complexity. The low complexity makes it possible to analyze the behavior of not only second-order archetype delay-locked loops but also higher-order non-coherent delay-locked loops in the presence of both multiple access interference and channel noise. It is found from the presented analysis that replacing i.i.d. spreading sequences with Markovian spreading sequences with non-vanishing negative autocorrelation reduces the phase tracking error of a non-coherent 1Δ delay-locked loop. The time spent for estimating the error by the presented method is about 1/1000 compared with that by the path integral method.

  4. Performance analyses and improvements for the IEEE 802.15.4 CSMA/CA scheme with heterogeneous buffered conditions.

    PubMed

    Zhu, Jianping; Tao, Zhengsu; Lv, Chunfeng

    2012-01-01

    Studies of the IEEE 802.15.4 Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) scheme have been received considerable attention recently, with most of these studies focusing on homogeneous or saturated traffic. Two novel transmission schemes-OSTS/BSTS (One Service a Time Scheme/Bulk Service a Time Scheme)-are proposed in this paper to improve the behaviors of time-critical buffered networks with heterogeneous unsaturated traffic. First, we propose a model which contains two modified semi-Markov chains and a macro-Markov chain combined with the theory of M/G/1/K queues to evaluate the characteristics of these two improved CSMA/CA schemes, in which traffic arrivals and accessing packets are bestowed with non-preemptive priority over each other, instead of prioritization. Then, throughput, packet delay and energy consumption of unsaturated, unacknowledged IEEE 802.15.4 beacon-enabled networks are predicted based on the overall point of view which takes the dependent interactions of different types of nodes into account. Moreover, performance comparisons of these two schemes with other non-priority schemes are also proposed. Analysis and simulation results show that delay and fairness of our schemes are superior to those of other schemes, while throughput and energy efficiency are superior to others in more heterogeneous situations. Comprehensive simulations demonstrate that the analysis results of these models match well with the simulation results.

  5. Can front-of-pack labelling schemes guide healthier food choices? Australian shoppers' responses to seven labelling formats.

    PubMed

    Watson, Wendy L; Kelly, Bridget; Hector, Debra; Hughes, Clare; King, Lesley; Crawford, Jennifer; Sergeant, John; Chapman, Kathy

    2014-01-01

    There is evidence that easily accessible, comprehensible and consistent nutrient information on the front of packaged foods could assist shoppers to make healthier food choices. This study used an online questionnaire of 4357 grocery shoppers to examine Australian shoppers' ability to use a range of front-of-pack labels to identify healthier food products. Seven different front-of-pack labelling schemes comprising variants of the Traffic Light labelling scheme and the Percentage Daily Intake scheme, and a star rating scheme, were applied to nine pairs of commonly purchased food products. Participants could also access a nutrition information panel for each product. Participants were able to identify the healthier product in each comparison over 80% of the time using any of the five schemes that provided information on multiple nutrients. No individual scheme performed significantly better in terms of shoppers' ability to determine the healthier product, shopper reliance on the 'back-of-pack' nutrition information panel, and speed of use. The scheme that provided information about energy only and a scheme with limited numerical information of nutrient type or content performed poorly, as did the nutrition information panel alone (control). Further consumer testing is necessary to determine the optimal format and content of an interpretive front-of-pack nutrition labelling scheme.

  6. New LNG process scheme

    SciTech Connect

    Foglietta, J.H.

    1999-07-01

    A new LNG cycle has been developed for base load liquefaction facilities. This new design offers a different technical and economical solution comparing in efficiency with the classical technologies. The new LNG scheme could offer attractive business opportunities to oil and gas companies that are trying to find paths to monetize gas sources more effectively; particularly for remote or offshore locations where smaller scale LNG facilities might be applicable. This design offers also an alternative route to classic LNG projects, as well as alternative fuel sources. Conceived to offer simplicity and access to industry standard equipment, This design is a hybrid result of combining a standard refrigeration system and turboexpander technology.

  7. A robust and novel dynamic-ID-based authentication scheme for care team collaboration with smart cards.

    PubMed

    Chang, Ya-Fen; Chen, Chia-Chen; Chang, Pei-Yu

    2013-04-01

    Nowadays, users/patients may gain desired medical services on-line because of the rapid development of computer network technologies. Conventional healthcare services are provided by a single server. However, care team collaboration by integrating services is the key to improve financial and clinical performance. How a user/patient accesses desired medical services provided by multiple servers becomes a challenge to realize care team collaboration. User authentication plays an important role to protect resources or services from being accessed by unauthorized users. In this paper, we first discuss the perceived security drawbacks of pervasive smart-card-based remote user authentication schemes. Then, we propose a novel dynamic-ID-based user authentication scheme based on elliptic curve cryptosystem (ECC) for multi-server environment with smart cards. The proposed scheme ensures user anonymity and computational efficiency and complies with essential requirements of a secure smart-card-based authentication scheme for multi-server environment to enable care team collaboration.

  8. Matroids and quantum-secret-sharing schemes

    SciTech Connect

    Sarvepalli, Pradeep; Raussendorf, Robert

    2010-05-15

    A secret-sharing scheme is a cryptographic protocol to distribute a secret state in an encoded form among a group of players such that only authorized subsets of the players can reconstruct the secret. Classically, efficient secret-sharing schemes have been shown to be induced by matroids. Furthermore, access structures of such schemes can be characterized by an excluded minor relation. No such relations are known for quantum secret-sharing schemes. In this paper we take the first steps toward a matroidal characterization of quantum-secret-sharing schemes. In addition to providing a new perspective on quantum-secret-sharing schemes, this characterization has important benefits. While previous work has shown how to construct quantum-secret-sharing schemes for general access structures, these schemes are not claimed to be efficient. In this context the present results prove to be useful; they enable us to construct efficient quantum-secret-sharing schemes for many general access structures. More precisely, we show that an identically self-dual matroid that is representable over a finite field induces a pure-state quantum-secret-sharing scheme with information rate 1.

  9. High-resolution 2D NMR spectra in inhomogeneous fields based on intermolecular multiple-quantum coherences with efficient acquisition schemes

    NASA Astrophysics Data System (ADS)

    Lin, Meijin; Huang, Yuqing; Chen, Xi; Cai, Shuhui; Chen, Zhong

    2011-01-01

    High-resolution 2D NMR spectra in inhomogeneous fields can be achieved by the use of intermolecular multiple-quantum coherences and shearing reconstruction of 3D data. However, the long acquisition time of 3D spectral data is generally unbearable for invivo applications. To overcome this problem, two pulse sequences dubbed as iDH-COSY and iDH-JRES were proposed in this paper. Although 3D acquisition is still required for the new sequences, the high-resolution 2D spectra can be obtained with a relatively short scanning time utilizing the manipulation of indirect evolution period and sparse sampling. The intermolecular multiple-quantum coherence treatment combined with the raising and lowering operators was applied to derive analytical signal expressions for the new sequences. And the experimental observations agree with the theoretical predictions. Our results show that the new sequences possess bright perspective in the applications on invivo localized NMR spectroscopy.

  10. Synthesis and demonstration of high speed, bandwidth efficient optical Code Division Multiple Access (CDMA) tested at 1 Gb/s throughput

    NASA Astrophysics Data System (ADS)

    Mendez, Antonio J.; Lambert, James L.; Morookian, John-Michael; Gagliardi, Robert M.

    1994-09-01

    Code division multiple access (CDMA) permits concurrent communication over all virtual channels (in principle), independent of the data rate and the network size. In reality, most CDMA approaches have a bandwidth penalty due to the code length and a loss penalty due to the broadcasting required by CDMA. Both of these penalties can be reduced or ameliorated by means of multi-attribute coding. Matrices constructed from relatively inefficient (0, 1)pulse sequences are suitable multi-attribute non-coherent CDMA codes which are both bandwidth and broadcast efficient. We exhibit a novel approach to synthesizing matrix CDMA codes, develop a 4 x 4 physical model, and demonstrate concurrent communication experimentally at concurrent data rates of 100-, 150-, and 250 Mb/s per port.

  11. Efficiency droop effects of GaN-based light-emitting diodes on the performance of code division multiple access visible-light communication system

    NASA Astrophysics Data System (ADS)

    Lu, Huimin; Yan, Chaowen; Gao, Wei; Yu, Tongjun; Wang, Jianping

    2016-02-01

    The physical mechanism in efficiency droop of GaN-based light-emitting diodes (LEDs) was investigated using a modified rate equation model considering inhomogeneous carrier distribution and was compared with the measured result. On this basis, the efficiency droop effect on the performance of a code division multiple access (CDMA) visible-light communication (VLC) system using GaN-based LEDs was also analyzed. The results reveal that the obvious transmitted signal error under the effect of LED efficiency droop leads to performance deterioration of multiuser CDMA VLC systems. Also, the performance of CDMA VLC systems is reduced with the user number increase due to LED efficiency droop. The bit error rate of a CDMA VLC system was further calculated for different branch signal levels and bias currents. It is demonstrated that the efficiency droop effect on the performance of CDMA VLC systems can be alleviated by adjusting the branch signal level and the bias current.

  12. Experimental demonstration of a DSP-based cross-channel interference cancellation technique for application in digital filter multiple access PONs.

    PubMed

    Al-Rawachy, E; Giddings, R P; Tang, J M

    2017-02-20

    A DSP-based cross-channel interference cancellation (CCIC) technique with initial condition-free, fast convergence and signal modulation format independence, is experimentally demonstrated in a two-channel point-to-point digital filter multiple access (DFMA) PON system based on intensity-modulation and direct-detection (IMDD). The CCIC-induced transmission performance improvements under various system conditions are fully investigated for the first time. It is shown that with one iteration only the CCIC technique can achieve a reduction in individual OFDM subcarrier BERs of more than 1000 times, an increase in transmission capacity by as much as 19 times and an increase in optical power budget by as much as 3.5dB. The CCIC technique thus has the potential to drastically improve the transmission performance of DFMA PONs.

  13. Optical multidimensional multiple access(O-MDMA): a new concept for free-space laser communication based on photonic mixer devices

    NASA Astrophysics Data System (ADS)

    Hess, Holger; Albrecht, Martin; Grothof, Markus; Hussmann, Stephan; Schwarte, Rudolf

    2004-01-01

    Working on optical distance measurement a new optical correlator was developed at the Institute for Data Processing of the University of Siegen in the last years. The so called Photonic Mixer Device (PMD), to be meant originally for laser ranging systems, offers a lot of advantages for wireless optical data communication like high speed spatial light demodulation up to the GHz range and inherent backlight suppression. This contribution describes the application of such PMDs in a free space interconnect based on the principle of Multi Dimensional Multiple Access (MDMA) and the advantages of this new approach, starting from the MDMA principle and followed by the fundamental functionality of PMDs. After that an Optical MDMA (O-MDMA) demonstrator and first measurement results will be presented.

  14. The use of multiple indices of physiological activity to access viability in chlorine disinfected Escherichia coli O157:H7

    NASA Technical Reports Server (NTRS)

    Lisle, J. T.; Pyle, B. H.; McFeters, G. A.

    1999-01-01

    A suite of fluorescent intracellular stains and probes was used, in conjunction with viable plate counts, to assess the effect of chlorine disinfection on membrane potential (rhodamine 123; Rh123 and bis-(1,3-dibutylbarbituric acid) trimethine oxonol; DiBAC4(3)), membrane integrity (LIVE/DEAD BacLight kit), respiratory activity (5-cyano-2,3-ditolyl tetrazolium chloride; CTC) and substrate responsiveness (direct viable counts; DVC) in the commensal pathogen Escherichia coli O157:H7. After a 5 min exposure to the disinfectant, physiological indices were affected in the following order: viable plate counts > substrate responsiveness > membrane potential > respiratory activity > membrane integrity. In situ assessment of physiological activity by examining multiple targets, as demonstrated in this study, permits a more comprehensive determination of the site and extent of injury in bacterial cells following sublethal disinfection with chlorine. This approach to assessing altered bacterial physiology has application in various fields where detection of stressed bacteria is of interest.

  15. The new efficient multi-beamforming method based on multiple-access register block on a post-fractional filtering architecture

    NASA Astrophysics Data System (ADS)

    Kang, Jeeun; Kim, Giduck; Yoon, Changhan; Yoo, Yangmo; Song, Tai-Kyong

    2011-03-01

    In medical ultrasound imaging, a multi-beamforming (MBF) method is used for supporting high frame rate imaging or functional imaging where multiple scanlines are reconstructed from a single excitation event. For efficient MBF, a time-sharing technique (i.e., MBF-TS) can be applied. However, the MBF-TS could degrade image quality due to the decreased beamforming frequency. In this paper, the multi-access register-based MBF (MBF-MAR) method running on the post-fractional filtering (PFF) architecture is presented. In PFF-MBF-MAR, instead of lowering beamforming frequency, a multi-access register at each channel is utilized for generating multiple scanlines simultaneously. To evaluate the performance of the proposed PFF-MBF-MAR method, the phantom experiment was conducted where 64- channel pre-beamformed radio-frequency (RF) data were captured from a tissue mimicking phantom by using a modified commercial ultrasound system (SONOLINE G40, Siemens Inc., USA) using a 3-MHz phased array probe. From the phantom experiment, the PFF-MBF-MAR method showed 4.7 dB and 0.6 improvements in the signal-to-noise ratio (SNR) and the contrast-to-noise ratio (CNR), respectively, compared to the PFF-MBF-TS method, while slightly increasing the hardware complexity (<5.2%). The similar results were achieved with the in vivo thyroid data. These results indicate that the proposed PFF-MBF-MAR method can be used for high frame rate imaging or functional imaging without sacrificing image quality while slightly increasing the hardware complexity.

  16. An orthogonal wavelet division multiple-access processor architecture for LTE-advanced wireless/radio-over-fiber systems over heterogeneous networks

    NASA Astrophysics Data System (ADS)

    Mahapatra, Chinmaya; Leung, Victor CM; Stouraitis, Thanos

    2014-12-01

    The increase in internet traffic, number of users, and availability of mobile devices poses a challenge to wireless technologies. In long-term evolution (LTE) advanced system, heterogeneous networks (HetNet) using centralized coordinated multipoint (CoMP) transmitting radio over optical fibers (LTE A-ROF) have provided a feasible way of satisfying user demands. In this paper, an orthogonal wavelet division multiple-access (OWDMA) processor architecture is proposed, which is shown to be better suited to LTE advanced systems as compared to orthogonal frequency division multiple access (OFDMA) as in LTE systems 3GPP rel.8 (3GPP, http://www.3gpp.org/DynaReport/36300.htm). ROF systems are a viable alternative to satisfy large data demands; hence, the performance in ROF systems is also evaluated. To validate the architecture, the circuit is designed and synthesized on a Xilinx vertex-6 field-programmable gate array (FPGA). The synthesis results show that the circuit performs with a clock period as short as 7.036 ns (i.e., a maximum clock frequency of 142.13 MHz) for transform size of 512. A pipelined version of the architecture reduces the power consumption by approximately 89%. We compare our architecture with similar available architectures for resource utilization and timing and provide performance comparison with OFDMA systems for various quality metrics of communication systems. The OWDMA architecture is found to perform better than OFDMA for bit error rate (BER) performance versus signal-to-noise ratio (SNR) in wireless channel as well as ROF media. It also gives higher throughput and mitigates the bad effect of peak-to-average-power ratio (PAPR).

  17. A simple wavelength-locking scheme of a tunable three-electrode distributed Bragg reflector laser for multiple ITU channel application in C band

    NASA Astrophysics Data System (ADS)

    Ye, Nan; Liu, Yang; Zhao, Ling-Juan

    2010-11-01

    In this paper, a simple wavelength-locking scheme for a tunable distributed Bragg reflector laser is presented. A 1*2 wide band fiber coupler as the function of beam splitter forms two optical paths with evenly separated power, one for wavelength monitoring and the other for power reference. For wavelength monitoring, two single mode fiber collimators- one as a transmitter and the other as a receiver-form a collimated light path for laser beam and a highly stable air-paced Etalon inserted between them is used as an optical frequency discriminator to lock the laser wavelengths to several ITU channels maintain 100GHz or 0.8 nm channel spacing in C band. Meanwhile, a photodetector connected with receiving collimator by a FC/PC connector turns the optical signal into electronic signal. For power reference, one of the coupler output pots is directly connected with a similar photodetector. Then wavelength shifting signal proportional to the power differences between two optical paths could be feed backed to the phase region or DBR region for stabilizing the laser output wavelength.

  18. Empower: access to medicine - working towards early access.

    PubMed

    Pearson, Jennifer Bryant; Turgoose, James; Hargrave, James

    2015-01-01

    Empower: Access to Medicine's contribution will document the founding of Empower: Access to Medicine and tactics used to create a lobbying campaign designed to facilitate the debate around barriers to medical innovation and patient access to medicines. The article will detail the evolution of the campaign's goals and the potential solutions to an expensive and slow system. Specifically the submission will look at the influence that Empower: Access to Medicine had on the Government's thinking and development of an early access scheme.

  19. Resource Allocation Scheme in MIMO-OFDMA System for User's Different Data Throughput Requirements

    NASA Astrophysics Data System (ADS)

    Sann Maw, Maung; Sasase, Iwao

    In the subcarrier and power allocation schemes in Multi-Input Multi-Output and Orthogonal Frequency Division Multiple Access (MIMO-OFDMA) systems, only equal fairness among users has been considered and no scheme for proportional data rate fairness has been considered. In this paper, a subcarrier, bit and power allocation scheme is proposed to maximize the total throughput under the constraints of total power and proportional data rate fairness among users. In the proposed scheme, joint subchannel allocation and adaptive bit loading is firstly performed by using singular value decomposition (SVD) of channel matrix under the constraint of users' data throughput requirements, and then adaptive power loading is applied. Simulation results show that effective performance of the system has been improved as well as each throughput is proportionally distributed among users in MIMO-OFDMA systems.

  20. An experimental investigation of an air cooling scheme for removing environmentally imposed heat loads from the multiplicity and vertex detector`s main enclosure

    SciTech Connect

    Cunningham, R.; Bernardin, J.D.; Simon-Gillo, J.

    1997-11-01

    This report presents a summary of an experimental investigation of a closed loop air cooling system designed to control the temperature and humidity in the main enclosure of the multiplicity and vertex detector (MVD). Measurements of the cooling air flow rate, the humidity levels inside and outside of the MVD, and the cooling air temperatures were used to assess the performance of the system and to characterize the system limitations and potential assembly problems. The results of the study indicate that several design changes are needed in the final design to meet the temperature and humidity operating requirements. A thorough set of design change recommendations that satisfy these operating criteria completes this report.

  1. Development of a multiple-locus variable-number tandem-repeat typing scheme for genetic fingerprinting of Burkholderia cenocepacia and application to nationwide epidemiological analysis.

    PubMed

    Segonds, Christine; Thouverez, Michelle; Barthe, Antoine; Bossuet-Greif, Nadège; Tisseyre, Lenka; Plésiat, Patrick; Vergnaud, Gilles; Chabanon, Gérard; Pourcel, Christine

    2015-02-01

    Organisms of the Burkholderia cepacia complex are especially important pathogens in cystic fibrosis (CF), with a propensity for patient-to-patient spread and long-term respiratory colonization. B. cenocepacia and Burkholderia multivorans account for the majority of infections in CF, and major epidemic clones have been recognized throughout the world. The aim of the present study was to develop and evaluate a multilocus variable-number tandem-repeat (VNTR) analysis (MLVA) scheme for B. cenocepacia. Potential VNTR loci were identified upon analysis of the annotated genome sequences of B. cenocepacia strains AU1054, J2315, and MCO-3, and 10 of them were selected on the basis of polymorphisms and size. A collection of 100 B. cenocepacia strains, including epidemiologically related and unrelated strains, as well as representatives of the major epidemic lineages, was used to evaluate typeability, epidemiological concordance, and the discriminatory power of MLVA-10 compared with those of pulsed-field gel electrophoresis (PFGE) and multilocus sequence typing (MLST). Longitudinal stability was assessed by testing 39 successive isolates from 14 patients. Typeability ranged from 0.91 to 1, except for that of one marker, which was not amplified in 53% of the B. cenocepacia IIIA strains. The MLVA types were shown to be stable in chronically colonized patients and within outbreak-related strains, with excellent epidemiological concordance. Epidemic and/or globally distributed lineages (epidemic Edinburgh-Toronto electrophoretic type 12 [ET-12], sequence type 32 [ST-32], ST-122, ST-234, and ST-241) were successfully identified. Conversely, the discriminatory power of MLVA was lower than that of PFGE or MLST, although PFGE variations within the epidemic lineages sometimes masked their genetic relatedness. In conclusion, MLVA represents a promising cost-effective first-line tool in B. cenocepacia surveillance.

  2. A new multiple scattering scheme for the FLAIR forest radiative transfer model: Application to biochemical and biophysical parameter retrieval using hyperspectral data

    NASA Astrophysics Data System (ADS)

    Omari, Khalid

    This thesis investigated the development and assessment of a simple parameterization of the multiple scattering within canopies assuming the single scattering field is known and the background beneath the canopy is completely absorbing. The parameterization is based on the concept of spectral invariants related to recollision and escape probabilities from vegetation canopies. The simplified approach is evaluated against detailed 3-D ray tracing model, PARCINOPY, as well as reference datasets from the Radiation Modelling Intercomparison Experiment On-Line Checker. Comparison with homogenous canopies simulated with PARCINOPY showed that the model's performance is best in both the solar principal and perpendicular planes at low and mid LAI levels for all solar zenith angles. The comparison to the On-line Checker datasets shows also that the model is a suitable approach to describe the multiple scattering components of physically based models. This simple parameterization is then incorporated into the Four Scale Linear Model for Anisotropie Reflectance (FLAIR) canopy radiative transfer model to enhance the description of the spectrally dependant multiple scattered radiation field of a forest canopy. The contribution of the multiply scattered radiation between the canopy and the background is also added to the parameterization of the multiple scattering component. The validation of the new version of the FLAIR model was performed using the multi-angular data sets obtained by the airborne sensor POLarization and Directionality of the Earth's Reflectances (POLDER) during the BOReal Ecosystem-Atmosphere Study (BOREAS) campaign of 1994. The results indicate that this approach is well suited to the FLAIR model. It is also demonstrated that the multiple scattering problem can be parameterized by a limited number of architectural parameters and the leaf scattering coefficient. Finally, the combined canopy-leaf PROFLAIR (PROSPECT + FLAIR) model is used to investigate the

  3. Subchannel Access and Rate Assignment for Multicarrier Multi-Cell Networks

    NASA Astrophysics Data System (ADS)

    Wang, Jui Teng

    We study in this paper the subchannel access and the rate assignment for the multicarrier multi-cell networks. For subchannel access, we show from theoretic results and simulation results that the scheme with only one user per cell in each subchannel outperforms the scheme with multiple users per cell in each subchannel. For rate assignment, a distributed rate assignment is proposed to assign the rate for all subchannels. The proposed rate assignment need not measure the channel gains and uses only local information to iteratively adjust the transmitting power and data rate. We prove that the aggregate rate can be increased by increasing the number of iterations in the proposed rate assignment.

  4. Research on an uplink carrier sense multiple access algorithm of large indoor visible light communication networks based on an optical hard core point process.

    PubMed

    Nan, Zhufen; Chi, Xuefen

    2016-12-20

    The IEEE 802.15.7 protocol suggests that it could coordinate the channel access process based on the competitive method of carrier sensing. However, the directionality of light and randomness of diffuse reflection would give rise to a serious imperfect carrier sense (ICS) problem [e.g., hidden node (HN) problem and exposed node (EN) problem], which brings great challenges in realizing the optical carrier sense multiple access (CSMA) mechanism. In this paper, the carrier sense process implemented by diffuse reflection light is modeled as the choice of independent sets. We establish an ICS model with the presence of ENs and HNs for the multi-point to multi-point visible light communication (VLC) uplink communications system. Considering the severe optical ICS problem, an optical hard core point process (OHCPP) is developed, which characterizes the optical CSMA for the indoor VLC uplink communications system. Due to the limited coverage of the transmitted optical signal, in our OHCPP, the ENs within the transmitters' carrier sense region could be retained provided that they could not corrupt the ongoing communications. Moreover, because of the directionality of both light emitting diode (LED) transmitters and receivers, theoretical analysis of the HN problem becomes difficult. In this paper, we derive the closed-form expression for approximating the outage probability and transmission capacity of VLC networks with the presence of HNs and ENs. Simulation results validate the analysis and also show the existence of an optimal physical carrier-sensing threshold that maximizes the transmission capacity for a given emission angle of LED.

  5. A Selective Group Authentication Scheme for IoT-Based Medical Information System.

    PubMed

    Park, YoHan; Park, YoungHo

    2017-04-01

    The technology of IoT combined with medical systems is expected to support advanced medical services. However, unsolved security problems, such as misuse of medical devices, illegal access to the medical server and so on, make IoT-based medical systems not be applied widely. In addition, users have a high burden of computation to access Things for the explosive growth of IoT devices. Because medical information is critical and important, but users have a restricted computing power, IoT-based medical systems are required to provide secure and efficient authentication for users. In this paper, we propose a selective group authentication scheme using Shamir's threshold technique. The property of selectivity gives the right of choice to users to form a group which consists of things users select and access. And users can get an access authority for those Things at a time. Thus, our scheme provides an efficient user authentication for multiple Things and conditional access authority for safe IoT-based medical information system. To the best of our knowledge, our proposed scheme is the first in which selectivity is combined with group authentication in IoT environments.

  6. Fundamental Issues of Multiple Accessing

    DTIC Science & Technology

    1983-11-01

    Ngai Hui, submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy at the Massachusetts Institute of Technology ...Foundation under Grant NSF/ECS-79-19880. 72.. -o ’.’i Laboratory for Information and Decision Systems Massachusetts Institute of Technology Cambridge...PROJECT. TASKA*EA S WoAK uNiT NUMOERS Massachusetts Institute of Technology Program Code No. 5T10 Laboratory for Information and Decisions Systems ONR

  7. A Microstrip Patch-Fed Short Backfire Antenna for the Tracking and Data Relay Satellite System-Continuation (TDRSS-C) Multiple Access (MA) Array

    NASA Technical Reports Server (NTRS)

    Nessel, James A.; Kory, Carol L.; Lambert, Kevin M.; Acosta, Roberto J.

    2006-01-01

    Short Backfire Antennas (SBAs) are widely utilized for mobile satellite communications, tracking, telemetry, and wireless local area network (WLAN) applications due to their compact structure and excellent radiation characteristics [1-3]. Typically, these SBA s consist of an excitation element (i.e., a half-wavelength dipole), a reflective bottom plane, a planar sub-reflector located above the "exciter", and an outer circular rim. This configuration is capable of achieving gains on the order of 13-15 dBi, but with relatively narrow bandwidths (approx.3%-5%), making it incompatible with the requirements of the next generation enhanced Tracking and Data Relay Satellite System-Continuation (TDRSS-C) Multiple Access (MA) array [1]. Several attempts have been made to enhance the bandwidth performance of the common dipole-fed SBA by employing various other feeding mechanisms (e.g., waveguide, slot) with moderate success [4-5]. In this paper, a novel method of using a microstrip patch is employed for the first time to excite an SBA. The patch element is fed via two H-shaped slots electromagnetically coupled to a broadband hybrid coupler to maintain a wide bandwidth, as well as provide for dual circular polarization capabilities.

  8. A Query Result Merging Scheme for Providing Energy Efficiency in Underwater Sensor Networks

    PubMed Central

    Kim, Yunsung; Park, Soo-Hyun

    2011-01-01

    Underwater sensor networks are emerging as a promising distributed data management system for various applications in underwater environments, despite their limited accessibility and restricted energy capacity. With the aid of recent developments in ubiquitous data computing, an increasing number of users are expected to overcome low accessibility by applying queries to underwater sensor networks. However, when multiple users send queries to an underwater sensor network in a disorganized manner, it may incur lethal energy waste and problematic network traffic. The current query management mechanisms cannot effectively deal with this matter due to their limited applicability and unrealistic assumptions. In this paper, a novel query management scheme involving query result merging is proposed for underwater sensor networks. The mechanism is based on a relational database model and is adjusted to the practical restrictions affecting underwater communication environments. Network simulations will prove that the scheme becomes more efficient with a greater number of queries and a smaller period range. PMID:22247695

  9. Nonlinearly stable compact schemes for shock calculations

    NASA Technical Reports Server (NTRS)

    Cockburn, Bernardo; Shu, Chi-Wang

    1992-01-01

    The applications of high-order, compact finite difference methods in shock calculations are discussed. The main concern is to define a local mean which will serve as a reference for introducing a local nonlinear limiting to control spurious numerical oscillations while maintaining the formal accuracy of the scheme. For scalar conservation laws, the resulting schemes can be proven total-variation stable in one space dimension and maximum-norm stable in multiple space dimensions. Numerical examples are shown to verify accuracy and stability of such schemes for problems containing shocks. These ideas can also be applied to other implicit schemes such as the continuous Galerkin finite element methods.

  10. Asynchronous Communication Scheme For Hypercube Computer

    NASA Technical Reports Server (NTRS)

    Madan, Herb S.

    1988-01-01

    Scheme devised for asynchronous-message communication system for Mark III hypercube concurrent-processor network. Network consists of up to 1,024 processing elements connected electrically as though were at corners of 10-dimensional cube. Each node contains two Motorola 68020 processors along with Motorola 68881 floating-point processor utilizing up to 4 megabytes of shared dynamic random-access memory. Scheme intended to support applications requiring passage of both polled or solicited and unsolicited messages.

  11. Subranging scheme for SQUID sensors

    NASA Technical Reports Server (NTRS)

    Penanen, Konstantin I. (Inventor)

    2008-01-01

    A readout scheme for measuring the output from a SQUID-based sensor-array using an improved subranging architecture that includes multiple resolution channels (such as a coarse resolution channel and a fine resolution channel). The scheme employs a flux sensing circuit with a sensing coil connected in series to multiple input coils, each input coil being coupled to a corresponding SQUID detection circuit having a high-resolution SQUID device with independent linearizing feedback. A two-resolution configuration (course and fine) is illustrated with a primary SQUID detection circuit for generating a fine readout, and a secondary SQUID detection circuit for generating a course readout, both having feedback current coupled to the respective SQUID devices via feedback/modulation coils. The primary and secondary SQUID detection circuits function and derive independent feedback. Thus, the SQUID devices may be monitored independently of each other (and read simultaneously) to dramatically increase slew rates and dynamic range.

  12. Cross-ontological analytics for alignment of different classification schemes

    DOEpatents

    Posse, Christian; Sanfilippo, Antonio P; Gopalan, Banu; Riensche, Roderick M; Baddeley, Robert L

    2010-09-28

    Quantification of the similarity between nodes in multiple electronic classification schemes is provided by automatically identifying relationships and similarities between nodes within and across the electronic classification schemes. Quantifying the similarity between a first node in a first electronic classification scheme and a second node in a second electronic classification scheme involves finding a third node in the first electronic classification scheme, wherein a first product value of an inter-scheme similarity value between the second and third nodes and an intra-scheme similarity value between the first and third nodes is a maximum. A fourth node in the second electronic classification scheme can be found, wherein a second product value of an inter-scheme similarity value between the first and fourth nodes and an intra-scheme similarity value between the second and fourth nodes is a maximum. The maximum between the first and second product values represents a measure of similarity between the first and second nodes.

  13. Adaptive mobile access protocol (AMAP) for the message service of a land mobile satellite experiment (MSAT-X)

    NASA Technical Reports Server (NTRS)

    Li, V. O. K.; Yan, T.-Y.

    1984-01-01

    This paper describes a feasibility study of the adaptive mobile access protocol (AMAP) for MSATA-X, a proposed experimental mobile satellite communication network. The mobiles are dispersed over a wide geographical area and the channel data rate is limited due to the size and cost limitations of mobile antennas. AMAP is a reservation based multiple-access scheme. The available bandwidth is divided into subchannels, which are divided into reservation and message channels. The ALOHA multiple-access scheme is employed in the reservation channels, while the message channels are demand assigned. AMAP adaptively reallocates the reservation and message channels to optimize system performance. It has been shown that if messages are generated at a rate of one message per hour, AMAP can support approximately 2000 active users per 2400 bit/s channel with an average delay of 1.4 s.

  14. Improving the secrecy rate by turning foes to allies: An auction scheme

    NASA Astrophysics Data System (ADS)

    Ma, Ya-Yan; Wang, Bao-Yun

    2015-09-01

    Security against eavesdroppers is a critical issue in cognitive radio networks (CRNs). In this paper, a scenario consisting of one primary pair and multiple secondary pairs is considered. The secondary transmitters (STs) work in half-duplex mode and they are potential eavesdroppers on the primary transmission unless they are allowed to simultaneously transmit with the primary transmitter (PT). A modified second-price sealed-bid auction scheme is employed to model the interaction between the PT and STs. With the proposed auction scheme, the hostile relationship between the PT and STs is transformed into a cooperative relationship. An iterative algorithm based on the max-min criteria is proposed to find the optimal bidding power of the STs for an access chance in the presence of multiple eavesdroppers. Numerical results show that the proposed auction scheme not only improves the PT’s security but also increases the access opportunities of the STs. Project supported by the National Natural Science Foundation of China (Grant Nos. 61271232 and 61372126) and the University Postgraduate Research and Innovation Project in Jiangsu Province, China (Grant No. CXZZ12-0472).

  15. Channel Access in Erlang

    SciTech Connect

    Nicklaus, Dennis J.

    2013-10-13

    We have developed an Erlang language implementation of the Channel Access protocol. Included are low-level functions for encoding and decoding Channel Access protocol network packets as well as higher level functions for monitoring or setting EPICS process variables. This provides access to EPICS process variables for the Fermilab Acnet control system via our Erlang-based front-end architecture without having to interface to C/C++ programs and libraries. Erlang is a functional programming language originally developed for real-time telecommunications applications. Its network programming features and list management functions make it particularly well-suited for the task of managing multiple Channel Access circuits and PV monitors.

  16. Novel secure and bandwidth efficient optical code division multiplexed system for future access networks

    NASA Astrophysics Data System (ADS)

    Singh, Simranjit

    2016-12-01

    In this paper, a spectrally coded optical code division multiple access (OCDMA) system using a hybrid modulation scheme has been investigated. The idea is to propose an effective approach for simultaneous improvement of the system capacity and security. Data formats, NRZ (non-return to zero), DQPSK (differential quadrature phase shift keying), and PoISk (polarisation shift keying) are used to get the orthogonal modulated signal. It is observed that the proposed hybrid modulation provides efficient utilisation of bandwidth, increases the data capacity and enhances the data confidentiality over existing OCDMA systems. Further, the proposed system performance is compared with the current state-of-the-art OCDMA schemes.

  17. A power-efficient ZF precoding scheme for multi-user indoor visible light communication systems

    NASA Astrophysics Data System (ADS)

    Zhao, Qiong; Fan, Yangyu; Deng, Lijun; Kang, Bochao

    2017-02-01

    In this study, we propose a power-efficient ZF precoding scheme for visible light communication (VLC) downlink multi-user multiple-input-single-output (MU-MISO) systems, which incorporates the zero-forcing (ZF) and the characteristics of VLC systems. The main idea of this scheme is that the channel matrix used to perform pseudoinverse comes from the set of optical Access Points (APs) shared by more than one user, instead of the set of all involved serving APs as the existing ZF precoding schemes often used. By doing this, the waste of power, which is caused by the transmission of one user's data in the un-serving APs, can be avoided. In addition, the size of the channel matrix needs to perform pseudoinverse becomes smaller, which helps to reduce the computation complexity. Simulation results in two scenarios show that the proposed ZF precoding scheme has higher power efficiency, better bit error rate (BER) performance and lower computation complexity compared with traditional ZF precoding schemes.

  18. Arteriovenous Access

    PubMed Central

    MacRae, Jennifer M.; Dipchand, Christine; Oliver, Matthew; Moist, Louise; Yilmaz, Serdar; Lok, Charmaine; Leung, Kelvin; Clark, Edward; Hiremath, Swapnil; Kappel, Joanne; Kiaii, Mercedeh; Luscombe, Rick; Miller, Lisa M.

    2016-01-01

    Complications of vascular access lead to morbidity and may reduce quality of life. In this module, we review both infectious and noninfectious arteriovenous access complications including neuropathy, aneurysm, and high-output access. For the challenging patients who have developed many complications and are now nearing their last vascular access, we highlight some potentially novel approaches. PMID:28270919

  19. Spatial dimming scheme for optical OFDM based visible light communication.

    PubMed

    Yang, Yang; Zeng, Zhimin; Cheng, Julian; Guo, Caili

    2016-12-26

    A new dimming control scheme termed spatial dimming orthogonal frequency division multiplexing (SD-OFDM) is proposed for multiple-input and multiple output OFDM based visible light communication. The basic idea of SD-OFDM is that the illumination can be represented by the number of glared light emitting diodes (LEDs) in an LED lamp. As the biasing level of LEDs does not adjust to represent the required illumination level, the proposed scheme can significantly mitigate the clipping noise compared to analogue dimming schemes. Furthermore, unlike digital dimming schemes that control illumination levels by setting different duty cycles of pulse width modulation, the proposed scheme is always in the "on-state" for varied illumination levels. Both analytical and simulation results indicate that the proposed scheme is an efficient and feasible dimmable scheme.

  20. A CDMA synchronisation scheme

    NASA Technical Reports Server (NTRS)

    Soprano, C.

    1993-01-01

    CDMA (Code Division Multiple Access) is known to decrease inter-service interference in Satellite Communication Systems. Its performance is increased by chip quasi-synchronous operation which virtually eliminates the self-noise; however, the theory shows that the time error on the synchronization has to be kept at less than one tenth of a chip which, for 1 Mchip/sec. spreading rate, corresponds to 10(exp -7) sec. This, on the return-link, may only be achieved by means of a closed loop control system which, for mobile communication systems, has to be capable of autonomous operation. Until now some results have been reported on the feasibility of chip quasi-synchronous operation for mobile communication systems only including satellites on GEO (Geostationary Earth Orbit). In what follows, the basic principles are exposed, and results are presented showing how low chip synchronism error may be achieved by means of an autonomous control loop operating through satellites on any Earth orbit.

  1. Development of a generic system for real-time data access and remote control of multiple in-situ water quality monitoring instruments

    NASA Astrophysics Data System (ADS)

    Wright, S. A.; Bennett, G. E.; Andrews, T.; Melis, T. S.; Topping, D. J.

    2005-05-01

    Currently, in-situ monitoring of water quality parameters (e.g. water temperature, conductivity, turbidity) in the Colorado River ecosystem typically consists of deploying instruments in the river, retrieving them at a later date, downloading the datalogger, then examining the data; an arduous process in the remote settings of Grand Canyon. Under this protocol, data is not available real-time and there is no way to detect problems with the instrumentation until after retrieval. The next obvious stage in the development of in-situ monitoring in Grand Canyon was the advent of one-way telemetry, i.e. streaming data in real-time from the instrument to the office and/or the world-wide-web. This protocol allows for real-time access to data and the identification of instrumentation problems, but still requires a site visit to address instrument malfunctions, i.e. the user does not have the ability to remotely control the instrument. At some field sites, such as the Colorado River in Grand Canyon, site visitation is restricted by remoteness and lack of traditional access routes (i.e. roads). Even at less remote sites, it may still be desirable to have two-way communication with instruments in order to, for example, diagnose and potentially fix instrumentation problems, change sampling parameters to save battery power, etc., without having to visit the site. To this end, the U.S. Geological Survey, Grand Canyon Monitoring and Research Center, is currently developing and testing a high-speed, two-way communication system that allows for real-time data access and remote control of instrumentation. The approach tested relies on internet access and may be especially useful in areas where land-line or cellular connections are unavailable. The system is composed of off-the-shelf products, uses a commercial broadband satellite service, and is designed in a generic way such that any instrument that communicates through RS-232 communication (i.e. a serial port) is compatible with

  2. Power consumption analysis of priority-based service differentiation scheme for LR-WPANs

    NASA Astrophysics Data System (ADS)

    Kim, Meejoung; Hwang, Eenjun

    2016-06-01

    In this paper, we investigate the effect of service differentiation on the power consumption in contention period of IEEE 802.15.4 sensor networks. Power consumption is analysed for two different service differentiation schemes under non-saturation condition. The two service differentiation schemes are the differentiation by the backoff exponent (BED) and differentiation by the contention window (CWD), which provide multilevel differentiated services in beacon-enabled mode with slotted carrier sense multiple access/collision avoidance (CSMA/CA) algorithm. The analysis is based on the stationary probabilities of a discrete-time Markov chain, which is a model of CSMA/CA describing the state of a head packet of a device. Numerical results show that CWD uses the power more efficiently and performs better in terms of throughput, while BED more differentiates the service.

  3. Multiple bit differential detection of offset QPSK

    NASA Technical Reports Server (NTRS)

    Simon, M.

    2003-01-01

    Analogous to multiple symbol differential detection of quadrature phase-shift-keying, a multiple bit differential detection scheme is described for offset QPSK that also exhibits continuous improvement in performance with increasing observation interval. Being derived from maximum-likelihood (ML) considerations, the proposed scheme is purported to be the most power efficient scheme for such a modulation and detection method.

  4. How the Pharmaceutical Benefits Scheme began.

    PubMed

    Goddard, Martyn S

    2014-07-07

    Seventy years ago, the Curtin wartime government introduced legislation for a Pharmaceutical Benefits Scheme (PBS). It was a response to the need to provide access to a wave of antibiotic drugs - sulfonamides, streptomycin, penicillin - to the whole population, not only to the minority able to afford them. The scheme was immediately and successfully opposed by doctors and the conservative opposition, which saw in universal health care an underhand plan to nationalise medicine. There were two High Court challenges, two referendums and a constitutional amendment; but it was not until 1960 that Australians had the comprehensive PBS envisaged by Curtin in 1944.

  5. Twin Signature Schemes, Revisited

    NASA Astrophysics Data System (ADS)

    Schäge, Sven

    In this paper, we revisit the twin signature scheme by Naccache, Pointcheval and Stern from CCS 2001 that is secure under the Strong RSA (SRSA) assumption and improve its efficiency in several ways. First, we present a new twin signature scheme that is based on the Strong Diffie-Hellman (SDH) assumption in bilinear groups and allows for very short signatures and key material. A big advantage of this scheme is that, in contrast to the original scheme, it does not require a computationally expensive function for mapping messages to primes. We prove this new scheme secure under adaptive chosen message attacks. Second, we present a modification that allows to significantly increase efficiency when signing long messages. This construction uses collision-resistant hash functions as its basis. As a result, our improvements make the signature length independent of the message size. Our construction deviates from the standard hash-and-sign approach in which the hash value of the message is signed in place of the message itself. We show that in the case of twin signatures, one can exploit the properties of the hash function as an integral part of the signature scheme. This improvement can be applied to both the SRSA based and SDH based twin signature scheme.

  6. A secure biometrics-based authentication scheme for telecare medicine information systems.

    PubMed

    Yan, Xiaopeng; Li, Weiheng; Li, Ping; Wang, Jiantao; Hao, Xinhong; Gong, Peng

    2013-10-01

    The telecare medicine information system (TMIS) allows patients and doctors to access medical services or medical information at remote sites. Therefore, it could bring us very big convenient. To safeguard patients' privacy, authentication schemes for the TMIS attracted wide attention. Recently, Tan proposed an efficient biometrics-based authentication scheme for the TMIS and claimed their scheme could withstand various attacks. However, in this paper, we point out that Tan's scheme is vulnerable to the Denial-of-Service attack. To enhance security, we also propose an improved scheme based on Tan's work. Security and performance analysis shows our scheme not only could overcome weakness in Tan's scheme but also has better performance.

  7. Access to Medications for Cardiovascular Diseases in Low- and Middle-Income Countries.

    PubMed

    Wirtz, Veronika J; Kaplan, Warren A; Kwan, Gene F; Laing, Richard O

    2016-05-24

    Cardiovascular diseases (CVD) represent the highest burden of disease globally. Medicines are a critical intervention used to prevent and treat CVD. This review describes access to medication for CVD from a health system perspective and strategies that have been used to promote access, including providing medicines at lower cost, improving medication supply, ensuring medicine quality, promoting appropriate use, and managing intellectual property issues. Using key evidence in published and gray literature and systematic reviews, we summarize advances in access to cardiovascular medicines using the 5 health system dimensions of access: availability, affordability, accessibility, acceptability, and quality of medicines. There are multiple barriers to access of CVD medicines, particularly in low- and middle-income countries. Low availability of CVD medicines has been reported in public and private healthcare facilities. When patients lack insurance and pay out of pocket to purchase medicines, medicines can be unaffordable. Accessibility and acceptability are low for medicines used in secondary prevention; increasing use is positively related to country income. Fixed-dose combinations have shown a positive effect on adherence and intermediate outcome measures such as blood pressure and cholesterol. We have a new opportunity to improve access to CVD medicines by using strategies such as efficient procurement of low-cost, quality-assured generic medicines, development of fixed-dose combination medicines, and promotion of adherence through insurance schemes that waive copayment for long-term medications. Monitoring progress at all levels, institutional, regional, national, and international, is vital to identifying gaps in access and implementing adequate policies.

  8. Tabled Execution in Scheme

    SciTech Connect

    Willcock, J J; Lumsdaine, A; Quinlan, D J

    2008-08-19

    Tabled execution is a generalization of memorization developed by the logic programming community. It not only saves results from tabled predicates, but also stores the set of currently active calls to them; tabled execution can thus provide meaningful semantics for programs that seemingly contain infinite recursions with the same arguments. In logic programming, tabled execution is used for many purposes, both for improving the efficiency of programs, and making tasks simpler and more direct to express than with normal logic programs. However, tabled execution is only infrequently applied in mainstream functional languages such as Scheme. We demonstrate an elegant implementation of tabled execution in Scheme, using a mix of continuation-passing style and mutable data. We also show the use of tabled execution in Scheme for a problem in formal language and automata theory, demonstrating that tabled execution can be a valuable tool for Scheme users.

  9. Web Accessibility and Accessibility Instruction

    ERIC Educational Resources Information Center

    Green, Ravonne A.; Huprich, Julia

    2009-01-01

    Section 508 of the Americans with Disabilities Act (ADA) mandates that programs and services be accessible to people with disabilities. While schools of library and information science (SLIS*) and university libraries should model accessible Web sites, this may not be the case. This article examines previous studies about the Web accessibility of…

  10. Living in a 'fat swamp': exposure to multiple sources of accessible, cheap, energy-dense fast foods in a deprived community.

    PubMed

    Saunders, Patrick; Saunders, Annie; Middleton, John

    2015-06-14

    This study assesses the levels of fats, including trans-fatty acids, and salt in common takeaway fast foods in a deprived urban municipality in the West Midlands, England, and implications in the context of the spatial distribution of fast food takeaways. The results of the compositional analysis of over 250 take-out foods were compared with established and derived standards. About 70% of products exceeded the recommendation that a meal should contain less than 30% of a Guideline Daily Amount (GDA). More than half of them exceeded 50% GDA for at least one metric, including 81% of all analyses for SFA. And 17% of samples exceeded the GDA for SFA, including each of two meals that contained about twice the GDA. Over 30% samples exceeded the children's GDA for total fat or SFA. 27% of salt analyses exceeded the GDA. People in Sandwell are exposed to large portion sizes and high levels of fats and salt in takeaway foods, with levels in some foods having increased since 2010. Given this population's limited options to break out of a highly compromising environment of living simultaneously in a 'swamp' of unhealthy, readily accessible and cheap takeaways, and a 'desert' of healthy options, an immediate and innovative package of interventions is required.

  11. Massive Access Control Aided by Knowledge-Extraction for Co-Existing Periodic and Random Services over Wireless Clinical Networks.

    PubMed

    Du, Qinghe; Zhao, Weidong; Li, Weimin; Zhang, Xuelin; Sun, Bo; Song, Houbing; Ren, Pinyi; Sun, Li; Wang, Yichen

    2016-07-01

    The prosperity of e-health is boosted by fast development of medical devices with wireless communications capability such as wearable devices, tiny sensors, monitoring equipments, etc., which are randomly distributed in clinic environments. The drastically-increasing population of such devices imposes new challenges on the limited wireless resources. To relieve this problem, key knowledge needs to be extracted from massive connection attempts dispersed in the air towards efficient access control. In this paper, a hybrid periodic-random massive access (HPRMA) scheme for wireless clinical networks employing ultra-narrow band (UNB) techniques is proposed. In particular, the proposed scheme towards accommodating a large population of devices include the following new features. On one hand, it can dynamically adjust the resource allocated for coexisting periodic and random services based on the traffic load learned from signal collision status. On the other hand, the resource allocation within periodic services is thoroughly designed to simultaneously align with the timing requests of differentiated services. Abundant simulation results are also presented to demonstrate the superiority of the proposed HPRMA scheme over baseline schemes including time-division multiple access (TDMA) and random access approach, in terms of channel utilization efficiency, packet drop ratio, etc., for the support of massive devices' services.

  12. Unique Access to Learning

    ERIC Educational Resources Information Center

    Goble, Don

    2009-01-01

    This article describes the many learning opportunities that broadcast technology students at Ladue Horton Watkins High School in St. Louis, Missouri, experience because of their unique access to technology and methods of learning. Through scaffolding, stepladder techniques, and trial by fire, students learn to produce multiple television programs,…

  13. ISDC Data Access Layer

    NASA Astrophysics Data System (ADS)

    Jennings, D.; Borkowski, J.; Contessi, T.; Lock, T.; Rohlfs, R.; Walter, R.

    The ISDC Data Access Layer (DAL) is an ANSI C and \\fortran 90 compatible library under development in support of the ESA INTEGRAL mission data analysis software. DALs primary purpose is to isolate the analysis software from the specifics of the data formats while at the same time providing new data abstraction and access capabilities. DAL supports the creation and manipulation of hierarchical data sets which may span multiple files and, in theory, multiple computer systems. A number of Application Programming Interfaces (APIs) are supported by DAL that allow software to view and access data at different levels of complexity. DAL also allows data sets to reside on disk, in conventional memory or in shared memory in a way that is transparent to the user/application.

  14. An Efficient Remote Authentication Scheme for Wireless Body Area Network.

    PubMed

    Omala, Anyembe Andrew; Kibiwott, Kittur P; Li, Fagen

    2017-02-01

    Wireless body area network (WBAN) provide a mechanism of transmitting a persons physiological data to application providers e.g. hospital. Given the limited range of connectivity associated with WBAN, an intermediate portable device e.g. smartphone, placed within WBAN's connectivity, forwards the data to a remote server. This data, if not protected from an unauthorized access and modification may be lead to poor diagnosis. In order to ensure security and privacy between WBAN and a server at the application provider, several authentication schemes have been proposed. Recently, Wang and Zhang proposed an authentication scheme for WBAN using bilinear pairing. However, in their scheme, an application provider could easily impersonate a client. In order to overcome this weakness, we propose an efficient remote authentication scheme for WBAN. In terms of performance, our scheme can not only provide a malicious insider security, but also reduce running time of WBAN (client) by 51 % as compared to Wang and Zhang scheme.

  15. Robust anonymous authentication scheme for telecare medical information systems.

    PubMed

    Xie, Qi; Zhang, Jun; Dong, Na

    2013-04-01

    Patient can obtain sorts of health-care delivery services via Telecare Medical Information Systems (TMIS). Authentication, security, patient's privacy protection and data confidentiality are important for patient or doctor accessing to Electronic Medical Records (EMR). In 2012, Chen et al. showed that Khan et al.'s dynamic ID-based authentication scheme has some weaknesses and proposed an improved scheme, and they claimed that their scheme is more suitable for TMIS. However, we show that Chen et al.'s scheme also has some weaknesses. In particular, Chen et al.'s scheme does not provide user's privacy protection and perfect forward secrecy, is vulnerable to off-line password guessing attack and impersonation attack once user's smart card is compromised. Further, we propose a secure anonymity authentication scheme to overcome their weaknesses even an adversary can know all information stored in smart card.

  16. Optical Access Networks

    NASA Astrophysics Data System (ADS)

    Zheng, Jun; Ansari, Nirwan

    2005-05-01

    are now underway this hot area. The purpose of this feature issue is to expose the networking community to the latest research breakthroughs and progresses in the area of optical access networks. This feature issue aims to present a collection of papers that focus on the state-of-the-art research in various networking aspects of optical access networks. Original papers are solicited from all researchers involved in area of optical access networks. Topics of interest include but not limited to: Optical access network architectures and protocols Passive optical networks (BPON, EPON, GPON, etc.) Active optical networks Multiple access control Multiservices and QoS provisioning Network survivability Field trials and standards Performance modeling and analysis

  17. Optical Access Networks

    NASA Astrophysics Data System (ADS)

    Zheng, Jun; Ansari, Nirwan; Jersey Inst Ansari, New; Jersey Inst, New

    2005-04-01

    are now underway this hot area. The purpose of this feature issue is to expose the networking community to the latest research breakthroughs and progresses in the area of optical access networks. This feature issue aims to present a collection of papers that focus on the state-of-the-art research in various networking aspects of optical access networks. Original papers are solicited from all researchers involved in area of optical access networks. Topics of interest include but not limited to: Optical access network architectures and protocols Passive optical networks (BPON, EPON, GPON, etc.) Active optical networks Multiple access control Multiservices and QoS provisioning Network survivability Field trials and standards Performance modeling and analysis

  18. Optical Access Networks

    NASA Astrophysics Data System (ADS)

    Zheng, Jun; Ansari, Nirwan

    2005-06-01

    are now underway this hot area. The purpose of this feature issue is to expose the networking community to the latest research breakthroughs and progresses in the area of optical access networks. This feature issue aims to present a collection of papers that focus on the state-of-the-art research in various networking aspects of optical access networks. Original papers are solicited from all researchers involved in area of optical access networks. Topics of interest include but not limited to: Optical access network architectures and protocols Passive optical networks (BPON, EPON, GPON, etc.) Active optical networks Multiple access control Multiservices and QoS provisioning Network survivability Field trials and standards Performance modeling and analysis

  19. Leaf water storage increases with salinity and aridity in the mangrove Avicennia marina: integration of leaf structure, osmotic adjustment, and access to multiple water sources.

    PubMed

    Nguyen, Hoa T; Meir, Patrick; Sack, Lawren; Evans, John R; Oliveira, Rafael S; Ball, Marilyn C

    2017-04-05

    Leaf structure and water relations were studied in a temperate population of Avicennia marina subsp. australasica along a natural salinity gradient (28 to 49 parts per thousand (ppt)) and compared with two subspecies grown naturally in similar soil salinities to those of subsp. australasica but under different climates: subsp. eucalyptifolia (salinity 30 ppt, wet tropics) and subsp. marina (salinity 46 ppt, arid tropics). Leaf thickness, leaf dry mass per area, and water content increased with salinity and aridity. Turgor loss point declined with increase in soil salinity, driven mainly by differences in osmotic potential at full turgor. Nevertheless, a high modulus of elasticity (ε) contributed to maintenance of high cell hydration at turgor loss point. Despite similarity among leaves in leaf water storage capacitance, total leaf water storage increased with increasing salinity and aridity. The time that stored water alone could sustain an evaporation rate of 1 mmol m(-2) s(-1) ranged from 77 to 126 min from subspecies eucalyptifolia to ssp. marina, respectively. Achieving full leaf hydration or turgor would require water from sources other than the roots, emphasizing the importance of multiple water sources to growth and survival of Avicennia marina across gradients in salinity and aridity.

  20. A Novel Scheme of Fast-frequency Hopping Optical CDMA System with No-hit-zone Sequence

    NASA Astrophysics Data System (ADS)

    Ji, Jianhua; liu, Ling; Wang, Ke; Zhang, Zhipeng; Xu, Ming

    2013-09-01

    In traditional fast frequency-hopping OCDMA (FFH-OCDMA) system, beat noise and multiple-access interference are the main performance limitations, and complicated power control must be employed to eliminate the near-far effect. In this paper, a novel scheme of FFH-OCDMA with no-hit-zone sequence is proposed, which is named NHZ FFH-OCDMA. In NHZ FFH-OCDMA, the synchronization among users can be controlled within permissible time delay, and the code cross-correlation for different users equals zero. Therefore, near-far effect can be eliminated. Furthermore, beat noise and multiple-access interference also can be removed. Simulation of eight simultaneous users with dada rate 100 Mbit/s is demonstrated, where the fiber link consists of 50 km single-mode fiber, plus 5 km dispersion compensating fiber. Simulation results show that the near-far problem of NHZ FFH-OCDMA can be eliminated, and complicated power control can be removed. Therefore, this scheme is a good candidate for optical access network.

  1. A Double-Moment Multiple-Phase Four-Class Bulk Ice Scheme. Part II: Simulations of Convective Storms in Different Large-Scale Environments and Comparisons with other Bulk Parameterizations.

    NASA Astrophysics Data System (ADS)

    Schoenberg Ferrier, Brad; Tao, Wei-Kuo; Simpson, Joanne

    1995-04-01

    Part I of this study described a detailed four-class bulk ice scheme (4ICE) developed to simulate the hydro-meteor profiles of convective and stratiform precipitation associated with mesoscale convective systems. In Part II, the 4ICE scheme is incorporated into the Goddard Cumulus Ensemble (GCE) model and applied without any `tuning' to two squall lines occurring in widely different environments, namely, one over the `Pica) ocean in the Global Atmospheric Research Program's (GARP) Atlantic Tropical Experiment (GATE) and the other over a midlatitude continent in the Cooperative Huntsville Meteorological Experiment (COHMEX). Comparisons were made both with earlier three-class ice formulations and with observations. In both cases, the 4ICE scheme interacted with the dynamics so as to resemble the observations much more closely than did the model runs with either of the three-class ice parameterizations. The following features were well simulated in the COHMEX case: a lack of stratiform rain at the surface ahead of the storm, reflectivity maxima near 60 dBZ in the vicinity of the melting level, and intense radar echoes up to near the tropopause. These features were in strong contrast with the GATE simulation, which showed extensive trailing stratiform precipitation containing a horizontally oriented radar bright band. Peak reflectivities were below the melting level, rarely exceeding 50 dBz, with a steady decrease in reflectivity with height above. With the other bulk formulations, the large stratiform rain areas were not reproduced in the GATE conditions.The microphysical structure of the model clouds in both environments were more realistic than that of earlier modeling efforts. Number concentrations of ice of O(100 L1) occurred above 6 km in the GATE model clouds as a result of ice enhancement and rime splintering in the 4ICE runs. These processes were more effective in the GATE simulation, because near the freezing level the weaker updrafts were comparable in

  2. Verifier-based three-party authentication schemes using extended chaotic maps for data exchange in telecare medicine information systems.

    PubMed

    Lee, Tian-Fu

    2014-12-01

    Telecare medicine information systems provide a communicating platform for accessing remote medical resources through public networks, and help health care workers and medical personnel to rapidly making correct clinical decisions and treatments. An authentication scheme for data exchange in telecare medicine information systems enables legal users in hospitals and medical institutes to establish a secure channel and exchange electronic medical records or electronic health records securely and efficiently. This investigation develops an efficient and secure verified-based three-party authentication scheme by using extended chaotic maps for data exchange in telecare medicine information systems. The proposed scheme does not require server's public keys and avoids time-consuming modular exponential computations and scalar multiplications on elliptic curve used in previous related approaches. Additionally, the proposed scheme is proven secure in the random oracle model, and realizes the lower bounds of messages and rounds in communications. Compared to related verified-based approaches, the proposed scheme not only possesses higher security, but also has lower computational cost and fewer transmissions.

  3. A New Era of Open Access?

    ERIC Educational Resources Information Center

    Mercieca, Paul; Macauley, Peter

    2008-01-01

    There has been a push for open access journals for more than a decade in a higher education and research environment in which the "publish or perish" syndrome is as dominant as ever. This article examines the success, or otherwise, of open access schemes in light of the Excellence in Research for Australia (ERA) initiative. It compares…

  4. Access Denied

    ERIC Educational Resources Information Center

    Villano, Matt

    2008-01-01

    Building access control (BAC)--a catchall phrase to describe the systems that control access to facilities across campus--has traditionally been handled with remarkably low-tech solutions: (1) manual locks; (2) electronic locks; and (3) ID cards with magnetic strips. Recent improvements have included smart cards and keyless solutions that make use…

  5. Open Access

    ERIC Educational Resources Information Center

    Suber, Peter

    2012-01-01

    The Internet lets us share perfect copies of our work with a worldwide audience at virtually no cost. We take advantage of this revolutionary opportunity when we make our work "open access": digital, online, free of charge, and free of most copyright and licensing restrictions. Open access is made possible by the Internet and copyright-holder…

  6. Check-Digit Schemes.

    ERIC Educational Resources Information Center

    Wheeler, Mary L.

    1994-01-01

    Discusses the study of identification codes and check-digit schemes as a way to show students a practical application of mathematics and introduce them to coding theory. Examples include postal service money orders, parcel tracking numbers, ISBN codes, bank identification numbers, and UPC codes. (MKR)

  7. Implicit schemes and parallel computing in unstructured grid CFD

    NASA Technical Reports Server (NTRS)

    Venkatakrishnam, V.

    1995-01-01

    The development of implicit schemes for obtaining steady state solutions to the Euler and Navier-Stokes equations on unstructured grids is outlined. Applications are presented that compare the convergence characteristics of various implicit methods. Next, the development of explicit and implicit schemes to compute unsteady flows on unstructured grids is discussed. Next, the issues involved in parallelizing finite volume schemes on unstructured meshes in an MIMD (multiple instruction/multiple data stream) fashion are outlined. Techniques for partitioning unstructured grids among processors and for extracting parallelism in explicit and implicit solvers are discussed. Finally, some dynamic load balancing ideas, which are useful in adaptive transient computations, are presented.

  8. A generalized well management scheme for reservoir simulation

    SciTech Connect

    Fang, W.Y.; Lo, K.K.

    1995-12-31

    A new generalized well management scheme has been formulated to maximize oil production under multiple facility constraints. The scheme integrates reserve performance, wellbore hydraulics, surface facility constraints and lift-gas allocation o maximize oil production. It predicts well performance based on up-to-date hydraulics and reservoir conditions. The scheme has been implemented in a black oil simulator by using Separable programming and Simplex algorithm. This production optimization scheme has been applied to two full-field models. The oil production of these two full-field models is limited by water, gas and liquid haling limits at both field- and flow station-levels. The gas production is limited by injectivity as well as gas handling limits. For a 12-year production forecast on Field A, the new scheme increased oil production by 3 to 9%. For a 12-year production forecast on field B, the new scheme increased oil production by 7 to 9%.

  9. Efficient Unrestricted Identity-Based Aggregate Signature Scheme

    PubMed Central

    Yuan, Yumin; Zhan, Qian; Huang, Hua

    2014-01-01

    An aggregate signature scheme allows anyone to compress multiple individual signatures from various users into a single compact signature. The main objective of such a scheme is to reduce the costs on storage, communication and computation. However, among existing aggregate signature schemes in the identity-based setting, some of them fail to achieve constant-length aggregate signature or require a large amount of pairing operations which grows linearly with the number of signers, while others have some limitations on the aggregated signatures. The main challenge in building efficient aggregate signature scheme is to compress signatures into a compact, constant-length signature without any restriction. To address the above drawbacks, by using the bilinear pairings, we propose an efficient unrestricted identity-based aggregate signature. Our scheme achieves both full aggregation and constant pairing computation. We prove that our scheme has existential unforgeability under the computational Diffie-Hellman assumption. PMID:25329777

  10. Efficient unrestricted identity-based aggregate signature scheme.

    PubMed

    Yuan, Yumin; Zhan, Qian; Huang, Hua

    2014-01-01

    An aggregate signature scheme allows anyone to compress multiple individual signatures from various users into a single compact signature. The main objective of such a scheme is to reduce the costs on storage, communication and computation. However, among existing aggregate signature schemes in the identity-based setting, some of them fail to achieve constant-length aggregate signature or require a large amount of pairing operations which grows linearly with the number of signers, while others have some limitations on the aggregated signatures. The main challenge in building efficient aggregate signature scheme is to compress signatures into a compact, constant-length signature without any restriction. To address the above drawbacks, by using the bilinear pairings, we propose an efficient unrestricted identity-based aggregate signature. Our scheme achieves both full aggregation and constant pairing computation. We prove that our scheme has existential unforgeability under the computational Diffie-Hellman assumption.

  11. Equal Access.

    ERIC Educational Resources Information Center

    De Patta, Joe

    2003-01-01

    Presents an interview with Stephen McCarthy, co-partner and president of Equal Access ADA Consulting Architects of San Diego, California, about designing schools to naturally integrate compliance with the Americans with Disabilities Act (ADA). (EV)

  12. Dynamic Spectrum Access to the Combined Resource of Commercial and Public Safety Bands Based on a WCDMA Shared Network

    NASA Astrophysics Data System (ADS)

    Jeon, Hyoungsuk; Im, Sooyeol; Kim, Youmin; Kim, Seunghee; Kim, Jinup; Lee, Hyuckjae

    The public safety spectrum is generally under-utilized due to the unique traffic characteristics of bursty and mission critical. This letter considers the application of dynamic spectrum access (DSA) to the combined spectrum of public safety (PS) and commercial (CMR) users in a common shared network that can provide both PS and CMR services. Our scenario includes the 700MHz Public/Private Partnership which was recently issued by the Federal Communications Commission. We first propose an efficient DSA mechanism to coordinate the combined spectrum, and then establish a call admission control that reflects the proposed DSA in a wideband code division multiple access based network. The essentials of our proposed DSA are opportunistic access to the public safety spectrum and priority access to the commercial spectrum. Simulation results show that these schemes are well harmonized in various network environments.

  13. Hybridization schemes for clusters

    NASA Astrophysics Data System (ADS)

    Wales, David J.

    The concept of an optimum hybridization scheme for cluster compounds is developed with particular reference to electron counting. The prediction of electron counts for clusters and the interpretation of the bonding is shown to depend critically upon the presumed hybridization pattern of the cluster vertex atoms. This fact has not been properly appreciated in previous work, particularly in applications of Stone's tensor surface harmonic (TSH) theory, but is found to be a useful tool when dealt with directly. A quantitative definition is suggested for the optimum cluster hybridization pattern based directly upon the ease of interpretation of the molecular orbitals, and results are given for a range of species. The relationship of this scheme to the detailed cluster geometry is described using Löwdin's partitioned perturbation theory, and the success and range of application of TSH theory are discussed.

  14. Scalable Nonlinear Compact Schemes

    SciTech Connect

    Ghosh, Debojyoti; Constantinescu, Emil M.; Brown, Jed

    2014-04-01

    In this work, we focus on compact schemes resulting in tridiagonal systems of equations, specifically the fifth-order CRWENO scheme. We propose a scalable implementation of the nonlinear compact schemes by implementing a parallel tridiagonal solver based on the partitioning/substructuring approach. We use an iterative solver for the reduced system of equations; however, we solve this system to machine zero accuracy to ensure that no parallelization errors are introduced. It is possible to achieve machine-zero convergence with few iterations because of the diagonal dominance of the system. The number of iterations is specified a priori instead of a norm-based exit criterion, and collective communications are avoided. The overall algorithm thus involves only point-to-point communication between neighboring processors. Our implementation of the tridiagonal solver differs from and avoids the drawbacks of past efforts in the following ways: it introduces no parallelization-related approximations (multiprocessor solutions are exactly identical to uniprocessor ones), it involves minimal communication, the mathematical complexity is similar to that of the Thomas algorithm on a single processor, and it does not require any communication and computation scheduling.

  15. A privacy enhanced authentication scheme for telecare medical information systems.

    PubMed

    Jiang, Qi; Ma, Jianfeng; Ma, Zhuo; Li, Guangsong

    2013-02-01

    The telecare medical information system (TMIS) aims to establish telecare services and enable the public to access medical services or medical information at remote sites. Authentication and key agreement is essential to ensure data integrity, confidentiality, and availability for TMIS. Most recently, Chen et al. proposed an efficient and secure dynamic ID-based authentication scheme for TMIS, and claimed that their scheme achieves user anonymity. However, we observe that Chen et al.'s scheme achieves neither anonymity nor untraceability, and is subject to the identity guessing attack and tracking attack. In order to protect user privacy, we propose an enhanced authentication scheme which achieves user anonymity and untraceablity. It is a secure and efficient authentication scheme with user privacy preservation which is practical for TMIS.

  16. Performance of hashed cache data migration schemes on multicomputers

    NASA Technical Reports Server (NTRS)

    Hiranandani, Seema; Saltz, Joel; Mehrotra, Piyush; Berryman, Harry

    1991-01-01

    After conducting an examination of several data-migration mechanisms which permit an explicit and controlled mapping of data to memory, a set of schemes for storage and retrieval of off-processor array elements is experimentally evaluated and modeled. All schemes considered have their basis in the use of hash tables for efficient access of nonlocal data. The techniques in question are those of hashed cache, partial enumeration, and full enumeration; in these, nonlocal data are stored in hash tables, so that the operative difference lies in the amount of memory used by each scheme and in the retrieval mechanism used for nonlocal data.

  17. Grading Scheme, Test Difficulty, and the Immediate Feedback Assessment Technique

    ERIC Educational Resources Information Center

    DiBattista, David; Gosse, Leanne; Sinnige-Egger, Jo-Anne; Candale, Bela; Sargeson, Kim

    2009-01-01

    The authors examined how the grading scheme affects learning and students' reactions to the Immediate Feedback Assessment Technique (IFAT), an answer form providing immediate feedback on multiple-choice questions. Undergraduate students (N = 141) took a general-knowledge multiple-choice test of low, medium, or high difficulty. They used the IFAT…

  18. GC-based dynamic QoS priority handoff scheme in multimedia cellular systems

    NASA Astrophysics Data System (ADS)

    Chen, Huan; Kumar, Sunil; Kuo, C.-C. Jay

    2001-03-01

    A dynamic call admission control (CAC) and its associated resource reservation (RR) schemes are proposed in this research based on the guard channel (GC) concept for a wireless cellular system supporting multiple QoS classes. A comprehensive service model is developed, which includes not only mobile terminals' bandwidth requirements but also their different levels of priorities, rate adaptivity and mobility. The proposed CAC policy selects the resource access thresold according to the estimated number of incoming call requests of different QoS classes. The amount of resources to be reserved is dynamically adjusted by considering neighboring-cell higher-priority calls which are likely to handoff. The handoff interaction between adjacent cells is estimated by using radio propagation in terms of the signal-to-noise ratio (SNR) and the distance of each active call in neighboring cells. Experiments are conducted by using the OPNET simulator to study the performance of the proposed scheme under various traffic conditions. It is shown that better QoS guarantees can be provided by the proposed CAC and RR schemes.

  19. Multiple-Access Techniques for Broadband Networks

    DTIC Science & Technology

    1991-12-20

    satellite-to- earth -station links of corn- some of the transmitted signals either separately (subop- munieation networks. When bursty data or voice traffic...frequency-sclective and lite-to- earth -station links in communication networks such multipath fading. These properties of SSMA are of inter- as the...Muy, nd. Cokle Pat, through the Nati• l Sciemce Foundation’s Enering Rmo&l Ca0 PraSm: NSF CDI NMOIOI MULTI-SENSOR CORRELATION AND QUANTIZATION IN

  20. Access to Multiple Underlying Systems in Janus

    DTIC Science & Technology

    1989-09-01

    are created from individual er,,ices: otherw ise partal solutions are created by combining other partial solutions. Each of these obiects has the...matched clauses (I i and (2 1 and the other in % hklh the se. ice ha. matched clauses ( i and, 3 I BegtnninL e.i tNI ,ou et of mitial partal solutions, the...is not complete: it is possible that none of th- .;t.l partal solutions chosen as starting points can be expanded into a solution that covers the

  1. Collision Avoidance and Resolution Multiple Access

    DTIC Science & Technology

    1999-03-01

    X C Y Z2ð Z\\[ ] �à "!5!p� @7A!)< Y "*2,(A!=6P� )64 a,(">"" mP6 $,(8g,(>"+D51�,(A!G.YA/658/8!P>c�uI/Ŝ&d@7A/Q.Ag...5*-,+.)65*%+*?65.< ),kI!P>Q6P`h658/IS.A/658?8!P>o,(">"" mP6 $,(8�l[P.0,(>8A5W¦ED.#"+*?6$<P*,(A! 658/65>` ,(".)65>P...S¬?­�»Ü qr8z,(A/Q*=*%P.0,(8z@7XI&)� e6Z> p@7)󈧆/8/IF8v,(A!D6P� )Y64 g,(Q>" mP6 $,(8F512,(A!D.YA/658/8!P>f65* @7

  2. Intelligent Access to Multiple Relational Database Systems

    DTIC Science & Technology

    1992-11-01

    integrity. A composite key is made up of more than one field (Elmasri and Navathe, 1989), e.g., last and first name could be used a composite key...Appendix B SQL Script Files info.sql Page 1 ,• set up must run beiore other info scripts */ july 92 p wright save application table names to iams tab names...start mks7; start mks8; exit 59 Appendix B SQL Script Files Aug 13 17:24 1992 mksl.sql Page 1 /* set up must run before other info scripts * july 92 p

  3. English Universities, Additional Fee Income and Access Agreements: Their Impact on Widening Participation and Fair Access

    ERIC Educational Resources Information Center

    McCaig, Colin; Adnett, Nick

    2009-01-01

    This paper argues that the introduction of access agreements following the establishment of the Office for Fair Access (OFFA) has consolidated how English higher education institutions (HEIs) position themselves in the marketplace in relation to widening participation. However, the absence of a national bursary scheme has led to obfuscation rather…

  4. Mobile and Accessible Learning for MOOCs

    ERIC Educational Resources Information Center

    Sharples, Mike; Kloos, Carlos Delgado; Dimitriadis, Yannis; Garlatti, Serge; Specht, Marcus

    2015-01-01

    Many modern web-based systems provide a "responsive" design that allows material and services to be accessed on mobile and desktop devices, with the aim of providing "ubiquitous access." Besides offering access to learning materials such as podcasts and videos across multiple locations, mobile, wearable and ubiquitous…

  5. Optical Access Networks

    NASA Astrophysics Data System (ADS)

    Zheng, Jun; Ansari, Nirwan

    2005-01-01

    economic viability of many potential high-bandwidth applications. In recent years, optical access networks have been receiving tremendous attention from both academia and industry. A large number of research activities have been carried out or are now underway this hot area. The purpose of this feature issue is to expose the networking community to the latest research breakthroughs and progresses in the area of optical access networks.

    Scope of Contributions

    This feature issue aims to present a collection of papers that focus on the state-of-the-art research in various networking aspects of optical access networks. Original papers are solicited from all researchers involved in area of optical access networks. Topics of interest include but not limited to:
    • Optical access network architectures and protocols
    • Passive optical networks (BPON, EPON, GPON, etc.)
    • Active optical networks
    • Multiple access control
    • Multiservices and QoS provisioning
    • Network survivability
    • Field trials and standards
    • Performance modeling and analysis

    Manuscript Submission

    To submit to this special issue, follow the normal procedure for submission to JON, indicating ``Optical Access Networks feature' in the ``Comments' field of the online submission form. For all other questions relating to this feature issue, please send an e-mail to jon@osa.org, subject line ``Optical Access Networks' Additional information can be found on the JON website: http://www.osa-jon.org/submission/. Submission Deadline: 1 June 2005

  6. Massive momentum-subtraction scheme

    NASA Astrophysics Data System (ADS)

    Boyle, Peter; Del Debbio, Luigi; Khamseh, Ava

    2017-03-01

    A new renormalization scheme is defined for fermion bilinears in QCD at nonvanishing quark masses. This new scheme, denoted RI/mSMOM, preserves the benefits of the nonexceptional momenta introduced in the RI/SMOM scheme and allows a definition of renormalized composite fields away from the chiral limit. Some properties of the scheme are investigated by performing explicit one-loop computation in dimensional regularization.

  7. Stealth transmission of temporal phase en/decoded polarization-modulated-code-shift-keying optical-code-division multiple-access signal over synchronous digital hierarchy network with asynchronous detection

    NASA Astrophysics Data System (ADS)

    Chen, Yinfang; Wang, Rong; Fang, Tao; Pu, Tao; Xiang, Peng; Zhu, Huatao; Zheng, Jilin

    2014-06-01

    An innovative approach for security-enhanced optical stealth transmission in a synchronous digital hierarchy network is proposed and experimentally investigated. The security enhancement is achieved through a signal modulation format, so-called polarization-modulated-code-shift-keying, which is implemented with two superstructured fiber Bragg gratings-based optical-code-division multiple-access encoders and a polarization modulator. The proposed modulation format can provide a constant energy level for both bits 0's and 1's, which avoids secure vulnerability of single-stealth-user with on-off-keying modulation before coupling into the host channel and after the cascade of filters. Moreover, a self-made cost-effective gain-switched distributed feedback laser with relatively narrow spectrum is first employed as a stealth optical source, which greatly reduces the system cost and complexity. The stealth signal is recovered and detected asynchronously. The experimental results show high secure performance and robustness against eavesdropping, while keeping a bit error rate below forward error correction limit.

  8. Access to cancer medications in low- and middle-income countries.

    PubMed

    Lopes, Gilberto de Lima; de Souza, Jonas A; Barrios, Carlos

    2013-06-01

    Major breakthroughs have been realized in controlling cancer in the past five decades. However, for patients in low- and middle-income countries (LMICs), many of these advances are nothing but an aspiration and hope for the future. Indeed, the greatest challenge we face in oncology today is how to reconcile small, incremental and significant improvements in the management of cancer with the exponentially increasing costs of new treatments. Emerging economies are attempting to address this important issue of access to cancer medications. In this Review, we examine how LMICs are using generic and biosimilar drugs, expanding participation in clinical trials, implementing universal health-care schemes to pool resources, and using compulsory licensing schemes as well as increasing multiple-stakeholder public-private partnerships to increase access to cancer medications for their citizens. Any truly effective programme will require multiple stakeholder involvement-including governments, industry and civil society-to address the issue of access to medication. Only with the creation of a global entity to fight cancer that is supported by a global fund-for example, in the mould of the GAVI alliance and the International Finance Facility for Immunization-will we truly be able to improve cancer care in LMICs and drive down the high mortality rates in these regions.

  9. ESCAP mobile training scheme.

    PubMed

    Yasas, F M

    1977-01-01

    In response to a United Nations resolution, the Mobile Training Scheme (MTS) was set up to provide training to the trainers of national cadres engaged in frontline and supervisory tasks in social welfare and rural development. The training is innovative in its being based on an analysis of field realities. The MTS team consisted of a leader, an expert on teaching methods and materials, and an expert on action research and evaluation. The country's trainers from different departments were sent to villages to work for a short period and to report their problems in fulfilling their roles. From these grass roots experiences, they made an analysis of the job, determining what knowledge, attitude and skills it required. Analysis of daily incidents and problems were used to produce indigenous teaching materials drawn from actual field practice. How to consider the problems encountered through government structures for policy making and decisions was also learned. Tasks of the students were to identify the skills needed for role performance by job analysis, daily diaries and project histories; to analyze the particular community by village profiles; to produce indigenous teaching materials; and to practice the role skills by actual role performance. The MTS scheme was tried in Nepal in 1974-75; 3 training programs trained 25 trainers and 51 frontline workers; indigenous teaching materials were created; technical papers written; and consultations were provided. In Afghanistan the scheme was used in 1975-76; 45 participants completed the training; seminars were held; and an ongoing Council was created. It is hoped that the training program will be expanded to other countries.

  10. Computer-Access-Code Matrices

    NASA Technical Reports Server (NTRS)

    Collins, Earl R., Jr.

    1990-01-01

    Authorized users respond to changing challenges with changing passwords. Scheme for controlling access to computers defeats eavesdroppers and "hackers". Based on password system of challenge and password or sign, challenge, and countersign correlated with random alphanumeric codes in matrices of two or more dimensions. Codes stored on floppy disk or plug-in card and changed frequently. For even higher security, matrices of four or more dimensions used, just as cubes compounded into hypercubes in concurrent processing.

  11. An energy efficient cooperative hierarchical MIMO clustering scheme for wireless sensor networks.

    PubMed

    Nasim, Mehwish; Qaisar, Saad; Lee, Sungyoung

    2012-01-01

    In this work, we present an energy efficient hierarchical cooperative clustering scheme for wireless sensor networks. Communication cost is a crucial factor in depleting the energy of sensor nodes. In the proposed scheme, nodes cooperate to form clusters at each level of network hierarchy ensuring maximal coverage and minimal energy expenditure with relatively uniform distribution of load within the network. Performance is enhanced by cooperative multiple-input multiple-output (MIMO) communication ensuring energy efficiency for WSN deployments over large geographical areas. We test our scheme using TOSSIM and compare the proposed scheme with cooperative multiple-input multiple-output (CMIMO) clustering scheme and traditional multihop Single-Input-Single-Output (SISO) routing approach. Performance is evaluated on the basis of number of clusters, number of hops, energy consumption and network lifetime. Experimental results show significant energy conservation and increase in network lifetime as compared to existing schemes.

  12. Expanding Access

    ERIC Educational Resources Information Center

    Roach, Ronald

    2007-01-01

    There is no question that the United States lags behind most industrialized nations in consumer access to broadband Internet service. For many policy makers and activists, this shortfall marks the latest phase in the struggle to overcome the digital divide. To remedy this lack of broadband affordability and availability, one start-up firm--with…

  13. Easy Access

    ERIC Educational Resources Information Center

    Gettelman, Alan

    2009-01-01

    School and university restrooms, locker and shower rooms have specific ADA accessibility requirements that serve the needs of staff, students and campus visitors who are disabled as a result of injury, illness or age. Taking good care of them is good for the reputation of a sensitive community institution, and fosters positive public relations.…

  14. Access Denied

    ERIC Educational Resources Information Center

    Raths, David

    2012-01-01

    As faculty members add online and multimedia elements to their courses, colleges and universities across the country are realizing that there is a lot of work to be done to ensure that disabled students (and employees) have equal access to course material and university websites. Unfortunately, far too few schools consider the task a top priority.…

  15. A low-complexity medium access control framework for body sensor networks.

    PubMed

    Wang, Bo; Wang, Lei; Huang, Bang-Yu; Wu, Dan; Lin, Shao-Jie; Gu, Jia; Zhang, Yuan-Ting; Chen, Wei

    2009-01-01

    This paper proposed a low-complexity medium access control (MAC) protocol tailored for body sensor networks (BSN) applications. The MAC protocol was designated to handle collision avoidance by reducing the numbers of the overhead packets for handshake control within the BSN. We also suggested a novel message recovery mechanism for getting back the lost physiological information. The adaptive synchronization scheme we have implemented exploited the features of multiple data-rate and adjustable precision design to support differentiated healthcare applications. The MAC protocol was fully implemented using our BSN development platform. The experimental results suggested the improved MAC design was compact and energy-efficient.

  16. Optical beat interference noise reduction in OFDMA optical access link using self-homodyne balanced detection

    NASA Astrophysics Data System (ADS)

    Jung, Sang-Min; Won, Yong-Yuk; Han, Sang-Kook

    2013-12-01

    A Novel technique for reducing the OBI noise in optical OFDMA-PON uplink is presented. OFDMA is a multipleaccess/ multiplexing scheme that can provide multiplexing operation of user data streams onto the downlink sub-channels and uplink multiple access by means of dividing OFDM subcarriers as sub-channels. The main issue of high-speed, single-wavelength upstream OFDMA-PON arises from optical beating interference noise. Because the sub-channels are allocated dynamically to multiple access users over same nominal wavelength, it generates the optical beating interference among upstream signals. In this paper, we proposed a novel scheme using self-homodyne balanced detection in the optical line terminal (OLT) to reduce OBI noise which is generated in the uplink transmission of OFDMA-PON system. When multiple OFDMA sub-channels over the same nominal wavelength are received at the same time in the proposed architecture, OBI noises can be removed using balanced detection. Using discrete multitone modulation (DMT) to generate real valued OFDM signals, the proposed technique is verified through experimental demonstration.

  17. Experimental Evaluation of LIDAR Data Visualization Schemes

    NASA Astrophysics Data System (ADS)

    Ghosh, S.; Lohan, B.

    2012-07-01

    LiDAR (Light Detection and Ranging) has attained the status of an industry standard method of data collection for gathering three dimensional topographic information. Datasets captured through LiDAR are dense, redundant and are perceivable from multiple directions, which is unlike other geospatial datasets collected through conventional methods. This three dimensional information has triggered an interest in the scientific community to develop methods for visualizing LiDAR datasets and value added products. Elementary schemes of visualization use point clouds with intensity or colour, triangulation and tetrahedralization based terrain models draped with texture. Newer methods use feature extraction either through the process of classification or segmentation. In this paper, the authors have conducted a visualization experience survey where 60 participants respond to a questionnaire. The questionnaire poses six different questions on the qualities of feature perception and depth for 12 visualization schemes. The answers to these questions are obtained on a scale of 1 to 10. Results are thus presented using the non-parametric Friedman's test, using post-hoc analysis for hypothetically ranking the visualization schemes based on the rating received and finally confirming the rankings through the Page's trend test. Results show that a heuristic based visualization scheme, which has been developed by Ghosh and Lohani (2011) performs the best in terms of feature and depth perception.

  18. A chaotic map-based authentication scheme for telecare medicine information systems.

    PubMed

    Hao, Xinhong; Wang, Jiantao; Yang, Qinghai; Yan, Xiaopeng; Li, Ping

    2013-04-01

    With the development of Internet, patients could enjoy health-care delivery services through telecare medicine information systems (TMIS) in their home. To control the access to remote medical servers' resources, many authentication schemes using smart cards have been proposed. However, the performance of these schemes is not satisfactory since modular exponential operations are used in these schemes. In the paper, we propose a chaotic map-based authentication scheme for telecare medicine information systems. The security and performance analysis shows our scheme is more suitable for TMIS.

  19. A Scheme for Compressing Floating-Point Images

    NASA Astrophysics Data System (ADS)

    White, Richard L.; Greenfield, Perry

    While many techniques have been used to compress integer data, compressing floating-point data presents a number of additional problems. We have implemented a scheme for compressing floating-point images that is fast, robust, and automatic, that allows random access to pixels without decompressing the whole image, and that generally has a scientifically negligible effect on the noise present in the image. The compressed data are stored in an FITS binary table. Most astronomical images can be compressed by approximately a factor of 3, using conservative settings for the permitted level of changes in the data. We intend to work with NOAO to incorporate this compression method into the IRAF image kernel, so that FITS images compressed using this scheme can be accessed transparently from IRAF applications without any explicit decompression steps. The scheme is simple, and it should be possible to include it in other FITS libraries as well.

  20. Proposal of Wireless Traffic Control Schemes for Wireless LANs

    NASA Astrophysics Data System (ADS)

    Hiraguri, Takefumi; Ichikawa, Takeo; Iizuka, Masataka; Kubota, Shuji

    This paper proposes two traffic control schemes to support the communication quality of multimedia streaming services such as VoIP and audio/video over IEEE 802.11 wireless LAN systems. The main features of the proposed scheme are bandwidth control for each flow of the multimedia streaming service and load balancing between access points (APs) of the wireless LAN by using information of data link, network and transport layers. The proposed schemes are implemented on a Linux machine which is called the wireless traffic controller (WTC). The WTC connects a high capacity backbone network and an access network to which the APs are attached. We evaluated the performance of the proposed WTC and confirmed that the communication quality of the multimedia streaming would be greatly improved by using this technique.

  1. An Identity-Based (IDB) Broadcast Encryption Scheme with Personalized Messages (BEPM).

    PubMed

    Xu, Ke; Liao, Yongjian; Qiao, Li; Liu, Zhangyun; Yang, Xiaowei

    2015-01-01

    A broadcast encryption scheme with personalized messages (BEPM) is a scheme in which a broadcaster transmits not only encrypted broadcast messages to a subset of recipients but also encrypted personalized messages to each user individually. Several broadcast encryption (BE) schemes allow a broadcaster encrypts a message for a subset S of recipients with public keys and any user in S can decrypt the message with his/her private key. However, these BE schemes can not provide an efficient way to transmit encrypted personalized messages to each user individually. In this paper, we propose a broadcast encryption scheme with a transmission of personalized messages. Besides, the scheme is based on multilinear maps ensure constant ciphertext size and private key size of each user and the scheme can achieve statically security. More realistically, the scheme can be applied to the Conditional Access System (CAS) of pay television (pay-TV) efficiently and safely.

  2. An Identity-Based (IDB) Broadcast Encryption Scheme with Personalized Messages (BEPM)

    PubMed Central

    Xu, Ke; Liao, Yongjian; Qiao, Li

    2015-01-01

    A broadcast encryption scheme with personalized messages (BEPM) is a scheme in which a broadcaster transmits not only encrypted broadcast messages to a subset of recipients but also encrypted personalized messages to each user individually. Several broadcast encryption (BE) schemes allow a broadcaster encrypts a message for a subset S of recipients with public keys and any user in S can decrypt the message with his/her private key. However, these BE schemes can not provide an efficient way to transmit encrypted personalized messages to each user individually. In this paper, we propose a broadcast encryption scheme with a transmission of personalized messages. Besides, the scheme is based on multilinear maps ensure constant ciphertext size and private key size of each user and the scheme can achieve statically security. More realistically, the scheme can be applied to the Conditional Access System (CAS) of pay television (pay-TV) efficiently and safely. PMID:26629817

  3. On Some Numerical Dissipation Schemes

    NASA Technical Reports Server (NTRS)

    Swanson, R. C.; Radespiel, R.; Turkel, E.

    1998-01-01

    Several schemes for introducing an artificial dissipation into a central difference approximation to the Euler and Navier Stokes equations are considered. The focus of the paper is on the convective upwind and split pressure (CUSP) scheme, which is designed to support single interior point discrete shock waves. This scheme is analyzed and compared in detail with scalar dissipation and matrix dissipation (MATD) schemes. Resolution capability is determined by solving subsonic, transonic, and hypersonic flow problems. A finite-volume discretization and a multistage time-stepping scheme with multigrid are used to compute solutions to the flow equations. Numerical solutions are also compared with either theoretical solutions or experimental data. For transonic airfoil flows the best accuracy on coarse meshes for aerodynamic coefficients is obtained with a simple MATD scheme. The coarse-grid accuracy for the original CUSP scheme is improved by modifying the limiter function used with the scheme, giving comparable accuracy to that obtained with the MATD scheme. The modifications reduce the background dissipation and provide control over the regions where the scheme can become first order.

  4. The Scheme of Beam Synchronization in MEIC

    SciTech Connect

    Zhang, Yuhong; Derbenev, Yaroslav S.; Hutton, Andrew M.

    2013-06-01

    Synchronizing colliding beams at single or multiple collision points is a critical R&D issue in the design of a medium energy electron-ion collider (MEIC) at Jefferson Lab. The path-length variation due to changes in the ion energy, which varies over 20 to 100 GeV, could be more than several times the bunch spacing. The scheme adopted in the present MEIC baseline is centered on varying the number of bunches (i.e., harmonic number) stored in the collider ring. This could provide a set of discrete energies for proton or ions such that the beam synchronization condition is satisfied. To cover the ion energy between these synchronized values, we further propose to vary simultaneously the electron ring circumference and the frequency of the RF systems in both collider rings. We also present in this paper the requirement of frequency tunability of SRF cavities to support the scheme.

  5. Hemodialysis access - self care

    MedlinePlus

    Kidney failure - chronic-hemodialysis access; Renal failure - chronic-hemodialysis access; Chronic renal insufficiency - hemodialysis access; Chronic kidney failure - hemodialysis access; Chronic renal failure - hemodialysis access; dialysis - hemodialysis ...

  6. Data oriented job submission scheme for the PHENIX user analysis in CCJ

    NASA Astrophysics Data System (ADS)

    Nakamura, T.; En'yo, H.; Ichihara, T.; Watanabe, Y.; Yokkaichi, S.

    2011-12-01

    The RIKEN Computing Center in Japan (CCJ) has been developed to make it possible analyzing huge amount of data corrected by the PHENIX experiment at RHIC. The corrected raw data or reconstructed data are transferred via SINET3 with 10 Gbps bandwidth from Brookheaven National Laboratory (BNL) by using GridFTP. The transferred data are once stored in the hierarchical storage management system (HPSS) prior to the user analysis. Since the size of data grows steadily year by year, concentrations of the access request to data servers become one of the serious bottlenecks. To eliminate this I/O bound problem, 18 calculating nodes with total 180 TB local disks were introduced to store the data a priori. We added some setup in a batch job scheduler (LSF) so that user can specify the requiring data already distributed to the local disks. The locations of data are automatically obtained from a database, and jobs are dispatched to the appropriate node which has the required data. To avoid the multiple access to a local disk from several jobs in a node, techniques of lock file and access control list are employed. As a result, each job can handle a local disk exclusively. Indeed, the total throughput was improved drastically as compared to the preexisting nodes in CCJ, and users can analyze about 150 TB data within 9 hours. We report this successful job submission scheme and the feature of the PC cluster.

  7. A modified prediction scheme of the H.264 multiview video coding to improve the decoder performance

    NASA Astrophysics Data System (ADS)

    Hamadan, Ayman M.; Aly, Hussein A.; Fouad, Mohamed M.; Dansereau, Richard M.

    2013-02-01

    In this paper, we present a modified inter-view prediction scheme for the multiview video coding (MVC).With more inter-view prediction, the number of reference frames required to decode a single view increase. Consequently, the data size of decoding a single view increases, thus impacting the decoder performance. In this paper, we propose an MVC scheme that requires less inter-view prediction than that of the MVC standard scheme. The proposed scheme is implemented and tested on real multiview video sequences. Improvements are shown using the proposed scheme in terms of average data size required either to decode a single view, or to access any frame (i.e., random access), with comparable rate-distortion. It is compared to the MVC standard scheme and another improved techniques from the literature.

  8. Improving antivenom availability and accessibility: science, technology, and beyond.

    PubMed

    Gutiérrez, José María

    2012-09-15

    Snakebite envenomings constitute a serious and neglected public health problem. Despite the fact that effective treatment exists, i.e. administration of animal-derived antivenoms, the availability and accessibility of these life-saving immunobiologicals is deficitary in various parts of the world, particularly in sub-Saharan Africa and some regions of Asia. This article discusses some of the problems that need to be circumvented in order to improve the availability and accessibility of antivenoms. The conglomerate of antivenom manufacturers is highly heterogeneous in terms of technological base, qualification of staff, implementation of Good Manufacturing Practices (GMPs), and volume of production. Therefore, improvements in antivenom quality and availability should be based on strategies tailored to the situation of each region or country; in this context, three different scenarios are discussed. Accessibility of antivenoms demands concerted efforts at multiple levels, including raising the awareness of public health authorities on the relevance of the problem, implementing innovative antivenom purchasing schemes, strengthening national distribution channels on the basis of robust epidemiological information, improving the cold chain and the provision of health services in remote rural settings, supporting the correct use of antivenoms, and promoting the involvement of local community organizations in various aspects of prevention and management. These tasks should be envisaged in terms of synergistic, interprogrammatic and intersectorial interventions, with the participation of many players.

  9. A modified symplectic PRK scheme for seismic wave modeling

    NASA Astrophysics Data System (ADS)

    Liu, Shaolin; Yang, Dinghui; Ma, Jian

    2017-02-01

    A new scheme for the temporal discretization of the seismic wave equation is constructed based on symplectic geometric theory and a modified strategy. The ordinary differential equation in terms of time, which is obtained after spatial discretization via the spectral-element method, is transformed into a Hamiltonian system. A symplectic partitioned Runge-Kutta (PRK) scheme is used to solve the Hamiltonian system. A term related to the multiplication of the spatial discretization operator with the seismic wave velocity vector is added into the symplectic PRK scheme to create a modified symplectic PRK scheme. The symplectic coefficients of the new scheme are determined via Taylor series expansion. The positive coefficients of the scheme indicate that its long-term computational capability is more powerful than that of conventional symplectic schemes. An exhaustive theoretical analysis reveals that the new scheme is highly stable and has low numerical dispersion. The results of three numerical experiments demonstrate the high efficiency of this method for seismic wave modeling.

  10. A Theoretical Analysis of a New Polarimetric Optical Scheme for Glucose Sensing in the Human Eye

    NASA Technical Reports Server (NTRS)

    Rovati, Luigi L.; Boeckle, Stefan; Ansari, Rafat R.; Salzman, Jack A. (Technical Monitor)

    2002-01-01

    The challenging task of in vivo polarimetric glucose sensing is the identification and selection of a scheme to optically access the aqueous humor of the human eye. In this short communication an earlier approach of Cote et al. is theoretically compared with our new optical scheme. Simulations of the new scheme using the eye model of Navarro, suggest that the new optical geometry can overcome the limitations of the previous approach for in vivo measurements of glucose in a human eye.

  11. The Social Meanings of the C-Card Scheme: The Importance of Friends and Peers

    ERIC Educational Resources Information Center

    Cheetham, Mandy

    2014-01-01

    This paper draws on findings from an analysis of interviews with young people aged 14-18 years, to explore the peer influences in young people's informal social networks which can affect their access to sexual health services. The research focuses on the social meanings of a C-Card condom distribution scheme in North East England. Such schemes are…

  12. On-line access to nursing literature.

    PubMed

    Cassey, M Z; Kane, W P; Sutton, L S

    1993-01-01

    Providing access to the multiple databases essential to nursing practice and education is a challenge for universities and health care providers alike. Collaboration between Wayne State University and other institutions in the Detroit metropolitan area provides a unique system for user access to nursing information. Building on the Detroit Area Library Network (DALNET) structure, additional computer databases have been added to the Library User Information System (LUIS) to allow faculty and student access from remote locations. With university identification, faculty and students access up-to-date literature-searching tools and check the availability of desired journal articles at multiple locations throughout the large tri-county area.

  13. Quantum Walk Schemes for Universal Quantum Computation

    NASA Astrophysics Data System (ADS)

    Underwood, Michael S.

    Random walks are a powerful tool for the efficient implementation of algorithms in classical computation. Their quantum-mechanical analogues, called quantum walks, hold similar promise. Quantum walks provide a model of quantum computation that has recently been shown to be equivalent in power to the standard circuit model. As in the classical case, quantum walks take place on graphs and can undergo discrete or continuous evolution, though quantum evolution is unitary and therefore deterministic until a measurement is made. This thesis considers the usefulness of continuous-time quantum walks to quantum computation from the perspectives of both their fundamental power under various formulations, and their applicability in practical experiments. In one extant scheme, logical gates are effected by scattering processes. The results of an exhaustive search for single-qubit operations in this model are presented. It is shown that the number of distinct operations increases exponentially with the number of vertices in the scattering graph. A catalogue of all graphs on up to nine vertices that implement single-qubit unitaries at a specific set of momenta is included in an appendix. I develop a novel scheme for universal quantum computation called the discontinuous quantum walk, in which a continuous-time quantum walker takes discrete steps of evolution via perfect quantum state transfer through small 'widget' graphs. The discontinuous quantum-walk scheme requires an exponentially sized graph, as do prior discrete and continuous schemes. To eliminate the inefficient vertex resource requirement, a computation scheme based on multiple discontinuous walkers is presented. In this model, n interacting walkers inhabiting a graph with 2n vertices can implement an arbitrary quantum computation on an input of length n, an exponential savings over previous universal quantum walk schemes. This is the first quantum walk scheme that allows for the application of quantum error correction

  14. Authenticated IGMP for Controlling Access to Multicast Distribution Tree

    NASA Astrophysics Data System (ADS)

    Park, Chang-Seop; Kang, Hyun-Sun

    A receiver access control scheme is proposed to protect the multicast distribution tree from DoS attack induced by unauthorized use of IGMP, by extending the security-related functionality of IGMP. Based on a specific network and business model adopted for commercial deployment of IP multicast applications, a key management scheme is also presented for bootstrapping the proposed access control as well as accounting and billing for CP (Content Provider), NSP (Network Service Provider), and group members.

  15. Multiple image encryption by phase retrieval

    NASA Astrophysics Data System (ADS)

    Di, Hong; Kang, Yanmei; Liu, Yueqin; Zhang, Xin

    2016-07-01

    Multiple image encryption (MIE) was proposed to increase the efficiency of encrypting images by processing several images simultaneously. Because of the advantage of optical technology in processing twodimensional images at high throughput, MIE has been significantly improved by use of methods originating from optics. Phase retrieval was the process of algorithmically finding solutions to the phase loss problem due to light detectors only capturing the intensity. It was to retrieve phase information for the determination of a structure from diffraction data. Error-reduction algorithm is a typical phase retrieval method. Here, we employ it to illustrate that methods in phase retrieval are able to encrypt multiple images and compress them into encrypted data simultaneously. Moreover, the decryption is also designed to handle multiple images at the same time. The whole process including both the encryption and decryption is proposed to improve MIE with respect to the compression and efficiency. The feasibility and encryption of the MIE scheme is demonstrated with encryption experiments under Gaussian white noise and unauthorized access.

  16. Joint Access Control Based on Access Ratio and Resource Utilization for High-Speed Railway Communications

    NASA Astrophysics Data System (ADS)

    Zhou, Yuzhe; Ai, Bo

    2015-05-01

    The fast development of high-speed rails makes people's life more and more convenient. However, provisioning of quality of service of multimedia applications for users on the high-speed train is a critical task for wireless communications. Therefore, new solutions are desirable to be found to address this kind of problem. Current researches mainly focus on providing seamless broadband wireless access for high-speed mobile terminals. In this paper, an algorithm to calculate the optimal resource reservation fraction of handovers is proposed. A joint access control scheme for high-speed railway communication handover scenario is proposed. Metrics of access ratio and resource utilization ratio are considered jointly in the analysis and the performance evaluation. Simulation results show that the proposed algorithm and the scheme improve quality of service compared with other conventional schemes.

  17. A new flux splitting scheme

    NASA Technical Reports Server (NTRS)

    Liou, Meng-Sing; Steffen, Christopher J., Jr.

    1991-01-01

    A new flux splitting scheme is proposed. The scheme is remarkably simple and yet its accuracy rivals and in some cases surpasses that of Roe's solver in the Euler and Navier-Stokes solutions performed in this study. The scheme is robust and converges as fast as the Roe splitting. An approximately defined cell-face advection Mach number is proposed using values from the two straddling cells via associated characteristic speeds. This interface Mach number is then used to determine the upwind extrapolation for the convective quantities. Accordingly, the name of the scheme is coined as Advection Upstream Splitting Method (AUSM). A new pressure splitting is introduced which is shown to behave successfully, yielding much smoother results than other existing pressure splittings. Of particular interest is the supersonic blunt body problem in which the Roe scheme gives anomalous solutions. The AUSM produces correct solutions without difficulty for a wide range of flow conditions as well as grids.

  18. Multiple Object Based RFID System Using Security Level

    NASA Astrophysics Data System (ADS)

    Kim, Jiyeon; Jung, Jongjin; Ryu, Ukjae; Ko, Hoon; Joe, Susan; Lee, Yongjun; Kim, Boyeon; Chang, Yunseok; Lee, Kyoonha

    2007-12-01

    RFID systems are increasingly applied for operational convenience in wide range of industries and individual life. However, it is uneasy for a person to control many tags because common RFID systems have the restriction that a tag used to identify just a single object. In addition, RFID systems can make some serious problems in violation of privacy and security because of their radio frequency communication. In this paper, we propose a multiple object RFID tag which can keep multiple object identifiers for different applications in a same tag. The proposed tag allows simultaneous access for their pair applications. We also propose an authentication protocol for multiple object tag to prevent serious problems of security and privacy in RFID applications. Especially, we focus on efficiency of the authentication protocol by considering security levels of applications. In the proposed protocol, the applications go through different authentication procedures according to security level of the object identifier stored in the tag. We implemented the proposed RFID scheme and made experimental results about efficiency and stability for the scheme.

  19. Efficient spares matrix multiplication scheme for the CYBER 203

    NASA Technical Reports Server (NTRS)

    Lambiotte, J. J., Jr.

    1984-01-01

    This work has been directed toward the development of an efficient algorithm for performing this computation on the CYBER-203. The desire to provide software which gives the user the choice between the often conflicting goals of minimizing central processing (CPU) time or storage requirements has led to a diagonal-based algorithm in which one of three types of storage is selected for each diagonal. For each storage type, an initialization sub-routine estimates the CPU and storage requirements based upon results from previously performed numerical experimentation. These requirements are adjusted by weights provided by the user which reflect the relative importance the user places on the resources. The three storage types employed were chosen to be efficient on the CYBER-203 for diagonals which are sparse, moderately sparse, or dense; however, for many densities, no diagonal type is most efficient with respect to both resource requirements. The user-supplied weights dictate the choice.

  20. Sampling scheme for pyrethroids on multiple surfaces on commercial aircrafts

    PubMed Central

    MOHAN, KRISHNAN R.; WEISEL, CLIFFORD P.

    2015-01-01

    A wipe sampler for the collection of permethrin from soft and hard surfaces has been developed for use in aircraft. “Disinsection” or application of pesticides, predominantly pyrethrods, inside commercial aircraft is routinely required by some countries and is done on an as-needed basis by airlines resulting in potential pesticide dermal and inhalation exposures to the crew and passengers. A wipe method using filter paper and water was evaluated for both soft and hard aircraft surfaces. Permethrin was analyzed by GC/MS after its ultrasonication extraction from the sampling medium into hexane and volume reduction. Recoveries, based on spraying known levels of permethrin, were 80–100% from table trays, seat handles and rugs; and 40–50% from seat cushions. The wipe sampler is easy to use, requires minimum training, is compatible with the regulations on what can be brought through security for use on commercial aircraft, and readily adaptable for use in residential and other settings. PMID:19756041

  1. Multiple Multi-Qubit Quantum States Sharing

    NASA Astrophysics Data System (ADS)

    Qin, Hua-Wang; Dai, Yue-Wei

    2016-04-01

    A multiple multi-qubit quantum states sharing scheme is proposed, in which the dealer can share multiple multi-qubit quantum states among the participants through only one distribution and one recovery. The dealer encodes the secret quantum states into a special entangled state, and then distributes the particles of the entangled state to the participants. The participants perform the single-particle measurements on their particles, and can cooperate to recover the multiple multi-qubit quantum states. Compared to the existing schemes, our scheme is more efficient and more flexible in practice.

  2. Scheme for Quantum Computing Immune to Decoherence

    NASA Technical Reports Server (NTRS)

    Williams, Colin; Vatan, Farrokh

    2008-01-01

    A constructive scheme has been devised to enable mapping of any quantum computation into a spintronic circuit in which the computation is encoded in a basis that is, in principle, immune to quantum decoherence. The scheme is implemented by an algorithm that utilizes multiple physical spins to encode each logical bit in such a way that collective errors affecting all the physical spins do not disturb the logical bit. The scheme is expected to be of use to experimenters working on spintronic implementations of quantum logic. Spintronic computing devices use quantum-mechanical spins (typically, electron spins) to encode logical bits. Bits thus encoded (denoted qubits) are potentially susceptible to errors caused by noise and decoherence. The traditional model of quantum computation is based partly on the assumption that each qubit is implemented by use of a single two-state quantum system, such as an electron or other spin-1.2 particle. It can be surprisingly difficult to achieve certain gate operations . most notably, those of arbitrary 1-qubit gates . in spintronic hardware according to this model. However, ironically, certain 2-qubit interactions (in particular, spin-spin exchange interactions) can be achieved relatively easily in spintronic hardware. Therefore, it would be fortunate if it were possible to implement any 1-qubit gate by use of a spin-spin exchange interaction. While such a direct representation is not possible, it is possible to achieve an arbitrary 1-qubit gate indirectly by means of a sequence of four spin-spin exchange interactions, which could be implemented by use of four exchange gates. Accordingly, the present scheme provides for mapping any 1-qubit gate in the logical basis into an equivalent sequence of at most four spin-spin exchange interactions in the physical (encoded) basis. The complexity of the mathematical derivation of the scheme from basic quantum principles precludes a description within this article; it must suffice to report

  3. Entropy-bounded discontinuous Galerkin scheme for Euler equations

    NASA Astrophysics Data System (ADS)

    Lv, Yu; Ihme, Matthias

    2015-08-01

    An entropy-bounded Discontinuous Galerkin (EBDG) scheme is proposed in which the solution is regularized by constraining the entropy. The resulting scheme is able to stabilize the solution in the vicinity of discontinuities and retains the optimal accuracy for smooth solutions. The properties of the limiting operator according to the entropy-minimum principle are proofed, and an optimal CFL-criterion is derived. We provide a rigorous description for locally imposing entropy constraints to capture multiple discontinuities. Significant advantages of the EBDG-scheme are the general applicability to arbitrary high-order elements and its simple implementation for multi-dimensional configurations. Numerical tests confirm the properties of the scheme, and particular focus is attributed to the robustness in treating discontinuities on arbitrary meshes.

  4. Modulation scheme for electron-electron double resonance spectroscopy

    NASA Astrophysics Data System (ADS)

    Mehlkopf, A. F.; Kuiper, F. G.; Smidt, J.; Tiggelman, T. A.

    1983-06-01

    A modulation scheme for electron-electron double resonance (ELDOR) spectrometers is presented. With this scheme an optimum stabilization signal for locking the pump microwave generator to the pumped electron paramagnetic resonance (EPR) line is generated. A separate pump power level and a separate magnetic field modulation amplitude are used for the purpose of locking. In general, such a modulation scheme introduces false ELDOR lines. These false lines disturb the real ELDOR signals, or introduce an ELDOR signal in the absence of any communication between the observed EPR line and the pumped EPR line. With the described modulation scheme the frequencies of the false ELDOR signals are limited to even multiples of the frequency of the wanted ELDOR signals. This makes a suppression of the false ELDOR lines easy.

  5. Accessing and visualizing scientific spatiotemporal data

    NASA Technical Reports Server (NTRS)

    Katz, Daniel S.; Bergou, Attila; Berriman, G. Bruce; Block, Gary L.; Collier, Jim; Curkendall, David W.; Good, John; Husman, Laura; Jacob, Joseph C.; Laity, Anastasia; Li, P. Peggy; Miller, Craig; Prince, Tom; Siegel, Herb; Williams, Roy

    2004-01-01

    This paper discusses work done by JPL's Parallel Applications Technologies Group in helping scientists access and visualize very large data sets through the use of multiple computing resources, such as parallel supercomputers, clusters, and grids.

  6. A Novel Phase Rotation Scheme on the Constellations for the E-UTRA Uplink ACK/NACK Signals

    NASA Astrophysics Data System (ADS)

    Nakao, Seigo; Takata, Tomohumi; Imamura, Daichi; Hiramatsu, Katsuhiko

    Hybrid automatic repeat request (HARQ) is employed for the Evolved Universal Terrestrial Radio Access (E-UTRA) downlink. The ACK/NACK signals from each user equipment (UE) are multiplexed by code division multiple access (CDMA) and transmitted via a physical uplink control channel (PUCCH). The ACK/NACK signals are code spread by the cyclic shift (CS) sequences made from zero auto-correlation (ZAC) sequences; however, the orthogonality of these sequences is not guaranteed depending on the propagation channels; moreover, the amount of inter-code interference (ICI) depends on the delay spread of the channel and the transmitting timing control error of each UE. In the conventional PUCCH structure, ICI between two ACK signals does not degrade their detection performance, whereas ICI between an ACK signal and a NACK signal degrades the detection performance. This causes a serious gap between the detection performances of ACK and NACK signals, because generally in a PUCCH, there are more ACK signals than NACK signals. In this paper, we propose a novel phase rotation scheme on the constellations of ACK/NACK signals that can resolve this issue, and the simulation evaluation results confirm the benefits of the proposed phase rotation scheme.

  7. A novel encoded excitation scheme in a phased array for the improving data acquisition rate.

    PubMed

    Gutiérrez-Fernández, César; Jiménez, Ana; Martín-Arguedas, Carlos Julián; Ureña, Jesús; Hernández, Álvaro

    2013-12-31

    One of the challenges of phased array (PA) ultrasonic imaging systems is their limited capability to deal with real-time applications, such as echocardiography and obstetrics. In its most basic outline, these systems require emitting and receiving with the entire array for each image line to be acquired; therefore, with many image lines, a higher acquisition time and a lower frame rate. This constraint requires one to find alternatives to reduce the total number of emissions needed to obtain the whole image. In this work, we propose a new PA scheme based on the Code Division Multiple Access (CDMA) technique, where a different code is assigned to each steering direction, allowing the array to emit in several directions simultaneously. However, the use of encoding techniques produces a reduction of the image contrast because of the interferences between codes. To solve this, a new scheme based on merging several images is proposed, allowing the system to get close to the theoretical maximum frame rate, as well as to limit the loss of contrast, intrinsic to the technique.

  8. A Novel Encoded Excitation Scheme in a Phased Array for The Improving Data Acquisition Rate

    PubMed Central

    Gutiérrez-Fernández, César; Jiménez, Ana; Martín-Arguedas, Carlos Julián; Ureña, Jesús; Hernández, Álvaro

    2014-01-01

    One of the challenges of phased array (PA) ultrasonic imaging systems is their limited capability to deal with real-time applications, such as echocardiography and obstetrics. In its most basic outline, these systems require emitting and receiving with the entire array for each image line to be acquired; therefore, with many image lines, a higher acquisition time and a lower frame rate. This constraint requires one to find alternatives to reduce the total number of emissions needed to obtain the whole image. In this work, we propose a new PA scheme based on the Code Division Multiple Access (CDMA) technique, where a different code is assigned to each steering direction, allowing the array to emit in several directions simultaneously. However, the use of encoding techniques produces a reduction of the image contrast because of the interferences between codes. To solve this, a new scheme based on merging several images is proposed, allowing the system to get close to the theoretical maximum frame rate, as well as to limit the loss of contrast, intrinsic to the technique. PMID:24385031

  9. A study on Data Transmission Scheme for High Functional Railway Signaling System

    NASA Astrophysics Data System (ADS)

    Ishikawa, Ryo; Sano, Minoru; Mochizuki, Hiroshi; Nakamura, Hideo

    Railway signaling systems that transmit control information via rails have been deployed in many applications, for example, digital automatic train control (ATC) systems for controlling train speed. Since the performance of digital ATC systems depends on the signal transmission speed, recently there have been many studies aimed at realizing high-speed data transmission. However, it is difficult to increase the transmission speed because rails have strong attenuation in proportion to an increase of the frequency. In this paper, we aimed to increase the transmission speed by improving the modulation scheme to overcome these limitations. We proposed CDMA-QAM method that is combined code-division multiple access (CDMA) and quadrature amplitude modulation (QAM). And we evaluated in a field trial the CDMA-QAM rail transmission device developed using DSP. On the other hand, an analog ATC based on an amplitude modulation (AM) is still employed in some railway lines. It is difficult for their lines to introduce the digital signal due to track circuit configurations and interoperability conditions. So we studied a data transmission scheme that makes it possible to mix an analog signal and a digital signal, and evaluated the influence given to both signals using a developed device that generates the mixed signal of analog and digital signal.

  10. Don’t make cache too complex: A simple probability-based cache management scheme for SSDs

    PubMed Central

    Cho, Sangyeun; Choi, Jongmoo

    2017-01-01

    Solid-state drives (SSDs) have recently become a common storage component in computer systems, and they are fueled by continued bit cost reductions achieved with smaller feature sizes and multiple-level cell technologies. However, as the flash memory stores more bits per cell, the performance and reliability of the flash memory degrade substantially. To solve this problem, a fast non-volatile memory (NVM-)based cache has been employed within SSDs to reduce the long latency required to write data. Absorbing small writes in a fast NVM cache can also reduce the number of flash memory erase operations. To maximize the benefits of an NVM cache, it is important to increase the NVM cache utilization. In this paper, we propose and study ProCache, a simple NVM cache management scheme, that makes cache-entrance decisions based on random probability testing. Our scheme is motivated by the observation that frequently written hot data will eventually enter the cache with a high probability, and that infrequently accessed cold data will not enter the cache easily. Owing to its simplicity, ProCache is easy to implement at a substantially smaller cost than similar previously studied techniques. We evaluate ProCache and conclude that it achieves comparable performance compared to a more complex reference counter-based cache-management scheme. PMID:28358897

  11. Community health insurance schemes & patient satisfaction - evidence from India

    PubMed Central

    Devadasan, N.; Criel, Bart; Damme, Wim Van; Lefevre, Pierre; Manoharan, S.; der Stuyft, Patrick Van

    2011-01-01

    Background & objectives: Quality of care is an important determinant for utilizing health services. In India, the quality of care in most health services is poor. The government recognizes this and has been working on both supply and demand aspects. In particular, it is promoting community health insurance (CHI) schemes, so that patients can access quality services. This observational study was undertaken to measure the level of satisfaction among insured and uninsured patients in two CHI schemes in India. Methods: Patient satisfaction was measured, which is an outcome of good quality care. Two CHI schemes, Action for Community Organisation, Rehabilitation and Development (ACCORD) and Kadamalai Kalanjiam Vattara Sangam (KKVS), were chosen. Randomly selected, insured and uninsured households were interviewed. The household where a patient was admitted to a hospital was interviewed in depth about the health seeking behaviour, the cost of treatment and the satisfaction levels. Results: It was found that at both ACCORD and KKVS, there was no significant difference in the levels of satisfaction between the insured and uninsured patients. The main reasons for satisfaction were the availability of doctors and medicines and the recovery by the patient. Interpretation & conclusions: Our study showed that insured hospitalized patients did not have significantly higher levels of satisfaction compared to uninsured hospitalized patients. If CHI schemes want to improve the quality of care for their clients, so that they adhere to the scheme, the scheme managers need to negotiate actively for better quality of care with empanelled providers. PMID:21321418

  12. Module partitioning and interlaced data placement schemes to reduce conflicts in interleaved memories

    SciTech Connect

    Kurian, L.; Choi, B.; Hulina, P.T.; Coraor, L.D.

    1994-12-31

    In interleaved memories, interference between concurrently active vector streams results in memory bank conflicts and reduced bandwidth. In this paper, we present two schemes for reducing inter-vector interference. First, we propose a memory module partitioning technique in which disjoint access sets are created for each of the concurrent vectors. Various properties of the involved address mapping are presented. Then we present an interlaced data placement scheme, where the simultaneously accessed vectors are interlaced and stored to the memory. Performance of the two schemes are evaluated by trace driven simulation. It is observed that the schemes have significant merit in reducing the interference in interleaved memories and increasingly the effective memory bandwidth. The schemes are applicable to memory systems for superscalar processors, vector supercomputers and parallel processors.

  13. Small Satellite Access of the Space Network

    NASA Technical Reports Server (NTRS)

    Horan, Stephen; Minnix, Timothy O.; Vigil, J. S.

    1999-01-01

    Small satellites have been perceived as having limited access to NASA's Space Network (SN). The potential for satellite access of the space network when the design utilizes a fixed antenna configuration and low-power, coded transmission is analyzed. From the analysis, satellites using this configuration in high-inclination orbits are shown to have a daily data throughput in the 100 to 1000 Mbit range using the multiple access communications service.

  14. Differential Space-Time Coding Scheme Using Star Quadrature Amplitude Modulation Method

    NASA Astrophysics Data System (ADS)

    Yu, Xiangbin; Xu, DaZhuan; Bi, Guangguo

    2006-12-01

    Differential space-time coding (DSTC) has received much interest as it obviates the requirement of the channel state information at the receiver while maintaining the desired properties of space-time coding techniques. In this paper, by introducing star quadrature amplitude modulation (star QAM) method, two kinds of multiple amplitudes DSTC schemes are proposed. One is based on differential unitary space-time coding (DUSTC) scheme, and the other is based on differential orthogonal space-time coding (DOSTC) scheme. Corresponding bit-error-rate (BER) performance and coding-gain analysis are given, respectively. The proposed schemes can avoid the performance loss of conventional DSTC schemes based on phase-shift keying (PSK) modulation in high spectrum efficiency via multiple amplitudes modulation. Compared with conventional PSK-based DSTC schemes, the developed schemes have higher spectrum efficiency via carrying information not only on phases but also on amplitudes, and have higher coding gain. Moreover, the first scheme can implement low-complexity differential modulation and different code rates and be applied to any number of transmit antennas; while the second scheme has simple decoder and high code rate in the case of 3 and 4 antennas. The simulation results show that our schemes have lower BER when compared with conventional DUSTC and DOSTC schemes.

  15. Improved pKa calculations through flexibility based sampling of a water-dominated interaction scheme.

    PubMed

    Warwicker, Jim

    2004-10-01

    Ionizable groups play critical roles in biological processes. Computation of pK(a)s is complicated by model approximations and multiple conformations. Calculated and experimental pK(a)s are compared for relatively inflexible active-site side chains, to develop an empirical model for hydration entropy changes upon charge burial. The modification is found to be generally small, but large for cysteine, consistent with small molecule ionization data and with partial charge distributions in ionized and neutral forms. The hydration model predicts significant entropic contributions for ionizable residue burial, demonstrated for components in the pyruvate dehydrogenase complex. Conformational relaxation in a pH-titration is estimated with a mean-field assessment of maximal side chain solvent accessibility. All ionizable residues interact within a low protein dielectric finite difference (FD) scheme, and more flexible groups also access water-mediated Debye-Hückel (DH) interactions. The DH method tends to match overall pH-dependent stability, while FD can be more accurate for active-site groups. Tolerance for side chain rotamer packing is varied, defining access to DH interactions, and the best fit with experimental pK(a)s obtained. The new (FD/DH) method provides a fast computational framework for making the distinction between buried and solvent-accessible groups that has been qualitatively apparent from previous work, and pK(a) calculations are significantly improved for a mixed set of ionizable residues. Its effectiveness is also demonstrated with computation of the pH-dependence of electrostatic energy, recovering favorable contributions to folded state stability and, in relation to structural genomics, with substantial improvement (reduction of false positives) in active-site identification by electrostatic strain.

  16. Relaxation schemes for Chebyshev spectral multigrid methods

    NASA Technical Reports Server (NTRS)

    Kang, Yimin; Fulton, Scott R.

    1993-01-01

    Two relaxation schemes for Chebyshev spectral multigrid methods are presented for elliptic equations with Dirichlet boundary conditions. The first scheme is a pointwise-preconditioned Richardson relaxation scheme and the second is a line relaxation scheme. The line relaxation scheme provides an efficient and relatively simple approach for solving two-dimensional spectral equations. Numerical examples and comparisons with other methods are given.

  17. Privacy protection schemes for fingerprint recognition systems

    NASA Astrophysics Data System (ADS)

    Marasco, Emanuela; Cukic, Bojan

    2015-05-01

    The deployment of fingerprint recognition systems has always raised concerns related to personal privacy. A fingerprint is permanently associated with an individual and, generally, it cannot be reset if compromised in one application. Given that fingerprints are not a secret, potential misuses besides personal recognition represent privacy threats and may lead to public distrust. Privacy mechanisms control access to personal information and limit the likelihood of intrusions. In this paper, image- and feature-level schemes for privacy protection in fingerprint recognition systems are reviewed. Storing only key features of a biometric signature can reduce the likelihood of biometric data being used for unintended purposes. In biometric cryptosystems and biometric-based key release, the biometric component verifies the identity of the user, while the cryptographic key protects the communication channel. Transformation-based approaches only a transformed version of the original biometric signature is stored. Different applications can use different transforms. Matching is performed in the transformed domain which enable the preservation of low error rates. Since such templates do not reveal information about individuals, they are referred to as cancelable templates. A compromised template can be re-issued using a different transform. At image-level, de-identification schemes can remove identifiers disclosed for objectives unrelated to the original purpose, while permitting other authorized uses of personal information. Fingerprint images can be de-identified by, for example, mixing fingerprints or removing gender signature. In both cases, degradation of matching performance is minimized.

  18. A Data Gathering Scheme in Wireless Sensor Networks Based on Synchronization of Chaotic Spiking Oscillator Networks

    SciTech Connect

    Nakano, Hidehiro; Utani, Akihide; Miyauchi, Arata; Yamamoto, Hisao

    2011-04-19

    This paper studies chaos-based data gathering scheme in multiple sink wireless sensor networks. In the proposed scheme, each wireless sensor node has a simple chaotic oscillator. The oscillators generate spike signals with chaotic interspike intervals, and are impulsively coupled by the signals via wireless communication. Each wireless sensor node transmits and receives sensor information only in the timing of the couplings. The proposed scheme can exhibit various chaos synchronous phenomena and their breakdown phenomena, and can effectively gather sensor information with the significantly small number of transmissions and receptions compared with the conventional scheme. Also, the proposed scheme can flexibly adapt various wireless sensor networks not only with a single sink node but also with multiple sink nodes. This paper introduces our previous works. Through simulation experiments, we show effectiveness of the proposed scheme and discuss its development potential.

  19. Security enhancement of a biometric based authentication scheme for telecare medicine information systems with nonce.

    PubMed

    Mishra, Dheerendra; Mukhopadhyay, Sourav; Kumari, Saru; Khan, Muhammad Khurram; Chaturvedi, Ankita

    2014-05-01

    Telecare medicine information systems (TMIS) present the platform to deliver clinical service door to door. The technological advances in mobile computing are enhancing the quality of healthcare and a user can access these services using its mobile device. However, user and Telecare system communicate via public channels in these online services which increase the security risk. Therefore, it is required to ensure that only authorized user is accessing the system and user is interacting with the correct system. The mutual authentication provides the way to achieve this. Although existing schemes are either vulnerable to attacks or they have higher computational cost while an scalable authentication scheme for mobile devices should be secure and efficient. Recently, Awasthi and Srivastava presented a biometric based authentication scheme for TMIS with nonce. Their scheme only requires the computation of the hash and XOR functions.pagebreak Thus, this scheme fits for TMIS. However, we observe that Awasthi and Srivastava's scheme does not achieve efficient password change phase. Moreover, their scheme does not resist off-line password guessing attack. Further, we propose an improvement of Awasthi and Srivastava's scheme with the aim to remove the drawbacks of their scheme.

  20. A design of tamper resistant prescription RFID access control system.

    PubMed

    Chen, Yu-Yi; Huang, Der-Chen; Tsai, Meng-Lin; Jan, Jinn-Ke

    2012-10-01

    In this paper, we propose a tamper resistant prescription RFID access control protocol for different authorized readers. Not only the authentication mechanism but also the access right authorization mechanism is designed in our scheme. Only the specific doctor, usually the patient's doctor, can access the tag. Moreover, some related information of patient's prescription is attached to a RFID tag for tamper resistance. The patients' rights will be guaranteed.

  1. High resolution schemes for hyperbolic conservation laws

    NASA Technical Reports Server (NTRS)

    Harten, A.

    1983-01-01

    A class of new explicit second order accurate finite difference schemes for the computation of weak solutions of hyperbolic conservation laws is presented. These highly nonlinear schemes are obtained by applying a nonoscillatory first order accurate scheme to an appropriately modified flux function. The so-derived second order accurate schemes achieve high resolution while preserving the robustness of the original nonoscillatory first order accurate scheme. Numerical experiments are presented to demonstrate the performance of these new schemes.

  2. On applications of chimera grid schemes to store separation

    NASA Technical Reports Server (NTRS)

    Cougherty, F. C.; Benek, J. A.; Steger, J. L.

    1985-01-01

    A finite difference scheme which uses multiple overset meshes to simulate the aerodynamics of aircraft/store interaction and store separation is described. In this chimera, or multiple mesh, scheme, a complex configuration is mapped using a major grid about the main component of the configuration, and minor overset meshes are used to map each additional component such as a store. As a first step in modeling the aerodynamics of store separation, two dimensional inviscid flow calculations were carried out in which one of the minor meshes is allowed to move with respect to the major grid. Solutions of calibrated two dimensional problems indicate that allowing one mesh to move with respect to another does not adversely affect the time accuracy of an unsteady solution. Steady, inviscid three dimensional computations demonstrate the capability to simulate complex configurations, including closely packed multiple bodies.

  3. Epistemological Access through Lecture Materials in Multiple Modes and Language Varieties: The Role of Ideologies and Multilingual Literacy Practices in Student Evaluations of Such Materials at a South African University

    ERIC Educational Resources Information Center

    Antia, Bassey E.; Dyers, Charlyn

    2016-01-01

    This paper seeks to address the ways in which ideology and literacy practices shape the responses of students to an ongoing initiative at the University of the Western Cape aimed at diversifying options for epistemological access, specifically the language varieties and the modes in which parts of the curriculum for a third year linguistics module…

  4. Factors affecting sustainability of rural water schemes in Swaziland

    NASA Astrophysics Data System (ADS)

    Peter, Graciana; Nkambule, Sizwe E.

    The Millennium Development Goal (MDG) target to reduce the proportion of people without sustainable access to safe drinking water by the year 2015 has been met as of 2010, but huge disparities exist. Some regions, particularly Sub-Saharan Africa are lagging behind it is also in this region where up to 30% of the rural schemes are not functional at any given time. There is need for more studies on factors affecting sustainability and necessary measures which when implemented will improve the sustainability of rural water schemes. The main objective of this study was to assess the main factors affecting the sustainability of rural water schemes in Swaziland using a Multi-Criteria Analysis Approach. The main factors considered were: financial, social, technical, environmental and institutional. The study was done in Lubombo region. Fifteen functional water schemes in 11 communities were studied. Data was collected using questionnaires, checklist and focused group discussion guide. A total of 174 heads of households were interviewed. Statistical Package for Social Sciences (SPSS) was used to analyse the data and to calculate sustainability scores for water schemes. SPSS was also used to classify sustainability scores according to sustainability categories: sustainable, partially sustainable and non-sustainable. The averages of the ratings for the different sub-factors studied and the results on the sustainability scores for the sustainable, partially sustainable and non-sustainable schemes were then computed and compared to establish the main factors influencing sustainability of the water schemes. The results indicated technical and social factors as most critical while financial and institutional, although important, played a lesser role. Factors which contributed to the sustainability of water schemes were: functionality; design flow; water fetching time; ability to meet additional demand; use by population; equity; participation in decision making on operation and

  5. Consolidating the social health insurance schemes in China: towards an equitable and efficient health system.

    PubMed

    Meng, Qingyue; Fang, Hai; Liu, Xiaoyun; Yuan, Beibei; Xu, Jin

    2015-10-10

    Fragmentation in social health insurance schemes is an important factor for inequitable access to health care and financial protection for people covered by different health insurance schemes in China. To fulfil its commitment of universal health coverage by 2020, the Chinese Government needs to prioritise addressing this issue. After analysing the situation of fragmentation, this Review summarises efforts to consolidate health insurance schemes both in China and internationally. Rural migrants, elderly people, and those with non-communicable diseases in China will greatly benefit from consolidation of the existing health insurance schemes with extended funding pools, thereby narrowing the disparities among health insurance schemes in fund level and benefit package. Political commitments, institutional innovations, and a feasible implementation plan are the major elements needed for success in consolidation. Achievement of universal health coverage in China needs systemic strategies including consolidation of the social health insurance schemes.

  6. Optimal probabilistic dense coding schemes

    NASA Astrophysics Data System (ADS)

    Kögler, Roger A.; Neves, Leonardo

    2017-04-01

    Dense coding with non-maximally entangled states has been investigated in many different scenarios. We revisit this problem for protocols adopting the standard encoding scheme. In this case, the set of possible classical messages cannot be perfectly distinguished due to the non-orthogonality of the quantum states carrying them. So far, the decoding process has been approached in two ways: (i) The message is always inferred, but with an associated (minimum) error; (ii) the message is inferred without error, but only sometimes; in case of failure, nothing else is done. Here, we generalize on these approaches and propose novel optimal probabilistic decoding schemes. The first uses quantum-state separation to increase the distinguishability of the messages with an optimal success probability. This scheme is shown to include (i) and (ii) as special cases and continuously interpolate between them, which enables the decoder to trade-off between the level of confidence desired to identify the received messages and the success probability for doing so. The second scheme, called multistage decoding, applies only for qudits ( d-level quantum systems with d>2) and consists of further attempts in the state identification process in case of failure in the first one. We show that this scheme is advantageous over (ii) as it increases the mutual information between the sender and receiver.

  7. Nonlinear Secret Image Sharing Scheme

    PubMed Central

    Shin, Sang-Ho; Yoo, Kee-Young

    2014-01-01

    Over the past decade, most of secret image sharing schemes have been proposed by using Shamir's technique. It is based on a linear combination polynomial arithmetic. Although Shamir's technique based secret image sharing schemes are efficient and scalable for various environments, there exists a security threat such as Tompa-Woll attack. Renvall and Ding proposed a new secret sharing technique based on nonlinear combination polynomial arithmetic in order to solve this threat. It is hard to apply to the secret image sharing. In this paper, we propose a (t, n)-threshold nonlinear secret image sharing scheme with steganography concept. In order to achieve a suitable and secure secret image sharing scheme, we adapt a modified LSB embedding technique with XOR Boolean algebra operation, define a new variable m, and change a range of prime p in sharing procedure. In order to evaluate efficiency and security of proposed scheme, we use the embedding capacity and PSNR. As a result of it, average value of PSNR and embedding capacity are 44.78 (dB) and 1.74t⌈log2⁡m⌉ bit-per-pixel (bpp), respectively. PMID:25140334

  8. Nonlinear secret image sharing scheme.

    PubMed

    Shin, Sang-Ho; Lee, Gil-Je; Yoo, Kee-Young

    2014-01-01

    Over the past decade, most of secret image sharing schemes have been proposed by using Shamir's technique. It is based on a linear combination polynomial arithmetic. Although Shamir's technique based secret image sharing schemes are efficient and scalable for various environments, there exists a security threat such as Tompa-Woll attack. Renvall and Ding proposed a new secret sharing technique based on nonlinear combination polynomial arithmetic in order to solve this threat. It is hard to apply to the secret image sharing. In this paper, we propose a (t, n)-threshold nonlinear secret image sharing scheme with steganography concept. In order to achieve a suitable and secure secret image sharing scheme, we adapt a modified LSB embedding technique with XOR Boolean algebra operation, define a new variable m, and change a range of prime p in sharing procedure. In order to evaluate efficiency and security of proposed scheme, we use the embedding capacity and PSNR. As a result of it, average value of PSNR and embedding capacity are 44.78 (dB) and 1.74t⌈log2 m⌉ bit-per-pixel (bpp), respectively.

  9. Acceleration of neutrons in a scheme of a tautochronous mathematical pendulum (physical principles)

    SciTech Connect

    Rivlin, Lev A

    2010-12-09

    We consider the physical principles of neutron acceleration through a multiple synchronous interaction with a gradient rf magnetic field in a scheme of a tautochronous mathematical pendulum. (laser applications and other aspects of quantum electronics)

  10. A Hybrid Nonlinear Control Scheme for Active Magnetic Bearings

    NASA Technical Reports Server (NTRS)

    Xia, F.; Albritton, N. G.; Hung, J. Y.; Nelms, R. M.

    1996-01-01

    A nonlinear control scheme for active magnetic bearings is presented in this work. Magnet winding currents are chosen as control inputs for the electromechanical dynamics, which are linearized using feedback linearization. Then, the desired magnet currents are enforced by sliding mode control design of the electromagnetic dynamics. The overall control scheme is described by a multiple loop block diagram; the approach also falls in the class of nonlinear controls that are collectively known as the 'integrator backstepping' method. Control system hardware and new switching power electronics for implementing the controller are described. Various experiments and simulation results are presented to demonstrate the concepts' potentials.

  11. [Artificial nutrition in children (I): enteral access].

    PubMed

    Estevão-Costa, José

    2014-01-01

    Appropriate nutritional support is crucial in the therapeutic approach of multiple conditions, which justifies the frequent and increasing use of specific access routes for enteral and parenteral nutrition. This article reviews the relevant literature concerning indications, procedures, effectiveness and complications of enteral access routes in children. The decision between gastric and postpyloric access, and between nasogastric tube and gastrostomy is thoroughly discussed. Percutaneous endoscopic gastrostomy is the most commonly used technique when a long-term gastric access is required, given its efficacy and safety although the associated morbidity is not negligible;laparoscopic gastrostomy emerges as a potentially advantageous alternative.

  12. Wired/wireless access integrated RoF-PON with scalable generation of multi-frequency MMWs enabled by tunable optical frequency comb.

    PubMed

    Xiang, Yu; Jiang, Ning; Chen, Chen; Zhang, Chongfu; Qiu, Kun

    2013-08-26

    In this paper, a novel wired/wireless access integrated radio-over-fiber passive optical network (RoF-PON) system that utilizes scalable multiple-frequency millimeter-wave (MF-MMW) generation based on tunable optical frequency comb (TOFC) is proposed. The TOFC is performed by cascading a phase modulator (PM) and two intensity modulators (IMs), and with proper selection of the peak-to-peak voltage of the PM, a flat and effective optical comb with tens of frequency lines is achieved. The MF-MMWs are generated by beating the optical comb line pairs with an interval about 60 GHz. The feasibility and scalability of the proposed wired/wireless access integrated RoF-PON scheme are confirmed by the simulations of simultaneous distribution of wired and wireless data with the proposed multiple frequency MMW generation technology.

  13. One-qubit fingerprinting schemes

    SciTech Connect

    Beaudrap, J. Niel de

    2004-02-01

    Fingerprinting is a technique in communication complexity in which two parties (Alice and Bob) with large data sets send short messages to a third party (a referee), who attempts to compute some function of the larger data sets. For the equality function, the referee attempts to determine whether Alice's data and Bob's data are the same. In this paper, we consider the extreme scenario of performing fingerprinting where Alice and Bob both send either one bit (classically) or one qubit (in the quantum regime) messages to the referee for the equality problem. Restrictive bounds are demonstrated for the error probability of one-bit fingerprinting schemes, and show that it is easy to construct one-qubit fingerprinting schemes which can outperform any one-bit fingerprinting scheme. The author hopes that this analysis will provide results useful for performing physical experiments, which may help to advance implementations for more general quantum communication protocols.

  14. Modeling mandatory access control in role-based security systems

    SciTech Connect

    Nyanchama, M.; Osborn, S.

    1996-12-31

    This paper discusses the realization of mandatory access control in role-based protection systems. Starting from the basic definitions of roles, their application in security and the basics of the concept of mandatory access control, we develop a scheme of role-based protection that realizes mandatory access control. The basis of this formulation develops from the recognition that roles can be seen as facilitating access to some given information context. By handling each of the role contexts as independent security levels of information, we simulate mandatory access by imposing the requirements of mandatory access control. Among the key considerations, we propose a means of taming Trojan horses by imposing acyclic information flow among contexts in role-based protection systems. The acyclic information flows and suitable access rules incorporate secrecy which is an essential component of mandatory access control.

  15. Hemodialysis access procedures

    MedlinePlus

    ... returned to your body. Usually the access is put in your arm but it can also go ... A surgeon will put the access in. There are 3 types of access. Fistula: The surgeon joins an artery and vein under the ...

  16. Improved hemodialysis access in children.

    PubMed

    Applebaum, H; Shashikumar, V L; Somers, L A; Baluarte, H J; Gruskin, A B; Grossman, M; McGarvey, M J; Weintraub, W H

    1980-12-01

    Vascular access for chronic hemodialysis in children is difficult because of problems that include obtaining vessels of sufficient size, the limited life-span of external shunts, and the multiple painful punctures associated with internal fistulae. Twenty-five expanded polytetraflouroethylene (PTFE) grafts of 6-mm diameter were inserted for dialysis access over a 2-yr period in 23 children. Grafts were placed either in the upper arm or thigh. Each patient was successfully dialyzed from 60 to 370 times. Longterm patency of the PTFE grafts was 88%, with a complication rate of 36%, mostly minor. The same ease of insertion and high flow characteristics were noted in a series of 22 bovine carotid heterograft (BCH) fistulae inserted in the two years immediately preceeding this study. However, the patency rate was only 36% and the complication rate was 69%, mostly major. We consider the PTFE graft fistula to be the preferred method for long-term hemodialysis access in children.

  17. A provably-secure ECC-based authentication scheme for wireless sensor networks.

    PubMed

    Nam, Junghyun; Kim, Moonseong; Paik, Juryon; Lee, Youngsook; Won, Dongho

    2014-11-06

    A smart-card-based user authentication scheme for wireless sensor networks (in short, a SUA-WSN scheme) is designed to restrict access to the sensor data only to users who are in possession of both a smart card and the corresponding password. While a significant number of SUA-WSN schemes have been suggested in recent years, their intended security properties lack formal definitions and proofs in a widely-accepted model. One consequence is that SUA-WSN schemes insecure against various attacks have proliferated. In this paper, we devise a security model for the analysis of SUA-WSN schemes by extending the widely-accepted model of Bellare, Pointcheval and Rogaway (2000). Our model provides formal definitions of authenticated key exchange and user anonymity while capturing side-channel attacks, as well as other common attacks. We also propose a new SUA-WSN scheme based on elliptic curve cryptography (ECC), and prove its security properties in our extended model. To the best of our knowledge, our proposed scheme is the first SUA-WSN scheme that provably achieves both authenticated key exchange and user anonymity. Our scheme is also computationally competitive with other ECC-based (non-provably secure) schemes.

  18. A Provably-Secure ECC-Based Authentication Scheme for Wireless Sensor Networks

    PubMed Central

    Nam, Junghyun; Kim, Moonseong; Paik, Juryon; Lee, Youngsook; Won, Dongho

    2014-01-01

    A smart-card-based user authentication scheme for wireless sensor networks (in short, a SUA-WSN scheme) is designed to restrict access to the sensor data only to users who are in possession of both a smart card and the corresponding password. While a significant number of SUA-WSN schemes have been suggested in recent years, their intended security properties lack formal definitions and proofs in a widely-accepted model. One consequence is that SUA-WSN schemes insecure against various attacks have proliferated. In this paper, we devise a security model for the analysis of SUA-WSN schemes by extending the widely-accepted model of Bellare, Pointcheval and Rogaway (2000). Our model provides formal definitions of authenticated key exchange and user anonymity while capturing side-channel attacks, as well as other common attacks. We also propose a new SUA-WSN scheme based on elliptic curve cryptography (ECC), and prove its security properties in our extended model. To the best of our knowledge, our proposed scheme is the first SUA-WSN scheme that provably achieves both authenticated key exchange and user anonymity. Our scheme is also computationally competitive with other ECC-based (non-provably secure) schemes. PMID:25384009

  19. United States Access Board

    MedlinePlus

    ... disabilities through leadership in accessible design and the development of accessibility guidelines and standards for the built environment, transportation, communication, medical diagnostic equipment, and information technology. ...

  20. Critical Access Hospitals (CAH)

    MedlinePlus

    ... use requirements for Critical Access Hospitals related to Electronic Health Records (EHRs)? Critical Access Hospital (CAH) are eligible for Electronic Health Record (EHR) incentive payments and can receive ...

  1. An effective BIST scheme for SRAM full speed test

    NASA Astrophysics Data System (ADS)

    Zhang, Lijun; Yu, Yue; Zheng, Jianbin; Song, Xiaoyu

    2011-09-01

    This article presents a novel built-in self-test (BIST) scheme at full speed test where access time test is performed. Based on normal BIST circuits, we harness an all digital phase locked loop to generate a high-frequency clock for static random access memory (SRAM) performance test at full speed. A delay chain is incorporated to achieve the four-phase clock. As inputs to SRAM, clock, address, data are generated in terms of the four-phase clock. Key performance parameters, such as access time, address setup and hold times, are measured. The test chip has been fabricated by United Microelectronics Corporation 55 nm CMOS logic standard process. According to test results, the maximum test frequency is about 1.3 GHz, and the test precision is about 35 ps at the typical process corner with supply voltage 1.0 V and temperature 25°C.

  2. On symmetric and upwind TVD schemes

    NASA Technical Reports Server (NTRS)

    Yee, H. C.

    1985-01-01

    A class of explicit and implicit total variation diminishing (TVD) schemes for the compressible Euler and Navier-Stokes equations was developed. They do not generate spurious oscillations across shocks and contact discontinuities. In general, shocks can be captured within 1 to 2 grid points. For the inviscid case, these schemes are divided into upwind TVD schemes and symmetric (nonupwind) TVD schemes. The upwind TVD scheme is based on the second-order TVD scheme. The symmetric TVD scheme is a generalization of Roe's and Davis' TVD Lax-Wendroff scheme. The performance of these schemes on some viscous and inviscid airfoil steady-state calculations is investigated. The symmetric and upwind TVD schemes are compared.

  3. Improved short adjacent repeat identification using three evolutionary Monte Carlo schemes.

    PubMed

    Xu, Jin; Li, Qiwei; Li, Victor O K; Li, Shuo-Yen Robert; Fan, Xiaodan

    2013-01-01

    This paper employs three Evolutionary Monte Carlo (EMC) schemes to solve the Short Adjacent Repeat Identification Problem (SARIP), which aims to identify the common repeat units shared by multiple sequences. The three EMC schemes, i.e., Random Exchange (RE), Best Exchange (BE), and crossover are implemented on a parallel platform. The simulation results show that compared with the conventional Markov Chain Monte Carlo (MCMC) algorithm, all three EMC schemes can not only shorten the computation time via speeding up the convergence but also improve the solution quality in difficult cases. Moreover, we observe that the performances of different EMC schemes depend on the degeneracy degree of the motif pattern.

  4. A Dewey-Eyed Look at Children's Book Classification: A Comparison of Four Classification Schemes Used in Children's Libraries.

    ERIC Educational Resources Information Center

    Polan, Ruth

    Four classification schemes for subject access to children's books are compared. Two of these are general schemes (the "Dewey Decimal Classification" and the abridged "Dewey Decimal Classification"), and two others were devised specifically for children's books (the Toronto Public Library's "Boys and Girls Book Classification" and the Inglewood…

  5. Upwind Compact Finite Difference Schemes

    NASA Astrophysics Data System (ADS)

    Christie, I.

    1985-07-01

    It was shown by Ciment, Leventhal, and Weinberg ( J. Comput. Phys.28 (1978), 135) that the standard compact finite difference scheme may break down in convection dominated problems. An upwinding of the method, which maintains the fourth order accuracy, is suggested and favorable numerical results are found for a number of test problems.

  6. A Parameter Estimation Scheme for Multiscale Kalman Smoother (MKS) Algorithm Used in Precipitation Data Fusion

    NASA Technical Reports Server (NTRS)

    Wang, Shugong; Liang, Xu

    2013-01-01

    A new approach is presented in this paper to effectively obtain parameter estimations for the Multiscale Kalman Smoother (MKS) algorithm. This new approach has demonstrated promising potentials in deriving better data products based on data of different spatial scales and precisions. Our new approach employs a multi-objective (MO) parameter estimation scheme (called MO scheme hereafter), rather than using the conventional maximum likelihood scheme (called ML scheme) to estimate the MKS parameters. Unlike the ML scheme, the MO scheme is not simply built on strict statistical assumptions related to prediction errors and observation errors, rather, it directly associates the fused data of multiple scales with multiple objective functions in searching best parameter estimations for MKS through optimization. In the MO scheme, objective functions are defined to facilitate consistency among the fused data at multiscales and the input data at their original scales in terms of spatial patterns and magnitudes. The new approach is evaluated through a Monte Carlo experiment and a series of comparison analyses using synthetic precipitation data. Our results show that the MKS fused precipitation performs better using the MO scheme than that using the ML scheme. Particularly, improvements are significant compared to that using the ML scheme for the fused precipitation associated with fine spatial resolutions. This is mainly due to having more criteria and constraints involved in the MO scheme than those included in the ML scheme. The weakness of the original ML scheme that blindly puts more weights onto the data associated with finer resolutions is overcome in our new approach.

  7. Group statistical channel coding dimming scheme in visible light communication system

    NASA Astrophysics Data System (ADS)

    Zhuang, Kaiyu; Huang, Zhitong; Zhang, Ruqi; Li, Jianfeng; Ji, Yuefeng

    2016-10-01

    In this paper, we propose a group statistical channel coding (GSCC) scheme, which achieves dimming by changing the ratio of the 0-1 symbol of the original data stream through probabilistic statistics method. The simulation under various brightness conditions displays that the GSCC maintains good performance comparing to PWM dimming with half satisfice of transmission rate and a larger dimming intensity. Simulation of GSCC after combining with other channel coding schemes reflects that GSCC has good compatibility to arbitrary access coded signal.

  8. A Theory of Access

    ERIC Educational Resources Information Center

    Ribot, Jesse C.; Peluso, Nancy Lee

    2003-01-01

    The term "access" is frequently used by property and natural resource analysts without adequate definition. In this paper we develop a concept of access and examine a broad set of factors that differentiate access from property. We define access as "the "ability" to derive benefits from things," broadening from property's classical definition as…

  9. Graph State-Based Quantum Group Authentication Scheme

    NASA Astrophysics Data System (ADS)

    Liao, Longxia; Peng, Xiaoqi; Shi, Jinjing; Guo, Ying

    2017-02-01

    Motivated by the elegant structure of the graph state, we design an ingenious quantum group authentication scheme, which is implemented by operating appropriate operations on the graph state and can solve the problem of multi-user authentication. Three entities, the group authentication server (GAS) as a verifier, multiple users as provers and the trusted third party Trent are included. GAS and Trent assist the multiple users in completing the authentication process, i.e., GAS is responsible for registering all the users while Trent prepares graph states. All the users, who request for authentication, encode their authentication keys on to the graph state by performing Pauli operators. It demonstrates that a novel authentication scheme can be achieved with the flexible use of graph state, which can synchronously authenticate a large number of users, meanwhile the provable security can be guaranteed definitely.

  10. A patient privacy protection scheme for medical information system.

    PubMed

    Lu, Chenglang; Wu, Zongda; Liu, Mingyong; Chen, Wei; Guo, Junfang

    2013-12-01

    In medical information systems, there are a lot of confidential information about patient privacy. It is therefore an important problem how to prevent patient's personal privacy information from being disclosed. Although traditional security protection strategies (such as identity authentication and authorization access control) can well ensure data integrity, they cannot prevent system's internal staff (such as administrators) from accessing and disclosing patient privacy information. In this paper, we present an effective scheme to protect patients' personal privacy for a medical information system. In the scheme, privacy data before being stored in the database of the server of a medical information system would be encrypted using traditional encryption algorithms, so that the data even if being disclosed are also difficult to be decrypted and understood. However, to execute various kinds of query operations over the encrypted data efficiently, we would also augment the encrypted data with additional index, so as to process as much of the query as possible at the server side, without the need to decrypt the data. Thus, in this paper, we mainly explore how the index of privacy data is constructed, and how a query operation over privacy data is translated into a new query over the corresponding index so that it can be executed at the server side immediately. Finally, both theoretical analysis and experimental evaluation validate the practicality and effectiveness of our proposed scheme.

  11. A Survey of Authentication Schemes in Telecare Medicine Information Systems.

    PubMed

    Aslam, Muhammad Umair; Derhab, Abdelouahid; Saleem, Kashif; Abbas, Haider; Orgun, Mehmet; Iqbal, Waseem; Aslam, Baber

    2017-01-01

    E-Healthcare is an emerging field that provides mobility to its users. The protected health information of the users are stored at a remote server (Telecare Medical Information System) and can be accessed by the users at anytime. Many authentication protocols have been proposed to ensure the secure authenticated access to the Telecare Medical Information System. These protocols are designed to provide certain properties such as: anonymity, untraceability, unlinkability, privacy, confidentiality, availability and integrity. They also aim to build a key exchange mechanism, which provides security against some attacks such as: identity theft, password guessing, denial of service, impersonation and insider attacks. This paper reviews these proposed authentication protocols and discusses their strengths and weaknesses in terms of ensured security and privacy properties, and computation cost. The schemes are divided in three broad categories of one-factor, two-factor and three-factor authentication schemes. Inter-category and intra-category comparison has been performed for these schemes and based on the derived results we propose future directions and recommendations that can be very helpful to the researchers who work on the design and implementation of authentication protocols.

  12. Multiple Sclerosis

    MedlinePlus

    Multiple sclerosis Overview By Mayo Clinic Staff Multiple sclerosis (MS) is a potentially disabling disease of the brain and spinal cord (central nervous system). In MS, the immune system attacks the protective ...

  13. Multiple Sclerosis

    MedlinePlus

    Multiple sclerosis (MS) is a nervous system disease that affects your brain and spinal cord. It damages the ... attacks healthy cells in your body by mistake. Multiple sclerosis affects women more than men. It often begins ...

  14. Multiple myeloma

    MedlinePlus

    Plasma cell dyscrasia; Plasma cell myeloma; Malignant plasmacytoma; Plasmacytoma of bone; Myeloma - multiple ... Multiple myeloma most commonly causes: Low red blood cell count ( anemia ), which can lead to fatigue and ...

  15. [PICS: pharmaceutical inspection cooperation scheme].

    PubMed

    Morénas, J

    2009-01-01

    The pharmaceutical inspection cooperation scheme (PICS) is a structure containing 34 participating authorities located worldwide (October 2008). It has been created in 1995 on the basis of the pharmaceutical inspection convention (PIC) settled by the European free trade association (EFTA) in1970. This scheme has different goals as to be an international recognised body in the field of good manufacturing practices (GMP), for training inspectors (by the way of an annual seminar and experts circles related notably to active pharmaceutical ingredients [API], quality risk management, computerized systems, useful for the writing of inspection's aide-memoires). PICS is also leading to high standards for GMP inspectorates (through regular crossed audits) and being a room for exchanges on technical matters between inspectors but also between inspectors and pharmaceutical industry.

  16. Nonthreshold quantum secret-sharing schemes in the graph-state formalism

    NASA Astrophysics Data System (ADS)

    Sarvepalli, Pradeep

    2012-10-01

    In a recent work, Markham and Sanders proposed a framework to study quantum secret-sharing (QSS) schemes using graph states. This framework unified three classes of QSS protocols, namely, sharing classical secrets over private and public channels, and sharing quantum secrets. However, previous work on graph-state secret sharing mostly focused on threshold schemes. In this paper, we focus on general access structures. We show how to realize a large class of arbitrary access structures using the graph-state formalism. We show an equivalence between [[n,1

  17. Efficiently Multi-User Searchable Encryption Scheme with Attribute Revocation and Grant for Cloud Storage

    PubMed Central

    Wang, Shangping; Zhang, Xiaoxue; Zhang, Yaling

    2016-01-01

    Cipher-policy attribute-based encryption (CP-ABE) focus on the problem of access control, and keyword-based searchable encryption scheme focus on the problem of finding the files that the user interested in the cloud storage quickly. To design a searchable and attribute-based encryption scheme is a new challenge. In this paper, we propose an efficiently multi-user searchable attribute-based encryption scheme with attribute revocation and grant for cloud storage. In the new scheme the attribute revocation and grant processes of users are delegated to proxy server. Our scheme supports multi attribute are revoked and granted simultaneously. Moreover, the keyword searchable function is achieved in our proposed scheme. The security of our proposed scheme is reduced to the bilinear Diffie-Hellman (BDH) assumption. Furthermore, the scheme is proven to be secure under the security model of indistinguishability against selective ciphertext-policy and chosen plaintext attack (IND-sCP-CPA). And our scheme is also of semantic security under indistinguishability against chosen keyword attack (IND-CKA) in the random oracle model. PMID:27898703

  18. Efficiently Multi-User Searchable Encryption Scheme with Attribute Revocation and Grant for Cloud Storage.

    PubMed

    Wang, Shangping; Zhang, Xiaoxue; Zhang, Yaling

    2016-01-01

    Cipher-policy attribute-based encryption (CP-ABE) focus on the problem of access control, and keyword-based searchable encryption scheme focus on the problem of finding the files that the user interested in the cloud storage quickly. To design a searchable and attribute-based encryption scheme is a new challenge. In this paper, we propose an efficiently multi-user searchable attribute-based encryption scheme with attribute revocation and grant for cloud storage. In the new scheme the attribute revocation and grant processes of users are delegated to proxy server. Our scheme supports multi attribute are revoked and granted simultaneously. Moreover, the keyword searchable function is achieved in our proposed scheme. The security of our proposed scheme is reduced to the bilinear Diffie-Hellman (BDH) assumption. Furthermore, the scheme is proven to be secure under the security model of indistinguishability against selective ciphertext-policy and chosen plaintext attack (IND-sCP-CPA). And our scheme is also of semantic security under indistinguishability against chosen keyword attack (IND-CKA) in the random oracle model.

  19. A user anonymity preserving three-factor authentication scheme for telecare medicine information systems.

    PubMed

    Tan, Zuowen

    2014-03-01

    The telecare medicine information system enables the patients gain health monitoring at home and access medical services over internet or mobile networks. In recent years, the schemes based on cryptography have been proposed to address the security and privacy issues in the telecare medicine information systems. However, many schemes are insecure or they have low efficiency. Recently, Awasthi and Srivastava proposed a three-factor authentication scheme for telecare medicine information systems. In this paper, we show that their scheme is vulnerable to the reflection attacks. Furthermore, it fails to provide three-factor security and the user anonymity. We propose a new three-factor authentication scheme for the telecare medicine information systems. Detailed analysis demonstrates that the proposed scheme provides mutual authentication, server not knowing password and freedom of password, biometric update and three-factor security. Moreover, the new scheme provides the user anonymity. As compared with the previous three-factor authentication schemes, the proposed scheme is more secure and practical.

  20. A biometric signcryption scheme without bilinear pairing

    NASA Astrophysics Data System (ADS)

    Wang, Mingwen; Ren, Zhiyuan; Cai, Jun; Zheng, Wentao

    2013-03-01

    How to apply the entropy in biometrics into the encryption and remote authentication schemes to simplify the management of keys is a hot research area. Utilizing Dodis's fuzzy extractor method and Liu's original signcryption scheme, a biometric identity based signcryption scheme is proposed in this paper. The proposed scheme is more efficient than most of the previous proposed biometric signcryption schemes for that it does not need bilinear pairing computation and modular exponentiation computation which is time consuming largely. The analysis results show that under the CDH and DL hard problem assumption, the proposed scheme has the features of confidentiality and unforgeability simultaneously.

  1. Bounds on the information rate of quantum-secret-sharing schemes

    SciTech Connect

    Sarvepalli, Pradeep

    2011-04-15

    An important metric of the performance of a quantum-secret-sharing scheme is its information rate. Beyond the fact that the information rate is upper-bounded by one, very little is known in terms of bounds on the information rate of quantum-secret-sharing schemes. Furthermore, not every scheme can be realized with rate one. In this paper we derive upper bounds for the information rates of quantum-secret-sharing schemes. We show that there exist quantum access structures on n players for which the information rate cannot be better than O((log{sub 2}n)/n). These results are the quantum analogues of the bounds for classical-secret-sharing schemes proved by Csirmaz.

  2. Self-protection scheme against failures of distributed fiber links in an Ethernet passive optical network

    NASA Astrophysics Data System (ADS)

    Chen, Jiajia; Chen, Biao; He, Sailing

    2006-09-01

    A novel self-protection scheme for an Ethernet passive optical network is introduced and studied at both the physical and the media access control layers. The scheme is simple and fast and can provide 1:1 protection and automatic traffic restoration against the fiber link failure between a remote node (RN) and any optical network unit (ONU). Simulation results show that fiber failure does not degrade the transmission performance, and the restoration time depends mainly on the switch time of the physical layer. Our protection scheme saves many long fibers, does not influence other normal ONUs, and requires no active device in the RN.

  3. Robust chaotic map-based authentication and key agreement scheme with strong anonymity for telecare medicine information systems.

    PubMed

    Jiang, Qi; Ma, Jianfeng; Lu, Xiang; Tian, Youliang

    2014-02-01

    To ensure only authorized access to medical services, several authentication schemes for telecare medicine information systems (TMIS) have been proposed in the literature. Due to its better performance than traditional cryptography, Hao et al. proposed an authentication scheme for TMIS using chaotic map based cryptography. They claimed that their scheme could resist various attacks, including the smart card stolen attack. However, we identify that their scheme is vulnerable to the stolen smart card attack. The reason causing the stolen smart card attack is that the scheme is designed based on the assumption that the scheme itself achieves user untraceability. Then, we propose a robust authentication and key agreement scheme. Compared with the previous schemes, our scheme not only enjoys more security features, but also has better efficiency. Our analysis indicates that designing a two-factor authentication scheme based on the assumption that privacy protection is achieved in the scheme itself may pose potential security risks. The lesson learned is that, we should avoid this situation in the future design of two-factor authentication schemes.

  4. World Wide Access: Accessible Web Design.

    ERIC Educational Resources Information Center

    Washington Univ., Seattle.

    This brief paper considers the application of "universal design" principles to Web page design in order to increase accessibility for people with disabilities. Suggestions are based on the World Wide Web Consortium's accessibility initiative, which has proposed guidelines for all Web authors and federal government standards. Seven guidelines for…

  5. Multiplicity Counting

    SciTech Connect

    Geist, William H.

    2015-12-01

    This set of slides begins by giving background and a review of neutron counting; three attributes of a verification item are discussed: 240Pueff mass; α, the ratio of (α,n) neutrons to spontaneous fission neutrons; and leakage multiplication. It then takes up neutron detector systems – theory & concepts (coincidence counting, moderation, die-away time); detector systems – some important details (deadtime, corrections); introduction to multiplicity counting; multiplicity electronics and example distributions; singles, doubles, and triples from measured multiplicity distributions; and the point model: multiplicity mathematics.

  6. Multiple trellis coded modulation

    NASA Technical Reports Server (NTRS)

    Simon, Marvin K. (Inventor); Divsalar, Dariush (Inventor)

    1990-01-01

    A technique for designing trellis codes to minimize bit error performance for a fading channel. The invention provides a criteria which may be used in the design of such codes which is significantly different from that used for average white Gaussian noise channels. The method of multiple trellis coded modulation of the present invention comprises the steps of: (a) coding b bits of input data into s intermediate outputs; (b) grouping said s intermediate outputs into k groups of s.sub.i intermediate outputs each where the summation of all s.sub.i,s is equal to s and k is equal to at least 2; (c) mapping each of said k groups of intermediate outputs into one of a plurality of symbols in accordance with a plurality of modulation schemes, one for each group such that the first group is mapped in accordance with a first modulation scheme and the second group is mapped in accordance with a second modulation scheme; and (d) outputting each of said symbols to provide k output symbols for each b bits of input data.

  7. Access Nets: Modeling Access to Physical Spaces

    NASA Astrophysics Data System (ADS)

    Frohardt, Robert; Chang, Bor-Yuh Evan; Sankaranarayanan, Sriram

    Electronic, software-managed mechanisms using, for example, radio-frequency identification (RFID) cards, enable great flexibility in specifying access control policies to physical spaces. For example, access rights may vary based on time of day or could differ in normal versus emergency situations. With such fine-grained control, understanding and reasoning about what a policy permits becomes surprisingly difficult requiring knowledge of permission levels, spatial layout, and time. In this paper, we present a formal modeling framework, called AccessNets, suitable for describing a combination of access permissions, physical spaces, and temporal constraints. Furthermore, we provide evidence that model checking techniques are effective in reasoning about physical access control policies. We describe our results from a tool that uses reachability analysis to validate security policies.

  8. Enhanced Hydrogen Production from DNA-Assembled Z-Scheme TiO2-CdS Photocatalyst Systems.

    PubMed

    Ma, Ke; Yehezkeli, Omer; Domaille, Dylan W; Funke, Hans H; Cha, Jennifer N

    2015-09-21

    A wide range of inorganic nanostructures have been used as photocatalysts for generating H2. To increase activity, Z-scheme photocatalytic systems have been implemented that use multiple types of photoactive materials and electron mediators. Optimal catalysis has previously been obtained by interfacing different materials through aggregation or epitaxial nucleation, all of which lowers the accessible active surface area. DNA has now been used as a structure-directing agent to organize TiO2 and CdS nanocrystals. A significant increase in H2 production compared to CdS or TiO2 alone was thus observed directly in solution with no sacrificial donors or applied bias. The inclusion of benzoquinone (BQ) equidistant between the TiO2 and CdS through DNA assembly further increased H2 production. While the use of a second quinone in conjunction with BQ showed no more improvement, its location within the Z-scheme was found to strongly influence catalysis.

  9. The new cooperative medical scheme in China.

    PubMed

    You, Xuedan; Kobayashi, Yasuki

    2009-06-01

    The New Cooperative Medical Scheme (NCMS) is a heavily subsidized voluntary health insurance program established in 2003 to reduce the risk of catastrophic health spending for rural residents in China. In this review, we present the current collection of knowledge available regarding the performance of NCMS on the aspects of revenue collection, risk pooling, reimbursement rules and provider payment. The available evidence suggests that NCMS has substantially improved health care access and utilization among the participants; however, it appears to have no statistically significant effect on average household out-of-pocket health spending and catastrophic expenditure risk. As NCMS is rolled out to other counties, it must be careful to generalize the findings reported in the published papers and reports, because the early pilot counties were not randomly selected and there are a lot of local adaptations. In addition, we expect that NCMS could be an important opportunity to establish some trust-based institutions in the best interest of the participants to monitor provider quality and control cost inflation. Rigorous evaluations, based on richer and latest micro-level data, could considerably strengthen the evidence base for the performance and impact of NCMS.

  10. A simple recipe for setting up the flux equations of cyclic and linear reaction schemes of ion transport with a high number of states: The arrow scheme.

    PubMed

    Hansen, Ulf-Peter; Rauh, Oliver; Schroeder, Indra

    2016-01-01

    The calculation of flux equations or current-voltage relationships in reaction kinetic models with a high number of states can be very cumbersome. Here, a recipe based on an arrow scheme is presented, which yields a straightforward access to the minimum form of the flux equations and the occupation probability of the involved states in cyclic and linear reaction schemes. This is extremely simple for cyclic schemes without branches. If branches are involved, the effort of setting up the equations is a little bit higher. However, also here a straightforward recipe making use of so-called reserve factors is provided for implementing the branches into the cyclic scheme, thus enabling also a simple treatment of such cases.

  11. A simple recipe for setting up the flux equations of cyclic and linear reaction schemes of ion transport with a high number of states: The arrow scheme

    PubMed Central

    Hansen, Ulf-Peter; Rauh, Oliver; Schroeder, Indra

    2016-01-01

    abstract The calculation of flux equations or current-voltage relationships in reaction kinetic models with a high number of states can be very cumbersome. Here, a recipe based on an arrow scheme is presented, which yields a straightforward access to the minimum form of the flux equations and the occupation probability of the involved states in cyclic and linear reaction schemes. This is extremely simple for cyclic schemes without branches. If branches are involved, the effort of setting up the equations is a little bit higher. However, also here a straightforward recipe making use of so-called reserve factors is provided for implementing the branches into the cyclic scheme, thus enabling also a simple treatment of such cases. PMID:26646356

  12. Decoupling schemes for the SSC Collider

    SciTech Connect

    Cai, Y.; Bourianoff, G.; Cole, B.; Meinke, R.; Peterson, J.; Pilat, F.; Stampke, S.; Syphers, M.; Talman, R.

    1993-05-01

    A decoupling system is designed for the SSC Collider. This system can accommodate three decoupling schemes by using 44 skew quadrupoles in the different configurations. Several decoupling schemes are studied and compared in this paper.

  13. A secure and robust password-based remote user authentication scheme using smart cards for the integrated EPR information system.

    PubMed

    Das, Ashok Kumar

    2015-03-01

    An integrated EPR (Electronic Patient Record) information system of all the patients provides the medical institutions and the academia with most of the patients' information in details for them to make corrective decisions and clinical decisions in order to maintain and analyze patients' health. In such system, the illegal access must be restricted and the information from theft during transmission over the insecure Internet must be prevented. Lee et al. proposed an efficient password-based remote user authentication scheme using smart card for the integrated EPR information system. Their scheme is very efficient due to usage of one-way hash function and bitwise exclusive-or (XOR) operations. However, in this paper, we show that though their scheme is very efficient, their scheme has three security weaknesses such as (1) it has design flaws in password change phase, (2) it fails to protect privileged insider attack and (3) it lacks the formal security verification. We also find that another recently proposed Wen's scheme has the same security drawbacks as in Lee at al.'s scheme. In order to remedy these security weaknesses found in Lee et al.'s scheme and Wen's scheme, we propose a secure and efficient password-based remote user authentication scheme using smart cards for the integrated EPR information system. We show that our scheme is also efficient as compared to Lee et al.'s scheme and Wen's scheme as our scheme only uses one-way hash function and bitwise exclusive-or (XOR) operations. Through the security analysis, we show that our scheme is secure against possible known attacks. Furthermore, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool and show that our scheme is secure against passive and active attacks.

  14. Simultaneous CDMA and error correction schemes based on wavelet filters in integer quotient rings

    NASA Astrophysics Data System (ADS)

    Lay, Kuen-Tsair; Kong, Lin-Wen; Chen, Jiann-Horng

    2000-04-01

    In the past decade, wavelet filters have been widely applied to signal processing. In effect, wavelet filters are perfect reconstruction filter banks (PRFBs). However, in most researches, the filterbanks and wavelets operate on real- valued or complex-valued signals. In this paper, PRFBs operating over integer quotient rings (IQRs) are introduced. We denote an IQR as Z/(q). Algorithms for constructing such filter banks are proposed. The PRFB design can be carried out either in the time or the frequency domain. We demonstrate that some classical or well known filter tap coefficients can even be transformed into values over Z/(q) in a simple and straightforward way. Here we emphasize that to achieve perfect reconstruction (PR), the filters need not to work on elements in fields. In fact, operating on elements in IQRs can achieve PR with proper choices of a ring and filter tap coefficients. The designed filter banks can be orthogonal or biorthogonal. Based ona PRFB over an IQR, to which we refer as an IQR-PRFB, a perfect reconstruction transmultiplexer (PRTM), to which we refer as an IQR-PRTM, can be derived. Through the utilization of the IQR-PRTM multiplexing and multiple access in a multi-user digital communication system can be realized. The IQR-PRTM effectively decomposes the communication signal space into several orthogonal subspaces, where each multiplexed user sends his message in one of them. If some of the orthogonal subspaces are preserved for parity check, then error correction at the receiving end can be performed. In the proposed schemes, the data to be transmitted must be represented with elements of Z/(q), which can be done easily. A modulation and demodulation/detection scheme, in conjunction with the IQR-PRTM is proposed.

  15. The DIII-D ECH multiple gyrotron control system

    SciTech Connect

    Ponce, D.; Lohr, J.; Tooker, J.F.; Cary, W.P.; Harris, T.E.

    1997-11-01

    DIII-D`s ECH upgrade with 1 MW, 110 GHz gyrotrons is ongoing, and with it, an upgrade of the control system. The ECH Multiple Gyrotron Control System uses software distributed among networked computers, interfaced to a programmable logic controller (PLC), the timing and pulse system, power supplies, vacuum and wave guide controls, and instrumentation. During DIII-D operations, the system will allow a chief and a co-operator to control and monitor a number of gyrotrons from different manufacturers. The software, written using LabVIEW, allows for remote and multiple operator control. Thus any supported computer can become a control station and multiple projects can be simultaneously accommodated. Each operator can be given access to the controls of all gyrotrons or to a subset of controls. Status information is also remotely available. The use of a PLC simplifies the hardware and software design. It reduces interlock and control circuitry, includes monitoring for slow analog signals, and allows one software driver to efficiently interface to a number of systems. In addition, the interlock logic can be easily changed and control points can be forced as needed. The pulse system is designed around arbitrary function generators. Various modulation schemes can be accommodated, including real-time control of the modulation. This discussion will include the hardware and software design of the control system and its current implementation.

  16. Multiobjective hyper heuristic scheme for system design and optimization

    NASA Astrophysics Data System (ADS)

    Rafique, Amer Farhan

    2012-11-01

    As system design is becoming more and more multifaceted, integrated, and complex, the traditional single objective optimization trends of optimal design are becoming less and less efficient and effective. Single objective optimization methods present a unique optimal solution whereas multiobjective methods present pareto front. The foremost intent is to predict a reasonable distributed pareto-optimal solution set independent of the problem instance through multiobjective scheme. Other objective of application of intended approach is to improve the worthiness of outputs of the complex engineering system design process at the conceptual design phase. The process is automated in order to provide the system designer with the leverage of the possibility of studying and analyzing a large multiple of possible solutions in a short time. This article presents Multiobjective Hyper Heuristic Optimization Scheme based on low level meta-heuristics developed for the application in engineering system design. Herein, we present a stochastic function to manage meta-heuristics (low-level) to augment surety of global optimum solution. Generic Algorithm, Simulated Annealing and Swarm Intelligence are used as low-level meta-heuristics in this study. Performance of the proposed scheme is investigated through a comprehensive empirical analysis yielding acceptable results. One of the primary motives for performing multiobjective optimization is that the current engineering systems require simultaneous optimization of conflicting and multiple. Random decision making makes the implementation of this scheme attractive and easy. Injecting feasible solutions significantly alters the search direction and also adds diversity of population resulting in accomplishment of pre-defined goals set in the proposed scheme.

  17. Comparative study of numerical schemes of TVD3, UNO3-ACM and optimized compact scheme

    NASA Technical Reports Server (NTRS)

    Lee, Duck-Joo; Hwang, Chang-Jeon; Ko, Duck-Kon; Kim, Jae-Wook

    1995-01-01

    Three different schemes are employed to solve the benchmark problem. The first one is a conventional TVD-MUSCL (Monotone Upwind Schemes for Conservation Laws) scheme. The second scheme is a UNO3-ACM (Uniformly Non-Oscillatory Artificial Compression Method) scheme. The third scheme is an optimized compact finite difference scheme modified by us: the 4th order Runge Kutta time stepping, the 4th order pentadiagonal compact spatial discretization with the maximum resolution characteristics. The problems of category 1 are solved by using the second (UNO3-ACM) and third (Optimized Compact) schemes. The problems of category 2 are solved by using the first (TVD3) and second (UNO3-ACM) schemes. The problem of category 5 is solved by using the first (TVD3) scheme. It can be concluded from the present calculations that the Optimized Compact scheme and the UN03-ACM show good resolutions for category 1 and category 2 respectively.

  18. Development of a new flux splitting scheme

    NASA Technical Reports Server (NTRS)

    Liou, Meng-Sing; Steffen, Christopher J., Jr.

    1991-01-01

    The successful use of a novel splitting scheme, the advection upstream splitting method, for model aerodynamic problems where Van Leer and Roe schemes had failed previously is discussed. The present scheme is based on splitting in which the convective and pressure terms are separated and treated differently depending on the underlying physical conditions. The present method is found to be both simple and accurate.

  19. Development of a new flux splitting scheme

    NASA Technical Reports Server (NTRS)

    Liou, Meng-Sing; Steffen, Christopher J., Jr.

    1991-01-01

    The use of a new splitting scheme, the advection upstream splitting method, for model aerodynamic problems where Van Leer and Roe schemes had failed previously is discussed. The present scheme is based on splitting in which the convective and pressure terms are separated and treated differently depending on the underlying physical conditions. The present method is found to be both simple and accurate.

  20. Current terminology and diagnostic classification schemes.

    PubMed

    Okeson, J P

    1997-01-01

    This article reviews the current terminology and classification schemes available for temporomandibular disorders. The origin of each term is presented, and the classification schemes that have been offered for temporomandibular disorders are briefly reviewed. Several important classifications are presented in more detail, with mention of advantages and disadvantages. Final recommendations are provided for future direction in the area of classification schemes.

  1. Primary vascular access.

    PubMed

    Gibbons, C P

    2006-05-01

    Primary vascular access is usually achievable by a distal autogenous arterio-venous fistula (AVF). This article describes the approach to vascular access planning, the usual surgical options and the factors affecting patency.

  2. Local ensemble assimilation scheme with global constraints and conservation

    NASA Astrophysics Data System (ADS)

    Barth, Alexander; Yan, Yajing; Canter, Martin; Alvera-Azcárate, Aida; Beckers, Jean-Marie

    2014-05-01

    Ensemble assimilation schemes applied in their original, global formulation have no problem in respecting linear conservation properties if the ensemble perturbations are setup accordingly. For realistic ocean systems, only a relatively small number of ensemble members can be calculated. A localization of the ensemble increment is thus necessary to filter out spurious long-range correlations. However, the conservation of the global property will be lost if the assimilation is performed locally since the conservation requires a coupling between model grid points, which is filtered out by the localization. In the ocean, the distribution of observations is highly inhomogeneous. Systematic errors of the observed parts of the ocean state can lead to spurious systematic adjustments of the non-observed part of the ocean state due to data assimilation. As a result, global properties which should be conserved, increase or decrease in long-term simulations. We propose an assimilation scheme (with stochastic or deterministic analysis steps) which is formulated globally (i.e. for the whole state vector) but where spurious long-range correlations can be filtered out. The scheme can thus be used to enforce global conservation properties and non-local observation operators. Both aspects are indeed linked since one can introduce the global conservation as a weak constraint by using a global observation operator. The conserved property becomes thus an observed value. The proposed scheme is tested with the Kuramoto-Sivashinsky model which is conservative. The benefit compared to the traditional covariance localization scheme (with an ad-hoc step enforcing conservation) where observations are assimilated sequentially is shown. The assimilation scheme is suitable to be implemented on parallel computers where the number of available computing cores is a multiple of the ensemble size.

  3. Multiple-Replica Strategies for Free-Energy Calculations in NAMD: Multiple-Walker Adaptive Biasing Force and Walker Selection Rules.

    PubMed

    Comer, Jeffrey; Phillips, James C; Schulten, Klaus; Chipot, Christophe

    2014-12-09

    From the most powerful supercomputers to multicore desktops and laptops, parallel computing architectures have been in the mainstream for some time. However, numerical schemes for calculating free energies in molecular systems that directly leverage this hardware paradigm, usually taking the form of multiple-replica strategies, are just now on the cusp of becoming standard practice. Here, we present a modification of the popular molecular dynamics program NAMD that is envisioned to facilitate the use of powerful multiple-replica strategies to improve ergodic sampling for a specific class of free-energy methods known as adaptive biasing force. We describe the software implementation in a so-called multiple-walker context, alongside the interface that makes the proposed approach accessible to the end users. We further evaluate the performance of the adaptive biasing force multiple-walker strategy for a model system, namely, the reversible folding of a short peptide, and show, in particular, in regions of the transition coordinate where convergence of the free-energy calculation is encumbered by hidden barriers, that the multiple-walker strategy can yield far more reliable results in appreciably less real time on parallel architectures, relative to standard, single-replica calculations.

  4. [Accessible Rural Housing.

    ERIC Educational Resources Information Center

    Baker, Nick, Ed.

    1995-01-01

    This issue of the quarterly newsletter "Rural Exchange" provides information and resources on accessible rural housing for the disabled. "Accessible Manufactured Housing Could Increase Rural Home Supply" (Nick Baker) suggests that incorporation of access features such as lever door handles and no-step entries into manufactured housing could help…

  5. Reflective Database Access Control

    ERIC Educational Resources Information Center

    Olson, Lars E.

    2009-01-01

    "Reflective Database Access Control" (RDBAC) is a model in which a database privilege is expressed as a database query itself, rather than as a static privilege contained in an access control list. RDBAC aids the management of database access controls by improving the expressiveness of policies. However, such policies introduce new interactions…

  6. Open Access Alternatives

    ERIC Educational Resources Information Center

    Tenopir, Carol

    2004-01-01

    Open access publishing is a hot topic today. But open access publishing can have many different definitions, and pros and cons vary with the definitions. Open access publishing is especially attractive to companies and small colleges or universities that are likely to have many more readers than authors. A downside is that a membership fee sounds…

  7. Demystifying Remote Access

    ERIC Educational Resources Information Center

    Howe, Grant

    2009-01-01

    With money tight, more and more districts are considering remote access as a way to reduce expenses and budget information technology costs more effectively. Remote access allows staff members to work with a hosted software application from any school campus without being tied to a specific physical location. Each school can access critical…

  8. Community Access to Atmospheric Measurements

    NASA Astrophysics Data System (ADS)

    Durbin, P. B.; Tilmes, C. A.; Parris, F. E.; Martin, A. T.; Soika, V.; Bichali, L.; Higgins, P. H.

    2006-12-01

    This paper provides an overview of the computer application that provides community access to atmosphere measurements derived from backscatter ultraviolet sources. It is funded by NASA's Advance Collaborative Connections for Earth-Sun System Science (ACCESS), and is devoted to Measurements of Atmospheric Chemistry in the Ultraviolet (MACUV). The purpose is to provide "one-stop shopping" for data and information of interest to the Backscattered Ultraviolet (BUV) community. It is built from the well-used, highly successful Total Ozone Mapping Spectrometer (TOMS) website and is being evolved into a broader focus for the BUV community. This application supports NASA's evolutionary step toward science measurement processing and analysis systems and enables the BUV community to easily access information and expertise from multiple sources over a nearly 30 year history of space based remote sensing of the atmosphere. It facilitates finding and comparing data, algorithms, and scientific results from different parts of the BUV science community as well as from different instruments and missions. It provides the means to manage and access the products of the Ozone Community Oriented Measurement-based Processing System (ComPS). The MACUV application contains components that store and manage data, manage user access to that data, provide multi-dimensional views of the data and other information, serve data based on user criteria, and facilitate on-line collaboration. The web site hosts Algorithm Theoretical Basis documents for each data product, quality assessment of those products, published papers, instrument descriptions, access to mission information, reports and assessments of events and issues, problem reporting and tracking, a moderated forum, and a user collaboration area. Visitors to the MACUV web site fall into several categories: the general public; students, educators and researchers outside the BUV community; members of the BUV community who validate the

  9. A robust uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care.

    PubMed

    Wen, Fengtong

    2013-12-01

    User authentication plays an important role to protect resources or services from being accessed by unauthorized users. In a recent paper, Das et al. proposed a secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. This scheme uses three factors, e.g. biometrics, password, and smart card, to protect the security. It protects user privacy and is believed to have many abilities to resist a range of network attacks, even if the secret information stored in the smart card is compromised. In this paper, we analyze the security of Das et al.'s scheme, and show that the scheme is in fact insecure against the replay attack, user impersonation attacks and off-line guessing attacks. Then, we also propose a robust uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. Compared with the existing schemes, our protocol uses a different user authentication mechanism to resist replay attack. We show that our proposed scheme can provide stronger security than previous protocols. Furthermore, we demonstrate the validity of the proposed scheme through the BAN (Burrows, Abadi, and Needham) logic.

  10. Enhancing of a Password-Based Authentication Scheme Using Smart Cards

    NASA Astrophysics Data System (ADS)

    Lee, Youngsook; Won, Dongho

    A password based remote user authentication scheme is a two-party protocol whereby an authentication server in a distributed system confirms the identity of a remote individual logging on to the server over an untrusted, open network. This paper discusses the security of Chen et al.'s remote user authentication scheme making use of smart cards. They have recently presented an improved version of Lin, Shen, and Hwang's scheme. But, unlike their claims, in Chen et al.'s scheme, if an attacker gains access to some user's smart card and extracts the information stored in the smart card, he/she can easily find out the user's password. We show this by mounting a dictionary attack on the scheme. In addition, Chen et al.'s scheme does not support its main security goal of authenticating between a remote individual and the server. This is shown via a sever impersonation attack on the scheme. Motivated by these security flaws, we propose a more secure remote user authentication scheme that achieves both two-factor security and mutual authentication.

  11. Improvement of a Privacy Authentication Scheme Based on Cloud for Medical Environment.

    PubMed

    Chiou, Shin-Yan; Ying, Zhaoqin; Liu, Junqiang

    2016-04-01

    Medical systems allow patients to receive care at different hospitals. However, this entails considerable inconvenience through the need to transport patients and their medical records between hospitals. The development of Telecare Medicine Information Systems (TMIS) makes it easier for patients to seek medical treatment and to store and access medical records. However, medical data stored in TMIS is not encrypted, leaving patients' private data vulnerable to external leaks. In 2014, scholars proposed a new cloud-based medical information model and authentication scheme which would not only allow patients to remotely access medical services but also protects patient privacy. However, this scheme still fails to provide patient anonymity and message authentication. Furthermore, this scheme only stores patient medical data, without allowing patients to directly access medical advice. Therefore, we propose a new authentication scheme, which provides anonymity, unlinkability, and message authentication, and allows patients to directly and remotely consult with doctors. In addition, our proposed scheme is more efficient in terms of computation cost. The proposed system was implemented in Android system to demonstrate its workability.

  12. High-Order Energy Stable WENO Schemes

    NASA Technical Reports Server (NTRS)

    Yamaleev, Nail K.; Carpenter, Mark H.

    2008-01-01

    A new third-order Energy Stable Weighted Essentially NonOscillatory (ESWENO) finite difference scheme for scalar and vector linear hyperbolic equations with piecewise continuous initial conditions is developed. The new scheme is proven to be stable in the energy norm for both continuous and discontinuous solutions. In contrast to the existing high-resolution shock-capturing schemes, no assumption that the reconstruction should be total variation bounded (TVB) is explicitly required to prove stability of the new scheme. A rigorous truncation error analysis is presented showing that the accuracy of the 3rd-order ESWENO scheme is drastically improved if the tuning parameters of the weight functions satisfy certain criteria. Numerical results show that the new ESWENO scheme is stable and significantly outperforms the conventional third-order WENO finite difference scheme of Jiang and Shu in terms of accuracy, while providing essentially nonoscillatory solutions near strong discontinuities.

  13. Multiple myeloma.

    PubMed

    Peller, Patrick J

    2015-04-01

    This article presents a review of multiple myeloma, precursor states, and related plasma cell disorders. The clinical roles of fluorodeoxyglucose PET/computed tomography (CT) and the potential to improve the management of patients with multiple myeloma are discussed. The clinical and research data supporting the utility of PET/CT use in evaluating myeloma and other plasma cell dyscrasias continues to grow.

  14. An improved scheme for classifying susceptibility to preferential flow

    NASA Astrophysics Data System (ADS)

    Moeys, Julien; Koestel, John; Hollis, John M.; Jarvis, Nicholas J.

    2010-05-01

    The ability to reliably predict the occurrence and strength of preferential flow in different soils and land use systems would be of great benefit in environmental planning and management at multiple spatial scales, from field to catchments and regions. We recently proposed a simple classification scheme for predicting the susceptibility of soil horizons and pedons to macropore flow, designed to support predictive modelling (Jarvis N.J. et al., 2009. A conceptual model of soil susceptibility to macropore flow. Vadose Zone Journal, 8: 902-910). The scheme, which takes the form of a decision tree, was successfully validated against a small dataset of solute transport experiments. However, in its present form, it is strongly biased toward European agricultural soils, since it was developed to support pesticide risk assessment in the EU. In this poster, we propose an improved version of the classification scheme, which is much broader in scope, with relevance for a much wider range of soils worldwide, including those with clay mineralogies that limit the development of soil macro-structure and restrict macropore flow (e.g. Ferralsols and Andosols). The new scheme is tested in a literature meta-analysis exercise, making use of the temporal moments of solute breakthrough curves derived from fits of the mobile / immobile model to steady-state experiments on short laboratory columns.

  15. Efficient implementation of weighted ENO schemes

    NASA Technical Reports Server (NTRS)

    Jiang, Guang-Shan; Shu, Chi-Wang

    1995-01-01

    In this paper, we further analyze, test, modify and improve the high order WENO (weighted essentially non-oscillatory) finite difference schemes of Liu, Osher and Chan. It was shown by Liu et al. that WENO schemes constructed from the r-th order (in L1 norm) ENO schemes are (r+1)-th order accurate. We propose a new way of measuring the smoothness of a numerical solution, emulating the idea of minimizing the total variation of the approximation, which results in a 5-th order WENO scheme for the case r = 3, instead of the 4-th order with the original smoothness measurement by Liu et al. This 5-th order WENO scheme is as fast as the 4-th order WENO scheme of Liu et al., and both schemes are about twice as fast as the 4-th order ENO schemes on vector supercomputers and as fast on serial and parallel computers. For Euler systems of gas dynamics, we suggest computing the weights from pressure and entropy instead of the characteristic values to simplify the costly characteristic procedure. The resulting WENO schemes are about twice as fast as the WENO schemes using the characteristic decompositions to compute weights, and work well for problems which do not contain strong shocks or strong reflected waves. We also prove that, for conservation laws with smooth solutions, all WENO schemes are convergent. Many numerical tests, including the 1D steady state nozzle flow problem and 2D shock entropy wave interaction problem, are presented to demonstrate the remarkable capability of the WENO schemes, especially the WENO scheme using the new smoothness measurement, in resolving complicated shock and flow structures. We have also applied Yang's artificial compression method to the WENO schemes to sharpen contact discontinuities.

  16. Classroom Games: The Allocation of Renewable Resources under Different Property Rights and Regulation Schemes.

    ERIC Educational Resources Information Center

    Giraud, Kelly L.; Herrmann, Mark

    2002-01-01

    Describes a renewable resource allocation game designed to stimulate student interest in and understanding of market failure associated with open-access types of resource use. Employs the game to discuss advantages and disadvantages of property rights and regulation schemes. States the game benefits noneconomics majors in natural resource…

  17. Decoding Schemes for FBMC with Single-Delay STTC

    NASA Astrophysics Data System (ADS)

    Lélé, Chrislin; Le Ruyet, Didier

    2010-12-01

    Orthogonally multiplexed Quadrature Amplitude Modulation (OQAM) with Filter-Bank-based MultiCarrier modulation (FBMC) is a multicarrier modulation scheme that can be considered an alternative to the conventional orthogonal frequency division multiplexing (OFDM) with cyclic prefix (CP) for transmission over multipath fading channels. However, as OQAM-based FBMC is based on real orthogonality, transmission over a complex-valued channel makes the decoding process more challenging compared to CP-OFDM case. Moreover, if we apply Multiple Input Multiple Output (MIMO) techniques to OQAM-based FBMC, the decoding schemes are different from the ones used in CP-OFDM. In this paper, we consider the combination of OQAM-based FBMC with single-delay Space-Time Trellis Coding (STTC). We extend the decoding process presented earlier in the case of [InlineEquation not available: see fulltext.] transmit antennas to greater values of [InlineEquation not available: see fulltext.]. Then, for [InlineEquation not available: see fulltext.], we make an analysis of the theoretical and simulation performance of ML and Viterbi decoding. Finally, to improve the performance of this method, we suggest an iterative decoding method. We show that the OQAM-based FBMC iterative decoding scheme can slightly outperform CP-OFDM.

  18. A Scheme to Smooth Aggregated Traffic from Sensors with Periodic Reports.

    PubMed

    Oh, Sungmin; Jang, Ju Wook

    2017-03-03

    The possibility of smoothing aggregated traffic from sensors with varying reporting periods and frame sizes to be carried on an access link is investigated. A straightforward optimization would take O(pn) time, whereas our heuristic scheme takes O(np) time where n, p denote the number of sensors and size of periods, respectively. Our heuristic scheme performs local optimization sensor by sensor, starting with the smallest to largest periods. This is based on an observation that sensors with large offsets have more choices in offsets to avoid traffic peaks than the sensors with smaller periods. A MATLAB simulation shows that our scheme excels the known scheme by M. Grenier et al. in a similar situation (aggregating periodic traffic in a controller area network) for almost all possible permutations. The performance of our scheme is very close to the straightforward optimization, which compares all possible permutations. We expect that our scheme would greatly contribute in smoothing the traffic from an ever-increasing number of IoT sensors to the gateway, reducing the burden on the access link to the Internet.

  19. A Scheme to Smooth Aggregated Traffic from Sensors with Periodic Reports

    PubMed Central

    Oh, Sungmin; Jang, Ju Wook

    2017-01-01

    The possibility of smoothing aggregated traffic from sensors with varying reporting periods and frame sizes to be carried on an access link is investigated. A straightforward optimization would take O(pn) time, whereas our heuristic scheme takes O(np) time where n, p denote the number of sensors and size of periods, respectively. Our heuristic scheme performs local optimization sensor by sensor, starting with the smallest to largest periods. This is based on an observation that sensors with large offsets have more choices in offsets to avoid traffic peaks than the sensors with smaller periods. A MATLAB simulation shows that our scheme excels the known scheme by M. Grenier et al. in a similar situation (aggregating periodic traffic in a controller area network) for almost all possible permutations. The performance of our scheme is very close to the straightforward optimization, which compares all possible permutations. We expect that our scheme would greatly contribute in smoothing the traffic from an ever-increasing number of IoT sensors to the gateway, reducing the burden on the access link to the Internet. PMID:28273831

  20. What are the emerging features of community health insurance schemes in East Africa?

    PubMed Central

    Basaza, Robert; Pariyo, George; Criel, Bart

    2009-01-01

    Background The three East African countries of Uganda, Tanzania, and Kenya are characterized by high poverty levels, population growth rates, prevalence of HIV/AIDS, under-funding of the health sector, poor access to quality health care, and small health insurance coverage. Tanzania and Kenya have user-fees whereas Uganda abolished user-fees in public-owned health units. Objective To provide comparative description of community health insurance (CHI) schemes in three East African countries of Uganda, Tanzania, and Kenya and thereafter provide a basis for future policy research for development of CHI schemes. Methods An analytical grid of 10 distinctive items pertaining to the nature of CHI schemes was developed so as to have a uniform lens of comparing country situations of CHI. Results and conclusions The majority of the schemes have been in existence for a relatively short time of less than 10 years and their number remains small. There is need for further research to identify what is the mix and weight of factors that cause people to refrain from joining schemes. Specific issues that could also be addressed in subsequent studies are whether the current schemes provide financial protection, increase access to quality of care and impact on the equity of health services financing and delivery. On the basis of this knowledge, rational policy decisions can be taken. The governments thereafter could consider an option of playing more roles in advocacy, paying for the poorest, and developing an enabling policy and legal framework. PMID:22312207

  1. Breaking and Fixing of an Identity Based Multi-Signcryption Scheme

    NASA Astrophysics Data System (ADS)

    Selvi, S. Sharmila Deva; Vivek, S. Sree; Rangan, C. Pandu

    Signcryption is a cryptographic primitive that provides authentication and confidentiality simultaneously in a single logical step. It is often required that multiple senders have to signcrypt a single message to a certain receiver. Obviously, it is inefficient to signcrypt the messages separately. An efficient alternative is to go for multi-signcryption. The concept of multi-signcryption is similar to that of multi-signatures with the added property - confidentiality. Recently, Jianhong et al. proposed an identity based multi-signcryption scheme. They claimed that their scheme is secure against adaptive chosen ciphertext attack and it is existentially unforgeable. In this paper, we show that their scheme is not secure against chosen plaintext attack and is existentially forgeable, we also provide a fix for the scheme and prove formally that the improved scheme is secure against both adaptive chosen ciphertext attack and existential forgery.

  2. Multiple Stars in the Field

    DTIC Science & Technology

    2008-01-01

    Pribulla and S.M. Rucinski . ................................... 163 Extrasolar Planets in Double and Multiple Stellar Systems A. Eggenberger, S. Udry... planets )" at a multi-commission meeting in Manchester (GA24). This was re-atRrmed at Special Session 3 in Sydney (GA25) by Commissions 5, 8, 26, 42...and a method to "develop a simple, unambiguous, flexible, and computer friendly designation scheme for stellar companions (including planets )" at a

  3. A Hash Based Remote User Authentication and Authenticated Key Agreement Scheme for the Integrated EPR Information System.

    PubMed

    Li, Chun-Ta; Weng, Chi-Yao; Lee, Cheng-Chi; Wang, Chun-Cheng

    2015-11-01

    To protect patient privacy and ensure authorized access to remote medical services, many remote user authentication schemes for the integrated electronic patient record (EPR) information system have been proposed in the literature. In a recent paper, Das proposed a hash based remote user authentication scheme using passwords and smart cards for the integrated EPR information system, and claimed that the proposed scheme could resist various passive and active attacks. However, in this paper, we found that Das's authentication scheme is still vulnerable to modification and user duplication attacks. Thereafter we propose a secure and efficient authentication scheme for the integrated EPR information system based on lightweight hash function and bitwise exclusive-or (XOR) operations. The security proof and performance analysis show our new scheme is well-suited to adoption in remote medical healthcare services.

  4. A community training scheme in cardiopulmonary resuscitation.

    PubMed Central

    Vincent, R; Martin, B; Williams, G; Quinn, E; Robertson, G; Chamberlain, D A

    1984-01-01

    Community instruction in basic life support and resuscitation techniques has been offered in Brighton Health District since 1978. Classes are held frequently for the general public and businesses, schools, and other organisations. First aid care for unconscious patients, the treatment of respiratory obstruction or failure, and the recognition and management of cardiac arrest is taught in a single two hour session. Over 20 000 people have been taught, up to 40 at a time in multiple groups of six to eight, by lay instructors usually supervised by ambulancemen trained to "paramedic" standards. Fifty four incidents have been reported to us in which techniques learnt in the classes have been implemented. Five patients recovered after first aid support but subsequently did not seek medical treatment. Of the 34 patients reviewed in hospital, at least 20 survived to be discharged. We believe that intervention may have been life saving in 16 instances. The benefit of cardiopulmonary resuscitation for victims who may have been asystolic is, however, difficult to quantify because the outcome without intervention cannot be predicted accurately. Community training in basic life support should be considered in association with ambulances equipped for resuscitation and hospital intensive care and cardiac care units as an integrated service for the victims of sudden circulatory or respiratory emergencies. The results achieved so far in Brighton and in other more advanced schemes, particularly in the United States of America, may encourage other health authorities to adopt similar programmes. PMID:6421403

  5. Scheme of thinking quantum systems

    NASA Astrophysics Data System (ADS)

    Yukalov, V. I.; Sornette, D.

    2009-11-01

    A general approach describing quantum decision procedures is developed. The approach can be applied to quantum information processing, quantum computing, creation of artificial quantum intelligence, as well as to analyzing decision processes of human decision makers. Our basic point is to consider an active quantum system possessing its own strategic state. Processing information by such a system is analogous to the cognitive processes associated to decision making by humans. The algebra of probability operators, associated with the possible options available to the decision maker, plays the role of the algebra of observables in quantum theory of measurements. A scheme is advanced for a practical realization of decision procedures by thinking quantum systems. Such thinking quantum systems can be realized by using spin lattices, systems of magnetic molecules, cold atoms trapped in optical lattices, ensembles of quantum dots, or multilevel atomic systems interacting with electromagnetic field.

  6. Teaching to the Multiple Intelligences.

    ERIC Educational Resources Information Center

    Loria, Win

    1999-01-01

    Relates the exploration and incorporation of Howard Gardner's Multiple Intelligences Theory (MI) into classroom practices. States that service-learning projects provide wonderful opportunities to put into practice the various types of intelligences, allowing students to utilize their best learning strategies to access the content area of the…

  7. MV-OPES: Multivalued-Order Preserving Encryption Scheme: A Novel Scheme for Encrypting Integer Value to Many Different Values

    NASA Astrophysics Data System (ADS)

    Kadhem, Hasan; Amagasa, Toshiyuki; Kitagawa, Hiroyuki

    Encryption can provide strong security for sensitive data against inside and outside attacks. This is especially true in the “Database as Service” model, where confidentiality and privacy are important issues for the client. In fact, existing encryption approaches are vulnerable to a statistical attack because each value is encrypted to another fixed value. This paper presents a novel database encryption scheme called MV-OPES (Multivalued — Order Preserving Encryption Scheme), which allows privacy-preserving queries over encrypted databases with an improved security level. Our idea is to encrypt a value to different multiple values to prevent statistical attacks. At the same time, MV-OPES preserves the order of the integer values to allow comparison operations to be directly applied on encrypted data. Using calculated distance (range), we propose a novel method that allows a join query between relations based on inequality over encrypted values. We also present techniques to offload query execution load to a database server as much as possible, thereby making a better use of server resources in a database outsourcing environment. Our scheme can easily be integrated with current database systems as it is designed to work with existing indexing structures. It is robust against statistical attack and the estimation of true values. MV-OPES experiments show that security for sensitive data can be achieved with reasonable overhead, establishing the practicability of the scheme.

  8. Network Access Control List Situation Awareness

    ERIC Educational Resources Information Center

    Reifers, Andrew

    2010-01-01

    Network security is a large and complex problem being addressed by multiple communities. Nevertheless, current theories in networking security appear to overestimate network administrators' ability to understand network access control lists (NACLs), providing few context specific user analyses. Consequently, the current research generally seems to…

  9. Community Access to Atmospheric Measurements

    NASA Astrophysics Data System (ADS)

    Marshall, J. J.; Batluck, G. R.; Durbin, P. B.; Gerard, R.; Larko, D. E.; Martin, A.; Tilmes, C. A.

    2007-05-01

    This poster provides an overview of the computer system that provides community access to atmosphere measurements derived from backscatter ultraviolet sources. It is funded by NASA's Advancing Collaborative Connections for Earth-Sun System Science (ACCESS), and is devoted to Measurements of Atmospheric Composition in the Ultraviolet. The purpose is to provide "one-stop shopping" for data and information of interested to the Backscattered Ultraviolet (BUV) community. It is built from the well-used, highly successful Total Ozone Mapping Spectrometer (TOMS) web site, and is being evolved into a broader focus for the BUV community. This effort supports NASA's evolutionary step toward science measurement processing and analysis systems, and enables the BUV community to easily access information and expertise from multiple sources over a nearly 30 year history of space-based remote sensing of the atmosphere. It facilitates finding algorithms and scientific results from different parts of the BUV science community as well as from different instruments and missions. It provides the means to access the products of the Ozone Community Oriented Measurement-based Processing System (ComPS). The system contains components that store and manage data, manage user access to that data, provide multi-dimensional views of the data and other information, serve data based on user criteria, and facilitate on-line collaboration. The web site hosts Algorithm Theoretical Basis documents, quality assessment of data products, published papers, instrument descriptions, access to mission information, reports and assessments of events and issues, problem reporting and tracking, a moderated forum, and a user collaboration area. Visitors to the web site fall into several categories: the general public; students, educators, and researchers outside the BUV community; members of the BUV community who validate the measurements; members of the community who develop algorithms and software. Access to

  10. Error determination of a successive correction type objective analysis scheme. [for surface meteorological data

    NASA Technical Reports Server (NTRS)

    Smith, D. R.; Leslie, F. W.

    1984-01-01

    The Purdue Regional Objective Analysis of the Mesoscale (PROAM) is a successive correction type scheme for the analysis of surface meteorological data. The scheme is subjected to a series of experiments to evaluate its performance under a variety of analysis conditions. The tests include use of a known analytic temperature distribution to quantify error bounds for the scheme. Similar experiments were conducted using actual atmospheric data. Results indicate that the multiple pass technique increases the accuracy of the analysis. Furthermore, the tests suggest appropriate values for the analysis parameters in resolving disturbances for the data set used in this investigation.

  11. A scheme for supporting distributed data structures on multicomputers

    NASA Technical Reports Server (NTRS)

    Hiranandani, Seema; Saltz, Joel; Berryman, Harry; Mehrotra, Piyush

    1990-01-01

    A data migration mechanism is proposed that allows an explicit and controlled mapping of data to memory. While read or write copies of each data element can be assigned to any processor's memory, longer term storage of each data element is assigned to a specific location in the memory of a particular processor. The proposed integration of a data migration scheme with a compiler is able to eliminate the migration of unneeded data that can occur in multiprocessor paging or caching. The overhead of adjudicating multiple concurrent writes to the same page or cache line is also eliminated. Data is presented that suggests that the scheme may be a pratical method for efficiently supporting data migration.

  12. An authentication scheme to healthcare security under wireless sensor networks.

    PubMed

    Hsiao, Tsung-Chih; Liao, Yu-Ting; Huang, Jen-Yan; Chen, Tzer-Shyong; Horng, Gwo-Boa

    2012-12-01

    In recent years, Taiwan has been seeing an extension of the average life expectancy and a drop in overall fertility rate, initiating our country into an aged society. Due to this phenomenon, how to provide the elderly and patients with chronic diseases a suitable healthcare environment has become a critical issue presently. Therefore, we propose a new scheme that integrates healthcare services with wireless sensor technology in which sensor nodes are employed to measure patients' vital signs. Data collected from these sensor nodes are then transmitted to mobile devices of the medical staff and system administrator, promptly enabling them to understand the patients' condition in real time, which will significantly improve patients' healthcare quality. As per the personal data protection act, patients' vital signs can only be accessed by authorized medical staff. In order to protect patients', the system administrator will verify the medical staff's identity through the mobile device using a smart card and password mechanism. Accordingly, only the verified medical staff can obtain patients' vital signs data such as their blood pressure, pulsation, and body temperature, etc.. Besides, the scheme includes a time-bounded characteristic that allows the verified staff access to data without having to have to re-authenticate and re-login into the system within a set period of time. Consequently, the time-bounded property also increases the work efficiency of the system administrator and user.

  13. Data traffic reduction schemes for sparse Cholesky factorizations

    NASA Technical Reports Server (NTRS)

    Naik, Vijay K.; Patrick, Merrell L.

    1988-01-01

    Load distribution schemes are presented which minimize the total data traffic in the Cholesky factorization of dense and sparse, symmetric, positive definite matrices on multiprocessor systems with local and shared memory. The total data traffic in factoring an n x n sparse, symmetric, positive definite matrix representing an n-vertex regular 2-D grid graph using n (sup alpha), alpha is equal to or less than 1, processors are shown to be O(n(sup 1 + alpha/2)). It is O(n(sup 3/2)), when n (sup alpha), alpha is equal to or greater than 1, processors are used. Under the conditions of uniform load distribution, these results are shown to be asymptotically optimal. The schemes allow efficient use of up to O(n) processors before the total data traffic reaches the maximum value of O(n(sup 3/2)). The partitioning employed within the scheme, allows a better utilization of the data accessed from shared memory than those of previously published methods.

  14. A coprime blur scheme for data security in video surveillance.

    PubMed

    Thorpe, Christopher; Li, Feng; Li, Zijia; Yu, Zhan; Saunders, David; Yu, Jingyi

    2013-12-01

    This paper presents a novel coprime blurred pair (CBP) model to improve data security in camera surveillance. While most previous approaches have focused on completely encrypting the video stream, we introduce a spatial encryption scheme by strategically blurring the image/video contents. Specifically, we form a public stream and a private stream by blurring the original video data using two different kernels. Each blurred stream will provide the user who has lower clearance less access to personally identifiable details while still allowing behavior to be monitored. If the behavior is recognized as suspicious, a supervisor can use both streams to deblur the contents. Our approach is based on a new CBP theory where the two kernels are coprime when mapped to bivariate polynomials in the $(z)$ domain. We show that coprimality can be derived in terms of the rank of Bézout matrix formed by sampled polynomials, and we present an efficient algorithm to factor the Bézout matrix for recovering the latent image. To make our solution practical, we implement our decryption scheme on a graphics processing unit (GPU) to achieve real-time performance. Extensive experiments demonstrate that our new scheme can effectively protect sensitive identity information in surveillance videos and faithfully reconstruct the unblurred video stream when both CBP sequences are available.

  15. Energy harvesting schemes for building interior environment monitoring

    NASA Astrophysics Data System (ADS)

    Zylka, Pawel; Pociecha, Dominik

    2016-11-01

    A vision to supply microelectronic devices without batteries making them perpetual or extending time of service in battery-oriented mobile supply schemes is the driving force of the research related to ambient energy harvesting. Energy harnessing aims thus at extracting energy from various ambient energy "pools", which generally are cost- or powerineffective to be scaled up for full-size, power-plant energy generation schemes supplying energy in electric form. These include - but are not limited to - waste heat, electromagnetic hum, vibrations, or human-generated power in addition to traditional renewable energy resources like water flow, tidal and wind energy or sun radiation which can also be exploited at the miniature scale by energy scavengers. However, in case of taking advantage of energy harvesting strategies to power up sensors monitoring environment inside buildings adaptable energy sources are restrained to only some which additionally are limited in spatial and temporal accessibility as well as available power. The paper explores experimentally an energy harvesting scheme exploiting human kinesis applicable in indoor environment for supplying a wireless indoor micro-system, monitoring ambient air properties (pressure, humidity and temperature).

  16. Parenting Multiples

    MedlinePlus

    ... parents. It's important for caretakers to spend time speaking directly to each child, as well as reading to them and encouraging language. Social skills can come earlier for multiples, simply because they' ...

  17. On the security of a dynamic ID-based authentication scheme for telecare medical information systems.

    PubMed

    Lin, Han-Yu

    2013-04-01

    Telecare medical information systems (TMISs) are increasingly popular technologies for healthcare applications. Using TMISs, physicians and caregivers can monitor the vital signs of patients remotely. Since the database of TMISs stores patients' electronic medical records (EMRs), only authorized users should be granted the access to this information for the privacy concern. To keep the user anonymity, recently, Chen et al. proposed a dynamic ID-based authentication scheme for telecare medical information system. They claimed that their scheme is more secure and robust for use in a TMIS. However, we will demonstrate that their scheme fails to satisfy the user anonymity due to the dictionary attacks. It is also possible to derive a user password in case of smart card loss attacks. Additionally, an improved scheme eliminating these weaknesses is also presented.

  18. A secure user anonymity-preserving three-factor remote user authentication scheme for the telecare medicine information systems.

    PubMed

    Das, Ashok Kumar

    2015-03-01

    Recent advanced technology enables the telecare medicine information system (TMIS) for the patients to gain the health monitoring facility at home and also to access medical services over the Internet of mobile networks. Several remote user authentication schemes have been proposed in the literature for TMIS. However, most of them are either insecure against various known attacks or they are inefficient. Recently, Tan proposed an efficient user anonymity preserving three-factor authentication scheme for TMIS. In this paper, we show that though Tan's scheme is efficient, it has several security drawbacks such as (1) it fails to provide proper authentication during the login phase, (2) it fails to provide correct updation of password and biometric of a user during the password and biometric update phase, and (3) it fails to protect against replay attack. In addition, Tan's scheme lacks the formal security analysis and verification. Later, Arshad and Nikooghadam also pointed out some security flaws in Tan's scheme and then presented an improvement on Tan's s scheme. However, we show that Arshad and Nikooghadam's scheme is still insecure against the privileged-insider attack through the stolen smart-card attack, and it also lacks the formal security analysis and verification. In order to withstand those security loopholes found in both Tan's scheme, and Arshad and Nikooghadam's scheme, we aim to propose an effective and more secure three-factor remote user authentication scheme for TMIS. Our scheme provides the user anonymity property. Through the rigorous informal and formal security analysis using random oracle models and the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool, we show that our scheme is secure against various known attacks, including the replay and man-in-the-middle attacks. Furthermore, our scheme is also efficient as compared to other related schemes.

  19. Rapid Parameterization Schemes for Aircraft Shape Optimization

    NASA Technical Reports Server (NTRS)

    Li, Wu

    2012-01-01

    A rapid shape parameterization tool called PROTEUS is developed for aircraft shape optimization. This tool can be applied directly to any aircraft geometry that has been defined in PLOT3D format, with the restriction that each aircraft component must be defined by only one data block. PROTEUS has eight types of parameterization schemes: planform, wing surface, twist, body surface, body scaling, body camber line, shifting/scaling, and linear morphing. These parametric schemes can be applied to two types of components: wing-type surfaces (e.g., wing, canard, horizontal tail, vertical tail, and pylon) and body-type surfaces (e.g., fuselage, pod, and nacelle). These schemes permit the easy setup of commonly used shape modification methods, and each customized parametric scheme can be applied to the same type of component for any configuration. This paper explains the mathematics for these parametric schemes and uses two supersonic configurations to demonstrate the application of these schemes.

  20. An evolutionary Bayesian search scheme for ultrasound modulated optical tomography

    NASA Astrophysics Data System (ADS)

    Venugopal, Mamatha; Roy, Debasish; Vasu, Ram Mohan

    2016-04-01

    Ultrasound modulated optical tomography (UMOT) combines high optical contrast with high ultrasound resolution to image soft tissues. A focused ultrasound beam introduced to a specific region of interest (ROI) in the object modulates the mean position of the scattering centers locally. This in turn modulates the overall decay of the specific intensity of an incident coherent light beam as it passes through the insonified region. The inverse problem of UMOT aims to recover the mean-squared displacements of the scattering centers from the measured amplitude autocorrelation of light. We propose an evolutionary Bayesian search scheme to invert the measurements through repeated solves of the correlation diffusion equation so as to drive the resultant measurement-prediction misfit to a zero-mean Brownian process. The discretized parameter vector evolves as a stochastic process with respect to an iteration variable and follows a recursive prediction-update algorithm. The conventional multiplicative-weight-based Bayesian update schemes suffer from sample degeneracy and are consequently ill-equipped to solve large dimensional problems in imaging. The key idea of this work is to incorporate a derivative-free additive correction to the predicted parameter process via a gain term that is functionally analogous to the weights. The numerical results for simulated data indicate that the proposed scheme substantively improves the reconstruction accuracy vis-à-vis a popularly adopted regularized Gauss-Newton approach. The advantage of a derivative-free scheme is particularly highlighted in cases characterized by low sensitivity of measurements to variations in the parameters. Moreover, the proposed scheme circumvents the tedious Jacobian calculations involved in a Gauss-Newton approach.