78 FR 63915 - New Mailing Standards for Domestic Mailing Services Products
Federal Register 2010, 2011, 2012, 2013, 2014
2013-10-25
... locations. In addition, preparing FSS scheme pallets allows for the creation of larger pallets, which...-digit FSS scheme pools when addressed for delivery to any FSS 5-digit scheme combination per labeling... into a separate pool for each individual 5-digit FSS-scheme combination. Mailings that include 10 or...
One-third selection scheme for addressing a ferroelectric matrix arrangement
NASA Technical Reports Server (NTRS)
Tannas, Jr., Lawrence E. (Inventor)
1979-01-01
An improved scheme for selectively addressing a matrix arrangement comprised of ferroelectrics having x and y orthogonally disposed intersecting lines. A one-third selection scheme is utilized that includes normalized selection signals having amplitudes: V.sub.x =0; V.sub.x =2/3; V.sub.y =1/3; and V.sub.y =1, which signals can be applied to the intersection of an x and y-line. The instant selection scheme minimizes both hysteresis creep and the cross-coupling voltage between x and y-lines to prevent undesirable hysteresis switching of the ferroelectric matrix arrangement.
Song, Min Su; Lee, Jae Dong; Jeong, Young-Sik; Jeong, Hwa-Young; Park, Jong Hyuk
2014-01-01
Despite the convenience, ubiquitous computing suffers from many threats and security risks. Security considerations in the ubiquitous network are required to create enriched and more secure ubiquitous environments. The address resolution protocol (ARP) is a protocol used to identify the IP address and the physical address of the associated network card. ARP is designed to work without problems in general environments. However, since it does not include security measures against malicious attacks, in its design, an attacker can impersonate another host using ARP spoofing or access important information. In this paper, we propose a new detection scheme for ARP spoofing attacks using a routing trace, which can be used to protect the internal network. Tracing routing can find the change of network movement path. The proposed scheme provides high constancy and compatibility because it does not alter the ARP protocol. In addition, it is simple and stable, as it does not use a complex algorithm or impose extra load on the computer system.
Song, Min Su; Lee, Jae Dong; Jeong, Hwa-Young; Park, Jong Hyuk
2014-01-01
Despite the convenience, ubiquitous computing suffers from many threats and security risks. Security considerations in the ubiquitous network are required to create enriched and more secure ubiquitous environments. The address resolution protocol (ARP) is a protocol used to identify the IP address and the physical address of the associated network card. ARP is designed to work without problems in general environments. However, since it does not include security measures against malicious attacks, in its design, an attacker can impersonate another host using ARP spoofing or access important information. In this paper, we propose a new detection scheme for ARP spoofing attacks using a routing trace, which can be used to protect the internal network. Tracing routing can find the change of network movement path. The proposed scheme provides high constancy and compatibility because it does not alter the ARP protocol. In addition, it is simple and stable, as it does not use a complex algorithm or impose extra load on the computer system. PMID:25243205
A national medical register: balancing public transparency and professional privacy.
Healy, Judith M; Maffi, Costanza L; Dugdale, Paul
2008-02-18
The first aim of a medical registration scheme should be to protect patients. Medical registration boards currently offer variable information to the public on doctors' registration status. Current reform proposals for a national registration scheme should include free public access to professional profiles of registered medical practitioners. Practitioner profiles should include: practitioner's full name and practice address; type of qualifications; year first registered, and duration and type of registration; any conditions on registration and practice; any disciplinary action taken; and participation in continuing professional education.
A New UK 2006 National Kidney Allocation Scheme for deceased heart-beating donor kidneys.
Johnson, Rachel J; Fuggle, Susan V; Mumford, Lisa; Bradley, J Andrew; Forsythe, John L R; Rudge, Chris J
2010-02-27
In 2004, it was agreed that a new allocation scheme for kidneys from deceased heart-beating donors was required in the United Kingdom to address observed inequities in access to transplant. The 2006 National Kidney Allocation Scheme (2006 NKAS) was developed to meet agreed objectives and preparatory work included a review of the criteria for human leukocyte antigen (HLA) matching and simulation evidence about the effectiveness of alternative schemes. ALGORITHM FOR 2006 NKAS: The 2006 NKAS gives absolute priority to all 000 HLA-A, -B, -DR-mismatched patients and well-matched pediatric patients (<18 years), and then a points score defines priorities for allocation with waiting time being most influential. Points for age and HLA mismatch are linked in a novel approach to ensure well-matched transplants for younger patients while recognizing that HLA matching is less important for older patients as retransplantation is less likely to be required. To improve equity for difficult to match patients, rare HLA specificities were defaulted to more common, related specificities. IMPACT OF 2006 NKAS: After 3 years, the scheme is already making good progress in achieving its objectives, with overall results similar to those observed in the simulations. There has been a significant benefit for patients waiting more than 5 years for transplant. A number of other advantages of the scheme are also apparent with equity of access improving in many respects, including the achievement of equity of access to transplant for HLA-DR homozygous patients, but geographical inequity of access will take a number of years to address fully.
Project JOVE. [microgravity experiments and applications
NASA Technical Reports Server (NTRS)
Lyell, M. J.
1994-01-01
The goal of this project is to investigate new areas of research pertaining to free surface-interface fluids mechanics and/or microgravity which have potential commercial applications. This paper presents an introduction to ferrohydrodynamics (FHD), and discusses some applications. Also, computational methods for solving free surface flow problems are presented in detail. Both have diverse applications in industry and in microgravity fluids applications. Three different modeling schemes for FHD flows are addressed and the governing equations, including Maxwell's equations, are introduced. In the area of computational modeling of free surface flows, both Eulerian and Lagrangian schemes are discussed. The state of the art in computational methods applied to free surface flows is elucidated. In particular, adaptive grids and re-zoning methods are discussed. Additional research results are addressed and copies of the publications produced under the JOVE Project are included.
Developing and Modifying Behavioral Coding Schemes in Pediatric Psychology: A Practical Guide
McMurtry, C. Meghan; Chambers, Christine T.; Bakeman, Roger
2015-01-01
Objectives To provide a concise and practical guide to the development, modification, and use of behavioral coding schemes for observational data in pediatric psychology. Methods This article provides a review of relevant literature and experience in developing and refining behavioral coding schemes. Results A step-by-step guide to developing and/or modifying behavioral coding schemes is provided. Major steps include refining a research question, developing or refining the coding manual, piloting and refining the coding manual, and implementing the coding scheme. Major tasks within each step are discussed, and pediatric psychology examples are provided throughout. Conclusions Behavioral coding can be a complex and time-intensive process, but the approach is invaluable in allowing researchers to address clinically relevant research questions in ways that would not otherwise be possible. PMID:25416837
Meng, Qingyue; Fang, Hai; Liu, Xiaoyun; Yuan, Beibei; Xu, Jin
2015-10-10
Fragmentation in social health insurance schemes is an important factor for inequitable access to health care and financial protection for people covered by different health insurance schemes in China. To fulfil its commitment of universal health coverage by 2020, the Chinese Government needs to prioritise addressing this issue. After analysing the situation of fragmentation, this Review summarises efforts to consolidate health insurance schemes both in China and internationally. Rural migrants, elderly people, and those with non-communicable diseases in China will greatly benefit from consolidation of the existing health insurance schemes with extended funding pools, thereby narrowing the disparities among health insurance schemes in fund level and benefit package. Political commitments, institutional innovations, and a feasible implementation plan are the major elements needed for success in consolidation. Achievement of universal health coverage in China needs systemic strategies including consolidation of the social health insurance schemes. Copyright © 2015 Elsevier Ltd. All rights reserved.
Elgenaidi, Walid; Newe, Thomas; O'Connell, Eoin; Toal, Daniel; Dooly, Gerard
2016-12-21
There has been a significant increase in the proliferation and implementation of Wireless Sensor Networks (WSNs) in different disciplines, including the monitoring of maritime environments, healthcare systems, and industrial sectors. It has now become critical to address the security issues of data communication while considering sensor node constraints. There are many proposed schemes, including the scheme being proposed in this paper, to ensure that there is a high level of security in WSNs. This paper presents a symmetric security scheme for a maritime coastal environment monitoring WSN. The scheme provides security for travelling packets via individually encrypted links between authenticated neighbors, thus avoiding a reiteration of a global rekeying process. Furthermore, this scheme proposes a dynamic update key based on a trusted node configuration, called a leader node, which works as a trusted third party. The technique has been implemented in real time on a Waspmote test bed sensor platform and the results from both field testing and indoor bench testing environments are discussed in this paper.
Elgenaidi, Walid; Newe, Thomas; O’Connell, Eoin; Toal, Daniel; Dooly, Gerard
2016-01-01
There has been a significant increase in the proliferation and implementation of Wireless Sensor Networks (WSNs) in different disciplines, including the monitoring of maritime environments, healthcare systems, and industrial sectors. It has now become critical to address the security issues of data communication while considering sensor node constraints. There are many proposed schemes, including the scheme being proposed in this paper, to ensure that there is a high level of security in WSNs. This paper presents a symmetric security scheme for a maritime coastal environment monitoring WSN. The scheme provides security for travelling packets via individually encrypted links between authenticated neighbors, thus avoiding a reiteration of a global rekeying process. Furthermore, this scheme proposes a dynamic update key based on a trusted node configuration, called a leader node, which works as a trusted third party. The technique has been implemented in real time on a Waspmote test bed sensor platform and the results from both field testing and indoor bench testing environments are discussed in this paper. PMID:28009834
Automated Network Mapping and Topology Verification
2016-06-01
collection of information includes amplifying data about the networked devices such as hardware details, logical addressing schemes, 7 operating ...collection of information, including suggestions for reducing this burden, to Washington headquarters Services, Directorate for Information Operations ...maximum 200 words) The current military reliance on computer networks for operational missions and administrative duties makes network
Signature scheme based on bilinear pairs
NASA Astrophysics Data System (ADS)
Tong, Rui Y.; Geng, Yong J.
2013-03-01
An identity-based signature scheme is proposed by using bilinear pairs technology. The scheme uses user's identity information as public key such as email address, IP address, telephone number so that it erases the cost of forming and managing public key infrastructure and avoids the problem of user private generating center generating forgery signature by using CL-PKC framework to generate user's private key.
Developing and modifying behavioral coding schemes in pediatric psychology: a practical guide.
Chorney, Jill MacLaren; McMurtry, C Meghan; Chambers, Christine T; Bakeman, Roger
2015-01-01
To provide a concise and practical guide to the development, modification, and use of behavioral coding schemes for observational data in pediatric psychology. This article provides a review of relevant literature and experience in developing and refining behavioral coding schemes. A step-by-step guide to developing and/or modifying behavioral coding schemes is provided. Major steps include refining a research question, developing or refining the coding manual, piloting and refining the coding manual, and implementing the coding scheme. Major tasks within each step are discussed, and pediatric psychology examples are provided throughout. Behavioral coding can be a complex and time-intensive process, but the approach is invaluable in allowing researchers to address clinically relevant research questions in ways that would not otherwise be possible. © The Author 2014. Published by Oxford University Press on behalf of the Society of Pediatric Psychology. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.
2014-01-01
Background Nigeria has included a regulated community-based health insurance (CBHI) model within its National Health Insurance Scheme (NHIS). Uptake to date has been disappointing, however. The aim of this study is to review the present status of CBHI in SSA in general to highlight the issues that affect its successful integration within the NHIS of Nigeria and more widely in developing countries. Methods A literature survey using PubMed and EconLit was carried out to identify and review studies that report factors affecting implementation of CBHI in SSA with a focus on Nigeria. Results CBHI schemes with a variety of designs have been introduced across SSA but with generally disappointing results so far. Two exceptions are Ghana and Rwanda, both of which have introduced schemes with effective government control and support coupled with intensive implementation programmes. Poor support for CBHI is repeatedly linked elsewhere with failure to engage and account for the ‘real world’ needs of beneficiaries, lack of clear legislative and regulatory frameworks, inadequate financial support, and unrealistic enrolment requirements. Nigeria’s CBHI-type schemes for the informal sectors of its NHIS have been set up under an appropriate legislative framework, but work is needed to eliminate regressive financing, to involve scheme members in the setting up and management of programmes, to inform and educate more effectively, to eliminate lack of confidence in the schemes, and to address inequity in provision. Targeted subsidies should also be considered. Conclusions Disappointing uptake of CBHI-type NHIS elements in Nigeria can be addressed through closer integration of informal and formal programmes under the NHIS umbrella, with increasing involvement of beneficiaries in scheme design and management, improved communication and education, and targeted financial assistance. PMID:24559409
47 CFR 95.1111 - Frequency coordination.
Code of Federal Regulations, 2012 CFR
2012-10-01
..., title, office, phone number, fax number, e-mail address). (b) An authorized health care provider shall...) Modulation scheme used (including occupied bandwidth); (3) Effective radiated power; (4) Number of...) and model numbers); (5) Legal name of the authorized health care provider; (6) Location of transmitter...
Supervised Multi-Authority Scheme with Blind Signature for IoT with Attribute Based Encryption
NASA Astrophysics Data System (ADS)
Nissenbaum, O. V.; Ponomarov, K. Y.; Zaharov, A. A.
2018-04-01
This article proposes a three-side cryptographic scheme for verifying device attributes with a Supervisor and a Certification Authority (CA) for attribute-based encryption. Two options are suggested: using a message authentication code and using a digital signature. The first version is suitable for networks with one CA, and the second one for networks with several CAs, including dynamic systems. Also, the addition of this scheme with a blind signature is proposed to preserve the confidentiality of the device attributes from the CA. The introduction gives a definition and a brief historical overview of attribute-based encryption (ABE), addresses the use of ABE in the Internet of Things.
Distributed Dynamic Host Configuration Protocol (D2HCP)
Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez
2011-01-01
Mobile Ad Hoc Networks (MANETs) are multihop wireless networks of mobile nodes without any fixed or preexisting infrastructure. The topology of these networks can change randomly due to the unpredictable mobility of nodes and their propagation characteristics. In most networks, including MANETs, each node needs a unique identifier to communicate. This work presents a distributed protocol for dynamic node IP address assignment in MANETs. Nodes of a MANET synchronize from time to time to maintain a record of IP address assignments in the entire network and detect any IP address leaks. The proposed stateful autoconfiguration scheme uses the OLSR proactive routing protocol for synchronization and guarantees unique IP addresses under a variety of network conditions, including message losses and network partitioning. Simulation results show that the protocol incurs low latency and communication overhead for IP address assignment. PMID:22163856
Distributed Dynamic Host Configuration Protocol (D2HCP).
Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez
2011-01-01
Mobile Ad Hoc Networks (MANETs) are multihop wireless networks of mobile nodes without any fixed or preexisting infrastructure. The topology of these networks can change randomly due to the unpredictable mobility of nodes and their propagation characteristics. In most networks, including MANETs, each node needs a unique identifier to communicate. This work presents a distributed protocol for dynamic node IP address assignment in MANETs. Nodes of a MANET synchronize from time to time to maintain a record of IP address assignments in the entire network and detect any IP address leaks. The proposed stateful autoconfiguration scheme uses the OLSR proactive routing protocol for synchronization and guarantees unique IP addresses under a variety of network conditions, including message losses and network partitioning. Simulation results show that the protocol incurs low latency and communication overhead for IP address assignment.
Design of an extensive information representation scheme for clinical narratives.
Deléger, Louise; Campillos, Leonardo; Ligozat, Anne-Laure; Névéol, Aurélie
2017-09-11
Knowledge representation frameworks are essential to the understanding of complex biomedical processes, and to the analysis of biomedical texts that describe them. Combined with natural language processing (NLP), they have the potential to contribute to retrospective studies by unlocking important phenotyping information contained in the narrative content of electronic health records (EHRs). This work aims to develop an extensive information representation scheme for clinical information contained in EHR narratives, and to support secondary use of EHR narrative data to answer clinical questions. We review recent work that proposed information representation schemes and applied them to the analysis of clinical narratives. We then propose a unifying scheme that supports the extraction of information to address a large variety of clinical questions. We devised a new information representation scheme for clinical narratives that comprises 13 entities, 11 attributes and 37 relations. The associated annotation guidelines can be used to consistently apply the scheme to clinical narratives and are https://cabernet.limsi.fr/annotation_guide_for_the_merlot_french_clinical_corpus-Sept2016.pdf . The information scheme includes many elements of the major schemes described in the clinical natural language processing literature, as well as a uniquely detailed set of relations.
A Secure and Efficient Scalable Secret Image Sharing Scheme with Flexible Shadow Sizes.
Xie, Dong; Li, Lixiang; Peng, Haipeng; Yang, Yixian
2017-01-01
In a general (k, n) scalable secret image sharing (SSIS) scheme, the secret image is shared by n participants and any k or more than k participants have the ability to reconstruct it. The scalability means that the amount of information in the reconstructed image scales in proportion to the number of the participants. In most existing SSIS schemes, the size of each image shadow is relatively large and the dealer does not has a flexible control strategy to adjust it to meet the demand of differen applications. Besides, almost all existing SSIS schemes are not applicable under noise circumstances. To address these deficiencies, in this paper we present a novel SSIS scheme based on a brand-new technique, called compressed sensing, which has been widely used in many fields such as image processing, wireless communication and medical imaging. Our scheme has the property of flexibility, which means that the dealer can achieve a compromise between the size of each shadow and the quality of the reconstructed image. In addition, our scheme has many other advantages, including smooth scalability, noise-resilient capability, and high security. The experimental results and the comparison with similar works demonstrate the feasibility and superiority of our scheme.
Community oncology in an era of payment reform.
Cox, John V; Ward, Jeffery C; Hornberger, John C; Temel, Jennifer S; McAneny, Barbara L
2014-01-01
Patients and payers (government and private) are frustrated with the fee-for-service system (FFS) of payment for outpatient health services. FFS rewards volume and highly valued services, including expensive diagnostics and therapeutics, over lesser valued cognitive services. Proposed payment schemes would incent collaboration and coordination of care among providers and reward quality. In oncology, new payment schemes must address the high costs of all services, particularly drugs, while preserving the robust distribution of sites of service available to patients in the United States. Information technology and personalized cancer care are changing the practice of oncology. Twenty-first century oncology will require increasing cognitive work and shared decision making, both of which are not well regarded in the FFS model. A high proportion of health care dollars are consumed in the final months of life. Effective delivery of palliative and end-of-life care must be addressed by practice and by new models of payment. Value-based reimbursement schemes will require oncology practices to change how they are structured. Lessons drawn from the principles of primary care's Patient Centered Medical Home (PCMH) will help oncology practice to prepare for new schemes. PCMH principles place a premium on proactively addressing toxicities of therapies, coordinating care with other providers, and engaging patients in shared decision making, supporting the ideal of value defined in the triple aim-to measurably improve patient experience and quality of care at less cost. Payment reform will be disruptive to all. Oncology must be engaged in policy discussions and guide rational shifts in priorities defined by new payment models.
Contribution of the Recent AUSM Schemes to the Overflow Code: Implementation and Validation
NASA Technical Reports Server (NTRS)
Liou, Meng-Sing; Buning, Pieter G.
2000-01-01
We shall present results of a recent collaborative effort between the authors attempting to implement the numerical flux scheme, AUSM+ and its new developments, into a widely used NASA code, OVERFLOW. This paper is intended to give a thorough and systematic documentation about the solutions of default test cases using the AUSNI+ scheme. Hence we will address various aspects of numerical solutions, such as accuracy, convergence rate, and effects of turbulence models, over a variety of geometries, speed regimes. We will briefly describe the numerical schemes employed in the calculations, including the capability of solving for low-speed flows and multiphase flows by employing the concept of numerical speed of sound. As a bonus, this low Mach number formulations also enhances convergence to steady solutions for flows even at transonic speed. Calculations for complex 3D turbulent flows were performed with several turbulence models and the results display excellent agreements with measured data.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Guo Xiaoming
The dominated process of controlled fusion is to let nuclei gain enough kinetic energy to overcome Coulomb barrier. As a result, a fusion scheme can consider two factors in its design: to increase kinetic energy of nuclei and to alter the Coulomb barrier. Cold Fusion and Hot fusion are all one-factor schemes while Intermediate Fusion is a twofactors scheme. This made CINF kinetically superior. Cold Fusion reduces deuteron-deuteron distance, addressing Coulomb barrier, and Hot Fusion heat up plasma into extreme high temperature, addressing kinetic energy. Without enough kinetic energy made Cold Fusion skeptical. Extreme high temperature made Hot Fusion verymore » difficult to engineer. Because CIFN addresses both factors, CIFN is a more promising technique to be industrialized.« less
Kinetic advantage of controlled intermediate nuclear fusion
NASA Astrophysics Data System (ADS)
Guo, Xiaoming
2012-09-01
The dominated process of controlled fusion is to let nuclei gain enough kinetic energy to overcome Coulomb barrier. As a result, a fusion scheme can consider two factors in its design: to increase kinetic energy of nuclei and to alter the Coulomb barrier. Cold Fusion and Hot fusion are all one-factor schemes while Intermediate Fusion is a twofactors scheme. This made CINF kinetically superior. Cold Fusion reduces deuteron-deuteron distance, addressing Coulomb barrier, and Hot Fusion heat up plasma into extreme high temperature, addressing kinetic energy. Without enough kinetic energy made Cold Fusion skeptical. Extreme high temperature made Hot Fusion very difficult to engineer. Because CIFN addresses both factors, CIFN is a more promising technique to be industrialized.
A Secure and Efficient Scalable Secret Image Sharing Scheme with Flexible Shadow Sizes
Xie, Dong; Li, Lixiang; Peng, Haipeng; Yang, Yixian
2017-01-01
In a general (k, n) scalable secret image sharing (SSIS) scheme, the secret image is shared by n participants and any k or more than k participants have the ability to reconstruct it. The scalability means that the amount of information in the reconstructed image scales in proportion to the number of the participants. In most existing SSIS schemes, the size of each image shadow is relatively large and the dealer does not has a flexible control strategy to adjust it to meet the demand of differen applications. Besides, almost all existing SSIS schemes are not applicable under noise circumstances. To address these deficiencies, in this paper we present a novel SSIS scheme based on a brand-new technique, called compressed sensing, which has been widely used in many fields such as image processing, wireless communication and medical imaging. Our scheme has the property of flexibility, which means that the dealer can achieve a compromise between the size of each shadow and the quality of the reconstructed image. In addition, our scheme has many other advantages, including smooth scalability, noise-resilient capability, and high security. The experimental results and the comparison with similar works demonstrate the feasibility and superiority of our scheme. PMID:28072851
Ancestral inference from haplotypes and mutations.
Griffiths, Robert C; Tavaré, Simon
2018-04-25
We consider inference about the history of a sample of DNA sequences, conditional upon the haplotype counts and the number of segregating sites observed at the present time. After deriving some theoretical results in the coalescent setting, we implement rejection sampling and importance sampling schemes to perform the inference. The importance sampling scheme addresses an extension of the Ewens Sampling Formula for a configuration of haplotypes and the number of segregating sites in the sample. The implementations include both constant and variable population size models. The methods are illustrated by two human Y chromosome datasets. Copyright © 2018. Published by Elsevier Inc.
A back-fitting algorithm to improve real-time flood forecasting
NASA Astrophysics Data System (ADS)
Zhang, Xiaojing; Liu, Pan; Cheng, Lei; Liu, Zhangjun; Zhao, Yan
2018-07-01
Real-time flood forecasting is important for decision-making with regards to flood control and disaster reduction. The conventional approach involves a postprocessor calibration strategy that first calibrates the hydrological model and then estimates errors. This procedure can simulate streamflow consistent with observations, but obtained parameters are not optimal. Joint calibration strategies address this issue by refining hydrological model parameters jointly with the autoregressive (AR) model. In this study, five alternative schemes are used to forecast floods. Scheme I uses only the hydrological model, while scheme II includes an AR model for error correction. In scheme III, differencing is used to remove non-stationarity in the error series. A joint inference strategy employed in scheme IV calibrates the hydrological and AR models simultaneously. The back-fitting algorithm, a basic approach for training an additive model, is adopted in scheme V to alternately recalibrate hydrological and AR model parameters. The performance of the five schemes is compared with a case study of 15 recorded flood events from China's Baiyunshan reservoir basin. Our results show that (1) schemes IV and V outperform scheme III during the calibration and validation periods and (2) scheme V is inferior to scheme IV in the calibration period, but provides better results in the validation period. Joint calibration strategies can therefore improve the accuracy of flood forecasting. Additionally, the back-fitting recalibration strategy produces weaker overcorrection and a more robust performance compared with the joint inference strategy.
Advanced mobility handover for mobile IPv6 based wireless networks.
Safa Sadiq, Ali; Fisal, Norsheila Binti; Ghafoor, Kayhan Zrar; Lloret, Jaime
2014-01-01
We propose an Advanced Mobility Handover scheme (AMH) in this paper for seamless mobility in MIPv6-based wireless networks. In the proposed scheme, the mobile node utilizes a unique home IPv6 address developed to maintain communication with other corresponding nodes without a care-of-address during the roaming process. The IPv6 address for each MN during the first round of AMH process is uniquely identified by HA using the developed MN-ID field as a global permanent, which is identifying uniquely the IPv6 address of MN. Moreover, a temporary MN-ID is generated by access point each time an MN is associated with a particular AP and temporarily saved in a developed table inside the AP. When employing the AMH scheme, the handover process in the network layer is performed prior to its default time. That is, the mobility handover process in the network layer is tackled by a trigger developed AMH message to the next access point. Thus, a mobile node keeps communicating with the current access point while the network layer handover is executed by the next access point. The mathematical analyses and simulation results show that the proposed scheme performs better as compared with the existing approaches.
MeMoVolc report on classification and dynamics of volcanic explosive eruptions
NASA Astrophysics Data System (ADS)
Bonadonna, C.; Cioni, R.; Costa, A.; Druitt, T.; Phillips, J.; Pioli, L.; Andronico, D.; Harris, A.; Scollo, S.; Bachmann, O.; Bagheri, G.; Biass, S.; Brogi, F.; Cashman, K.; Dominguez, L.; Dürig, T.; Galland, O.; Giordano, G.; Gudmundsson, M.; Hort, M.; Höskuldsson, A.; Houghton, B.; Komorowski, J. C.; Küppers, U.; Lacanna, G.; Le Pennec, J. L.; Macedonio, G.; Manga, M.; Manzella, I.; Vitturi, M. de'Michieli; Neri, A.; Pistolesi, M.; Polacci, M.; Ripepe, M.; Rossi, E.; Scheu, B.; Sulpizio, R.; Tripoli, B.; Valade, S.; Valentine, G.; Vidal, C.; Wallenstein, N.
2016-11-01
Classifications of volcanic eruptions were first introduced in the early twentieth century mostly based on qualitative observations of eruptive activity, and over time, they have gradually been developed to incorporate more quantitative descriptions of the eruptive products from both deposits and observations of active volcanoes. Progress in physical volcanology, and increased capability in monitoring, measuring and modelling of explosive eruptions, has highlighted shortcomings in the way we classify eruptions and triggered a debate around the need for eruption classification and the advantages and disadvantages of existing classification schemes. Here, we (i) review and assess existing classification schemes, focussing on subaerial eruptions; (ii) summarize the fundamental processes that drive and parameters that characterize explosive volcanism; (iii) identify and prioritize the main research that will improve the understanding, characterization and classification of volcanic eruptions and (iv) provide a roadmap for producing a rational and comprehensive classification scheme. In particular, classification schemes need to be objective-driven and simple enough to permit scientific exchange and promote transfer of knowledge beyond the scientific community. Schemes should be comprehensive and encompass a variety of products, eruptive styles and processes, including for example, lava flows, pyroclastic density currents, gas emissions and cinder cone or caldera formation. Open questions, processes and parameters that need to be addressed and better characterized in order to develop more comprehensive classification schemes and to advance our understanding of volcanic eruptions include conduit processes and dynamics, abrupt transitions in eruption regime, unsteadiness, eruption energy and energy balance.
Scheduling Future Water Supply Investments Under Uncertainty
NASA Astrophysics Data System (ADS)
Huskova, I.; Matrosov, E. S.; Harou, J. J.; Kasprzyk, J. R.; Reed, P. M.
2014-12-01
Uncertain hydrological impacts of climate change, population growth and institutional changes pose a major challenge to planning of water supply systems. Planners seek optimal portfolios of supply and demand management schemes but also when to activate assets whilst considering many system goals and plausible futures. Incorporation of scheduling into the planning under uncertainty problem strongly increases its complexity. We investigate some approaches to scheduling with many-objective heuristic search. We apply a multi-scenario many-objective scheduling approach to the Thames River basin water supply system planning problem in the UK. Decisions include which new supply and demand schemes to implement, at what capacity and when. The impact of different system uncertainties on scheme implementation schedules are explored, i.e. how the choice of future scenarios affects the search process and its outcomes. The activation of schemes is influenced by the occurrence of extreme hydrological events in the ensemble of plausible scenarios and other factors. The approach and results are compared with a previous study where only the portfolio problem is addressed (without scheduling).
NASA Technical Reports Server (NTRS)
Milman, Mark H.
1988-01-01
The fundamental control synthesis issue of establishing a priori convergence rates of approximation schemes for feedback controllers for a class of distributed parameter systems is addressed within the context of hereditary schemes. Specifically, a factorization approach is presented for deriving approximations to the optimal feedback gains for the linear regulator-quadratic cost problem associated with time-varying functional differential equations with control delays. The approach is based on a discretization of the state penalty which leads to a simple structure for the feedback control law. General properties of the Volterra factors of Hilbert-Schmidt operators are then used to obtain convergence results for the controls, trajectories and feedback kernels. Two algorithms are derived from the basic approximation scheme, including a fast algorithm, in the time-invariant case. A numerical example is also considered.
ERIC Educational Resources Information Center
Carbone, Angela
2014-01-01
This paper outlines a peer-assisted teaching scheme (PATS) which was piloted in the Faculty of Information Technology at Monash University, Australia to address the low student satisfaction with the quality of information and communication technology units. Positive results from the pilot scheme led to a trial of the scheme in other disciplines.…
Simple Peer-to-Peer SIP Privacy
NASA Astrophysics Data System (ADS)
Koskela, Joakim; Tarkoma, Sasu
In this paper, we introduce a model for enhancing privacy in peer-to-peer communication systems. The model is based on data obfuscation, preventing intermediate nodes from tracking calls, while still utilizing the shared resources of the peer network. This increases security when moving between untrusted, limited and ad-hoc networks, when the user is forced to rely on peer-to-peer schemes. The model is evaluated using a Host Identity Protocol-based prototype on mobile devices, and is found to provide good privacy, especially when combined with a source address hiding scheme. The contribution of this paper is to present the model and results obtained from its use, including usability considerations.
Calculating lattice thermal conductivity: a synopsis
NASA Astrophysics Data System (ADS)
Fugallo, Giorgia; Colombo, Luciano
2018-04-01
We provide a tutorial introduction to the modern theoretical and computational schemes available to calculate the lattice thermal conductivity in a crystalline dielectric material. While some important topics in thermal transport will not be covered (including thermal boundary resistance, electronic thermal conduction, and thermal rectification), we aim at: (i) framing the calculation of thermal conductivity within the general non-equilibrium thermodynamics theory of transport coefficients, (ii) presenting the microscopic theory of thermal conduction based on the phonon picture and the Boltzmann transport equation, and (iii) outlining the molecular dynamics schemes to calculate heat transport. A comparative and critical addressing of the merits and drawbacks of each approach will be discussed as well.
A Secure Watermarking Scheme for Buyer-Seller Identification and Copyright Protection
NASA Astrophysics Data System (ADS)
Ahmed, Fawad; Sattar, Farook; Siyal, Mohammed Yakoob; Yu, Dan
2006-12-01
We propose a secure watermarking scheme that integrates watermarking with cryptography for addressing some important issues in copyright protection. We address three copyright protection issues—buyer-seller identification, copyright infringement, and ownership verification. By buyer-seller identification, we mean that a successful watermark extraction at the buyer's end will reveal the identities of the buyer and seller of the watermarked image. For copyright infringement, our proposed scheme enables the seller to identify the specific buyer from whom an illegal copy of the watermarked image has originated, and further prove this fact to a third party. For multiple ownership claims, our scheme enables a legal seller to claim his/her ownership in the court of law. We will show that the combination of cryptography with watermarking not only increases the security of the overall scheme, but it also enables to associate identities of buyer/seller with their respective watermarked images.
All-IP wireless sensor networks for real-time patient monitoring.
Wang, Xiaonan; Le, Deguang; Cheng, Hongbin; Xie, Conghua
2014-12-01
This paper proposes the all-IP WSNs (wireless sensor networks) for real-time patient monitoring. In this paper, the all-IP WSN architecture based on gateway trees is proposed and the hierarchical address structure is presented. Based on this architecture, the all-IP WSN can perform routing without route discovery. Moreover, a mobile node is always identified by a home address and it does not need to be configured with a care-of address during the mobility process, so the communication disruption caused by the address change is avoided. Through the proposed scheme, a physician can monitor the vital signs of a patient at any time and at any places, and according to the IPv6 address he can also obtain the location information of the patient in order to perform effective and timely treatment. Finally, the proposed scheme is evaluated based on the simulation, and the simulation data indicate that the proposed scheme might effectively reduce the communication delay and control cost, and lower the packet loss rate. Copyright © 2014 Elsevier Inc. All rights reserved.
Fast Pixel Buffer For Processing With Lookup Tables
NASA Technical Reports Server (NTRS)
Fisher, Timothy E.
1992-01-01
Proposed scheme for buffering data on intensities of picture elements (pixels) of image increases rate or processing beyond that attainable when data read, one pixel at time, from main image memory. Scheme applied in design of specialized image-processing circuitry. Intended to optimize performance of processor in which electronic equivalent of address-lookup table used to address those pixels in main image memory required for processing.
Fast, accurate semiempirical molecular orbital calculations for macromolecules
NASA Astrophysics Data System (ADS)
Dixon, Steven L.; Merz, Kenneth M., Jr.
1997-07-01
A detailed review of the semiempirical divide-and-conquer (D&C) method is given, including a new approach to subsetting, which involves dual buffer regions. Comparisons are drawn between this method and other semiempirical macromolecular schemes. D&C calculations are carried out using a basic 32 Mbyte memory workstation on a variety of peptide systems, including proteins containing up to 1960 atoms. Aspects of storage and SCF convergence are addressed, and parallelization of the D&C algorithm is discussed.
ERIC Educational Resources Information Center
St. James-Roberts, Ian; Alston, Enid
2006-01-01
Background: WILSTAAR comprises a programme for identifying and treating 8-10-month-old infants who are at risk of language and cognitive difficulties. It has been adopted by health trusts, and included in Sure Start intervention schemes, throughout the UK. This study addresses one of the main queries raised by critics of the programme, by…
NASA Astrophysics Data System (ADS)
Taitano, W. T.; Chacón, L.; Simakov, A. N.
2018-07-01
We consider a 1D-2V Vlasov-Fokker-Planck multi-species ionic description coupled to fluid electrons. We address temporal stiffness with implicit time stepping, suitably preconditioned. To address temperature disparity in time and space, we extend the conservative adaptive velocity-space discretization scheme proposed in [Taitano et al., J. Comput. Phys., 318, 391-420, (2016)] to a spatially inhomogeneous system. In this approach, we normalize the velocity-space coordinate to a temporally and spatially varying local characteristic speed per species. We explicitly consider the resulting inertial terms in the Vlasov equation, and derive a discrete formulation that conserves mass, momentum, and energy up to a prescribed nonlinear tolerance upon convergence. Our conservation strategy employs nonlinear constraints to enforce these properties discretely for both the Vlasov operator and the Fokker-Planck collision operator. Numerical examples of varying degrees of complexity, including shock-wave propagation, demonstrate the favorable efficiency and accuracy properties of the scheme.
Advanced Mobility Handover for Mobile IPv6 Based Wireless Networks
Safa Sadiq, Ali; Fisal, Norsheila Binti; Ghafoor, Kayhan Zrar; Lloret, Jaime
2014-01-01
We propose an Advanced Mobility Handover scheme (AMH) in this paper for seamless mobility in MIPv6-based wireless networks. In the proposed scheme, the mobile node utilizes a unique home IPv6 address developed to maintain communication with other corresponding nodes without a care-of-address during the roaming process. The IPv6 address for each MN during the first round of AMH process is uniquely identified by HA using the developed MN-ID field as a global permanent, which is identifying uniquely the IPv6 address of MN. Moreover, a temporary MN-ID is generated by access point each time an MN is associated with a particular AP and temporarily saved in a developed table inside the AP. When employing the AMH scheme, the handover process in the network layer is performed prior to its default time. That is, the mobility handover process in the network layer is tackled by a trigger developed AMH message to the next access point. Thus, a mobile node keeps communicating with the current access point while the network layer handover is executed by the next access point. The mathematical analyses and simulation results show that the proposed scheme performs better as compared with the existing approaches. PMID:25614890
Bio-inspired online variable recruitment control of fluidic artificial muscles
NASA Astrophysics Data System (ADS)
Jenkins, Tyler E.; Chapman, Edward M.; Bryant, Matthew
2016-12-01
This paper details the creation of a hybrid variable recruitment control scheme for fluidic artificial muscle (FAM) actuators with an emphasis on maximizing system efficiency and switching control performance. Variable recruitment is the process of altering a system’s active number of actuators, allowing operation in distinct force regimes. Previously, FAM variable recruitment was only quantified with offline, manual valve switching; this study addresses the creation and characterization of novel, on-line FAM switching control algorithms. The bio-inspired algorithms are implemented in conjunction with a PID and model-based controller, and applied to a simulated plant model. Variable recruitment transition effects and chatter rejection are explored via a sensitivity analysis, allowing a system designer to weigh tradeoffs in actuator modeling, algorithm choice, and necessary hardware. Variable recruitment is further developed through simulation of a robotic arm tracking a variety of spline position inputs, requiring several levels of actuator recruitment. Switching controller performance is quantified and compared with baseline systems lacking variable recruitment. The work extends current variable recruitment knowledge by creating novel online variable recruitment control schemes, and exploring how online actuator recruitment affects system efficiency and control performance. Key topics associated with implementing a variable recruitment scheme, including the effects of modeling inaccuracies, hardware considerations, and switching transition concerns are also addressed.
Bulimia nervosa: friend or foe? The pros and cons of bulimia nervosa.
Serpell, Lucy; Treasure, Janet
2002-09-01
The aim of the current study was to use a qualitative approach to investigate the attitude of people with bulimia nervosa (BN) to their illness. Patients with BN were asked to write two letters to their bulimia, one addressing it as a friend and the other addressing it as an enemy. We used a coding scheme to classify themes in letters of people with anorexia nervosa (AN) to group together themes expressed by those with BN. We revised the coding scheme to include themes that were not present in the letters of people with AN. There were both similarities and differences in the themes described by AN and BN patients. Two positive themes (BN allowing the individuals to eat and not get fat and BN as a way of dealing with boredom) and two negative themes (shame or low self-esteem resulting from BN and obsessive thoughts of weight and shape) were added to the coding scheme to account for these differences. The positive and negative aspects of BN differ in some important ways from those expressed by patients with AN. The meaning of these differences is discussed with reference to the wider symptom pattern of BN compared with AN and their importance with reference to motivation for change is outlined. Copyright 2002 by Wiley Periodicals, Inc.
Relative position coordinated control for spacecraft formation flying with communication delays
NASA Astrophysics Data System (ADS)
Ran, Dechao; Chen, Xiaoqian; Misra, Arun K.; Xiao, Bing
2017-08-01
This study addresses a relative position coordinated control problem for spacecraft formation flying subject to directed communication topology. Two different kinds of communication delay cases, including time-varying delays and arbitrarily bounded delays are investigated. Using the backstepping control technique, two virtual velocity control inputs are firstly designed to achieve coordinated position tracking for the kinematic subsystem. Furthermore, a hyperbolic tangent function is introduced to guarantee the boundedness of the virtual controller. Then, a finite-time control algorithm is designed for the dynamic subsystem. It can guarantee that the virtual velocity can be followed by the real velocity after finite time. It is theoretically proved that the proposed control scheme can asymptotically stabilize the closed-loop system. Numerical simulations are further presented that not only highlight closed-loop performance benefiting from the proposed control scheme, but also illustrate its superiority in comparison with conventional formation control schemes.
Williams, Nefyn H; Hendry, Maggie; France, Barbara; Lewis, Ruth; Wilkinson, Clare
2007-12-01
Despite the health benefits of physical activity, most adults do not take the recommended amount of exercise. To assess whether exercise-referral schemes are effective in improving exercise participation in sedentary adults. Systematic review. Studies were identified by searching MEDLINE, CINAHL, EMBASE, AMED, PsycINFO, SPORTDiscus, The Cochrane Library and SIGLE until March 2007. Randomised controlled trials (RCTs), observational studies, process evaluations and qualitative studies of exercise-referral schemes, defined as referral by a primary care clinician to a programme that encouraged physical activity or exercise were included. RCT results were combined in a meta-analysis where there was sufficient homogeneity. Eighteen studies were included in the review. These comprised six RCTs, one non-randomised controlled study, four observational studies, six process evaluations and one qualitative study. In addition, two of the RCTs and two of the process evaluations incorporated a qualitative component. Results from five RCTs were combined in a meta-analysis. There was a statistically significant increase in the numbers of participants doing moderate exercise with a combined relative risk of 1.20 (95% confidence intervals = 1.06 to 1.35). This means that 17 sedentary adults would need to be referred for one to become moderately active. This small effect may be at least partly due to poor rates of uptake and adherence to the exercise schemes. Exercise-referral schemes have a small effect on increasing physical activity in sedentary people. The key challenge, if future exercise-referral schemes are to be commissioned by the NHS, is to increase uptake and improve adherence by addressing the barriers described in these studies.
Two-nucleon S10 amplitude zero in chiral effective field theory
NASA Astrophysics Data System (ADS)
Sánchez, M. Sánchez; Yang, C.-J.; Long, Bingwei; van Kolck, U.
2018-02-01
We present a new rearrangement of short-range interactions in the S10 nucleon-nucleon channel within chiral effective field theory. This is intended to address the slow convergence of Weinberg's scheme, which we attribute to its failure to reproduce the amplitude zero (scattering momentum ≃340 MeV) at leading order. After the power counting scheme is modified to accommodate the zero at leading order, it includes subleading corrections perturbatively in a way that is consistent with renormalization-group invariance. Systematic improvement is shown at next-to-leading order, and we obtain results that fit empirical phase shifts remarkably well all the way up to the pion-production threshold. An approach in which pions have been integrated out is included, which allows us to derive analytic results that also fit phenomenology surprisingly well.
New regularization scheme for blind color image deconvolution
NASA Astrophysics Data System (ADS)
Chen, Li; He, Yu; Yap, Kim-Hui
2011-01-01
This paper proposes a new regularization scheme to address blind color image deconvolution. Color images generally have a significant correlation among the red, green, and blue channels. Conventional blind monochromatic deconvolution algorithms handle each color image channels independently, thereby ignoring the interchannel correlation present in the color images. In view of this, a unified regularization scheme for image is developed to recover edges of color images and reduce color artifacts. In addition, by using the color image properties, a spectral-based regularization operator is adopted to impose constraints on the blurs. Further, this paper proposes a reinforcement regularization framework that integrates a soft parametric learning term in addressing blind color image deconvolution. A blur modeling scheme is developed to evaluate the relevance of manifold parametric blur structures, and the information is integrated into the deconvolution scheme. An optimization procedure called alternating minimization is then employed to iteratively minimize the image- and blur-domain cost functions. Experimental results show that the method is able to achieve satisfactory restored color images under different blurring conditions.
Slaughter, Susan E; Zimmermann, Gabrielle L; Nuspl, Megan; Hanson, Heather M; Albrecht, Lauren; Esmail, Rosmin; Sauro, Khara; Newton, Amanda S; Donald, Maoliosa; Dyson, Michele P; Thomson, Denise; Hartling, Lisa
2017-12-06
As implementation science advances, the number of interventions to promote the translation of evidence into healthcare, health systems, or health policy is growing. Accordingly, classification schemes for these knowledge translation (KT) interventions have emerged. A recent scoping review identified 51 classification schemes of KT interventions to integrate evidence into healthcare practice; however, the review did not evaluate the quality of the classification schemes or provide detailed information to assist researchers in selecting a scheme for their context and purpose. This study aimed to further examine and assess the quality of these classification schemes of KT interventions, and provide information to aid researchers when selecting a classification scheme. We abstracted the following information from each of the original 51 classification scheme articles: authors' objectives; purpose of the scheme and field of application; socioecologic level (individual, organizational, community, system); adaptability (broad versus specific); target group (patients, providers, policy-makers), intent (policy, education, practice), and purpose (dissemination versus implementation). Two reviewers independently evaluated the methodological quality of the development of each classification scheme using an adapted version of the AGREE II tool. Based on these assessments, two independent reviewers reached consensus about whether to recommend each scheme for researcher use, or not. Of the 51 original classification schemes, we excluded seven that were not specific classification schemes, not accessible or duplicates. Of the remaining 44 classification schemes, nine were not recommended. Of the 35 recommended classification schemes, ten focused on behaviour change and six focused on population health. Many schemes (n = 29) addressed practice considerations. Fewer schemes addressed educational or policy objectives. Twenty-five classification schemes had broad applicability, six were specific, and four had elements of both. Twenty-three schemes targeted health providers, nine targeted both patients and providers and one targeted policy-makers. Most classification schemes were intended for implementation rather than dissemination. Thirty-five classification schemes of KT interventions were developed and reported with sufficient rigour to be recommended for use by researchers interested in KT in healthcare. Our additional categorization and quality analysis will aid in selecting suitable classification schemes for research initiatives in the field of implementation science.
ARPANET Routing Algorithm Improvements. Volume 1
1980-08-01
the currently active PROCESS (at the head of the scheduling list). TIME returns the time. PASSIVATE puts the CURRENT PROCESS to sleep , and wakes uD...Ccntract. Network buffer managemenL issues are discussed and a new buffer managemet scheme for f the ARPANET is designed. Logical addressing is discussed...and a design is given for a logical addressing scheme suitable for ARPANET or DIN II. The applicability of ARPANET Routing to DIN II is evaluaced. The
High-performance parallel analysis of coupled problems for aircraft propulsion
NASA Technical Reports Server (NTRS)
Felippa, C. A.; Farhat, C.; Lanteri, S.; Gumaste, U.; Ronaghi, M.
1994-01-01
Applications are described of high-performance parallel, computation for the analysis of complete jet engines, considering its multi-discipline coupled problem. The coupled problem involves interaction of structures with gas dynamics, heat conduction and heat transfer in aircraft engines. The methodology issues addressed include: consistent discrete formulation of coupled problems with emphasis on coupling phenomena; effect of partitioning strategies, augmentation and temporal solution procedures; sensitivity of response to problem parameters; and methods for interfacing multiscale discretizations in different single fields. The computer implementation issues addressed include: parallel treatment of coupled systems; domain decomposition and mesh partitioning strategies; data representation in object-oriented form and mapping to hardware driven representation, and tradeoff studies between partitioning schemes and fully coupled treatment.
New User Support in the University Network with DACS Scheme
ERIC Educational Resources Information Center
Odagiri, Kazuya; Yaegashi, Rihito; Tadauchi, Masaharu; Ishii, Naohiro
2007-01-01
Purpose: The purpose of this paper is to propose and examine the new user support in university network. Design/methodology/approach: The new user support is realized by use of DACS (Destination Addressing Control System) Scheme which manages a whole network system through communication control on a client computer. This DACS Scheme has been…
Kerberos authentication: The security answer for unsecured networks
DOE Office of Scientific and Technical Information (OSTI.GOV)
Engert, D.E.
1995-06-01
Traditional authentication schemes do not properly address the problems encountered with today`s unsecured networks. Kerbmm developed by MIT, on the other hand is designed to operate in an open unsecured network, yet provide good authentication and security including encrypted session traffic. Basic Kerberos principles as well as experiences of the ESnet Authentication Pilot Project with Cross Realm. Authentication between four National Laboratories will also be described.
NASA Technical Reports Server (NTRS)
Stano, Geoffrey T.; Fuelberg, Henry E.; Roeder, William P.
2010-01-01
This research addresses the 45th Weather Squadron's (45WS) need for improved guidance regarding lightning cessation at Cape Canaveral Air Force Station and Kennedy Space Center (KSC). KSC's Lightning Detection and Ranging (LDAR) network was the primary observational tool to investigate both cloud-to-ground and intracloud lightning. Five statistical and empirical schemes were created from LDAR, sounding, and radar parameters derived from 116 storms. Four of the five schemes were unsuitable for operational use since lightning advisories would be canceled prematurely, leading to safety risks to personnel. These include a correlation and regression tree analysis, three variants of multiple linear regression, event time trending, and the time delay between the greatest height of the maximum dBZ value to the last flash. These schemes failed to adequately forecast the maximum interval, the greatest time between any two flashes in the storm. The majority of storms had a maximum interval less than 10 min, which biased the schemes toward small values. Success was achieved with the percentile method (PM) by separating the maximum interval into percentiles for the 100 dependent storms.
Generalization of the event-based Carnevale-Hines integration scheme for integrate-and-fire models.
van Elburg, Ronald A J; van Ooyen, Arjen
2009-07-01
An event-based integration scheme for an integrate-and-fire neuron model with exponentially decaying excitatory synaptic currents and double exponential inhibitory synaptic currents has been introduced by Carnevale and Hines. However, the integration scheme imposes nonphysiological constraints on the time constants of the synaptic currents, which hamper its general applicability. This letter addresses this problem in two ways. First, we provide physical arguments demonstrating why these constraints on the time constants can be relaxed. Second, we give a formal proof showing which constraints can be abolished. As part of our formal proof, we introduce the generalized Carnevale-Hines lemma, a new tool for comparing double exponentials as they naturally occur in many cascaded decay systems, including receptor-neurotransmitter dissociation followed by channel closing. Through repeated application of the generalized lemma, we lift most of the original constraints on the time constants. Thus, we show that the Carnevale-Hines integration scheme for the integrate-and-fire model can be employed for simulating a much wider range of neuron and synapse types than was previously thought.
Connection anonymity analysis in coded-WDM PONs
NASA Astrophysics Data System (ADS)
Sue, Chuan-Ching
2008-04-01
A coded wavelength division multiplexing passive optical network (WDM PON) is presented for fiber to the home (FTTH) systems to protect against eavesdropping. The proposed scheme applies spectral amplitude coding (SAC) with a unipolar maximal-length sequence (M-sequence) code matrix to generate a specific signature address (coding) and to retrieve its matching address codeword (decoding) by exploiting the cyclic properties inherent in array waveguide grating (AWG) routers. In addition to ensuring the confidentiality of user data, the proposed coded-WDM scheme is also a suitable candidate for the physical layer with connection anonymity. Under the assumption that the eavesdropper applies a photo-detection strategy, it is shown that the coded WDM PON outperforms the conventional TDM PON and WDM PON schemes in terms of a higher degree of connection anonymity. Additionally, the proposed scheme allows the system operator to partition the optical network units (ONUs) into appropriate groups so as to achieve a better degree of anonymity.
NASA Astrophysics Data System (ADS)
Kaminski, J. W.; Semeniuk, K.; McConnell, J. C.; Lupu, A.; Mamun, A.
2012-12-01
The Global Environmental Multiscale model for Air Quality and climate change (GEM-AC) is a global general circulation model based on the GEM model developed by the Meteorological Service of Canada for operational weather forecasting. It can be run with a global uniform (GU) grid or a global variable (GV) grid where the core has uniform grid spacing and the exterior grid expands. With a GV grid high resolution regional runs can be accomplished without a concern for boundary conditions. The work described here uses GEM version 3.3.2. The gas-phase chemistry consists in detailed reactions of Ox, NOx, HOx, CO, CH4, NMVOCs, halocarbons, ClOx and BrO. We have recently added elements of the Global Modal-aerosol eXtension (GMXe) scheme to address aerosol microphysics and gas-aerosol partitioning. The evaluation of the MESSY GMXe aerosol scheme is addressed in another poster. The Canadian aerosol module (CAM) is also available. Tracers are advected using the semi-Lagrangian scheme native to GEM. The vertical transport includes parameterized subgrid scale turbulence and large scale convection. Dry deposition is implemented as a flux boundary condition in the vertical diffusion equation. For climate runs the GHGs CO2, CH4, N2O, CFCs in the radiation scheme are adjusted to the scenario considered. In GV regional mode at high resolutions a lake model, FLAKE is also included. Wet removal comprises both in-cloud and below-cloud scavenging. With the gas phase chemistry the model has been run for a series of ten year time slices on a 3°×3° global grid with 77 hybrid levels from the surface to 0.15 hPa. The tropospheric and stratospheric gas phase results are compared with satellite measurements including, ACE, MIPAS, MOPITT, and OSIRIS. Current evaluations of the ozone field and other stratospheric fields are encouraging and tropospheric lifetimes for CH4 and CH3CCl3 are in reasonable accord with tropospheric models. We will present results for current and future climate conditions forced by SST for 2050.
Image Coding Based on Address Vector Quantization.
NASA Astrophysics Data System (ADS)
Feng, Yushu
Image coding is finding increased application in teleconferencing, archiving, and remote sensing. This thesis investigates the potential of Vector Quantization (VQ), a relatively new source coding technique, for compression of monochromatic and color images. Extensions of the Vector Quantization technique to the Address Vector Quantization method have been investigated. In Vector Quantization, the image data to be encoded are first processed to yield a set of vectors. A codeword from the codebook which best matches the input image vector is then selected. Compression is achieved by replacing the image vector with the index of the code-word which produced the best match, the index is sent to the channel. Reconstruction of the image is done by using a table lookup technique, where the label is simply used as an address for a table containing the representative vectors. A code-book of representative vectors (codewords) is generated using an iterative clustering algorithm such as K-means, or the generalized Lloyd algorithm. A review of different Vector Quantization techniques are given in chapter 1. Chapter 2 gives an overview of codebook design methods including the Kohonen neural network to design codebook. During the encoding process, the correlation of the address is considered and Address Vector Quantization is developed for color image and monochrome image coding. Address VQ which includes static and dynamic processes is introduced in chapter 3. In order to overcome the problems in Hierarchical VQ, Multi-layer Address Vector Quantization is proposed in chapter 4. This approach gives the same performance as that of the normal VQ scheme but the bit rate is about 1/2 to 1/3 as that of the normal VQ method. In chapter 5, a Dynamic Finite State VQ based on a probability transition matrix to select the best subcodebook to encode the image is developed. In chapter 6, a new adaptive vector quantization scheme, suitable for color video coding, called "A Self -Organizing Adaptive VQ Technique" is presented. In addition to chapters 2 through 6 which report on new work, this dissertation includes one chapter (chapter 1) and part of chapter 2 which review previous work on VQ and image coding, respectively. Finally, a short discussion of directions for further research is presented in conclusion.
Co-Production of Quality in the Applied Education Research Scheme
ERIC Educational Resources Information Center
Ozga, Jenny
2007-01-01
This contribution looks at the ways in which research quality is defined and addressed in the Applied Education Research Scheme (AERS), particularly within the network on Schools and Social Capital, which is one of the four areas of work within the overall AERS scheme. AERS is a five-year programme, funded jointly by the Scottish Executive and the…
Two-nucleon S 0 1 amplitude zero in chiral effective field theory
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sanchez, M. Sanchez; Yang, C. -J.; Long, Bingwei
We present a new rearrangement of short-range interactions in the 1S 0 nucleon-nucleon channel within chiral effective field theory. This is intended to address the slow convergence of Weinberg’s scheme, which we attribute to its failure to reproduce the amplitude zero (scattering momentum ≃340 MeV) at leading order. After the power counting scheme is modified to accommodate the zero at leading order, it includes subleading corrections perturbatively in a way that is consistent with renormalization-group invariance. Systematic improvement is shown at next-to-leading order, and we obtain results that fit empirical phase shifts remarkably well all the way up to themore » pion-production threshold. As a result, an approach in which pions have been integrated out is included, which allows us to derive analytic results that also fit phenomenology surprisingly well.« less
Two-nucleon S 0 1 amplitude zero in chiral effective field theory
Sanchez, M. Sanchez; Yang, C. -J.; Long, Bingwei; ...
2018-02-05
We present a new rearrangement of short-range interactions in the 1S 0 nucleon-nucleon channel within chiral effective field theory. This is intended to address the slow convergence of Weinberg’s scheme, which we attribute to its failure to reproduce the amplitude zero (scattering momentum ≃340 MeV) at leading order. After the power counting scheme is modified to accommodate the zero at leading order, it includes subleading corrections perturbatively in a way that is consistent with renormalization-group invariance. Systematic improvement is shown at next-to-leading order, and we obtain results that fit empirical phase shifts remarkably well all the way up to themore » pion-production threshold. As a result, an approach in which pions have been integrated out is included, which allows us to derive analytic results that also fit phenomenology surprisingly well.« less
Hierarchical auto-configuration addressing in mobile ad hoc networks (HAAM)
NASA Astrophysics Data System (ADS)
Ram Srikumar, P.; Sumathy, S.
2017-11-01
Addressing plays a vital role in networking to identify devices uniquely. A device must be assigned with a unique address in order to participate in the data communication in any network. Different protocols defining different types of addressing are proposed in literature. Address auto-configuration is a key requirement for self organizing networks. Existing auto-configuration based addressing protocols require broadcasting probes to all the nodes in the network before assigning a proper address to a new node. This needs further broadcasts to reflect the status of the acquired address in the network. Such methods incur high communication overheads due to repetitive flooding. To address this overhead, a new partially stateful address allocation scheme, namely Hierarchical Auto-configuration Addressing (HAAM) scheme is extended and proposed. Hierarchical addressing basically reduces latency and overhead caused during address configuration. Partially stateful addressing algorithm assigns addresses without the need for flooding and global state awareness, which in turn reduces the communication overhead and space complexity respectively. Nodes are assigned addresses hierarchically to maintain the graph of the network as a spanning tree which helps in effectively avoiding the broadcast storm problem. Proposed algorithm for HAAM handles network splits and merges efficiently in large scale mobile ad hoc networks incurring low communication overheads.
CLASSIFICATION FRAMEWORK FOR COASTAL ECOSYSTEM RESPONSES TO AQUATIC STRESSORS
Many classification schemes have been developed to group ecosystems based on similar characteristics. To date, however, no single scheme has addressed coastal ecosystem responses to multiple stressors. We developed a classification framework for coastal ecosystems to improve the ...
Linear Augmentation for Stabilizing Stationary Solutions: Potential Pitfalls and Their Application
Karnatak, Rajat
2015-01-01
Linear augmentation has recently been shown to be effective in targeting desired stationary solutions, suppressing bistablity, in regulating the dynamics of drive response systems and in controlling the dynamics of hidden attractors. The simplicity of the procedure is the main highlight of this scheme but questions related to its general applicability still need to be addressed. Focusing on the issue of targeting stationary solutions, this work demonstrates instances where the scheme fails to stabilize the required solutions and leads to other complicated dynamical scenarios. Examples from conservative as well as dissipative systems are presented in this regard and important applications in dissipative predator—prey systems are discussed, which include preventative measures to avoid potentially catastrophic dynamical transitions in these systems. PMID:26544879
Content-independent embedding scheme for multi-modal medical image watermarking.
Nyeem, Hussain; Boles, Wageeh; Boyd, Colin
2015-02-04
As the increasing adoption of information technology continues to offer better distant medical services, the distribution of, and remote access to digital medical images over public networks continues to grow significantly. Such use of medical images raises serious concerns for their continuous security protection, which digital watermarking has shown great potential to address. We present a content-independent embedding scheme for medical image watermarking. We observe that the perceptual content of medical images varies widely with their modalities. Recent medical image watermarking schemes are image-content dependent and thus they may suffer from inconsistent embedding capacity and visual artefacts. To attain the image content-independent embedding property, we generalise RONI (region of non-interest, to the medical professionals) selection process and use it for embedding by utilising RONI's least significant bit-planes. The proposed scheme thus avoids the need for RONI segmentation that incurs capacity and computational overheads. Our experimental results demonstrate that the proposed embedding scheme performs consistently over a dataset of 370 medical images including their 7 different modalities. Experimental results also verify how the state-of-the-art reversible schemes can have an inconsistent performance for different modalities of medical images. Our scheme has MSSIM (Mean Structural SIMilarity) larger than 0.999 with a deterministically adaptable embedding capacity. Our proposed image-content independent embedding scheme is modality-wise consistent, and maintains a good image quality of RONI while keeping all other pixels in the image untouched. Thus, with an appropriate watermarking framework (i.e., with the considerations of watermark generation, embedding and detection functions), our proposed scheme can be viable for the multi-modality medical image applications and distant medical services such as teleradiology and eHealth.
Optimized Energy Harvesting, Cluster-Head Selection and Channel Allocation for IoTs in Smart Cities
Aslam, Saleem; Hasan, Najam Ul; Jang, Ju Wook; Lee, Kyung-Geun
2016-01-01
This paper highlights three critical aspects of the internet of things (IoTs), namely (1) energy efficiency, (2) energy balancing and (3) quality of service (QoS) and presents three novel schemes for addressing these aspects. For energy efficiency, a novel radio frequency (RF) energy-harvesting scheme is presented in which each IoT device is associated with the best possible RF source in order to maximize the overall energy that the IoT devices harvest. For energy balancing, the IoT devices in close proximity are clustered together and then an IoT device with the highest residual energy is selected as a cluster head (CH) on a rotational basis. Once the CH is selected, it assigns channels to the IoT devices to report their data using a novel integer linear program (ILP)-based channel allocation scheme by satisfying their desired QoS. To evaluate the presented schemes, exhaustive simulations are carried out by varying different parameters, including the number of IoT devices, the number of harvesting sources, the distance between RF sources and IoT devices and the primary user (PU) activity of different channels. The simulation results demonstrate that our proposed schemes perform better than the existing ones. PMID:27918424
Optimized Energy Harvesting, Cluster-Head Selection and Channel Allocation for IoTs in Smart Cities.
Aslam, Saleem; Hasan, Najam Ul; Jang, Ju Wook; Lee, Kyung-Geun
2016-12-02
This paper highlights three critical aspects of the internet of things (IoTs), namely (1) energy efficiency, (2) energy balancing and (3) quality of service (QoS) and presents three novel schemes for addressing these aspects. For energy efficiency, a novel radio frequency (RF) energy-harvesting scheme is presented in which each IoT device is associated with the best possible RF source in order to maximize the overall energy that the IoT devices harvest. For energy balancing, the IoT devices in close proximity are clustered together and then an IoT device with the highest residual energy is selected as a cluster head (CH) on a rotational basis. Once the CH is selected, it assigns channels to the IoT devices to report their data using a novel integer linear program (ILP)-based channel allocation scheme by satisfying their desired QoS. To evaluate the presented schemes, exhaustive simulations are carried out by varying different parameters, including the number of IoT devices, the number of harvesting sources, the distance between RF sources and IoT devices and the primary user (PU) activity of different channels. The simulation results demonstrate that our proposed schemes perform better than the existing ones.
ERIC Educational Resources Information Center
Emery, Steven B.; Franks, Jeremy R.
2012-01-01
There is increasing recognition that whilst agri-environment schemes in England have had discernable benefits, their success in relation to certain species and resources has been inhibited by the piecemeal implementation of Environmental Stewardship (ES) on the basis of single farm agreements. In this paper we examine the receptivity of farmers to…
Bayesian calibration of coarse-grained forces: Efficiently addressing transferability
NASA Astrophysics Data System (ADS)
Patrone, Paul N.; Rosch, Thomas W.; Phelan, Frederick R.
2016-04-01
Generating and calibrating forces that are transferable across a range of state-points remains a challenging task in coarse-grained (CG) molecular dynamics. In this work, we present a coarse-graining workflow, inspired by ideas from uncertainty quantification and numerical analysis, to address this problem. The key idea behind our approach is to introduce a Bayesian correction algorithm that uses functional derivatives of CG simulations to rapidly and inexpensively recalibrate initial estimates f0 of forces anchored by standard methods such as force-matching. Taking density-temperature relationships as a running example, we demonstrate that this algorithm, in concert with various interpolation schemes, can be used to efficiently compute physically reasonable force curves on a fine grid of state-points. Importantly, we show that our workflow is robust to several choices available to the modeler, including the interpolation schemes and tools used to construct f0. In a related vein, we also demonstrate that our approach can speed up coarse-graining by reducing the number of atomistic simulations needed as inputs to standard methods for generating CG forces.
NASA Astrophysics Data System (ADS)
Tomaro, Robert F.
1998-07-01
The present research is aimed at developing a higher-order, spatially accurate scheme for both steady and unsteady flow simulations using unstructured meshes. The resulting scheme must work on a variety of general problems to ensure the creation of a flexible, reliable and accurate aerodynamic analysis tool. To calculate the flow around complex configurations, unstructured grids and the associated flow solvers have been developed. Efficient simulations require the minimum use of computer memory and computational times. Unstructured flow solvers typically require more computer memory than a structured flow solver due to the indirect addressing of the cells. The approach taken in the present research was to modify an existing three-dimensional unstructured flow solver to first decrease the computational time required for a solution and then to increase the spatial accuracy. The terms required to simulate flow involving non-stationary grids were also implemented. First, an implicit solution algorithm was implemented to replace the existing explicit procedure. Several test cases, including internal and external, inviscid and viscous, two-dimensional, three-dimensional and axi-symmetric problems, were simulated for comparison between the explicit and implicit solution procedures. The increased efficiency and robustness of modified code due to the implicit algorithm was demonstrated. Two unsteady test cases, a plunging airfoil and a wing undergoing bending and torsion, were simulated using the implicit algorithm modified to include the terms required for a moving and/or deforming grid. Secondly, a higher than second-order spatially accurate scheme was developed and implemented into the baseline code. Third- and fourth-order spatially accurate schemes were implemented and tested. The original dissipation was modified to include higher-order terms and modified near shock waves to limit pre- and post-shock oscillations. The unsteady cases were repeated using the higher-order spatially accurate code. The new solutions were compared with those obtained using the second-order spatially accurate scheme. Finally, the increased efficiency of using an implicit solution algorithm in a production Computational Fluid Dynamics flow solver was demonstrated for steady and unsteady flows. A third- and fourth-order spatially accurate scheme has been implemented creating a basis for a state-of-the-art aerodynamic analysis tool.
Analysis models for the estimation of oceanic fields
NASA Technical Reports Server (NTRS)
Carter, E. F.; Robinson, A. R.
1987-01-01
A general model for statistically optimal estimates is presented for dealing with scalar, vector and multivariate datasets. The method deals with anisotropic fields and treats space and time dependence equivalently. Problems addressed include the analysis, or the production of synoptic time series of regularly gridded fields from irregular and gappy datasets, and the estimate of fields by compositing observations from several different instruments and sampling schemes. Technical issues are discussed, including the convergence of statistical estimates, the choice of representation of the correlations, the influential domain of an observation, and the efficiency of numerical computations.
Stafinski, Tania; McCabe, Christopher J; Menon, Devidas
2010-01-01
As tensions between payers, responsible for ensuring prudent and principled use of scarce resources, and both providers and patients, who legitimately want access to technologies from which they could benefit, continue to mount, interest in approaches to managing the uncertainty surrounding the introduction of new health technologies has heightened. The purpose of this project was to compile an inventory of various types of 'access with evidence development' (AED) schemes, examining characteristics of the technologies to which they have been applied, the uncertainty they sought to address, the terms of arrangements of each scheme, and the policy outcomes. It also aimed to identify issues related to such schemes, including advantages and disadvantages from the perspectives of various stakeholder groups. A comprehensive search, review and appraisal of peer-reviewed and 'grey' literature were performed, followed by a facilitated workshop of academics and decision makers with expertise in AED schemes. Information was extracted and compiled in tabular form to identify patterns or trends. To enhance the validity of interpretations made, member checking was performed. Although the concept of AED is not new, evaluative data are sparse. Despite varying opinions on the 'right' answers to some of the questions raised, there appears to be consensus on a 'way forward'--development of methodological guidelines. All stakeholders seemed to share the view that AEDs offer the potential to facilitate patient access to promising new technologies and encourage innovation while ensuring effective use of scarce healthcare resources. There is no agreement on what constitutes 'sufficient evidence', and it depends on the specific uncertainty in question. There is agreement on the need for 'best practice' guidelines around the implementation and evaluation of AED schemes. This is the first attempt at a comprehensive analysis of methods that have been used to address uncertainty concerning a new drug or other technology. The analysis reveals that, although various approaches have been experimented with, many of them have not achieved the ostensible goal of the approach. This article outlines challenges related to AED schemes and issues that remain unresolved.
ERIC Educational Resources Information Center
Leroy, Norah
2017-01-01
This paper addresses the theme of social inclusion through language learning. The focus is on an ad-hoc tutoring scheme set up between newly arrived British migrant pupils and French monolingual pupils in a small secondary school in the south-west of France. Though the original objective of this tutoring scheme was to improve the English skills of…
NASA Astrophysics Data System (ADS)
Salah, Zeinab; Shalaby, Ahmed; Steiner, Allison L.; Zakey, Ashraf S.; Gautam, Ritesh; Abdel Wahab, Mohamed M.
2018-02-01
This study assesses the direct and indirect effects of natural and anthropogenic aerosols (e.g., black carbon and sulfate) over West and Central Africa during the West African monsoon (WAM) period (June-July-August). We investigate the impacts of aerosols on the amount of cloudiness, the influences on the precipitation efficiency of clouds, and the associated radiative forcing (direct and indirect). Our study includes the implementation of three new formulations of auto-conversion parameterization [namely, the Beheng (BH), Tripoli and Cotton (TC) and Liu and Daum (R6) schemes] in RegCM4.4.1, besides the default model's auto-conversion scheme (Kessler). Among the new schemes, BH reduces the precipitation wet bias by more than 50% over West Africa and achieves a bias reduction of around 25% over Central Africa. Results from detailed sensitivity experiments suggest a significant path forward in terms of addressing the long-standing issue of the characteristic wet bias in RegCM. In terms of aerosol-induced radiative forcing, the impact of the various schemes is found to vary considerably (ranging from -5 to -25 W m-2).
Setting a disordered password on a photonic memory
NASA Astrophysics Data System (ADS)
Su, Shih-Wei; Gou, Shih-Chuan; Chew, Lock Yue; Chang, Yu-Yen; Yu, Ite A.; Kalachev, Alexey; Liao, Wen-Te
2017-06-01
An all-optical method of setting a disordered password on different schemes of photonic memory is theoretically studied. While photons are regarded as ideal information carriers, it is imperative to implement such data protection on all-optical storage. However, we wish to address the intrinsic risk of data breaches in existing schemes of photonic memory. We theoretically demonstrate a protocol using spatially disordered laser fields to encrypt data stored on an optical memory, namely, encrypted photonic memory. To address the broadband storage, we also investigate a scheme of disordered echo memory with a high fidelity approaching unity. The proposed method increases the difficulty for the eavesdropper to retrieve the stored photon without the preset password even when the randomized and stored photon state is nearly perfectly cloned. Our results pave ways to significantly reduce the exposure of memories, required for long-distance communication, to eavesdropping and therefore restrict the optimal attack on communication protocols. The present scheme also increases the sensitivity of detecting any eavesdropper and so raises the security level of photonic information technology.
Hu, Wenfeng; Liu, Lu; Feng, Gang
2016-09-02
This paper addresses the output consensus problem of heterogeneous linear multi-agent systems. We first propose a novel distributed event-triggered control scheme. It is shown that, with the proposed control scheme, the output consensus problem can be solved if two matrix equations are satisfied. Then, we further propose a novel self-triggered control scheme, with which continuous monitoring is avoided. By introducing a fixed timer into both event- and self-triggered control schemes, Zeno behavior can be ruled out for each agent. The effectiveness of the event- and self-triggered control schemes is illustrated by an example.
Törnros, Tobias; Dorn, Helen; Reichert, Markus; Ebner-Priemer, Ulrich; Salize, Hans-Joachim; Tost, Heike; Meyer-Lindenberg, Andreas; Zipf, Alexander
2016-11-21
Self-reporting is a well-established approach within the medical and psychological sciences. In order to avoid recall bias, i.e. past events being remembered inaccurately, the reports can be filled out on a smartphone in real-time and in the natural environment. This is often referred to as ambulatory assessment and the reports are usually triggered at regular time intervals. With this sampling scheme, however, rare events (e.g. a visit to a park or recreation area) are likely to be missed. When addressing the correlation between mood and the environment, it may therefore be beneficial to include participant locations within the ambulatory assessment sampling scheme. Based on the geographical coordinates, the database query system then decides if a self-report should be triggered or not. We simulated four different ambulatory assessment sampling schemes based on movement data (coordinates by minute) from 143 voluntary participants tracked for seven consecutive days. Two location-based sampling schemes incorporating the environmental characteristics (land use and population density) at each participant's location were introduced and compared to a time-based sampling scheme triggering a report on the hour as well as to a sampling scheme incorporating physical activity. We show that location-based sampling schemes trigger a report less often, but we obtain more unique trigger positions and a greater spatial spread in comparison to sampling strategies based on time and distance. Additionally, the location-based methods trigger significantly more often at rarely visited types of land use and less often outside the study region where no underlying environmental data are available.
Decentralising Zimbabwe’s water management: The case of Guyu-Chelesa irrigation scheme
NASA Astrophysics Data System (ADS)
Tambudzai, Rashirayi; Everisto, Mapedza; Gideon, Zhou
Smallholder irrigation schemes are largely supply driven such that they exclude the beneficiaries on the management decisions and the choice of the irrigation schemes that would best suit their local needs. It is against this background that the decentralisation framework and the Dublin Principles on Integrated Water Resource Management (IWRM) emphasise the need for a participatory approach to water management. The Zimbabwean government has gone a step further in decentralising the management of irrigation schemes, that is promoting farmer managed irrigation schemes so as to ensure effective management of scarce community based land and water resources. The study set to investigate the way in which the Guyu-Chelesa irrigation scheme is managed with specific emphasis on the role of the Irrigation Management Committee (IMC), the level of accountability and the powers devolved to the IMC. Merrey’s 2008 critique of IWRM also informs this study which views irrigation as going beyond infrastructure by looking at how institutions and decision making processes play out at various levels including at the irrigation scheme level. The study was positioned on the hypothesis that ‘decentralised or autonomous irrigation management enhances the sustainability and effectiveness of irrigation schemes’. To validate or falsify the stated hypothesis, data was gathered using desk research in the form of reviewing articles, documents from within the scheme and field research in the form of questionnaire surveys, key informant interviews and field observation. The Statistical Package for Social Sciences was used to analyse data quantitatively, whilst content analysis was utilised to analyse qualitative data whereby data was analysed thematically. Comparative analysis was carried out as Guyu-Chelesa irrigation scheme was compared with other smallholder irrigation scheme’s experiences within Zimbabwe and the Sub Saharan African region at large. The findings were that whilst the scheme is a model of a decentralised entity whose importance lies at improving food security and employment creation within the community, it falls short in representing a downwardly accountable decentralised irrigation scheme. The scheme is faced with various challenges which include its operation which is below capacity utilisation, absence of specialised technical human personnel to address infrastructural breakdowns, uneven distribution of water pressure, incapacitated Irrigation Management Committee (IMC), absence of a locally legitimate constitution, compromised beneficiary participation and unclear lines of communication between various institutions involved in water management. Understanding decentralization is important since one of the key tenets of IWRM is stakeholder participation which the decentralization framework interrogates.
Tan, Zuowen
2014-03-01
The telecare medicine information system enables the patients gain health monitoring at home and access medical services over internet or mobile networks. In recent years, the schemes based on cryptography have been proposed to address the security and privacy issues in the telecare medicine information systems. However, many schemes are insecure or they have low efficiency. Recently, Awasthi and Srivastava proposed a three-factor authentication scheme for telecare medicine information systems. In this paper, we show that their scheme is vulnerable to the reflection attacks. Furthermore, it fails to provide three-factor security and the user anonymity. We propose a new three-factor authentication scheme for the telecare medicine information systems. Detailed analysis demonstrates that the proposed scheme provides mutual authentication, server not knowing password and freedom of password, biometric update and three-factor security. Moreover, the new scheme provides the user anonymity. As compared with the previous three-factor authentication schemes, the proposed scheme is more secure and practical.
Yu, Sam Wai-Kam
2008-01-01
In 2000, the Hong Kong government introduced the first compulsory retirement saving scheme intended to protect the entire workforce, the Mandatory Provident Fund (MPF). Prior to the introduction of this scheme, the government's main measure for giving financial protection to retirees was the Comprehensive Social Security Assistance (CSSA) scheme, which is a noncontributory, means-tested financial assistance scheme. This paper studies the government's attempt to introduce the MPF on top of the CSSA scheme as a means to illustrate how governments might address their financial responsibilities in providing pension schemes by adopting both the residual strategy-centered reform approach and the collaborative strategy-centered reform approach. The former approach is concerned with developing noncontributory schemes using residual strategies, and the latter is concerned with developing contributory schemes using collaborative strategies. The paper shows the difficulties involved in carrying out these two reform approaches simultaneously.
Some implementational issues of convection schemes for finite volume formulations
NASA Technical Reports Server (NTRS)
Thakur, Siddharth; Shyy, Wei
1993-01-01
Two higher-order upwind schemes - second-order upwind and QUICK - are examined in terms of their interpretation, implementation as well as performance for a recirculating flow in a lid-driven cavity, in the context of a control volume formulation using the SIMPLE algorithm. The present formulation of these schemes is based on a unified framework wherein the first-order upwind scheme is chosen as the basis, with the remaining terms being assigned to the source term. The performance of these schemes is contrasted with the first-order upwind and second-order central difference schemes. Also addressed in this study is the issue of boundary treatment associated with these higher-order upwind schemes. Two different boundary treatments - one that uses a two-point scheme consistently within a given control volume at the boundary, and the other that maintains consistency of flux across the interior face between the adjacent control volumes - are formulated and evaluated.
Some implementational issues of convection schemes for finite-volume formulations
NASA Technical Reports Server (NTRS)
Thakur, Siddharth; Shyy, Wei
1993-01-01
Two higher-order upwind schemes - second-order upwind and QUICK - are examined in terms of their interpretation, implementations, as well as performance for a recirculating flow in a lid-driven cavity, in the context of a control-volume formulation using the SIMPLE algorithm. The present formulation of these schemes is based on a unified framework wherein the first-order upwind scheme is chosen as the basis, with the remaining terms being assigned to the source term. The performance of these schemes is contrasted with the first-order upwind and second-order central difference schemes. Also addressed in this study is the issue of boundary treatment associated with these higher-order upwind schemes. Two different boundary treatments - one that uses a two-point scheme consistently within a given control volume at the boundary, and the other that maintains consistency of flux across the interior face between the adjacent control volumes - are formulated and evaluated.
The Australian Managed Entry Scheme: Are We Getting it Right?
Tuffaha, Haitham W; Scuffham, Paul A
2018-05-01
In 2010, the Australian Government introduced the managed entry scheme (MES) to improve patient access to subsidised drugs on the Pharmaceutical Benefits Scheme and enhance the quality of evidence provided to decision makers. The aim of this paper was to critically review the Australian MES experience. We performed a comprehensive review of publicly available Pharmaceutical Benefits Advisory Committee online documents from January 2010 to July 2017. Relevant information on each MES agreement was systematically extracted, including its rationale, the conditions that guided its implementation and its policy outcomes. We identified 11 drugs where an MES was considered. Most of the identified drugs (75%) were antineoplastic agents and the main uncertainty was the overall survival benefit. More than half of the MES proposals were made by sponsors and most of the schemes were considered after previous rejected/deferred submissions for reimbursement. An MES was not established in 8 of 11 drugs (73%) despite the high evidence uncertainty. Nevertheless, six of these eight drugs were listed after the sponsors reduced their prices. Three MESs were established and implemented by Deeds of Agreement. The three cases were concluded and the required data were submitted within the agreed time frames. The need for feasibility and value of an MES should be carefully considered by stakeholders before embarking on such an agreement. It is essential to engage major stakeholders, including patient representatives, in this process. The conditions governing MESs should be clear, transparent and balanced to address the expectations of various stakeholders.
School lunch program in India: background, objectives and components.
Chutani, Alka Mohan
2012-01-01
The School Lunch Program in India (SLP) is the largest food and nutrition assistance program feeding millions of children every day. This paper provides a review of the background information on the SLP in India earlier known as national program for nutrition support to primary education (NP-NSPE) and later as mid day meal scheme, including historical trends and objectives and components/characteristics of the scheme. It also addresses steps being taken to meet challenges being faced by the administrators of the program in monitoring and evaluation of the program. This program was initially started in 1960 in few states to overcome the complex problems malnutrition and illiteracy. Mid Day Meal Scheme is the popular name for school meal program. In 2001, as per the supreme court orders, it became mandatory to give a mid day meal to all primary and later extended to upper primary school children studying in the government and government aided schools. This scheme benefitted 140 million children in government assisted schools across India in 2008, strengthening child nutrition and literacy. In a country with a large percent of illiterate population with a high percent of children unable to read or write; governmental and non-governmental organizations have reported that mid day meal scheme has consistently increased enrollment in schools in India. One of the main goals of school lunch program is to promote the health and well-being of the Nation's children.
ERIC Educational Resources Information Center
Tomlinson, Nigel
2002-01-01
Looks at the "Passport to Success" scheme introduced by the Sheffield Chamber of Commerce in a bid to address the employability skills problem among young people. States that the scheme was launched in September 2001 in partnership with a local comprehensive school with the intention of helping pupils make the transition from school into…
Designing Targeted Educational Voucher Schemes for the Poor in Developing Countries
ERIC Educational Resources Information Center
Shafiq, M. Najeeb
2009-01-01
Targeted educational voucher schemes [TEVS] are often proposed for poor children in developing countries. This article explores the design of an effective TEVS using three policy instruments: regulation, support services, and finance. The regulation design addresses the rules that must be adhered to by participating households, children, and…
NASA Astrophysics Data System (ADS)
Mesinger, Fedor; Popovic, Jelena
2010-09-01
Ever since its introduction to meteorology in the early 1970s, the forward-backward scheme has proven to be a very efficient method of treating gravity waves, with an added bonus of avoiding the time computational mode of the leapfrog scheme. It has been and it is used today in a number of models. When used on a square grid other than the Arakawa C grid, modification is or modifications are available to suppress the noise-generating separation of solutions on elementary C grids. Yet, in spite of a number of papers addressing the scheme and its modification, or modifications, issues remain that have either not been addressed or have been commented upon in a misleading or even in an incorrect way. Specifically, restricting ourselves to the B/E grid does it matter and if so how which of the two equations, momentum and the continuity equation, is integrated forward? Is there just one modification suppressing the separation of solutions, or have there been proposed two modification schemes? Questions made are addressed and a number of misleading statements made are recalled and commented upon. In particular, it is demonstrated that there is no added computational cost in integrating the momentum equation forward, and it is pointed out that this would seem advantageous given the height perturbations excited in the first step following a perturbation at a single height point. Yet, 48-h numerical experiments with a full-physics model show only a barely visible difference between the forecasts done using one and the other equation forward.
Choi, Younsung; Nam, Junghyun; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Won, Dongho
2014-01-01
An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user's biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register many times. To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics. Chuang and Chen claimed that their scheme not only supports multiple servers but also achieves various security requirements. However, we show that this scheme is vulnerable to a masquerade attack, a smart card attack, a user impersonation attack, and a DoS attack and does not achieve perfect forward secrecy. We also propose a security enhanced anonymous multiserver authenticated key agreement scheme which addresses all the weaknesses identified in Chuang and Chen's scheme.
Sims, Aaron P; Alapaty, Kiran; Raman, Sethu
2017-01-01
Two mesoscale circulations, the Sandhills circulation and the sea breeze, influence the initiation of deep convection over the Sandhills and the coast in the Carolinas during the summer months. The interaction of these two circulations causes additional convection in this coastal region. Accurate representation of mesoscale convection is difficult as numerical models have problems with the prediction of the timing, amount, and location of precipitation. To address this issue, the authors have incorporated modifications to the Kain-Fritsch (KF) convective parameterization scheme and evaluated these mesoscale interactions using a high-resolution numerical model. The modifications include changes to the subgrid-scale cloud formulation, the convective turnover time scale, and the formulation of the updraft entrainment rates. The use of a grid-scaling adjustment parameter modulates the impact of the KF scheme as a function of the horizontal grid spacing used in a simulation. Results indicate that the impact of this modified cumulus parameterization scheme is more effective on domains with coarser grid sizes. Other results include a decrease in surface and near-surface temperatures in areas of deep convection (due to the inclusion of the effects of subgrid-scale clouds on the radiation), improvement in the timing of convection, and an increase in the strength of deep convection.
Privacy Breach Analysis in Social Networks
NASA Astrophysics Data System (ADS)
Nagle, Frank
This chapter addresses various aspects of analyzing privacy breaches in social networks. We first review literature that defines three types of privacy breaches in social networks: interactive, active, and passive. We then survey the various network anonymization schemes that have been constructed to address these privacy breaches. After exploring these breaches and anonymization schemes, we evaluate a measure for determining the level of anonymity inherent in a network graph based on its topological structure. Finally, we close by emphasizing the difficulty of anonymizing social network data while maintaining usability for research purposes and offering areas for future work.
Målqvist, Mats; Yuan, Beibei; Trygg, Nadja; Selling, Katarina; Thomsen, Sarah
2013-01-01
Targeted interventions to improve maternal and child health is suggested as a feasible and sometimes even necessary strategy to reduce inequity. The objective of this systematic review was to gather the evidence of the effectiveness of targeted interventions to improve equity in MDG 4 and 5 outcomes. We identified primary studies in all languages by searching nine health and social databases, including grey literature and dissertations. Studies evaluating the effect of an intervention tailored to address a structural determinant of inequity in maternal and child health were included. Thus general interventions targeting disadvantaged populations were excluded. Outcome measures were limited to indicators proposed for Millennium Development Goals 4 and 5. We identified 18 articles, whereof 15 evaluated various incentive programs, two evaluated a targeted policy intervention, and only one study evaluated an intervention addressing a cultural custom. Meta-analyses of the effectiveness of incentives programs showed a pooled effect size of RR 1.66 (95% CI 1.43-1.93) for antenatal care attendance (four studies with 2,476 participants) and RR 2.37 (95% CI 1.38-4.07) for health facility delivery (five studies with 25,625 participants). Meta-analyses were not performed for any of the other outcomes due to scarcity of studies. The targeted interventions aiming to improve maternal and child health are mainly limited to addressing economic disparities through various incentive schemes like conditional cash transfers and voucher schemes. This is a feasible strategy to reduce inequity based on income. More innovative action-oriented research is needed to speed up progress in maternal and child survival among the most disadvantaged populations through interventions targeting the underlying structural determinants of inequity.
Multichannel feedforward control schemes with coupling compensation for active sound profiling
NASA Astrophysics Data System (ADS)
Mosquera-Sánchez, Jaime A.; Desmet, Wim; de Oliveira, Leopoldo P. R.
2017-05-01
Active sound profiling includes a number of control techniques that enables the equalization, rather than the mere reduction, of acoustic noise. Challenges may rise when trying to achieve distinct targeted sound profiles simultaneously at multiple locations, e.g., within a vehicle cabin. This paper introduces distributed multichannel control schemes for independently tailoring structural borne sound reaching a number of locations within a cavity. The proposed techniques address the cross interactions amongst feedforward active sound profiling units, which compensate for interferences of the primary sound at each location of interest by exchanging run-time data amongst the control units, while attaining the desired control targets. Computational complexity, convergence, and stability of the proposed multichannel schemes are examined in light of the physical system at which they are implemented. The tuning performance of the proposed algorithms is benchmarked with the centralized and pure-decentralized control schemes through computer simulations on a simplified numerical model, which has also been subjected to plant magnitude variations. Provided that the representation of the plant is accurate enough, the proposed multichannel control schemes have been shown as the only ones that properly deliver targeted active sound profiling tasks at each error sensor location. Experimental results in a 1:3-scaled vehicle mock-up further demonstrate that the proposed schemes are able to attain reductions of more than 60 dB upon periodic disturbances at a number of positions, while resolving cross-channel interferences. Moreover, when the sensor/actuator placement is found as defective at a given frequency, the inclusion of a regularization parameter in the cost function is seen to not hinder the proper operation of the proposed compensation schemes, at the time that it assures their stability, at the expense of losing control performance.
A Novel Addressing Scheme for PMIPv6 Based Global IP-WSNs
Islam, Md. Motaharul; Huh, Eui-Nam
2011-01-01
IP based Wireless Sensor Networks (IP-WSNs) are being used in healthcare, home automation, industrial control and agricultural monitoring. In most of these applications global addressing of individual IP-WSN nodes and layer-three routing for mobility enabled IP-WSN with special attention to reliability, energy efficiency and end to end delay minimization are a few of the major issues to be addressed. Most of the routing protocols in WSN are based on layer-two approaches. For reliability and end to end communication enhancement the necessity of layer-three routing for IP-WSNs is generating significant attention among the research community, but due to the hurdle of maintaining routing state and other communication overhead, it was not possible to introduce a layer-three routing protocol for IP-WSNs. To address this issue we propose in this paper a global addressing scheme and layer-three based hierarchical routing protocol. The proposed addressing and routing approach focuses on all the above mentioned issues. Simulation results show that the proposed addressing and routing approach significantly enhances the reliability, energy efficiency and end to end delay minimization. We also present architecture, message formats and different routing scenarios in this paper. PMID:22164084
A novel addressing scheme for PMIPv6 based global IP-WSNs.
Islam, Md Motaharul; Huh, Eui-Nam
2011-01-01
IP based Wireless Sensor Networks (IP-WSNs) are being used in healthcare, home automation, industrial control and agricultural monitoring. In most of these applications global addressing of individual IP-WSN nodes and layer-three routing for mobility enabled IP-WSN with special attention to reliability, energy efficiency and end to end delay minimization are a few of the major issues to be addressed. Most of the routing protocols in WSN are based on layer-two approaches. For reliability and end to end communication enhancement the necessity of layer-three routing for IP-WSNs is generating significant attention among the research community, but due to the hurdle of maintaining routing state and other communication overhead, it was not possible to introduce a layer-three routing protocol for IP-WSNs. To address this issue we propose in this paper a global addressing scheme and layer-three based hierarchical routing protocol. The proposed addressing and routing approach focuses on all the above mentioned issues. Simulation results show that the proposed addressing and routing approach significantly enhances the reliability, energy efficiency and end to end delay minimization. We also present architecture, message formats and different routing scenarios in this paper.
Advanced Entry Adult Apprenticeship Training Scheme: A Case Study
ERIC Educational Resources Information Center
Sparks, Alan; Ingram, Hadyn; Phillips, Sunny
2009-01-01
Purpose: The purpose of this paper is to evaluate an innovative way to train adult apprentices for the construction industry. Design/methodology/approach: The paper emphasizes that, in order to address skills shortages for international construction, training methods must be improved. It looks at the example of an adult apprenticeship scheme in…
Understanding and (Dis)trusting Food Assurance Schemes: Consumer Confidence and the "Knowledge Fix"
ERIC Educational Resources Information Center
Eden, Sally; Bear, Christopher; Walker, Gordon
2008-01-01
This paper uses evidence from focus groups with consumers in England to consider how consumers understand and evaluate a range of proxies or intermediary organisations that offer assurance about food and consumer products, particularly voluntary certification schemes. This addresses the current concern in developed economies about providing…
Symbol Synchronization for Diffusion-Based Molecular Communications.
Jamali, Vahid; Ahmadzadeh, Arman; Schober, Robert
2017-12-01
Symbol synchronization refers to the estimation of the start of a symbol interval and is needed for reliable detection. In this paper, we develop several symbol synchronization schemes for molecular communication (MC) systems where we consider some practical challenges, which have not been addressed in the literature yet. In particular, we take into account that in MC systems, the transmitter may not be equipped with an internal clock and may not be able to emit molecules with a fixed release frequency. Such restrictions hold for practical nanotransmitters, e.g., modified cells, where the lengths of the symbol intervals may vary due to the inherent randomness in the availability of food and energy for molecule generation, the process for molecule production, and the release process. To address this issue, we develop two synchronization-detection frameworks which both employ two types of molecule. In the first framework, one type of molecule is used for symbol synchronization and the other one is used for data detection, whereas in the second framework, both types of molecule are used for joint symbol synchronization and data detection. For both frameworks, we first derive the optimal maximum likelihood (ML) symbol synchronization schemes as performance upper bounds. Since ML synchronization entails high complexity, for each framework, we also propose three low-complexity suboptimal schemes, namely a linear filter-based scheme, a peak observation-based scheme, and a threshold-trigger scheme, which are suitable for MC systems with limited computational capabilities. Furthermore, we study the relative complexity and the constraints associated with the proposed schemes and the impact of the insertion and deletion errors that arise due to imperfect synchronization. Our simulation results reveal the effectiveness of the proposed synchronization schemes and suggest that the end-to-end performance of MC systems significantly depends on the accuracy of the symbol synchronization.
Sub-federal ecological modernization: A case study of Colorado's new energy economy
NASA Astrophysics Data System (ADS)
Giannakouros, Stratis
European nations have often employed policies of explicit government intervention as a preferred means of addressing environmental and economic challenges. These policies have ranged from grey industrial policies focused solely on industrial growth, competitiveness and innovation to policies of stronger ecological modernization, which seek to align industrial interests with environmental protection. In recent years these policies have been mobilized to address the threat of climate change and promote environmental innovation. While some US Administrations have similarly recognized the need to address these challenges, the particular historical and political institutional dynamics of the US have meant that explicit government intervention has been eschewed in favor of more indirect strategies when dealing with economic and environmental challenges. This is evident in the rise of sub-federal policies at the level of US states. Supported by federal laboratories and public research, US states have adopted policies that look very much like sub-federal versions of industrial or ecological modernization policy. This thesis uses the Colorado case to highlight the importance of sub-federal institutions in addressing environmental and economic challenges in the US and explore its similarities to, and differences from, European approaches. To achieve this goal it first develops an analytical scheme within which to place policy initiatives on a continuum from grey industrial policy to strong ecological modernization policy by identifying key institutions that are influential in each policy type. This analytical scheme is then applied to the transitional renewable energy policy period from 2004-2012 in the state of Colorado. This period starts with the adoption of a renewable energy portfolio in 2004 and includes the `new energy economy' period from 2007-2010 as well as the years since. Looking at three key turning points this paper interprets the `new energy economy' strategy using the analytical scheme developed and identifies the political and social institutions that frame this transition. Drawing upon these findings, the paper analyses the implications of the Colorado case for understanding sub-federal initiatives in the US and concludes with a summary of the broader comparative institutional lessons.
On detection and visualization techniques for cyber security situation awareness
NASA Astrophysics Data System (ADS)
Yu, Wei; Wei, Shixiao; Shen, Dan; Blowers, Misty; Blasch, Erik P.; Pham, Khanh D.; Chen, Genshe; Zhang, Hanlin; Lu, Chao
2013-05-01
Networking technologies are exponentially increasing to meet worldwide communication requirements. The rapid growth of network technologies and perversity of communications pose serious security issues. In this paper, we aim to developing an integrated network defense system with situation awareness capabilities to present the useful information for human analysts. In particular, we implement a prototypical system that includes both the distributed passive and active network sensors and traffic visualization features, such as 1D, 2D and 3D based network traffic displays. To effectively detect attacks, we also implement algorithms to transform real-world data of IP addresses into images and study the pattern of attacks and use both the discrete wavelet transform (DWT) based scheme and the statistical based scheme to detect attacks. Through an extensive simulation study, our data validate the effectiveness of our implemented defense system.
NASA Technical Reports Server (NTRS)
Milman, Mark H.
1987-01-01
The fundamental control synthesis issue of establishing a priori convergence rates of approximation schemes for feedback controllers for a class of distributed parameter systems is addressed within the context of hereditary systems. Specifically, a factorization approach is presented for deriving approximations to the optimal feedback gains for the linear regulator-quadratic cost problem associated with time-varying functional differential equations with control delays. The approach is based on a discretization of the state penalty which leads to a simple structure for the feedback control law. General properties of the Volterra factors of Hilbert-Schmidt operators are then used to obtain convergence results for the controls, trajectories and feedback kernels. Two algorithms are derived from the basic approximation scheme, including a fast algorithm, in the time-invariant case. A numerical example is also considered.
IntelliCable Interface Specification
2016-07-14
address to configure itself for. NiMH/NiCAD: The checking of this bit means that this particular battery is not a Lithium - ion but is a NiCAD or a NiMH...value of 0, Lithium , should be used for all class of Lithium batteries , including Lithium - Ion and Lithium -Polymer. These all function much the same...2590 is Lithium - Ion but the 390 is NiMH, which have incompatible charging schemes. Offset 48 – ESR Value This field is the Equivalent Series
Reducing the Handover Delay in FMIPv6 Using Proactive Care-of Address Scheme
NASA Astrophysics Data System (ADS)
Li, Yong; Jin, Depeng; Su, Li; Zeng, Lieguang
To deal with the increasing number of mobile devices accessing the Internet and the increasing demands of mobility management, IETF has proposed Mobile IPv6 and its fast handover protocol FMIPv6. In FMIPv6, the possibility of Care-of Address (CoA) collision and the time for Return Routability (RR) procedure result in long handover delay, which makes it unsuitable for real-time applications. In this paper, we propose an improved handover scheme for FMIPv6, which reduces the handover delay by using proactive CoA acquisition, configuration and test method. In our proposal, collision-free CoA is proactively prepared, and the time for RR procedure does not contribute to the handover delay. Furthermore, we analyze our proposal's benefits and overhead tradeoff. The numerical results demonstrate that it outperforms the current schemes, such as FMIPv6 and enhanced FMIPv6, on the aspect of handover delay and packet transmission delay.
Autoconfiguration and Service Discovery
NASA Astrophysics Data System (ADS)
Manner, Jukka
To be useful, IP networking requires various parameters to be set up. A network node needs at least an IP address, routing information, and name services. In a fixed network this configuration is typically done with a centralized scheme, where a server hosts the configuration information and clients query the server with the Dynamic Host Configuration Protocol (DHCP). Companies, university campuses and even home broadband use the DHCP system to configure hosts. This signaling happens in the background, and users seldom need to think about it; only when things are not working properly, manual intervention is needed. The same protocol can be used in mobile networks, where the client device communicates with the access network provider and his DHCP service. The core information provided by DHCP includes a unique IP address for the host, the IP address of the closest IP router for routing messages to other networks, and the location of domain name servers.
Li, Congcong; Zhang, Xi; Wang, Haiping; Li, Dongfeng
2018-01-11
Vehicular sensor networks have been widely applied in intelligent traffic systems in recent years. Because of the specificity of vehicular sensor networks, they require an enhanced, secure and efficient authentication scheme. Existing authentication protocols are vulnerable to some problems, such as a high computational overhead with certificate distribution and revocation, strong reliance on tamper-proof devices, limited scalability when building many secure channels, and an inability to detect hardware tampering attacks. In this paper, an improved authentication scheme using certificateless public key cryptography is proposed to address these problems. A security analysis of our scheme shows that our protocol provides an enhanced secure anonymous authentication, which is resilient against major security threats. Furthermore, the proposed scheme reduces the incidence of node compromise and replication attacks. The scheme also provides a malicious-node detection and warning mechanism, which can quickly identify compromised static nodes and immediately alert the administrative department. With performance evaluations, the scheme can obtain better trade-offs between security and efficiency than the well-known available schemes.
Security Analysis and Improvement of an Anonymous Authentication Scheme for Roaming Services
Lee, Youngsook; Paik, Juryon
2014-01-01
An anonymous authentication scheme for roaming services in global mobility networks allows a mobile user visiting a foreign network to achieve mutual authentication and session key establishment with the foreign-network operator in an anonymous manner. In this work, we revisit He et al.'s anonymous authentication scheme for roaming services and present previously unpublished security weaknesses in the scheme: (1) it fails to provide user anonymity against any third party as well as the foreign agent, (2) it cannot protect the passwords of mobile users due to its vulnerability to an offline dictionary attack, and (3) it does not achieve session-key security against a man-in-the-middle attack. We also show how the security weaknesses of He et al.'s scheme can be addressed without degrading the efficiency of the scheme. PMID:25302330
A user-driven treadmill control scheme for simulating overground locomotion.
Kim, Jonghyun; Stanley, Christopher J; Curatalo, Lindsey A; Park, Hyung-Soon
2012-01-01
Treadmill-based locomotor training should simulate overground walking as closely as possible for optimal skill transfer. The constant speed of a standard treadmill encourages automaticity rather than engagement and fails to simulate the variable speeds encountered during real-world walking. To address this limitation, this paper proposes a user-driven treadmill velocity control scheme that allows the user to experience natural fluctuations in walking velocity with minimal unwanted inertial force due to acceleration/deceleration of the treadmill belt. A smart estimation limiter in the scheme effectively attenuates the inertial force during velocity changes. The proposed scheme requires measurement of pelvic and swing foot motions, and is developed for a treadmill of typical belt length (1.5 m). The proposed scheme is quantitatively evaluated here with four healthy subjects by comparing it with the most advanced control scheme identified in the literature.
Security analysis and improvement of an anonymous authentication scheme for roaming services.
Lee, Youngsook; Paik, Juryon
2014-01-01
An anonymous authentication scheme for roaming services in global mobility networks allows a mobile user visiting a foreign network to achieve mutual authentication and session key establishment with the foreign-network operator in an anonymous manner. In this work, we revisit He et al.'s anonymous authentication scheme for roaming services and present previously unpublished security weaknesses in the scheme: (1) it fails to provide user anonymity against any third party as well as the foreign agent, (2) it cannot protect the passwords of mobile users due to its vulnerability to an offline dictionary attack, and (3) it does not achieve session-key security against a man-in-the-middle attack. We also show how the security weaknesses of He et al.'s scheme can be addressed without degrading the efficiency of the scheme.
Research and development of a NYNEX switched multi-megabit data service prototype system
NASA Astrophysics Data System (ADS)
Maman, K. H.; Haines, Robert; Chatterjee, Samir
1991-02-01
Switched Multi-megabit Data Service (SMDS) is a proposed high-speed packet-switched service which will support broadband applications such as Local Area Network (LAN) interconnections across a metropolitan area and beyond. This service is designed to take advantage of evolving Metropolitan Area Network (MAN) standards and technology which will provide customers with 45-mbps and 1 . 5-mbps access to high-speed public data communications networks. This paper will briefly discuss SMDS and review its architecture including the Subscriber Network Interface (SNI) and the SMDS Interface Protocol (SIP). It will review the fundamental features of SMDS such as address screening addressing scheme and access classes. Then it will describe the SMDS prototype system developed in-house by NYNEX Science Technology.
Klinkenberg, Don; Thomas, Ekelijn; Artavia, Francisco F Calvo; Bouma, Annemarie
2011-08-01
Design of surveillance programs to detect infections could benefit from more insight into sampling schemes. We address the effect of sampling schemes for Salmonella Enteritidis surveillance in laying hens. Based on experimental estimates for the transmission rate in flocks, and the characteristics of an egg immunological test, we have simulated outbreaks with various sampling schemes, and with the current boot swab program with a 15-week sampling interval. Declaring a flock infected based on a single positive egg was not possible because test specificity was too low. Thus, a threshold number of positive eggs was defined to declare a flock infected, and, for small sample sizes, eggs from previous samplings had to be included in a cumulative sample to guarantee a minimum flock level specificity. Effectiveness of surveillance was measured by the proportion of outbreaks detected, and by the number of contaminated table eggs brought on the market. The boot swab program detected 90% of the outbreaks, with 75% fewer contaminated eggs compared to no surveillance, whereas the baseline egg program (30 eggs each 15 weeks) detected 86%, with 73% fewer contaminated eggs. We conclude that a larger sample size results in more detected outbreaks, whereas a smaller sampling interval decreases the number of contaminated eggs. Decreasing sample size and interval simultaneously reduces the number of contaminated eggs, but not indefinitely: the advantage of more frequent sampling is counterbalanced by the cumulative sample including less recently laid eggs. Apparently, optimizing surveillance has its limits when test specificity is taken into account. © 2011 Society for Risk Analysis.
Mishra, Raghavendra; Barnwal, Amit Kumar
2015-05-01
The Telecare medical information system (TMIS) presents effective healthcare delivery services by employing information and communication technologies. The emerging privacy and security are always a matter of great concern in TMIS. Recently, Chen at al. presented a password based authentication schemes to address the privacy and security. Later on, it is proved insecure against various active and passive attacks. To erase the drawbacks of Chen et al.'s anonymous authentication scheme, several password based authentication schemes have been proposed using public key cryptosystem. However, most of them do not present pre-smart card authentication which leads to inefficient login and password change phases. To present an authentication scheme with pre-smart card authentication, we present an improved anonymous smart card based authentication scheme for TMIS. The proposed scheme protects user anonymity and satisfies all the desirable security attributes. Moreover, the proposed scheme presents efficient login and password change phases where incorrect input can be quickly detected and a user can freely change his password without server assistance. Moreover, we demonstrate the validity of the proposed scheme by utilizing the widely-accepted BAN (Burrows, Abadi, and Needham) logic. The proposed scheme is also comparable in terms of computational overheads with relevant schemes.
Choi, Younsung; Nam, Junghyun; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Won, Dongho
2014-01-01
An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user's biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register many times. To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics. Chuang and Chen claimed that their scheme not only supports multiple servers but also achieves various security requirements. However, we show that this scheme is vulnerable to a masquerade attack, a smart card attack, a user impersonation attack, and a DoS attack and does not achieve perfect forward secrecy. We also propose a security enhanced anonymous multiserver authenticated key agreement scheme which addresses all the weaknesses identified in Chuang and Chen's scheme. PMID:25276847
NASA Astrophysics Data System (ADS)
Yang, P.; Aglieri, G.; Cavicchioli, C.; Chalmet, P. L.; Chanlek, N.; Collu, A.; Gao, C.; Hillemanns, H.; Junique, A.; Kofarago, M.; Keil, M.; Kugathasan, T.; Kim, D.; Kim, J.; Lattuca, A.; Marin Tobon, C. A.; Marras, D.; Mager, M.; Martinengo, P.; Mazza, G.; Mugnier, H.; Musa, L.; Puggioni, C.; Rousset, J.; Reidt, F.; Riedler, P.; Snoeys, W.; Siddhanta, S.; Usai, G.; van Hoorne, J. W.; Yi, J.
2015-06-01
Active Pixel Sensors used in High Energy Particle Physics require low power consumption to reduce the detector material budget, low integration time to reduce the possibilities of pile-up and fast readout to improve the detector data capability. To satisfy these requirements, a novel Address-Encoder and Reset-Decoder (AERD) asynchronous circuit for a fast readout of a pixel matrix has been developed. The AERD data-driven readout architecture operates the address encoding and reset decoding based on an arbitration tree, and allows us to readout only the hit pixels. Compared to the traditional readout structure of the rolling shutter scheme in Monolithic Active Pixel Sensors (MAPS), AERD can achieve a low readout time and a low power consumption especially for low hit occupancies. The readout is controlled at the chip periphery with a signal synchronous with the clock, allows a good digital and analogue signal separation in the matrix and a reduction of the power consumption. The AERD circuit has been implemented in the TowerJazz 180 nm CMOS Imaging Sensor (CIS) process with full complementary CMOS logic in the pixel. It works at 10 MHz with a matrix height of 15 mm. The energy consumed to read out one pixel is around 72 pJ. A scheme to boost the readout speed to 40 MHz is also discussed. The sensor chip equipped with AERD has been produced and characterised. Test results including electrical beam measurement are presented.
Cubic-panorama image dataset analysis for storage and transmission
NASA Astrophysics Data System (ADS)
Salehi, Saeed; Dubois, Eric
2013-02-01
In this paper we address the problem of disparity estimation required for free navigation in acquired cubicpanorama image datasets. A client server based scheme is assumed and a remote user is assumed to seek information at each navigation step. The initial compression of such image datasets for storage as well as the transmission of the required data is addressed in this work. Regarding the compression of such data for storage, a fast method that uses properties of the epipolar geometry together with the cubic format of panoramas is used to estimate disparity vectors efficiently. Assuming the use of B pictures, the concept of forward and backward prediction is addressed. Regarding the transmission stage, a new disparity vector transcoding-like scheme is introduced and a frame conversion scenario is addressed. Details on how to pick the best vector among candidate disparity vectors is explained. In all the above mentioned cases, results are compared both visually through error images as well as using the objective measure of Peak Signal to Noise Ratio (PSNR) versus time.
Intercomparison of hydrologic processes in global climate models
NASA Technical Reports Server (NTRS)
Lau, W. K.-M.; Sud, Y. C.; Kim, J.-H.
1995-01-01
In this report, we address the intercomparison of precipitation (P), evaporation (E), and surface hydrologic forcing (P-E) for 23 Atmospheric Model Intercomparison Project (AMIP) general circulation models (GCM's) including relevant observations, over a variety of spatial and temporal scales. The intercomparison includes global and hemispheric means, latitudinal profiles, selected area means for the tropics and extratropics, ocean and land, respectively. In addition, we have computed anomaly pattern correlations among models and observations for different seasons, harmonic analysis for annual and semiannual cycles, and rain-rate frequency distribution. We also compare the joint influence of temperature and precipitation on local climate using the Koeppen climate classification scheme.
The variance of length of stay and the optimal DRG outlier payments.
Felder, Stefan
2009-09-01
Prospective payment schemes in health care often include supply-side insurance for cost outliers. In hospital reimbursement, prospective payments for patient discharges, based on their classification into diagnosis related group (DRGs), are complemented by outlier payments for long stay patients. The outlier scheme fixes the length of stay (LOS) threshold, constraining the profit risk of the hospitals. In most DRG systems, this threshold increases with the standard deviation of the LOS distribution. The present paper addresses the adequacy of this DRG outlier threshold rule for risk-averse hospitals with preferences depending on the expected value and the variance of profits. It first shows that the optimal threshold solves the hospital's tradeoff between higher profit risk and lower premium loading payments. It then demonstrates for normally distributed truncated LOS that the optimal outlier threshold indeed decreases with an increase in the standard deviation.
Infinite order quantum-gravitational correlations
NASA Astrophysics Data System (ADS)
Knorr, Benjamin
2018-06-01
A new approximation scheme for nonperturbative renormalisation group equations for quantum gravity is introduced. Correlation functions of arbitrarily high order can be studied by resolving the full dependence of the renormalisation group equations on the fluctuation field (graviton). This is reminiscent of a local potential approximation in O(N)-symmetric field theories. As a first proof of principle, we derive the flow equation for the ‘graviton potential’ induced by a conformal fluctuation and corrections induced by a gravitational wave fluctuation. Indications are found that quantum gravity might be in a non-metric phase in the deep ultraviolet. The present setup significantly improves the quality of previous fluctuation vertex studies by including infinitely many couplings, thereby testing the reliability of schemes to identify different couplings to close the equations, and represents an important step towards the resolution of the Nielsen identity. The setup further allows one, in principle, to address the question of putative gravitational condensates.
NASA Technical Reports Server (NTRS)
Leibfried, T. F., Jr.; Davari, Sadegh; Natarajan, Swami; Zhao, Wei
1992-01-01
Two categories were chosen for study: the issue of using a preprocessor on Ada code of Application Programs which would interface with the Run-Time Object Data Base Standard Services (RODB STSV), the intent was to catch and correct any mis-registration errors of the program coder between the user declared Objects, their types, their addresses, and the corresponding RODB definitions; and RODB STSV Performance Issues and Identification of Problems with the planned methods for accessing Primitive Object Attributes, this included the study of an alternate storage scheme to the 'store objects by attribute' scheme in the current design of the RODB. The study resulted in essentially three separate documents, an interpretation of the system requirements, an assessment of the preliminary design, and a detailing of the components of a detailed design.
Liu, L; Zeng, S; Dong, X; Chen, J
2013-01-01
The Shougang Group is an industrial steel enterprise occupying 800 ha in Beijing that will cease production by 2010. The area will be converted to a new financial and commercial zone. The rebuilding of the water infrastructure in this area should address water shortages in Beijing and retain the industrial landmark of a large cooling water tank. A design framework and an assessment system with 11 indicators were developed for this purpose. Four reconstruction schemes are presented here. Scheme 1 is a traditional system that completely depends on outside the municipal facility. Schemes 2, 3, and 4 are systems to separately discharge greywater and blackwater. Scheme 4 uses a vacuum system that allows the reclamation of nutrients. Schemes 2 and 4 use wetland-treated greywater to fill the water tank. Scheme 3 reuses greywater for toilets after on-site treatment. Scheme 2 is recommended due to its lower cost, greater environmental benefit, moderate resource reclamation, and higher technical feasibility.
Novel Threshold Changeable Secret Sharing Schemes Based on Polynomial Interpolation
Li, Mingchu; Guo, Cheng; Choo, Kim-Kwang Raymond; Ren, Yizhi
2016-01-01
After any distribution of secret sharing shadows in a threshold changeable secret sharing scheme, the threshold may need to be adjusted to deal with changes in the security policy and adversary structure. For example, when employees leave the organization, it is not realistic to expect departing employees to ensure the security of their secret shadows. Therefore, in 2012, Zhang et al. proposed (t → t′, n) and ({t1, t2,⋯, tN}, n) threshold changeable secret sharing schemes. However, their schemes suffer from a number of limitations such as strict limit on the threshold values, large storage space requirement for secret shadows, and significant computation for constructing and recovering polynomials. To address these limitations, we propose two improved dealer-free threshold changeable secret sharing schemes. In our schemes, we construct polynomials to update secret shadows, and use two-variable one-way function to resist collusion attacks and secure the information stored by the combiner. We then demonstrate our schemes can adjust the threshold safely. PMID:27792784
Novel Threshold Changeable Secret Sharing Schemes Based on Polynomial Interpolation.
Yuan, Lifeng; Li, Mingchu; Guo, Cheng; Choo, Kim-Kwang Raymond; Ren, Yizhi
2016-01-01
After any distribution of secret sharing shadows in a threshold changeable secret sharing scheme, the threshold may need to be adjusted to deal with changes in the security policy and adversary structure. For example, when employees leave the organization, it is not realistic to expect departing employees to ensure the security of their secret shadows. Therefore, in 2012, Zhang et al. proposed (t → t', n) and ({t1, t2,⋯, tN}, n) threshold changeable secret sharing schemes. However, their schemes suffer from a number of limitations such as strict limit on the threshold values, large storage space requirement for secret shadows, and significant computation for constructing and recovering polynomials. To address these limitations, we propose two improved dealer-free threshold changeable secret sharing schemes. In our schemes, we construct polynomials to update secret shadows, and use two-variable one-way function to resist collusion attacks and secure the information stored by the combiner. We then demonstrate our schemes can adjust the threshold safely.
Electron-Nuclear Quantum Information Processing
2008-11-13
quantum information processing that exploits the anisotropic hyperfine coupling. This scheme enables universal control over a 1-electron, N-nuclear spin...exploits the anisotropic hyperfine coupling. This scheme enables universal control over a 1-electron, N-nuclear spin system, addressing only a...sample of irradiated malonic acid. (a) Papers published in peer-reviewed journals (N/A for none) Universal control of nuclear spins via anisotropic
EQUAL-quant: an international external quality assessment scheme for real-time PCR.
Ramsden, Simon C; Daly, Sarah; Geilenkeuser, Wolf-Jochen; Duncan, Graeme; Hermitte, Fabienne; Marubini, Ettore; Neumaier, Michael; Orlando, Claudio; Palicka, Vladimir; Paradiso, Angelo; Pazzagli, Mario; Pizzamiglio, Sara; Verderio, Paolo
2006-08-01
Quantitative gene expression analysis by real-time PCR is important in several diagnostic areas, such as the detection of minimum residual disease in leukemia and the prognostic assessment of cancer patients. To address quality assurance in this technically challenging area, the European Union (EU) has funded the EQUAL project to develop methodologic external quality assessment (EQA) relevant to diagnostic and research laboratories among the EU member states. We report here the results of the EQUAL-quant program, which assesses standards in the use of TaqMan probes, one of the most widely used assays in the implementation of real-time PCR. The EQUAL-quant reagent set was developed to assess the technical execution of a standard TaqMan assay, including RNA extraction, reverse transcription, and real-time PCR quantification of target DNA copy number. The multidisciplinary EQA scheme included 137 participating laboratories from 29 countries. We demonstrated significant differences in performance among laboratories, with 20% of laboratories reporting at least one result lacking in precision and/or accuracy according to the statistical procedures described. No differences in performance were observed for the >10 different testing platforms used by the study participants. This EQA scheme demonstrated both the requirement and demand for external assessment of technical standards in real-time PCR. The reagent design and the statistical tools developed within this project will provide a benchmark for defining acceptable working standards in this emerging technology.
Photomask etch system and process for 10nm technology node and beyond
NASA Astrophysics Data System (ADS)
Chandrachood, Madhavi; Grimbergen, Michael; Yu, Keven; Leung, Toi; Tran, Jeffrey; Chen, Jeff; Bivens, Darin; Yalamanchili, Rao; Wistrom, Richard; Faure, Tom; Bartlau, Peter; Crawford, Shaun; Sakamoto, Yoshifumi
2015-10-01
While the industry is making progress to offer EUV lithography schemes to attain ultimate critical dimensions down to 20 nm half pitch, an interim optical lithography solution to address an immediate need for resolution is offered by various integration schemes using advanced PSM (Phase Shift Mask) materials including thin e-beam resist and hard mask. Using the 193nm wavelength to produce 10nm or 7nm patterns requires a range of optimization techniques, including immersion and multiple patterning, which place a heavy demand on photomask technologies. Mask schemes with hard mask certainly help attain better selectivity and hence better resolution but pose integration challenges and defectivity issues. This paper presents a new photomask etch solution for attenuated phase shift masks that offers high selectivity (Cr:Resist > 1.5:1), tighter control on the CD uniformity with a 3sigma value approaching 1 nm and controllable CD bias (5-20 nm) with excellent CD linearity performance (<5 nm) down to the finer resolution. The new system has successfully demonstrated capability to meet the 10 nm node photomask CD requirements without the use of more complicated hard mask phase shift blanks. Significant improvement in post wet clean recovery performance was demonstrated by the use of advanced chamber materials. Examples of CD uniformity, linearity, and minimum feature size, and etch bias performance on 10 nm test site and production mask designs will be shown.
Economic growth and biodiversity loss in an age of tradable permits.
Rosales, Jon
2006-08-01
Tradable permits are increasingly becoming part of environmental policy and conservation programs. The efficacy of tradable permit schemes in addressing the root cause of environmental decline-economic growth--will not be achieved unless the schemes cap economic activity based on ecological thresholds. Lessons can be learned from the largest tradable permit scheme to date, emissions trading now being implemented with the Kyoto Protocol. The Kyoto Protocol caps neither greenhouse gas emissions at a level that will achieve climate stability nor economic growth. If patterned after the Kyoto Protocol, cap-and-trade schemes for conservation will not ameliorate biodiversity loss either because they will not address economic growth. In response to these failures to cap economic growth, professional organizations concerned about biodiversity conservation should release position statements on economic growth and ecological thresholds. The statements can then be used by policy makers to infuse these positions into the local, national, and international environmental science-policy process when these schemes are being developed. Infusing language into the science-policy process that calls for capping economic activity based on ecological thresholds represents sound conservation science. Most importantly, position statements have a greater potential to ameliorate biodiversity loss if they are created and released than if this information remains within professional organizations because there is the potential for these ideas to be enacted into law and policy.
Net Assessment: Creating an Institutional Capacity and General Process to Perform It
2017-06-01
PROCESS TO PERFORM IT 5. FUNDING NUMBERS 6. AUTHOR(S) Humberto Enrique Lopez Arellano 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Naval...Postgraduate School Monterey, CA 93943-5000 8. PERFORMING ORGANIZATION REPORT NUMBER 9. SPONSORING /MONITORING AGENCY NAME(S) AND ADDRESS(ES...assessment products. Finally, he proposes three different schemes for integrating net assessment capacity into government organizations , public
Li, Congcong; Zhang, Xi; Wang, Haiping; Li, Dongfeng
2018-01-01
Vehicular sensor networks have been widely applied in intelligent traffic systems in recent years. Because of the specificity of vehicular sensor networks, they require an enhanced, secure and efficient authentication scheme. Existing authentication protocols are vulnerable to some problems, such as a high computational overhead with certificate distribution and revocation, strong reliance on tamper-proof devices, limited scalability when building many secure channels, and an inability to detect hardware tampering attacks. In this paper, an improved authentication scheme using certificateless public key cryptography is proposed to address these problems. A security analysis of our scheme shows that our protocol provides an enhanced secure anonymous authentication, which is resilient against major security threats. Furthermore, the proposed scheme reduces the incidence of node compromise and replication attacks. The scheme also provides a malicious-node detection and warning mechanism, which can quickly identify compromised static nodes and immediately alert the administrative department. With performance evaluations, the scheme can obtain better trade-offs between security and efficiency than the well-known available schemes. PMID:29324719
NASA Astrophysics Data System (ADS)
Block, P. J.; Alexander, S.; WU, S.
2017-12-01
Skillful season-ahead predictions conditioned on local and large-scale hydro-climate variables can provide valuable knowledge to farmers and reservoir operators, enabling informed water resource allocation and management decisions. In Ethiopia, the potential for advancing agriculture and hydropower management, and subsequently economic growth, is substantial, yet evidence suggests a weak adoption of prediction information by sectoral audiences. To address common critiques, including skill, scale, and uncertainty, probabilistic forecasts are developed at various scales - temporally and spatially - for the Finchaa hydropower dam and the Koga agricultural scheme in an attempt to promote uptake and application. Significant prediction skill is evident across scales, particularly for statistical models. This raises questions regarding other potential barriers to forecast utilization at community scales, which are also addressed.
Self-addressed diffractive lens schemes for the characterization of LCoS displays
NASA Astrophysics Data System (ADS)
Zhang, Haolin; Lizana, Angel; Iemmi, Claudio; Monroy-Ramírez, Freddy A.; Marquez, Andrés.; Moreno, Ignacio; Campos, Juan
2018-02-01
We proposed a self-calibration method to calibrate both the phase-voltage look-up table and the screen phase distribution of Liquid Crystal on Silicon (LCoS) displays by implementing different lens configurations on the studied device within a same optical scheme. On the one hand, the phase-voltage relation is determined from interferometric measurements, which are obtained by addressing split-lens phase distributions on the LCoS display. On the other hand, the surface profile is retrieved by self-addressing a diffractive micro-lens array to the LCoS display, in a way that we configure a Shack-Hartmann wavefront sensor that self-determines the screen spatial variations. Moreover, both the phase-voltage response and the surface phase inhomogeneity of the LCoS are measured within the same experimental set-up, without the necessity of further adjustments. Experimental results prove the usefulness of the above-mentioned technique for LCoS displays characterization.
A secure data outsourcing scheme based on Asmuth-Bloom secret sharing
NASA Astrophysics Data System (ADS)
Idris Muhammad, Yusuf; Kaiiali, Mustafa; Habbal, Adib; Wazan, A. S.; Sani Ilyasu, Auwal
2016-11-01
Data outsourcing is an emerging paradigm for data management in which a database is provided as a service by third-party service providers. One of the major benefits of offering database as a service is to provide organisations, which are unable to purchase expensive hardware and software to host their databases, with efficient data storage accessible online at a cheap rate. Despite that, several issues of data confidentiality, integrity, availability and efficient indexing of users' queries at the server side have to be addressed in the data outsourcing paradigm. Service providers have to guarantee that their clients' data are secured against internal (insider) and external attacks. This paper briefly analyses the existing indexing schemes in data outsourcing and highlights their advantages and disadvantages. Then, this paper proposes a secure data outsourcing scheme based on Asmuth-Bloom secret sharing which tries to address the issues in data outsourcing such as data confidentiality, availability and order preservation for efficient indexing.
Reeve, Belinda
2013-06-01
Reducing non-core food advertising to children is an important priority in strategies to address childhood obesity. Public health researchers argue for government intervention on the basis that food industry self-regulation is ineffective; however, the industry contends that the existing voluntary scheme adequately addresses community concerns. This paper examines the operation of two self-regulatory initiatives governing food advertising to children in Australia, in order to determine whether these regulatory processes foster transparent and accountable self-regulation. The paper concludes that while both codes appear to establish transparency and accountability mechanisms, they do not provide for meaningful stakeholder participation in the self-regulatory scheme. Accordingly, food industry self-regulation is unlikely to reflect public health concerns or to be perceived as a legitimate form of governance by external stakeholders. If industry regulation is to remain a feasible alternative to statutory regulation, there is a strong argument for strengthening government oversight and implementing a co-regulatory scheme.
South Africa's universal health coverage reforms in the post-apartheid period.
van den Heever, Alexander Marius
2016-12-01
In 2011, the South African government published a Green Paper outlining proposals for a single-payer National Health Insurance arrangement as a means to achieve universal health coverage (UHC), followed by a White Paper in 2015. This follows over two decades of health reform proposals and reforms aimed at deepening UHC. The most recent reform departure aims to address pooling and purchasing weaknesses in the health system by internalising both functions within a single scheme. This contrasts with the post-apartheid period from 1994 to 2008 where pooling weaknesses were to be addressed using pooling schemes, in the form of government subsidies and risk-equalisation arrangements, external to the public and private purchasers. This article reviews both reform paths and attempts to reconcile what may appear to be very different approaches. The scale of the more recent set of proposals requires a very long reform path because in the mid-term (the next 25 years) no single scheme will be able to raise sufficient revenue to provide a universal package for the entire population. In the interim, reforms that maintain and improve existing forms of coverage are required. The earlier reform framework (1994-2008) largely addressed this concern while leaving open the final form of the system. Both reform approaches are therefore compatible: the earlier reforms addressed medium- to long-term coverage concerns, while the more recent define the long-term institutional goal. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.
Writing a group practice business plan.
Reiboldt, J M
1999-07-01
A business plan offers group practices a blueprint to accomplish a variety of goals, such as securing capital, marketing the practice's services, recruiting new employees, developing a strategic plan or a budget, or planning for growth. A business plan should be informative, specific, and visionary. Elements that every business plan should address are a mission statement, strategy, planning, management information, and action scheme. A business plan should include certain information in a prescribed order. By writing a realistic business plan, group practices can work more efficiently and minimize the risk of not meeting their financial projections.
Convergence Acceleration for Multistage Time-Stepping Schemes
NASA Technical Reports Server (NTRS)
Swanson, R. C.; Turkel, Eli L.; Rossow, C-C; Vasta, V. N.
2006-01-01
The convergence of a Runge-Kutta (RK) scheme with multigrid is accelerated by preconditioning with a fully implicit operator. With the extended stability of the Runge-Kutta scheme, CFL numbers as high as 1000 could be used. The implicit preconditioner addresses the stiffness in the discrete equations associated with stretched meshes. Numerical dissipation operators (based on the Roe scheme, a matrix formulation, and the CUSP scheme) as well as the number of RK stages are considered in evaluating the RK/implicit scheme. Both the numerical and computational efficiency of the scheme with the different dissipation operators are discussed. The RK/implicit scheme is used to solve the two-dimensional (2-D) and three-dimensional (3-D) compressible, Reynolds-averaged Navier-Stokes equations. In two dimensions, turbulent flows over an airfoil at subsonic and transonic conditions are computed. The effects of mesh cell aspect ratio on convergence are investigated for Reynolds numbers between 5.7 x 10(exp 6) and 100.0 x 10(exp 6). Results are also obtained for a transonic wing flow. For both 2-D and 3-D problems, the computational time of a well-tuned standard RK scheme is reduced at least a factor of four.
Maternal healthcare financing: Gujarat's Chiranjeevi Scheme and its beneficiaries.
Bhat, Ramesh; Mavalankar, Dileep V; Singh, Prabal V; Singh, Neelu
2009-04-01
Maternal mortality is an important public-health issue in India, specifically in Gujarat. Contributing factors are the Government's inability to operationalize the First Referral Units and to provide an adequate level of skilled birth attendants, especially to the poor. In response, the Gujarat state has developed a unique public-private partnership called the Chiranjeevi Scheme. This scheme focuses on institutional delivery, specifically emergency obstetric care for the poor. The objective of the study was to explore the targeting of the scheme, its coverage, and socioeconomic profile of the beneficiaries and to assess financial protection offered by the scheme, if any, in Dahod, one of the initial pilot districts of Gujarat. A household-level survey of beneficiaries (n=262) and non-users (n=394) indicated that the scheme is well-targeted to the poor but many poor people do not use the services. The beneficiaries saved more than Rs 3000 (US$ 75) in delivery-related expenses and were generally satisfied with the scheme. The study provided insights on how to improve the scheme further. Such a financing scheme could be replicated in other states and countries to address the cost barrier, especially in areas where high numbers of private specialists are available.
National health insurance policy in Nepal: challenges for implementation.
Mishra, Shiva Raj; Khanal, Pratik; Karki, Deepak Kumar; Kallestrup, Per; Enemark, Ulrika
2015-01-01
The health system in Nepal is characterized by a wide network of health facilities and community workers and volunteers. Nepal's Interim Constitution of 2007 addresses health as a fundamental right, stating that every citizen has the right to basic health services free of cost. But the reality is a far cry. Only 61.8% of the Nepalese households have access to health facilities within 30 min, with significant urban (85.9%) and rural (59%) discrepancy. Addressing barriers to health services needs urgent interventions at the population level. Recently (February 2015), the Government of Nepal formed a Social Health Security Development Committee as a legal framework to start implementing a social health security scheme (SHS) after the National Health Insurance Policy came out in 2013. The program has aimed to increase the access of health services to the poor and the marginalized, and people in hard to reach areas of the country, though challenges remain with financing. Several aspects should be considered in design, learning from earlier community-based health insurance schemes that suffered from low enrollment and retention of members as well as from a pro-rich bias. Mechanisms should be built for monitoring unfair pricing and unaffordable copayments, and an overall benefit package be crafted to include coverage of major health services including non-communicable diseases. Regulations should include such issues as accreditation mechanisms for private providers. Health system strengthening should move along with the roll-out of SHS. Improving the efficiency of hospital, motivating the health workers, and using appropriate technology can improve the quality of health services. Also, as currently a constitution drafting is being finalized, careful planning and deliberation is necessary about what insurance structure may suit the proposed future federal structure in Nepal.
Applications of the U.S. Geological Survey's global land cover product
Reed, B.
1997-01-01
The U.S. Geological Survey (USGS), in partnership with several international agencies and universities, has produced a global land cover characteristics database. The land cover data were created using multitemporal analysis of advanced very high resolution radiometer satellite images in conjunction with other existing geographic data. A translation table permits the conversion of the land cover classes into several conventional land cover schemes that are used by ecosystem modelers, climate modelers, land management agencies, and other user groups. The alternative classification schemes include Global Ecosystems, the Biosphere Atmosphere Transfer Scheme, the Simple Biosphere, the USGS Anderson Level 2, and the International Geosphere Biosphere Programme. The distribution system for these data is through the World Wide Web (the web site address is: http://edcwww.cr.usgs.gov/landdaac/glcc/glcc.html) or by magnetic media upon special request The availability of the data over the World Wide Web, in conjunction with the flexible database structure, allows easy data access to a wide range of users. The web site contains a user registration form that allows analysis of the diverse applications of large-area land cover data. Currently, applications are divided among mapping (20 percent), conservation (30 percent), and modeling (35 percent).
Particle/Continuum Hybrid Simulation in a Parallel Computing Environment
NASA Technical Reports Server (NTRS)
Baganoff, Donald
1996-01-01
The objective of this study was to modify an existing parallel particle code based on the direct simulation Monte Carlo (DSMC) method to include a Navier-Stokes (NS) calculation so that a hybrid solution could be developed. In carrying out this work, it was determined that the following five issues had to be addressed before extensive program development of a three dimensional capability was pursued: (1) find a set of one-sided kinetic fluxes that are fully compatible with the DSMC method, (2) develop a finite volume scheme to make use of these one-sided kinetic fluxes, (3) make use of the one-sided kinetic fluxes together with DSMC type boundary conditions at a material surface so that velocity slip and temperature slip arise naturally for near-continuum conditions, (4) find a suitable sampling scheme so that the values of the one-sided fluxes predicted by the NS solution at an interface between the two domains can be converted into the correct distribution of particles to be introduced into the DSMC domain, (5) carry out a suitable number of tests to confirm that the developed concepts are valid, individually and in concert for a hybrid scheme.
Turbulence interacting with chemical kinetics in airbreathing combustion of ducted rockets
NASA Astrophysics Data System (ADS)
Chung, T. J.; Yoon, W. S.
1992-10-01
Physical interactions between turbulence and shock waves are very complex phenomena. If these interactions take place in chemically reacting flows the degree of complexity increases dramatically. Examples of applications may be cited in the area of supersonic combustion, in which the controlled generation of turbulence and/or large scale vortices in the mixing and flame holding zones is crucial for efficient combustion. Equally important, shock waves interacting with turbulence and chemical reactions affect the combustor flowfield resulting in enhanced relaxation and chemical reaction rates. Chemical reactions in turn contribute to dispersion of shock waves and reduction of turbulent kinetic energies. Computational schemes to address these physical phenomena must be capable of resolving various length and time scales. These scales are widely disparate and the most optimum approach is found in explicit/ implicit adjustable schemes for the Navier-Stokes solver. This is accomplished by means of the generalized Taylor-Galerkin (GTG) finite element formulations. Adaptive meshes are used in order to assure efficiency and accuracy of solutions. Various benchmark problems are presented for illustration of the theory and applications. Geometries of ducted rockets, supersonic diffusers, flame holders, and hypersonic inlets are included. Merits of proposed schemes are demonstrated through these example problems.
Application of the Organic Synthetic Designs to Astrobiology
NASA Astrophysics Data System (ADS)
Kolb, V. M.
2009-12-01
In this paper we propose a synthesis of the heterocyclic compounds and the insoluble materials on the meteorites. Our synthetic scheme involves the reaction of sugars and amino acids, the so-called Maillard reaction. We have developed this scheme based on the combined analysis of the regular and retrosynthetic organic synthetic principles. The merits of these synthetic methods for the prebiotic design are addressed.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Swanson, J.L.
1993-09-01
Disposal of high-level tank wastes at the Hanford Site is currently envisioned to divide the waste between two principal waste forms: glass for the high-level waste (HLW) and grout for the low-level waste (LLW). The draft flow diagram shown in Figure 1.1 was developed as part of the current planning process for the Tank Waste Remediation System (TWRS), which is evaluating options for tank cleanup. The TWRS has been established by the US Department of Energy (DOE) to safely manage the Hanford tank wastes. It includes tank safety and waste disposal issues, as well as the waste pretreatment and wastemore » minimization issues that are involved in the ``clean option`` discussed in this report. This report describes the results of a study led by Pacific Northwest Laboratory to determine if a more aggressive separations scheme could be devised which could mitigate concerns over the quantity of the HLW and the toxicity of the LLW produced by the reference system. This aggressive scheme, which would meet NRC Class A restrictions (10 CFR 61), would fit within the overall concept depicted in Figure 1.1; it would perform additional and/or modified operations in the areas identified as interim storage, pretreatment, and LLW concentration. Additional benefits of this scheme might result from using HLW and LLW disposal forms other than glass and grout, but such departures from the reference case are not included at this time. The evaluation of this aggressive separations scheme addressed institutional issues such as: radioactivity remaining in the Hanford Site LLW grout, volume of HLW glass that must be shipped offsite, and disposition of appropriate waste constituents to nonwaste forms.« less
NASA Astrophysics Data System (ADS)
Campbell, Lucy J.; Shepherd, Theodore G.
2005-12-01
Parameterization schemes for the drag due to atmospheric gravity waves are discussed and compared in the context of a simple one-dimensional model of the quasi-biennial oscillation (QBO). A number of fundamental issues are examined in detail, with the goal of providing a better understanding of the mechanism by which gravity wave drag can produce an equatorial zonal wind oscillation. The gravity wave driven QBOs are compared with those obtained from a parameterization of equatorial planetary waves. In all gravity wave cases, it is seen that the inclusion of vertical diffusion is crucial for the descent of the shear zones and the development of the QBO. An important difference between the schemes for the two types of waves is that in the case of equatorial planetary waves, vertical diffusion is needed only at the lowest levels, while for the gravity wave drag schemes it must be included at all levels. The question of whether there is downward propagation of influence in the simulated QBOs is addressed. In the gravity wave drag schemes, the evolution of the wind at a given level depends on the wind above, as well as on the wind below. This is in contrast to the parameterization for the equatorial planetary waves in which there is downward propagation of phase only. The stability of a zero-wind initial state is examined, and it is determined that a small perturbation to such a state will amplify with time to the extent that a zonal wind oscillation is permitted.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ghosh, Debojyoti; Baeder, James D.
2014-01-21
A new class of compact-reconstruction weighted essentially non-oscillatory (CRWENO) schemes were introduced (Ghosh and Baeder in SIAM J Sci Comput 34(3): A1678–A1706, 2012) with high spectral resolution and essentially non-oscillatory behavior across discontinuities. The CRWENO schemes use solution-dependent weights to combine lower-order compact interpolation schemes and yield a high-order compact scheme for smooth solutions and a non-oscillatory compact scheme near discontinuities. The new schemes result in lower absolute errors, and improved resolution of discontinuities and smaller length scales, compared to the weighted essentially non-oscillatory (WENO) scheme of the same order of convergence. Several improvements to the smoothness-dependent weights, proposed inmore » the literature in the context of the WENO schemes, address the drawbacks of the original formulation. This paper explores these improvements in the context of the CRWENO schemes and compares the different formulations of the non-linear weights for flow problems with small length scales as well as discontinuities. Simplified one- and two-dimensional inviscid flow problems are solved to demonstrate the numerical properties of the CRWENO schemes and its different formulations. Canonical turbulent flow problems—the decay of isotropic turbulence and the shock-turbulence interaction—are solved to assess the performance of the schemes for the direct numerical simulation of compressible, turbulent flows« less
Azbel-Jackson, Lena; Heffernan, Claire; Gunn, George; Brownlie, Joe
2018-01-01
The article describes the influence of a disease control scheme (the Norfolk-Suffolk Bovine Viral Diarrhoea Disease (BVD) Eradication scheme) on farmers' bio-security attitudes and behaviours. In 2010, a survey of 100 cattle farmers (53 scheme members vs. 47 out of scheme farmers) was undertaken among cattle farmers residing in Norfolk and Suffolk counties in the UK. A cross-sectional independent measures design was employed. The main analytical tool was content analysis. The following variables at the farmer-level were explored: the specific BVD control measures adopted, livestock disease priorities, motivation for scheme membership, wider knowledge acquisition, biosecurity behaviours employed and training course attendance. The findings suggest that participation in the BVD scheme improved farmers' perception of the scheme benefits and participation in training courses. However, no association was found between the taking part in the BVD scheme and livestock disease priorities or motivation for scheme participation, or knowledge about BVD bio-security measures employed. Equally importantly, scheme membership did appear to influence the importance accorded specific bio-security measures. Yet such ranking did not appear to reflect the actual behaviours undertaken. As such, disease control efforts alone while necessary, are insufficient. Rather, to enhance farmer bio-security behaviours significant effort must be made to address underlying attitudes to the specific disease threat involved.
Azbel-Jackson, Lena; Heffernan, Claire; Gunn, George; Brownlie, Joe
2018-01-01
The article describes the influence of a disease control scheme (the Norfolk-Suffolk Bovine Viral Diarrhoea Disease (BVD) Eradication scheme) on farmers' bio-security attitudes and behaviours. In 2010, a survey of 100 cattle farmers (53 scheme members vs. 47 out of scheme farmers) was undertaken among cattle farmers residing in Norfolk and Suffolk counties in the UK. A cross-sectional independent measures design was employed. The main analytical tool was content analysis. The following variables at the farmer-level were explored: the specific BVD control measures adopted, livestock disease priorities, motivation for scheme membership, wider knowledge acquisition, biosecurity behaviours employed and training course attendance. The findings suggest that participation in the BVD scheme improved farmers' perception of the scheme benefits and participation in training courses. However, no association was found between the taking part in the BVD scheme and livestock disease priorities or motivation for scheme participation, or knowledge about BVD bio-security measures employed. Equally importantly, scheme membership did appear to influence the importance accorded specific bio-security measures. Yet such ranking did not appear to reflect the actual behaviours undertaken. As such, disease control efforts alone while necessary, are insufficient. Rather, to enhance farmer bio-security behaviours significant effort must be made to address underlying attitudes to the specific disease threat involved. PMID:29432435
NASA Astrophysics Data System (ADS)
Tian, Jiyang; Liu, Jia; Wang, Jianhua; Li, Chuanzhe; Yu, Fuliang; Chu, Zhigang
2017-07-01
Mesoscale Numerical Weather Prediction systems can provide rainfall products at high resolutions in space and time, playing an increasingly more important role in water management and flood forecasting. The Weather Research and Forecasting (WRF) model is one of the most popular mesoscale systems and has been extensively used in research and practice. However, for hydrologists, an unsolved question must be addressed before each model application in a different target area. That is, how are the most appropriate combinations of physical parameterisations from the vast WRF library selected to provide the best downscaled rainfall? In this study, the WRF model was applied with 12 designed parameterisation schemes with different combinations of physical parameterisations, including microphysics, radiation, planetary boundary layer (PBL), land-surface model (LSM) and cumulus parameterisations. The selected study areas are two semi-humid and semi-arid catchments located in the Daqinghe River basin, Northern China. The performance of WRF with different parameterisation schemes is tested for simulating eight typical 24-h storm events with different evenness in space and time. In addition to the cumulative rainfall amount, the spatial and temporal patterns of the simulated rainfall are evaluated based on a two-dimensional composed verification statistic. Among the 12 parameterisation schemes, Scheme 4 outperforms the other schemes with the best average performance in simulating rainfall totals and temporal patterns; in contrast, Scheme 6 is generally a good choice for simulations of spatial rainfall distributions. Regarding the individual parameterisations, Single-Moment 6 (WSM6), Yonsei University (YSU), Kain-Fritsch (KF) and Grell-Devenyi (GD) are better choices for microphysics, planetary boundary layers (PBL) and cumulus parameterisations, respectively, in the study area. These findings provide helpful information for WRF rainfall downscaling in semi-humid and semi-arid areas. The methodologies to design and test the combination schemes of parameterisations can also be regarded as a reference for generating ensembles in numerical rainfall predictions using the WRF model.
Debpuur, Cornelius; Dalaba, Maxwell Ayindenaba; Chatio, Samuel; Adjuik, Martin; Akweongo, Patricia
2015-10-15
The government of Ghana introduced the National Health Insurance Scheme (NHIS) in 2003 through an Act of Parliament (Act 650) as a strategy to improve financial access to quality basic health care services. Although attendance at health facilities has increased since the introduction of the NHIS, there have been media reports of widespread abuse of the NHIS by scheme operators, service providers and insured persons. The aim of the study was to document behaviors and practices of service providers and clients of the NHIS in the Kassena-Nankana District (KND) of Ghana that constitute moral hazards (abuse of the scheme) and identify strategies to minimize such behaviors. Qualitative methods through 14 Focused Group Discussions (FGDs) and 5 individual in-depth interviews were conducted between December 2009 and January 2010. Thematic analysis was performed with the aid of QSR NVivo 8 software. Analysis of FGDs and in-depth interviews showed that community members, health providers and NHIS officers are aware of various behaviors and practices that constitute abuse of the scheme. Behaviors such as frequent and 'frivolous' visits to health facilities, impersonation, feigning sickness to collect drugs for non-insured persons, over charging for services provided to clients, charging clients for services not provided and over prescription were identified. Suggestions on how to minimize abuse of the NHIS offered by respondents included: reduction of premiums and registration fees, premium payments by installment, improvement in the picture quality of the membership cards, critical examination and verification of membership cards at health facilities, some ceiling on the number of times one can seek health care within a specified time period, and general education to change behaviors that abuse the scheme. Attention should be focused on addressing the identified moral hazard behaviors and pursue cost containment strategies to ensure the smooth operation of the scheme and enhance its sustainability.
Modified PTS-based PAPR Reduction for FBMC-OQAM Systems
NASA Astrophysics Data System (ADS)
Deng, Honggui; Ren, Shuang; Liu, Yan; Tang, Chengying
2017-10-01
The filter bank multicarrier with offset quadrature amplitude modulation (FBMC-OQAM) has been raised great concern in the 5G communication research. However FBMC-OQAM has also the inherent drawback of high peak-to-average power ratio (PAPR) that should be addressed. Due to the overlapping structure of FBMC-OQAM signals, it is proven that directly employing conventional partial transmit sequence (PTS) scheme proposed for OFDM to FBMC-OQAM is ineffective. In this paper, we propose a modified PTS-based scheme by employing phase rotation factors to optimize only the phase of the sparse peak signals, called as sparse PTS (S-PTS) scheme. Theoretical analysis and simulation results show that the proposed S-PTS scheme provides a significant PAPR reduction performance with lower computational complexity.
Event generators for address event representation transmitters
NASA Astrophysics Data System (ADS)
Serrano-Gotarredona, Rafael; Serrano-Gotarredona, Teresa; Linares Barranco, Bernabe
2005-06-01
Address Event Representation (AER) is an emergent neuromorphic interchip communication protocol that allows for real-time virtual massive connectivity between huge number neurons located on different chips. By exploiting high speed digital communication circuits (with nano-seconds timings), synaptic neural connections can be time multiplexed, while neural activity signals (with mili-seconds timings) are sampled at low frequencies. Also, neurons generate 'events' according to their activity levels. More active neurons generate more events per unit time, and access the interchip communication channel more frequently, while neurons with low activity consume less communication bandwidth. In a typical AER transmitter chip, there is an array of neurons that generate events. They send events to a peripheral circuitry (let's call it "AER Generator") that transforms those events to neurons coordinates (addresses) which are put sequentially on an interchip high speed digital bus. This bus includes a parallel multi-bit address word plus a Rqst (request) and Ack (acknowledge) handshaking signals for asynchronous data exchange. There have been two main approaches published in the literature for implementing such "AER Generator" circuits. They differ on the way of handling event collisions coming from the array of neurons. One approach is based on detecting and discarding collisions, while the other incorporates arbitration for sequencing colliding events . The first approach is supposed to be simpler and faster, while the second is able to handle much higher event traffic. In this article we will concentrate on the second arbiter-based approach. Boahen has been publishing several techniques for implementing and improving the arbiter based approach. Originally, he proposed an arbitration squeme by rows, followed by a column arbitration. In this scheme, while one neuron was selected by the arbiters to transmit his event out of the chip, the rest of neurons in the array were freezed to transmit any further events during this time window. This limited the maximum transmission speed. In order to improve this speed, Boahen proposed an improved 'burst mode' scheme. In this scheme after the row arbitration, a complete row of events is pipelined out of the array and arbitered out of the chip at higher speed. During this single row event arbitration, the array is free to generate new events and communicate to the row arbiter, in a pipelined mode. This scheme significantly improves maximum event transmission speed, specially for high traffic situations were speed is more critical. We have analyzed and studied this approach and have detected some shortcomings in the circuits reported by Boahen, which may render some false situations under some statistical conditions. The present paper proposes some improvements to overcome such situations. The improved "AER Generator" has been implemented in an AER transmitter system
Genetic algorithms with memory- and elitism-based immigrants in dynamic environments.
Yang, Shengxiang
2008-01-01
In recent years the genetic algorithm community has shown a growing interest in studying dynamic optimization problems. Several approaches have been devised. The random immigrants and memory schemes are two major ones. The random immigrants scheme addresses dynamic environments by maintaining the population diversity while the memory scheme aims to adapt genetic algorithms quickly to new environments by reusing historical information. This paper investigates a hybrid memory and random immigrants scheme, called memory-based immigrants, and a hybrid elitism and random immigrants scheme, called elitism-based immigrants, for genetic algorithms in dynamic environments. In these schemes, the best individual from memory or the elite from the previous generation is retrieved as the base to create immigrants into the population by mutation. This way, not only can diversity be maintained but it is done more efficiently to adapt genetic algorithms to the current environment. Based on a series of systematically constructed dynamic problems, experiments are carried out to compare genetic algorithms with the memory-based and elitism-based immigrants schemes against genetic algorithms with traditional memory and random immigrants schemes and a hybrid memory and multi-population scheme. The sensitivity analysis regarding some key parameters is also carried out. Experimental results show that the memory-based and elitism-based immigrants schemes efficiently improve the performance of genetic algorithms in dynamic environments.
Convergence Acceleration of Runge-Kutta Schemes for Solving the Navier-Stokes Equations
NASA Technical Reports Server (NTRS)
Swanson, Roy C., Jr.; Turkel, Eli; Rossow, C.-C.
2007-01-01
The convergence of a Runge-Kutta (RK) scheme with multigrid is accelerated by preconditioning with a fully implicit operator. With the extended stability of the Runge-Kutta scheme, CFL numbers as high as 1000 can be used. The implicit preconditioner addresses the stiffness in the discrete equations associated with stretched meshes. This RK/implicit scheme is used as a smoother for multigrid. Fourier analysis is applied to determine damping properties. Numerical dissipation operators based on the Roe scheme, a matrix dissipation, and the CUSP scheme are considered in evaluating the RK/implicit scheme. In addition, the effect of the number of RK stages is examined. Both the numerical and computational efficiency of the scheme with the different dissipation operators are discussed. The RK/implicit scheme is used to solve the two-dimensional (2-D) and three-dimensional (3-D) compressible, Reynolds-averaged Navier-Stokes equations. Turbulent flows over an airfoil and wing at subsonic and transonic conditions are computed. The effects of the cell aspect ratio on convergence are investigated for Reynolds numbers between 5:7 x 10(exp 6) and 100 x 10(exp 6). It is demonstrated that the implicit preconditioner can reduce the computational time of a well-tuned standard RK scheme by a factor between four and ten.
Women into Non-Traditional Sectors: Addressing Gender Segregation in the Northern Ireland Workplace
ERIC Educational Resources Information Center
Potter, Michael; Hill, Myrtle
2009-01-01
The horizontal segregation of the workforce along gender lines tends to assign women to lower paid, lower status employment. Consequently, schemes to address segregation have focused on preparing women to enter non-traditional occupations through training and development processes. This article examines models to encourage women into…
Monte Carlo simulation models of breeding-population advancement.
J.N. King; G.R. Johnson
1993-01-01
Five generations of population improvement were modeled using Monte Carlo simulations. The model was designed to address questions that are important to the development of an advanced generation breeding population. Specifically we addressed the effects on both gain and effective population size of different mating schemes when creating a recombinant population for...
PRESAGE: Protecting Structured Address Generation against Soft Errors
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sharma, Vishal C.; Gopalakrishnan, Ganesh; Krishnamoorthy, Sriram
Modern computer scaling trends in pursuit of larger component counts and power efficiency have, unfortunately, lead to less reliable hardware and consequently soft errors escaping into application data ("silent data corruptions"). Techniques to enhance system resilience hinge on the availability of efficient error detectors that have high detection rates, low false positive rates, and lower computational overhead. Unfortunately, efficient detectors to detect faults during address generation have not been widely researched (especially in the context of indexing large arrays). We present a novel lightweight compiler-driven technique called PRESAGE for detecting bit-flips affecting structured address computations. A key insight underlying PRESAGEmore » is that any address computation scheme that propagates an already incurred error is better than a scheme that corrupts one particular array access but otherwise (falsely) appears to compute perfectly. Ensuring the propagation of errors allows one to place detectors at loop exit points and helps turn silent corruptions into easily detectable error situations. Our experiments using the PolyBench benchmark suite indicate that PRESAGE-based error detectors have a high error-detection rate while incurring low overheads.« less
A Novel Scheme for an Energy Efficient Internet of Things Based on Wireless Sensor Networks.
Rani, Shalli; Talwar, Rajneesh; Malhotra, Jyoteesh; Ahmed, Syed Hassan; Sarkar, Mahasweta; Song, Houbing
2015-11-12
One of the emerging networking standards that gap between the physical world and the cyber one is the Internet of Things. In the Internet of Things, smart objects communicate with each other, data are gathered and certain requests of users are satisfied by different queried data. The development of energy efficient schemes for the IoT is a challenging issue as the IoT becomes more complex due to its large scale the current techniques of wireless sensor networks cannot be applied directly to the IoT. To achieve the green networked IoT, this paper addresses energy efficiency issues by proposing a novel deployment scheme. This scheme, introduces: (1) a hierarchical network design; (2) a model for the energy efficient IoT; (3) a minimum energy consumption transmission algorithm to implement the optimal model. The simulation results show that the new scheme is more energy efficient and flexible than traditional WSN schemes and consequently it can be implemented for efficient communication in the IoT.
A Novel Scheme for an Energy Efficient Internet of Things Based on Wireless Sensor Networks
Rani, Shalli; Talwar, Rajneesh; Malhotra, Jyoteesh; Ahmed, Syed Hassan; Sarkar, Mahasweta; Song, Houbing
2015-01-01
One of the emerging networking standards that gap between the physical world and the cyber one is the Internet of Things. In the Internet of Things, smart objects communicate with each other, data are gathered and certain requests of users are satisfied by different queried data. The development of energy efficient schemes for the IoT is a challenging issue as the IoT becomes more complex due to its large scale the current techniques of wireless sensor networks cannot be applied directly to the IoT. To achieve the green networked IoT, this paper addresses energy efficiency issues by proposing a novel deployment scheme. This scheme, introduces: (1) a hierarchical network design; (2) a model for the energy efficient IoT; (3) a minimum energy consumption transmission algorithm to implement the optimal model. The simulation results show that the new scheme is more energy efficient and flexible than traditional WSN schemes and consequently it can be implemented for efficient communication in the IoT. PMID:26569260
NASA Astrophysics Data System (ADS)
Lin, Zhuosheng; Yu, Simin; Li, Chengqing; Lü, Jinhu; Wang, Qianxue
This paper proposes a chaotic secure video remote communication scheme that can perform on real WAN networks, and implements it on a smartphone hardware platform. First, a joint encryption and compression scheme is designed by embedding a chaotic encryption scheme into the MJPG-Streamer source codes. Then, multiuser smartphone communications between the sender and the receiver are implemented via WAN remote transmission. Finally, the transmitted video data are received with the given IP address and port in an Android smartphone. It should be noted that, this is the first time that chaotic video encryption schemes are implemented on such a hardware platform. The experimental results demonstrate that the technical challenges on hardware implementation of secure video communication are successfully solved, reaching a balance amongst sufficient security level, real-time processing of massive video data, and utilization of available resources in the hardware environment. The proposed scheme can serve as a good application example of chaotic secure communications for smartphone and other mobile facilities in the future.
A Novel Physical Layer Assisted Authentication Scheme for Mobile Wireless Sensor Networks
Wang, Qiuhua
2017-01-01
Physical-layer authentication can address physical layer vulnerabilities and security threats in wireless sensor networks, and has been considered as an effective complementary enhancement to existing upper-layer authentication mechanisms. In this paper, to advance the existing research and improve the authentication performance, we propose a novel physical layer assisted authentication scheme for mobile wireless sensor networks. In our proposed scheme, we explore the reciprocity and spatial uncorrelation of the wireless channel to verify the identities of involved transmitting users and decide whether all data frames are from the same sender. In our proposed scheme, a new method is developed for the legitimate users to compare their received signal strength (RSS) records, which avoids the information from being disclosed to the adversary. Our proposed scheme can detect the spoofing attack even in a high dynamic environment. We evaluate our scheme through experiments under indoor and outdoor environments. Experiment results show that our proposed scheme is more efficient and achieves a higher detection rate as well as keeping a lower false alarm rate. PMID:28165423
ESS-FH: Enhanced Security Scheme for Fast Handover in Hierarchical Mobile IPv6
NASA Astrophysics Data System (ADS)
You, Ilsun; Lee, Jong-Hyouk; Sakurai, Kouichi; Hori, Yoshiaki
Fast Handover for Hierarchical Mobile IPv6 (F-HMIPv6) that combines advantages of Fast Handover for Mobile IPv6 (FMIPv6) and Hierarchical Mobile IPv6 (HMIPv6) achieves the superior performance in terms of handover latency and signaling overhead compared with previously developed mobility protocols. However, without being secured, F-HMIPv6 is vulnerable to various security threats. In 2007, Kang and Park proposed a security scheme, which is seamlessly integrated into F-HMIPv6. In this paper, we reveal that Kang-Park's scheme cannot defend against the Denial of Service (DoS) and redirect attacks while largely relying on the group key. Then, we propose an Enhanced Security Scheme for F-HMIPv6 (ESS-FH) that achieves the strong key exchange and the key independence as well as addresses the weaknesses of Kang-Park's scheme. More importantly, it enables fast handover between different MAP domains. The proposed scheme is formally verified based on BAN-logic, and its handover latency is analyzed and compared with that of Kang-Park's scheme.
A Novel Physical Layer Assisted Authentication Scheme for Mobile Wireless Sensor Networks.
Wang, Qiuhua
2017-02-04
Physical-layer authentication can address physical layer vulnerabilities and security threats in wireless sensor networks, and has been considered as an effective complementary enhancement to existing upper-layer authentication mechanisms. In this paper, to advance the existing research and improve the authentication performance, we propose a novel physical layer assisted authentication scheme for mobile wireless sensor networks. In our proposed scheme, we explore the reciprocity and spatial uncorrelation of the wireless channel to verify the identities of involved transmitting users and decide whether all data frames are from the same sender. In our proposed scheme, a new method is developed for the legitimate users to compare their received signal strength (RSS) records, which avoids the information from being disclosed to the adversary. Our proposed scheme can detect the spoofing attack even in a high dynamic environment. We evaluate our scheme through experiments under indoor and outdoor environments. Experiment results show that our proposed scheme is more efficient and achieves a higher detection rate as well as keeping a lower false alarm rate.
NASA Astrophysics Data System (ADS)
McSharry, Patrick; Mitchell, Andrew; Anderson, Rebecca
2010-05-01
Decision-makers in both public and private organisations depend on accurate data and scientific understanding to adequately address climate change and the impact of extreme events. The financial impacts of catastrophes on populations and infrastructure can be offset through effective risk transfer mechanisms, structured to reflect the specific perils and levels of exposure to be covered. Optimal strategies depend on the likely socio-econonomic impact, the institutional framework, the overall objectives of the covers placed and the level of both the frequency and severity of loss potential expected. The diversity of approaches across different countries has been documented by the Spanish "Consorcio de Compensación de Seguros". We discuss why international public/private partnerships are necessary for addressing the risk of natural catastrophes. International initiatives such as the Global Earthquake Model (GEM) and the World Forum of Catastrophe Programmes (WFCP) can provide effective guidelines for constructing natural catastrophe schemes. The World Bank has been instrumental in the creation of many of the existing schemes such as the Turkish Catastrophe Insurance Pool, the Caribbean Catastrophe Risk Insurance Facility and the Mongolian Index-Based Livestock Insurance Program. We review existing schemes and report on best practice in relation to providing protection against natural catastrophe perils. The suitability of catastrophe modelling approaches to support schemes across the world are discussed and we identify opportunities to improve risk assessment for such schemes through transparent frameworks for quantifying, pricing, sharing and financing catastrophe risk on a local and global basis.
Security analysis and enhanced user authentication in proxy mobile IPv6 networks.
Kang, Dongwoo; Jung, Jaewook; Lee, Donghoon; Kim, Hyoungshick; Won, Dongho
2017-01-01
The Proxy Mobile IPv6 (PMIPv6) is a network-based mobility management protocol that allows a Mobile Node(MN) connected to the PMIPv6 domain to move from one network to another without changing the assigned IPv6 address. The user authentication procedure in this protocol is not standardized, but many smartcard based authentication schemes have been proposed. Recently, Alizadeh et al. proposed an authentication scheme for the PMIPv6. However, it could allow an attacker to derive an encryption key that must be securely shared between MN and the Mobile Access Gate(MAG). As a result, outsider adversary can derive MN's identity, password and session key. In this paper, we analyze Alizadeh et al.'s scheme regarding security and propose an enhanced authentication scheme that uses a dynamic identity to satisfy anonymity. Furthermore, we use BAN logic to show that our scheme can successfully generate and communicate with the inter-entity session key.
Enhanced Security and Pairing-free Handover Authentication Scheme for Mobile Wireless Networks
NASA Astrophysics Data System (ADS)
Chen, Rui; Shu, Guangqiang; Chen, Peng; Zhang, Lijun
2017-10-01
With the widely deployment of mobile wireless networks, we aim to propose a secure and seamless handover authentication scheme that allows users to roam freely in wireless networks without worrying about security and privacy issues. Given the open characteristic of wireless networks, safety and efficiency should be considered seriously. Several previous protocols are designed based on a bilinear pairing mapping, which is time-consuming and inefficient work, as well as unsuitable for practical situations. To address these issues, we designed a new pairing-free handover authentication scheme for mobile wireless networks. This scheme is an effective improvement of the protocol by Xu et al., which is suffer from the mobile node impersonation attack. Security analysis and simulation experiment indicate that the proposed protocol has many excellent security properties when compared with other recent similar handover schemes, such as mutual authentication and resistance to known network threats, as well as requiring lower computation and communication cost.
Hertz, Frej Daniel; Halkier, Bente
2017-07-01
The term convenience food is subject to diversification, lack of clarity and moral ambiguity. In this paper we address these issues and critically discuss convenience food by using empirical findings from a Danish study that deals with practitioners' uses of meal box schemes. The methodological design consists of thirteen individual interviews, four focus groups and some observations of cooking practices. We combine the empirical findings with a particular definition of convenience food by Brunner et al. (2010) and selected practice theoretical concepts. This particular combination enables us to categorize meal box schemes as a new form of convenience food called convenient food. In addition, results suggest that meal box schemes reduce leftovers from dinner. Meal boxes also influence dinner related activities such as planning ahead in time and grocery shopping, which require less physical and mental effort. Copyright © 2017 Elsevier Ltd. All rights reserved.
NASA Technical Reports Server (NTRS)
Reed, K. W.; Stonesifer, R. B.; Atluri, S. N.
1983-01-01
A new hybrid-stress finite element algorith, suitable for analyses of large quasi-static deformations of inelastic solids, is presented. Principal variables in the formulation are the nominal stress-rate and spin. A such, a consistent reformulation of the constitutive equation is necessary, and is discussed. The finite element equations give rise to an initial value problem. Time integration has been accomplished by Euler and Runge-Kutta schemes and the superior accuracy of the higher order schemes is noted. In the course of integration of stress in time, it has been demonstrated that classical schemes such as Euler's and Runge-Kutta may lead to strong frame-dependence. As a remedy, modified integration schemes are proposed and the potential of the new schemes for suppressing frame dependence of numerically integrated stress is demonstrated. The topic of the development of valid creep fracture criteria is also addressed.
Security enhanced multi-factor biometric authentication scheme using bio-hash function.
Choi, Younsung; Lee, Youngsook; Moon, Jongho; Won, Dongho
2017-01-01
With the rapid development of personal information and wireless communication technology, user authentication schemes have been crucial to ensure that wireless communications are secure. As such, various authentication schemes with multi-factor authentication have been proposed to improve the security of electronic communications. Multi-factor authentication involves the use of passwords, smart cards, and various biometrics to provide users with the utmost privacy and data protection. Cao and Ge analyzed various authentication schemes and found that Younghwa An's scheme was susceptible to a replay attack where an adversary masquerades as a legal server and a user masquerading attack where user anonymity is not provided, allowing an adversary to execute a password change process by intercepting the user's ID during login. Cao and Ge improved upon Younghwa An's scheme, but various security problems remained. This study demonstrates that Cao and Ge's scheme is susceptible to a biometric recognition error, slow wrong password detection, off-line password attack, user impersonation attack, ID guessing attack, a DoS attack, and that their scheme cannot provide session key agreement. Then, to address all weaknesses identified in Cao and Ge's scheme, this study proposes a security enhanced multi-factor biometric authentication scheme and provides a security analysis and formal analysis using Burrows-Abadi-Needham logic. Finally, the efficiency analysis reveals that the proposed scheme can protect against several possible types of attacks with only a slightly high computational cost.
Serial network simplifies the design of multiple microcomputer systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Folkes, D.
1981-01-01
Recently there has been a lot of interest in developing network communication schemes for carrying digital data between locally distributed computing stations. Many of these schemes have focused on distributed networking techniques for data processing applications. These applications suggest the use of a serial, multipoint bus, where a number of remote intelligent units act as slaves to a central or host computer. Each slave would be serially addressable from the host and would perform required operations upon being addressed by the host. Based on an MK3873 single-chip microcomputer, the SCU 20 is designed to be such a remote slave device.more » The capabilities of the SCU 20 and its use in systems applications are examined.« less
Nanoscale solid-state quantum computing
NASA Astrophysics Data System (ADS)
Ardavan, A.; Austwick, M.; Benjamin, S.C.; Briggs, G.A.D.; Dennis, T.J.S.; Ferguson, A.; Hasko, D.G.; Kanai, M.; Khlobystov, A.N.; Lovett, B.W.; Morley, G.W.; Oliver, R.A.; Pettifor, D.G.; Porfyrakis, K.; Reina, J.H.; Rice, J.H.; Smith, J.D.; Taylor, R.A.; Williams, D.A.; Adelmann, C.; Mariette, H.; Hamers, R.J.
2003-07-01
Most experts agree that it is too early to say how quantum computers will eventually be built, and several nanoscale solid-state schemes are being implemented in a range of materials. Nanofabricated quantum dots can be made in designer configurations, with established technology for controlling interactions and for reading out results. Epitaxial quantum dots can be grown in vertical arrays in semiconductors, and ultrafast optical techniques are available for controlling and measuring their excitations. Single-walled carbon nanotubes can be used for molecular self-assembly of endohedral fullerenes, which can embody quantum information in the electron spin. The challenges of individual addressing in such tiny structures could rapidly become intractable with increasing numbers of qubits, but these schemes are amenable to global addressing methods for computation.
Chung, Youngseok; Choi, Seokjin; Lee, Youngsook; Park, Namje; Won, Dongho
2016-10-07
More security concerns and complicated requirements arise in wireless sensor networks than in wired networks, due to the vulnerability caused by their openness. To address this vulnerability, anonymous authentication is an essential security mechanism for preserving privacy and providing security. Over recent years, various anonymous authentication schemes have been proposed. Most of them reveal both strengths and weaknesses in terms of security and efficiency. Recently, Farash et al. proposed a lightweight anonymous authentication scheme in ubiquitous networks, which remedies the security faults of previous schemes. However, their scheme still suffers from certain weaknesses. In this paper, we prove that Farash et al.'s scheme fails to provide anonymity, authentication, or password replacement. In addition, we propose an enhanced scheme that provides efficiency, as well as anonymity and security. Considering the limited capability of sensor nodes, we utilize only low-cost functions, such as one-way hash functions and bit-wise exclusive-OR operations. The security and lightness of the proposed scheme mean that it can be applied to roaming service in localized domains of wireless sensor networks, to provide anonymous authentication of sensor nodes.
Structural and parameteric uncertainty quantification in cloud microphysics parameterization schemes
NASA Astrophysics Data System (ADS)
van Lier-Walqui, M.; Morrison, H.; Kumjian, M. R.; Prat, O. P.; Martinkus, C.
2017-12-01
Atmospheric model parameterization schemes employ approximations to represent the effects of unresolved processes. These approximations are a source of error in forecasts, caused in part by considerable uncertainty about the optimal value of parameters within each scheme -- parameteric uncertainty. Furthermore, there is uncertainty regarding the best choice of the overarching structure of the parameterization scheme -- structrual uncertainty. Parameter estimation can constrain the first, but may struggle with the second because structural choices are typically discrete. We address this problem in the context of cloud microphysics parameterization schemes by creating a flexible framework wherein structural and parametric uncertainties can be simultaneously constrained. Our scheme makes no assuptions about drop size distribution shape or the functional form of parametrized process rate terms. Instead, these uncertainties are constrained by observations using a Markov Chain Monte Carlo sampler within a Bayesian inference framework. Our scheme, the Bayesian Observationally-constrained Statistical-physical Scheme (BOSS), has flexibility to predict various sets of prognostic drop size distribution moments as well as varying complexity of process rate formulations. We compare idealized probabilistic forecasts from versions of BOSS with varying levels of structural complexity. This work has applications in ensemble forecasts with model physics uncertainty, data assimilation, and cloud microphysics process studies.
Chung, Youngseok; Choi, Seokjin; Lee, Youngsook; Park, Namje; Won, Dongho
2016-01-01
More security concerns and complicated requirements arise in wireless sensor networks than in wired networks, due to the vulnerability caused by their openness. To address this vulnerability, anonymous authentication is an essential security mechanism for preserving privacy and providing security. Over recent years, various anonymous authentication schemes have been proposed. Most of them reveal both strengths and weaknesses in terms of security and efficiency. Recently, Farash et al. proposed a lightweight anonymous authentication scheme in ubiquitous networks, which remedies the security faults of previous schemes. However, their scheme still suffers from certain weaknesses. In this paper, we prove that Farash et al.’s scheme fails to provide anonymity, authentication, or password replacement. In addition, we propose an enhanced scheme that provides efficiency, as well as anonymity and security. Considering the limited capability of sensor nodes, we utilize only low-cost functions, such as one-way hash functions and bit-wise exclusive-OR operations. The security and lightness of the proposed scheme mean that it can be applied to roaming service in localized domains of wireless sensor networks, to provide anonymous authentication of sensor nodes. PMID:27739417
Hydrological challenges to groundwater trading: Lessons from south-west Western Australia
NASA Astrophysics Data System (ADS)
Skurray, James H.; Roberts, E. J.; Pannell, David J.
2012-01-01
SummaryPerth, Western Australia (pop. 1.6 m) derives 60% of its public water supply from the Gnangara groundwater system (GGS). Horticulture, domestic self-supply, and municipal parks are other major consumers of GGS groundwater. The system supports important wetlands and groundwater-dependent ecosystems. Underlying approximately 2200 km 2 of the Swan Coastal Plain, the GGS comprises several aquifer levels with partial interconnectivity. Supplies of GGS groundwater are under unprecedented stress, due to reduced recharge and increases in extraction. Stored reserves in the superficial aquifer fell by 700 GL between 1979 and 2008. Over a similar period, annual extraction for public supply increased by more than 350% from the system overall. Some management areas are over-allocated by as much as 69%. One potential policy response is a trading scheme for groundwater use. There has been only limited trading between GGS irrigators. Design and implementation of a robust groundwater trading scheme faces hydrological and/or hydro-economic challenges, among others. Groundwater trading involves transfers of the right to extract water. The resulting potential for spatial (and temporal) redistribution of the impacts of extraction requires management. Impacts at the respective selling and buying locations may differ in scale and nature. Negative externalities from groundwater trading may be uncertain as well as not monetarily compensable. An ideal groundwater trading scheme would ensure that marginal costs from trades do not exceed marginal benefits, incorporating future effects and impacts on third-parties. If this condition could be met, all transactions would result in constant or improved overall welfare. This paper examines issues that could reduce public welfare if groundwater trading is not subject to well-designed governance arrangements that are appropriate to meeting the above condition. It also outlines some opportunities to address key risks within the design of a groundwater trading scheme. We present a number of challenges, focusing on those with hydrological bases and/or information requirements. These include the appropriate hydrological definition of the boundaries of a trading area, the establishment and defining of sustainable yield and consumptive pool, and the estimation of effects of extractions on ecosystems and human users. We suggest several possible design tools. A combination of sustainable extraction limits, trading rules, management areas, and/or exchange rates may enable a trading scheme to address the above goals.
Comparitive Study of High-Order Positivity-Preserving WENO Schemes
NASA Technical Reports Server (NTRS)
Kotov, D. V.; Yee, H. C.; Sjogreen, B.
2014-01-01
In gas dynamics and magnetohydrodynamics flows, physically, the density ? and the pressure p should both be positive. In a standard conservative numerical scheme, however, the computed internal energy is The ideas of Zhang & Shu (2012) and Hu et al. (2012) precisely address the aforementioned issue. Zhang & Shu constructed a new conservative positivity-preserving procedure to preserve positive density and pressure for high-order Weighted Essentially Non-Oscillatory (WENO) schemes by the Lax-Friedrichs flux (WENO/LLF). In general, WENO/LLF is obtained by subtracting the kinetic energy from the total energy, resulting in a computed p that may be negative. Examples are problems in which the dominant energy is kinetic. Negative ? may often emerge in computing blast waves. In such situations the computed eigenvalues of the Jacobian will become imaginary. Consequently, the initial value problem for the linearized system will be ill posed. This explains why failure of preserving positivity of density or pressure may cause blow-ups of the numerical algorithm. The adhoc methods in numerical strategy which modify the computed negative density and/or the computed negative pressure to be positive are neither a conservative cure nor a stable solution. Conservative positivity-preserving schemes are more appropriate for such flow problems. too dissipative for flows such as turbulence with strong shocks computed in direct numerical simulations (DNS) and large eddy simulations (LES). The new conservative positivity-preserving procedure proposed in Hu et al. (2012) can be used with any high-order shock-capturing scheme, including high-order WENO schemes using the Roe's flux (WENO/Roe). The goal of this study is to compare the results obtained by non-positivity-preserving methods with the recently developed positivity-preserving schemes for representative test cases. In particular the more di cult 3D Noh and Sedov problems are considered. These test cases are chosen because of the negative pressure/density most often exhibited by standard high-order shock-capturing schemes. The simulation of a hypersonic nonequilibrium viscous shock tube that is related to the NASA Electric Arc Shock Tube (EAST) is also included. EAST is a high-temperature and high Mach number viscous nonequilibrium ow consisting of 13 species. In addition, as most common shock-capturing schemes have been developed for problems without source terms, when applied to problems with nonlinear and/or sti source terms these methods can result in spurious solutions, even when solving a conservative system of equations with a conservative scheme. This kind of behavior can be observed even for a scalar case as well as for the case consisting of two species and one reaction.. This EAST example indicated that standard high-order shock-capturing methods exhibit instability of density/pressure in addition to grid-dependent discontinuity locations with insufficient grid points. The evaluation of these test cases is based on the stability of the numerical schemes together with the accuracy of the obtained solutions.
Project WISH: The Emerald City
NASA Technical Reports Server (NTRS)
Oz, Hayrani; Slonksnes, Linda (Editor); Rogers, James W. (Editor); Sherer, Scott E. (Editor); Strosky, Michelle A. (Editor); Szmerekovsky, Andrew G. (Editor); Klupar, G. Joseph (Editor)
1990-01-01
The preliminary design of a permanently manned autonomous space oasis (PEMASO), including its pertinent subsystems, was performed during the 1990 Winter and Spring quarters. The purpose for the space oasis was defined and the preliminary design work was started with emphasis placed on the study of orbital mechanics, power systems and propulsion systems. A rotating torus was selected as the preliminary configuration, and overall size, mass and location of some subsystems within the station were addressed. Computer software packages were utilized to determine station transfer parameters and thus the preliminary propulsion requirements. Power and propulsion systems were researched to determine feasible configurations and many conventional schemes were ruled out. Vehicle dynamics and control, mechanical and life support systems were also studied. For each subsystem studied, the next step in the design process to be performed during the continuation of the project was also addressed.
The Predatory Bird Monitoring Scheme: identifying chemical risks to top predators in Britain.
Walker, Lee A; Shore, Richard F; Turk, Anthony; Pereira, M Glória; Best, Jennifer
2008-09-01
The Predatory Bird Monitoring Scheme (PBMS) is a long term (>40 y), UK-wide, exposure monitoring scheme that determines the concentration of selected pesticides and pollutants in the livers and eggs of predatory birds. This paper describes how the PBMS works, and in particular highlights some of the key scientific and policy drivers for monitoring contaminants in predatory birds and describes the specific aims, scope, and methods of the PBMS. We also present previously unpublished data that illustrates how the PBMS has been used to demonstrate the success of mitigation measures in reversing chemical-mediated impacts; identify and evaluate chemical threats to species of high conservation value; and finally to inform and refine monitoring methodologies. In addition, we discuss how such schemes can also address wider conservation needs.
Advanced lattice Boltzmann scheme for high-Reynolds-number magneto-hydrodynamic flows
NASA Astrophysics Data System (ADS)
De Rosis, Alessandro; Lévêque, Emmanuel; Chahine, Robert
2018-06-01
Is the lattice Boltzmann method suitable to investigate numerically high-Reynolds-number magneto-hydrodynamic (MHD) flows? It is shown that a standard approach based on the Bhatnagar-Gross-Krook (BGK) collision operator rapidly yields unstable simulations as the Reynolds number increases. In order to circumvent this limitation, it is here suggested to address the collision procedure in the space of central moments for the fluid dynamics. Therefore, an hybrid lattice Boltzmann scheme is introduced, which couples a central-moment scheme for the velocity with a BGK scheme for the space-and-time evolution of the magnetic field. This method outperforms the standard approach in terms of stability, allowing us to simulate high-Reynolds-number MHD flows with non-unitary Prandtl number while maintaining accuracy and physical consistency.
A CDMA system implementation with dimming control for visible light communication
NASA Astrophysics Data System (ADS)
Chen, Danyang; Wang, Jianping; Jin, Jianli; Lu, Huimin; Feng, Lifang
2018-04-01
Visible light communication (VLC), using solid-state lightings to transmit information, has become a complement technology to wireless radio communication. As a realistic multiple access scheme for VLC system, code division multiple access (CDMA) has attracted more and more attentions in recent years. In this paper, we address and implement an improved CDMA scheme for VLC system. The simulation results reveal that the improved CDMA scheme not only supports multi-users' transmission but also maintains dimming value at about 50% and enhances the system efficiency. It can also realize the flexible dimming control by adjusting some parameters of system structure, which rarely affects the system BER performance. A real-time experimental VLC system with improved CDMA scheme is performed based on field programmable gate array (FPGA), reaching a good BER performance.
2006-12-01
COL Timothy A Mitchener, DC USA 5e. TASK NUMBER 6. AUTHOR( S ) 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME( S ) AND ADDRESS(ES) 8...SPONSORING/MONITORING AGENCY NAME( S ) AND 10. SPONSOR/MONITOR’S ACRONYM( S ) ADDRESS(ES) 11. SPONSOR/MONITOR’S REPORT NUMBER( S ) 12. DISTRIBUTION/AVAILABILITY...NATO) Standardization Agreement (STANAG), 5th edition, coding scheme. (See P.J. Amoroso, G.S. Smith, and N.S. Bell : Qualitative assessment of cause
Unsupervised iterative detection of land mines in highly cluttered environments.
Batman, Sinan; Goutsias, John
2003-01-01
An unsupervised iterative scheme is proposed for land mine detection in heavily cluttered scenes. This scheme is based on iterating hybrid multispectral filters that consist of a decorrelating linear transform coupled with a nonlinear morphological detector. Detections extracted from the first pass are used to improve results in subsequent iterations. The procedure stops after a predetermined number of iterations. The proposed scheme addresses several weaknesses associated with previous adaptations of morphological approaches to land mine detection. Improvement in detection performance, robustness with respect to clutter inhomogeneities, a completely unsupervised operation, and computational efficiency are the main highlights of the method. Experimental results reveal excellent performance.
Realization of the revival of silenced echo (ROSE) quantum memory scheme in orthogonal geometry
NASA Astrophysics Data System (ADS)
Minnegaliev, M. M.; Gerasimov, K. I.; Urmancheev, R. V.; Moiseev, S. A.; Chanelière, T.; Louchet-Chauvet, A.
2018-02-01
We demonstrated quantum memory scheme on revival of silenced echo in orthogonal geometry in Tm3+: Y3Al5O12 crystal. The retrieval efficiency of ˜14% was demonstrated with the 36 µs storage time. In this scheme for the first time we also implemented a suppression of the revived echo signal by applying an external electric field and the echo signal has been recovered on demand if we then applied a second electric pulse with opposite polarity. This technique opens the possibilities for realizing addressing in multi-qubit quantum memory in Tm3+: Y3Al5O12 crystal.
QR code based noise-free optical encryption and decryption of a gray scale image
NASA Astrophysics Data System (ADS)
Jiao, Shuming; Zou, Wenbin; Li, Xia
2017-03-01
In optical encryption systems, speckle noise is one major challenge in obtaining high quality decrypted images. This problem can be addressed by employing a QR code based noise-free scheme. Previous works have been conducted for optically encrypting a few characters or a short expression employing QR codes. This paper proposes a practical scheme for optically encrypting and decrypting a gray-scale image based on QR codes for the first time. The proposed scheme is compatible with common QR code generators and readers. Numerical simulation results reveal the proposed method can encrypt and decrypt an input image correctly.
Experimental evaluation of multiprocessor cache-based error recovery
NASA Technical Reports Server (NTRS)
Janssens, Bob; Fuchs, W. K.
1991-01-01
Several variations of cache-based checkpointing for rollback error recovery in shared-memory multiprocessors have been recently developed. By modifying the cache replacement policy, these techniques use the inherent redundancy in the memory hierarchy to periodically checkpoint the computation state. Three schemes, different in the manner in which they avoid rollback propagation, are evaluated. By simulation with address traces from parallel applications running on an Encore Multimax shared-memory multiprocessor, the performance effect of integrating the recovery schemes in the cache coherence protocol are evaluated. The results indicate that the cache-based schemes can provide checkpointing capability with low performance overhead but uncontrollable high variability in the checkpoint interval.
Jung, Jaewook; Kim, Jiye; Choi, Younsung; Won, Dongho
2016-08-16
In wireless sensor networks (WSNs), a registered user can login to the network and use a user authentication protocol to access data collected from the sensor nodes. Since WSNs are typically deployed in unattended environments and sensor nodes have limited resources, many researchers have made considerable efforts to design a secure and efficient user authentication process. Recently, Chen et al. proposed a secure user authentication scheme using symmetric key techniques for WSNs. They claim that their scheme assures high efficiency and security against different types of attacks. After careful analysis, however, we find that Chen et al.'s scheme is still vulnerable to smart card loss attack and is susceptible to denial of service attack, since it is invalid for verification to simply compare an entered ID and a stored ID in smart card. In addition, we also observe that their scheme cannot preserve user anonymity. Furthermore, their scheme cannot quickly detect an incorrect password during login phase, and this flaw wastes both communication and computational overheads. In this paper, we describe how these attacks work, and propose an enhanced anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in WSNs to address all of the aforementioned vulnerabilities in Chen et al.'s scheme. Our analysis shows that the proposed scheme improves the level of security, and is also more efficient relative to other related schemes.
The design of IPv6's transitional scheme in university
NASA Astrophysics Data System (ADS)
Li, Biqing; Li, Zhao
2017-05-01
According to the current network environment of campus, the specific scheme of network transition is proposed, which has conducted detailed analyses for the basic concepts, the types of address, the necessary technology for transition and the agreement and principle of transition. According to the tunneling technology of IPv6, the IPv4 network and IPv6 network can communicate with each other, and the network of whole campus can operate well.
CCS-DTN: clustering and network coding-based efficient routing in social DTNs.
Zhang, Zhenjing; Ma, Maode; Jin, Zhigang
2014-12-25
With the development of mobile Internet, wireless communication via mobile devices has become a hot research topic, which is typically in the form of Delay Tolerant Networks (DTNs). One critical issue in the development of DTNs is routing. Although there is a lot research work addressing routing issues in DTNs, they cannot produce an advanced solution to the comprehensive challenges since only one or two aspects (nodes' movements, clustering, centricity and so on) are considered when the routing problem is handled. In view of these defects in the existing works, we propose a novel solution to address the routing issue in social DTNs. By this solution, mobile nodes are divided into different clusters. The scheme, Spray and Wait, is used for the intra-cluster communication while a new forwarding mechanism is designed for the inter-cluster version. In our solution, the characteristics of nodes and the relation between nodes are fully considered. The simulation results show that our proposed scheme can significantly improve the performance of the routing scheme in social DTNs.
Realisation and robustness evaluation of a blind spatial domain watermarking technique
NASA Astrophysics Data System (ADS)
Parah, Shabir A.; Sheikh, Javaid A.; Assad, Umer I.; Bhat, Ghulam M.
2017-04-01
A blind digital image watermarking scheme based on spatial domain is presented and investigated in this paper. The watermark has been embedded in intermediate significant bit planes besides the least significant bit plane at the address locations determined by pseudorandom address vector (PAV). The watermark embedding using PAV makes it difficult for an adversary to locate the watermark and hence adds to security of the system. The scheme has been evaluated to ascertain the spatial locations that are robust to various image processing and geometric attacks JPEG compression, additive white Gaussian noise, salt and pepper noise, filtering and rotation. The experimental results obtained, reveal an interesting fact, that, for all the above mentioned attacks, other than rotation, higher the bit plane in which watermark is embedded more robust the system. Further, the perceptual quality of the watermarked images obtained in the proposed system has been compared with some state-of-art watermarking techniques. The proposed technique outperforms the techniques under comparison, even if compared with the worst case peak signal-to-noise ratio obtained in our scheme.
CCS-DTN: Clustering and Network Coding-Based Efficient Routing in Social DTNs
Zhang, Zhenjing; Ma, Maode; Jin, Zhigang
2015-01-01
With the development of mobile Internet, wireless communication via mobile devices has become a hot research topic, which is typically in the form of Delay Tolerant Networks (DTNs). One critical issue in the development of DTNs is routing. Although there is a lot research work addressing routing issues in DTNs, they cannot produce an advanced solution to the comprehensive challenges since only one or two aspects (nodes' movements, clustering, centricity and so on) are considered when the routing problem is handled. In view of these defects in the existing works, we propose a novel solution to address the routing issue in social DTNs. By this solution, mobile nodes are divided into different clusters. The scheme, Spray and Wait, is used for the intra-cluster communication while a new forwarding mechanism is designed for the inter-cluster version. In our solution, the characteristics of nodes and the relation between nodes are fully considered. The simulation results show that our proposed scheme can significantly improve the performance of the routing scheme in social DTNs. PMID:25609047
Addressing Common Cloud-Radiation Errors from 4-hour to 4-week Model Prediction
NASA Astrophysics Data System (ADS)
Benjamin, S.; Sun, S.; Grell, G. A.; Green, B.; Olson, J.; Kenyon, J.; James, E.; Smirnova, T. G.; Brown, J. M.
2017-12-01
Cloud-radiation representation in models for subgrid-scale clouds is a known gap from subseasonal-to-seasonal models down to storm-scale models applied for forecast duration of only a few hours. NOAA/ESRL has been applying common physical parameterizations for scale-aware deep/shallow convection and boundary-layer mixing over this wide range of time and spatial scales, with some progress to be reported in this presentation. The Grell-Freitas scheme (2014, Atmos. Chem. Phys.) and MYNN boundary-layer EDMF scheme (Olson / Benjamin et al. 2016 Mon. Wea. Rev.) have been applied and tested extensively for the NOAA hourly updated 3-km High-Resolution Rapid Refresh (HRRR) and 13-km Rapid Refresh (RAP) model/assimilation systems over the United States and North America, with targeting toward improvement to boundary-layer evolution and cloud-radiation representation in all seasons. This representation is critical for both warm-season severe convective storm forecasting and for winter-storm prediction of snow and mixed precipitation. At the same time the Grell-Freitas scheme has been applied also as an option for subseasonal forecasting toward improved US week 3-4 prediction with the FIM-HYCOM coupled model (Green et al 2017, MWR). Cloud/radiation evaluation using CERES satellite-based estimates have been applied to both 12-h RAP (13km) and also during Weeks 1-4 from 32-day FIM-HYCOM (60km) forecasts. Initial results reveal that improved cloud representation is needed for both resolutions and now is guiding further refinement for cloud representation including with the Grell-Freitas scheme and with the updated MYNN-EDMF scheme (both now also in global testing as well as with the 3km HRRR and 13km RAP models).
A satellite-based personal communication system for the 21st century
NASA Technical Reports Server (NTRS)
Sue, Miles K.; Dessouky, Khaled; Levitt, Barry; Rafferty, William
1990-01-01
Interest in personal communications (PCOMM) has been stimulated by recent developments in satellite and terrestrial mobile communications. A personal access satellite system (PASS) concept was developed at the Jet Propulsion Laboratory (JPL) which has many attractive user features, including service diversity and a handheld terminal. Significant technical challenges addressed in formulating the PASS space and ground segments are discussed. PASS system concept and basic design features, high risk enabling technologies, an optimized multiple access scheme, alternative antenna coverage concepts, the use of non-geostationary orbits, user terminal radiation constraints, and user terminal frequency reference are covered.
Quantum Computing Architectural Design
NASA Astrophysics Data System (ADS)
West, Jacob; Simms, Geoffrey; Gyure, Mark
2006-03-01
Large scale quantum computers will invariably require scalable architectures in addition to high fidelity gate operations. Quantum computing architectural design (QCAD) addresses the problems of actually implementing fault-tolerant algorithms given physical and architectural constraints beyond those of basic gate-level fidelity. Here we introduce a unified framework for QCAD that enables the scientist to study the impact of varying error correction schemes, architectural parameters including layout and scheduling, and physical operations native to a given architecture. Our software package, aptly named QCAD, provides compilation, manipulation/transformation, multi-paradigm simulation, and visualization tools. We demonstrate various features of the QCAD software package through several examples.
NASA Astrophysics Data System (ADS)
Alapaty, K.; Zhang, G. J.; Song, X.; Kain, J. S.; Herwehe, J. A.
2012-12-01
Short lived pollutants such as aerosols play an important role in modulating not only the radiative balance but also cloud microphysical properties and precipitation rates. In the past, to understand the interactions of aerosols with clouds, several cloud-resolving modeling studies were conducted. These studies indicated that in the presence of anthropogenic aerosols, single-phase deep convection precipitation is reduced or suppressed. On the other hand, anthropogenic aerosol pollution led to enhanced precipitation for mixed-phase deep convective clouds. To date, there have not been many efforts to incorporate such aerosol indirect effects (AIE) in mesoscale models or global models that use parameterization schemes for deep convection. Thus, the objective of this work is to implement a diagnostic cloud microphysical scheme directly into a deep convection parameterization facilitating aerosol indirect effects in the WRF-CMAQ integrated modeling systems. Major research issues addressed in this study are: What is the sensitivity of a deep convection scheme to cloud microphysical processes represented by a bulk double-moment scheme? How close are the simulated cloud water paths as compared to observations? Does increased aerosol pollution lead to increased precipitation for mixed-phase clouds? These research questions are addressed by performing several WRF simulations using the Kain-Fritsch convection parameterization and a diagnostic cloud microphysical scheme. In the first set of simulations (control simulations) the WRF model is used to simulate two scenarios of deep convection over the continental U.S. during two summer periods at 36 km grid resolution. In the second set, these simulations are repeated after incorporating a diagnostic cloud microphysical scheme to study the impacts of inclusion of cloud microphysical processes. Finally, in the third set, aerosol concentrations simulated by the CMAQ modeling system are supplied to the embedded cloud microphysical scheme to study impacts of aerosol concentrations on precipitation and radiation fields. Observations available from the ARM microbase data, the SURFRAD network, GOES imagery, and other reanalysis and measurements will be used to analyze the impacts of a cloud microphysical scheme and aerosol concentrations on parameterized convection.
Tradeoffs in the Design of Health Plan Payment Systems: Fit, Power and Balance
Geruso, Michael; McGuire, Thomas G.
2016-01-01
In many markets, including the new U.S. Marketplaces, health insurance plans are paid by risk-adjusted capitation, sometimes combined with reinsurance and other payment mechanisms. This paper proposes a framework for evaluating the de facto insurer incentives embedded in these complex payment systems. We discuss fit, power and balance, each of which addresses a distinct market failure in health insurance. We implement empirical metrics of fit, power, and balance in a study of Marketplace payment systems. Using data similar to that used to develop the Marketplace risk adjustment scheme, we quantify tradeoffs among the three classes of incentives. We show that an essential tradeoff arises between the goals of limiting costs and limiting cream skimming because risk adjustment, which is aimed at discouraging cream-skimming, weakens cost control incentives in practice. A simple reinsurance system scores better on our measures of fit, power and balance than the risk adjustment scheme in use in the Marketplaces. PMID:26922122
Tradeoffs in the design of health plan payment systems: Fit, power and balance.
Geruso, Michael; McGuire, Thomas G
2016-05-01
In many markets, including the new U.S. Marketplaces, health insurance plans are paid by risk-adjusted capitation, sometimes combined with reinsurance and other payment mechanisms. This paper proposes a framework for evaluating the de facto insurer incentives embedded in these complex payment systems. We discuss fit, power and balance, each of which addresses a distinct market failure in health insurance. We implement empirical metrics of fit, power, and balance in a study of Marketplace payment systems. Using data similar to that used to develop the Marketplace risk adjustment scheme, we quantify tradeoffs among the three classes of incentives. We show that an essential tradeoff arises between the goals of limiting costs and limiting cream skimming because risk adjustment, which is aimed at discouraging cream-skimming, weakens cost control incentives in practice. A simple reinsurance system scores better on our measures of fit, power and balance than the risk adjustment scheme in use in the Marketplaces. Copyright © 2016 Elsevier B.V. All rights reserved.
The GRAPE aerosol retrieval algorithm
NASA Astrophysics Data System (ADS)
Thomas, G. E.; Poulsen, C. A.; Sayer, A. M.; Marsh, S. H.; Dean, S. M.; Carboni, E.; Siddans, R.; Grainger, R. G.; Lawrence, B. N.
2009-11-01
The aerosol component of the Oxford-Rutherford Aerosol and Cloud (ORAC) combined cloud and aerosol retrieval scheme is described and the theoretical performance of the algorithm is analysed. ORAC is an optimal estimation retrieval scheme for deriving cloud and aerosol properties from measurements made by imaging satellite radiometers and, when applied to cloud free radiances, provides estimates of aerosol optical depth at a wavelength of 550 nm, aerosol effective radius and surface reflectance at 550 nm. The aerosol retrieval component of ORAC has several incarnations - this paper addresses the version which operates in conjunction with the cloud retrieval component of ORAC (described by Watts et al., 1998), as applied in producing the Global Retrieval of ATSR Cloud Parameters and Evaluation (GRAPE) data-set. The algorithm is described in detail and its performance examined. This includes a discussion of errors resulting from the formulation of the forward model, sensitivity of the retrieval to the measurements and a priori constraints, and errors resulting from assumptions made about the atmospheric/surface state.
The GRAPE aerosol retrieval algorithm
NASA Astrophysics Data System (ADS)
Thomas, G. E.; Poulsen, C. A.; Sayer, A. M.; Marsh, S. H.; Dean, S. M.; Carboni, E.; Siddans, R.; Grainger, R. G.; Lawrence, B. N.
2009-04-01
The aerosol component of the Oxford-Rutherford Aerosol and Cloud (ORAC) combined cloud and aerosol retrieval scheme is described and the theoretical performance of the algorithm is analysed. ORAC is an optimal estimation retrieval scheme for deriving cloud and aerosol properties from measurements made by imaging satellite radiometers and, when applied to cloud free radiances, provides estimates of aerosol optical depth at a wavelength of 550 nm, aerosol effective radius and surface reflectance at 550 nm. The aerosol retrieval component of ORAC has several incarnations - this paper addresses the version which operates in conjunction with the cloud retrieval component of ORAC (described by Watts et al., 1998), as applied in producing the Global Retrieval of ATSR Cloud Parameters and Evaluation (GRAPE) data-set. The algorithm is described in detail and its performance examined. This includes a discussion of errors resulting from the formulation of the forward model, sensitivity of the retrieval to the measurements and a priori constraints, and errors resulting from assumptions made about the atmospheric/surface state.
An Indirect Adaptive Control Scheme in the Presence of Actuator and Sensor Failures
NASA Technical Reports Server (NTRS)
Sun, Joy Z.; Josh, Suresh M.
2009-01-01
The problem of controlling a system in the presence of unknown actuator and sensor faults is addressed. The system is assumed to have groups of actuators, and groups of sensors, with each group consisting of multiple redundant similar actuators or sensors. The types of actuator faults considered consist of unknown actuators stuck in unknown positions, as well as reduced actuator effectiveness. The sensor faults considered include unknown biases and outages. The approach employed for fault detection and estimation consists of a bank of Kalman filters based on multiple models, and subsequent control reconfiguration to mitigate the effect of biases caused by failed components as well as to obtain stability and satisfactory performance using the remaining actuators and sensors. Conditions for fault identifiability are presented, and the adaptive scheme is applied to an aircraft flight control example in the presence of actuator failures. Simulation results demonstrate that the method can rapidly and accurately detect faults and estimate the fault values, thus enabling safe operation and acceptable performance in spite of failures.
A Novel Passive Tracking Scheme Exploiting Geometric and Intercept Theorems
Zhou, Biao; Sun, Chao; Ahn, Deockhyeon; Kim, Youngok
2018-01-01
Passive tracking aims to track targets without assistant devices, that is, device-free targets. Passive tracking based on Radio Frequency (RF) Tomography in wireless sensor networks has recently been addressed as an emerging field. The passive tracking scheme using geometric theorems (GTs) is one of the most popular RF Tomography schemes, because the GT-based method can effectively mitigate the demand for a high density of wireless nodes. In the GT-based tracking scheme, the tracking scenario is considered as a two-dimensional geometric topology and then geometric theorems are applied to estimate crossing points (CPs) of the device-free target on line-of-sight links (LOSLs), which reveal the target’s trajectory information in a discrete form. In this paper, we review existing GT-based tracking schemes, and then propose a novel passive tracking scheme by exploiting the Intercept Theorem (IT). To create an IT-based CP estimation scheme available in the noisy non-parallel LOSL situation, we develop the equal-ratio traverse (ERT) method. Finally, we analyze properties of three GT-based tracking algorithms and the performance of these schemes is evaluated experimentally under various trajectories, node densities, and noisy topologies. Analysis of experimental results shows that tracking schemes exploiting geometric theorems can achieve remarkable positioning accuracy even under rather a low density of wireless nodes. Moreover, the proposed IT scheme can provide generally finer tracking accuracy under even lower node density and noisier topologies, in comparison to other schemes. PMID:29562621
Security enhanced multi-factor biometric authentication scheme using bio-hash function
Lee, Youngsook; Moon, Jongho
2017-01-01
With the rapid development of personal information and wireless communication technology, user authentication schemes have been crucial to ensure that wireless communications are secure. As such, various authentication schemes with multi-factor authentication have been proposed to improve the security of electronic communications. Multi-factor authentication involves the use of passwords, smart cards, and various biometrics to provide users with the utmost privacy and data protection. Cao and Ge analyzed various authentication schemes and found that Younghwa An’s scheme was susceptible to a replay attack where an adversary masquerades as a legal server and a user masquerading attack where user anonymity is not provided, allowing an adversary to execute a password change process by intercepting the user’s ID during login. Cao and Ge improved upon Younghwa An’s scheme, but various security problems remained. This study demonstrates that Cao and Ge’s scheme is susceptible to a biometric recognition error, slow wrong password detection, off-line password attack, user impersonation attack, ID guessing attack, a DoS attack, and that their scheme cannot provide session key agreement. Then, to address all weaknesses identified in Cao and Ge’s scheme, this study proposes a security enhanced multi-factor biometric authentication scheme and provides a security analysis and formal analysis using Burrows-Abadi-Needham logic. Finally, the efficiency analysis reveals that the proposed scheme can protect against several possible types of attacks with only a slightly high computational cost. PMID:28459867
Oxygen production processes on the Moon: An overview
NASA Technical Reports Server (NTRS)
Taylor, Lawrence A.; Carrier, W. David, III
1991-01-01
The production of oxygen on the Moon utilizing indigenous material is paramount to a successful lunar colonization. Several processes were put forth to accomplish this. The lunar liquid oxygen (LLOX) generation schemes which have received the most study to date are those involving: (1) the reduction of ilmenite (FeTiO3) by H2, C, CO, CH4, CO-Cl2 plasma; (2) magma electrolysis, both unadulterated and fluoride-fluxed, and (3) several others, including carbo-chlorination, HF acid leaching, fluorine extraction, magma oxidation, and vapor pyrolysis. The H2 reduction of ilmenite and magma electrolysis processes have received the most study to date. At this stage of development, they both appear feasible schemes with various pros and cons. However, all processes should be addressed at least at the onset of the considerations. It is ultimatley the energy requirements of the entire process, including the acquisition of feedstock, which will determine the mode of oxygen productions. There is an obvious need for considerably more experimentation and study. Some of these requisite studies are in progress, and several of the most studied and feasible processes for winning oxygen from lunar materials are reviewed.
Development and feasibility testing of the Pediatric Emergency Discharge Interaction Coding Scheme.
Curran, Janet A; Taylor, Alexandra; Chorney, Jill; Porter, Stephen; Murphy, Andrea; MacPhee, Shannon; Bishop, Andrea; Haworth, Rebecca
2017-08-01
Discharge communication is an important aspect of high-quality emergency care. This study addresses the gap in knowledge on how to describe discharge communication in a paediatric emergency department (ED). The objective of this feasibility study was to develop and test a coding scheme to characterize discharge communication between health-care providers (HCPs) and caregivers who visit the ED with their children. The Pediatric Emergency Discharge Interaction Coding Scheme (PEDICS) and coding manual were developed following a review of the literature and an iterative refinement process involving HCP observations, inter-rater assessments and team consensus. The coding scheme was pilot-tested through observations of HCPs across a range of shifts in one urban paediatric ED. Overall, 329 patient observations were carried out across 50 observational shifts. Inter-rater reliability was evaluated in 16% of the observations. The final version of the PEDICS contained 41 communication elements. Kappa scores were greater than .60 for the majority of communication elements. The most frequently observed communication elements were under the Introduction node and the least frequently observed were under the Social Concerns node. HCPs initiated the majority of the communication. Pediatric Emergency Discharge Interaction Coding Scheme addresses an important gap in the discharge communication literature. The tool is useful for mapping patterns of discharge communication between HCPs and caregivers. Results from our pilot test identified deficits in specific areas of discharge communication that could impact adherence to discharge instructions. The PEDICS would benefit from further testing with a different sample of HCPs. © 2017 The Authors. Health Expectations Published by John Wiley & Sons Ltd.
Eggs, ethics and exploitation? Investigating women's experiences of an egg sharing scheme
Haimes, Erica; Taylor, Ken; Turkmendag, Ilke
2012-01-01
Abstract There is a growing global demand for human eggs for the treatment of sub-fertile women and for stem cell-related research. This demand provokes concerns for the women providing the eggs, including their possible exploitation, whether they should be paid, whether they can give properly informed consent and whether their eggs and bodies are becoming commodified. However, few of the debates have benefitted from insights from the women themselves. We address this gap in knowledge by reporting on a study investigating women’s views and experiences of a scheme in which they can volunteer, in their capacity as fertility patients, to ‘share’ their eggs with researchers and receive a reduction in in vitro fertilisation fees. We focus our discussion on the question of exploitation, a concept central to many sociological and ethical interests. In brief, our analysis suggests that while interviewees acknowledge the potential of this scheme to be exploitative, they argue that this is not the case, emphasising their ability to act autonomously in deciding to volunteer. Nonetheless, these freely made decisions do not necessarily take place under circumstances of their choosing. We discuss the implications of this for egg provision in general and for understandings of exploitation. PMID:22443419
NASA Astrophysics Data System (ADS)
Bullimore, Blaise
2014-10-01
Management of anthropogenic activities that cause pressure on estuarine wildlife and biodiversity is beset by a wide range of challenges. Some, such as the differing environmental and socio-economic objectives and conflicting views and priorities, are common to many estuaries; others are site specific. The Carmarthen Bay and Estuaries European Marine Site encompasses four estuaries of European wildlife and conservation importance and considerable socio-economic value. The estuaries and their wildlife are subject to a range of pressures and threats and the statutory authorities responsible for management in and adjacent to the Site have developed a management scheme to address these. Preparation of the management scheme included an assessment of human activities known to occur in and adjacent to the Site for their potential to cause a threat to the designated habitats and species features, and identified actions the management authorities need to take to minimise or eliminate pressures and threats. To deliver the scheme the partner authorities need to accept the requirement for management actions and work together to achieve them. The Welsh Government also needs to work with these authorities because it is responsible for management of many of the most important pressure-causing activities. However, the absence of statutory obligations for partnership working has proved an impediment to successful management.
Colour image compression by grey to colour conversion
NASA Astrophysics Data System (ADS)
Drew, Mark S.; Finlayson, Graham D.; Jindal, Abhilash
2011-03-01
Instead of de-correlating image luminance from chrominance, some use has been made of using the correlation between the luminance component of an image and its chromatic components, or the correlation between colour components, for colour image compression. In one approach, the Green colour channel was taken as a base, and the other colour channels or their DCT subbands were approximated as polynomial functions of the base inside image windows. This paper points out that we can do better if we introduce an addressing scheme into the image description such that similar colours are grouped together spatially. With a Luminance component base, we test several colour spaces and rearrangement schemes, including segmentation. and settle on a log-geometric-mean colour space. Along with PSNR versus bits-per-pixel, we found that spatially-keyed s-CIELAB colour error better identifies problem regions. Instead of segmentation, we found that rearranging on sorted chromatic components has almost equal performance and better compression. Here, we sort on each of the chromatic components and separately encode windows of each. The result consists of the original greyscale plane plus the polynomial coefficients of windows of rearranged chromatic values, which are then quantized. The simplicity of the method produces a fast and simple scheme for colour image and video compression, with excellent results.
Numerical Simulations of Reacting Flows Using Asynchrony-Tolerant Schemes for Exascale Computing
NASA Astrophysics Data System (ADS)
Cleary, Emmet; Konduri, Aditya; Chen, Jacqueline
2017-11-01
Communication and data synchronization between processing elements (PEs) are likely to pose a major challenge in scalability of solvers at the exascale. Recently developed asynchrony-tolerant (AT) finite difference schemes address this issue by relaxing communication and synchronization between PEs at a mathematical level while preserving accuracy, resulting in improved scalability. The performance of these schemes has been validated for simple linear and nonlinear homogeneous PDEs. However, many problems of practical interest are governed by highly nonlinear PDEs with source terms, whose solution may be sensitive to perturbations caused by communication asynchrony. The current work applies the AT schemes to combustion problems with chemical source terms, yielding a stiff system of PDEs with nonlinear source terms highly sensitive to temperature. Examples shown will use single-step and multi-step CH4 mechanisms for 1D premixed and nonpremixed flames. Error analysis will be discussed both in physical and spectral space. Results show that additional errors introduced by the AT schemes are negligible and the schemes preserve their accuracy. We acknowledge funding from the DOE Computational Science Graduate Fellowship administered by the Krell Institute.
NASA Astrophysics Data System (ADS)
Chen, Zuojing; Polizzi, Eric
2010-11-01
Effective modeling and numerical spectral-based propagation schemes are proposed for addressing the challenges in time-dependent quantum simulations of systems ranging from atoms, molecules, and nanostructures to emerging nanoelectronic devices. While time-dependent Hamiltonian problems can be formally solved by propagating the solutions along tiny simulation time steps, a direct numerical treatment is often considered too computationally demanding. In this paper, however, we propose to go beyond these limitations by introducing high-performance numerical propagation schemes to compute the solution of the time-ordered evolution operator. In addition to the direct Hamiltonian diagonalizations that can be efficiently performed using the new eigenvalue solver FEAST, we have designed a Gaussian propagation scheme and a basis-transformed propagation scheme (BTPS) which allow to reduce considerably the simulation times needed by time intervals. It is outlined that BTPS offers the best computational efficiency allowing new perspectives in time-dependent simulations. Finally, these numerical schemes are applied to study the ac response of a (5,5) carbon nanotube within a three-dimensional real-space mesh framework.
Performance evaluation methodology for historical document image binarization.
Ntirogiannis, Konstantinos; Gatos, Basilis; Pratikakis, Ioannis
2013-02-01
Document image binarization is of great importance in the document image analysis and recognition pipeline since it affects further stages of the recognition process. The evaluation of a binarization method aids in studying its algorithmic behavior, as well as verifying its effectiveness, by providing qualitative and quantitative indication of its performance. This paper addresses a pixel-based binarization evaluation methodology for historical handwritten/machine-printed document images. In the proposed evaluation scheme, the recall and precision evaluation measures are properly modified using a weighting scheme that diminishes any potential evaluation bias. Additional performance metrics of the proposed evaluation scheme consist of the percentage rates of broken and missed text, false alarms, background noise, character enlargement, and merging. Several experiments conducted in comparison with other pixel-based evaluation measures demonstrate the validity of the proposed evaluation scheme.
Security analysis and enhanced user authentication in proxy mobile IPv6 networks
Kang, Dongwoo; Jung, Jaewook; Lee, Donghoon; Kim, Hyoungshick
2017-01-01
The Proxy Mobile IPv6 (PMIPv6) is a network-based mobility management protocol that allows a Mobile Node(MN) connected to the PMIPv6 domain to move from one network to another without changing the assigned IPv6 address. The user authentication procedure in this protocol is not standardized, but many smartcard based authentication schemes have been proposed. Recently, Alizadeh et al. proposed an authentication scheme for the PMIPv6. However, it could allow an attacker to derive an encryption key that must be securely shared between MN and the Mobile Access Gate(MAG). As a result, outsider adversary can derive MN’s identity, password and session key. In this paper, we analyze Alizadeh et al.’s scheme regarding security and propose an enhanced authentication scheme that uses a dynamic identity to satisfy anonymity. Furthermore, we use BAN logic to show that our scheme can successfully generate and communicate with the inter-entity session key. PMID:28719621
NASA Astrophysics Data System (ADS)
Leroy, Norah
2017-08-01
This paper addresses the theme of social inclusion through language learning. The focus is on an ad-hoc tutoring scheme set up between newly arrived British migrant pupils and French monolingual pupils in a small secondary school in the south-west of France. Though the original objective of this tutoring scheme was to improve the English skills of the younger pupils, feedback reports indicated that it also had a positive impact on the relationship between the British migrant pupils and their French peers. Teachers believed that those involved participated more fully in class, and appeared more self-assured and generally happy thanks to the interpersonal relationships this scheme helped to forge. This study demonstrates the necessity of analysing the socio-cultural context migrants may find themselves in, in order to identify potential challenges. The ad-hoc tutoring scheme described here is an example of how language learning can support the integration and inclusion of "new generation" migrants into everyday school life.
Assessment strategies for municipal selective waste collection schemes.
Ferreira, Fátima; Avelino, Catarina; Bentes, Isabel; Matos, Cristina; Teixeira, Carlos Afonso
2017-01-01
An important strategy to promote a strong sustainable growth relies on an efficient municipal waste management, and phasing out waste landfilling through waste prevention and recycling emerges as a major target. For this purpose, effective collection schemes are required, in particular those regarding selective waste collection, pursuing a more efficient and high quality recycling of reusable materials. This paper addresses the assessment and benchmarking of selective collection schemes, relevant to guide future operational improvements. In particular, the assessment is based on the monitoring and statistical analysis of a core-set of performance indicators that highlights collection trends, complemented with a performance index that gathers a weighted linear combination of these indicators. This combined analysis underlines a potential tool to support decision makers involved in the process of selecting the collection scheme with best overall performance. The presented approach was applied to a case study conducted in Oporto Municipality, with data gathered from two distinct selective collection schemes. Copyright © 2016 Elsevier Ltd. All rights reserved.
A Crosslinker Based on a Tethered Electrophile for Mapping Kinase-Substrate Networks
Riel-Mehan, Megan M; Shokat, Kevan M
2014-01-01
SUMMARY Despite the continuing progress made towards mapping kinase signaling networks, there are still many phosphorylation events for which the responsible kinase has not yet been identified. We are interested in addressing this problem through forming covalent crosslinks between a peptide substrate and the corresponding phosphorylating kinase. Previously we reported a dialdehyde-based kinase binding probe capable of such a reaction with a peptide containing a cysteine substituted for the phosphorylatable ser/thr/tyr residue. Here, we examine the yield of a previously reported dialdehyde-based probe, and report that the dialdehyde based probes possesses a significant limitation in terms of crosslinked kinase-substrate product yield. To address this limitation, we develop a crosslinking scheme based on a kinase activity-based probe, and this new cross-linker provides an increase in efficiency and substrate specificity, including in the context of cell lysate. PMID:24746561
NASA Astrophysics Data System (ADS)
Boone, Aaron; Samuelsson, Patrick; Gollvik, Stefan; Napoly, Adrien; Jarlan, Lionel; Brun, Eric; Decharme, Bertrand
2017-02-01
Land surface models (LSMs) are pushing towards improved realism owing to an increasing number of observations at the local scale, constantly improving satellite data sets and the associated methodologies to best exploit such data, improved computing resources, and in response to the user community. As a part of the trend in LSM development, there have been ongoing efforts to improve the representation of the land surface processes in the interactions between the soil-biosphere-atmosphere (ISBA) LSM within the EXternalized SURFace (SURFEX) model platform. The force-restore approach in ISBA has been replaced in recent years by multi-layer explicit physically based options for sub-surface heat transfer, soil hydrological processes, and the composite snowpack. The representation of vegetation processes in SURFEX has also become much more sophisticated in recent years, including photosynthesis and respiration and biochemical processes. It became clear that the conceptual limits of the composite soil-vegetation scheme within ISBA had been reached and there was a need to explicitly separate the canopy vegetation from the soil surface. In response to this issue, a collaboration began in 2008 between the high-resolution limited area model (HIRLAM) consortium and Météo-France with the intention to develop an explicit representation of the vegetation in ISBA under the SURFEX platform. A new parameterization has been developed called the ISBA multi-energy balance (MEB) in order to address these issues. ISBA-MEB consists in a fully implicit numerical coupling between a multi-layer physically based snowpack model, a variable-layer soil scheme, an explicit litter layer, a bulk vegetation scheme, and the atmosphere. It also includes a feature that permits a coupling transition of the snowpack from the canopy air to the free atmosphere. It shares many of the routines and physics parameterizations with the standard version of ISBA. This paper is the first of two parts; in part one, the ISBA-MEB model equations, numerical schemes, and theoretical background are presented. In part two (Napoly et al., 2016), which is a separate companion paper, a local scale evaluation of the new scheme is presented along with a detailed description of the new forest litter scheme.
Jung, Jaewook; Kim, Jiye; Choi, Younsung; Won, Dongho
2016-01-01
In wireless sensor networks (WSNs), a registered user can login to the network and use a user authentication protocol to access data collected from the sensor nodes. Since WSNs are typically deployed in unattended environments and sensor nodes have limited resources, many researchers have made considerable efforts to design a secure and efficient user authentication process. Recently, Chen et al. proposed a secure user authentication scheme using symmetric key techniques for WSNs. They claim that their scheme assures high efficiency and security against different types of attacks. After careful analysis, however, we find that Chen et al.’s scheme is still vulnerable to smart card loss attack and is susceptible to denial of service attack, since it is invalid for verification to simply compare an entered ID and a stored ID in smart card. In addition, we also observe that their scheme cannot preserve user anonymity. Furthermore, their scheme cannot quickly detect an incorrect password during login phase, and this flaw wastes both communication and computational overheads. In this paper, we describe how these attacks work, and propose an enhanced anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in WSNs to address all of the aforementioned vulnerabilities in Chen et al.’s scheme. Our analysis shows that the proposed scheme improves the level of security, and is also more efficient relative to other related schemes. PMID:27537890
NASA Technical Reports Server (NTRS)
Buehler, Martin G. (Inventor)
1988-01-01
A set of addressable test structures, each of which uses addressing schemes to access individual elements of the structure in a matrix, is used to test the quality of a wafer before integrated circuits produced thereon are diced, packaged and subjected to final testing. The electrical characteristic of each element is checked and compared to the electrical characteristic of all other like elements in the matrix. The effectiveness of the addressable test matrix is in readily analyzing the electrical characteristics of the test elements and in providing diagnostic information.
Criel, Bart; Waelkens, Maria Pia
2003-10-01
Mutual Health Organisations (MHOs) are a type of community health insurance scheme that are being developed and promoted in sub-Saharan Africa. In 1998, an MHO was organised in a rural district of Guinea to improve access to quality health care. Households paid an annual insurance fee of about US$2 per individual. Contributions were voluntary. The benefit package included free access to all first line health care services (except for a small co-payment), free paediatric care, free emergency surgical care and free obstetric care at the district hospital. Also included were part of the cost of emergency transport to the hospital. In 1998, the MHO covered 8% of the target population, but, by 1999, the subscription rate had dropped to about 6%. In March 2000, focus groups were held with members and non-members of the scheme to find out why subscription rates were so low. The research indicated that a failure to understand the scheme does not explain these low rates. On the contrary, the great majority of research subjects, members and non-members alike, acquired a very accurate understanding of the concepts and principles underlying health insurance. They value the system's re-distributive effects, which goes beyond household, next of kin or village. The participants accurately point out the sharp differences that exist between traditional financial mechanisms and the principle of health insurance, as well as the advantages and disadvantages of both. The ease with which risk-pooling is accepted as a financial mechanism which addresses specific needs demonstrates that it is not, per se, necessary to build health insurance schemes on existing or traditional systems of mutual aid. The majority of the participants consider the individual premium of 2 US dollars to be fair. There is, however, a problem of affordability for many poor and/or large families who cannot raise enough money to pay the subscription for all household members in one go. However, the main reason for the lack of interest in the scheme, is the poor quality of care offered to members of the MHO at the health centre.
Spectral Collocation Time-Domain Modeling of Diffractive Optical Elements
NASA Astrophysics Data System (ADS)
Hesthaven, J. S.; Dinesen, P. G.; Lynov, J. P.
1999-11-01
A spectral collocation multi-domain scheme is developed for the accurate and efficient time-domain solution of Maxwell's equations within multi-layered diffractive optical elements. Special attention is being paid to the modeling of out-of-plane waveguide couplers. Emphasis is given to the proper construction of high-order schemes with the ability to handle very general problems of considerable geometric and material complexity. Central questions regarding efficient absorbing boundary conditions and time-stepping issues are also addressed. The efficacy of the overall scheme for the time-domain modeling of electrically large, and computationally challenging, problems is illustrated by solving a number of plane as well as non-plane waveguide problems.
Loeffler, Troy D; Sepehri, Aliasghar; Chen, Bin
2015-09-08
Reformulation of existing Monte Carlo algorithms used in the study of grand canonical systems has yielded massive improvements in efficiency. Here we present an energy biasing scheme designed to address targeting issues encountered in particle swap moves using sophisticated algorithms such as the Aggregation-Volume-Bias and Unbonding-Bonding methods. Specifically, this energy biasing scheme allows a particle to be inserted to (or removed from) a region that is more acceptable. As a result, this new method showed a several-fold increase in insertion/removal efficiency in addition to an accelerated rate of convergence for the thermodynamic properties of the system.
Comparative Study on High-Order Positivity-preserving WENO Schemes
NASA Technical Reports Server (NTRS)
Kotov, D. V.; Yee, H. C.; Sjogreen, B.
2013-01-01
In gas dynamics and magnetohydrodynamics flows, physically, the density and the pressure p should both be positive. In a standard conservative numerical scheme, however, the computed internal energy is obtained by subtracting the kinetic energy from the total energy, resulting in a computed p that may be negative. Examples are problems in which the dominant energy is kinetic. Negative may often emerge in computing blast waves. In such situations the computed eigenvalues of the Jacobian will become imaginary. Consequently, the initial value problem for the linearized system will be ill posed. This explains why failure of preserving positivity of density or pressure may cause blow-ups of the numerical algorithm. The adhoc methods in numerical strategy which modify the computed negative density and/or the computed negative pressure to be positive are neither a conservative cure nor a stable solution. Conservative positivity-preserving schemes are more appropriate for such flow problems. The ideas of Zhang & Shu (2012) and Hu et al. (2012) precisely address the aforementioned issue. Zhang & Shu constructed a new conservative positivity-preserving procedure to preserve positive density and pressure for high-order WENO schemes by the Lax-Friedrichs flux (WENO/LLF). In general, WENO/LLF is too dissipative for flows such as turbulence with strong shocks computed in direct numerical simulations (DNS) and large eddy simulations (LES). The new conservative positivity-preserving procedure proposed in Hu et al. (2012) can be used with any high-order shock-capturing scheme, including high-order WENO schemes using the Roe's flux (WENO/Roe). The goal of this study is to compare the results obtained by non-positivity-preserving methods with the recently developed positivity-preserving schemes for representative test cases. In particular the more difficult 3D Noh and Sedov problems are considered. These test cases are chosen because of the negative pressure/density most often exhibited by standard high-order shock-capturing schemes. The simulation of a hypersonic nonequilibrium viscous shock tube that is related to the NASA Electric Arc Shock Tube (EAST) is also included. EAST is a high-temperature and high Mach number viscous nonequilibrium flow consisting of 13 species. In addition, as most common shock-capturing schemes have been developed for problems without source terms, when applied to problems with nonlinear and/or sti source terms these methods can result in spurious solutions, even when solving a conservative system of equations with a conservative scheme. This kind of behavior can be observed even for a scalar case (LeVeque & Yee 1990) as well as for the case consisting of two species and one reaction (Wang et al. 2012). For further information concerning this issue see (LeVeque & Yee 1990; Griffiths et al. 1992; Lafon & Yee 1996; Yee et al. 2012). This EAST example indicated that standard high-order shock-capturing methods exhibit instability of density/pressure in addition to grid-dependent discontinuity locations with insufficient grid points. The evaluation of these test cases is based on the stability of the numerical schemes together with the accuracy of the obtained solutions.
A classification of errors in lay comprehension of medical documents.
Keselman, Alla; Smith, Catherine Arnott
2012-12-01
Emphasis on participatory medicine requires that patients and consumers participate in tasks traditionally reserved for healthcare providers. This includes reading and comprehending medical documents, often but not necessarily in the context of interacting with Personal Health Records (PHRs). Research suggests that while giving patients access to medical documents has many benefits (e.g., improved patient-provider communication), lay people often have difficulty understanding medical information. Informatics can address the problem by developing tools that support comprehension; this requires in-depth understanding of the nature and causes of errors that lay people make when comprehending clinical documents. The objective of this study was to develop a classification scheme of comprehension errors, based on lay individuals' retellings of two documents containing clinical text: a description of a clinical trial and a typical office visit note. While not comprehensive, the scheme can serve as a foundation of further development of a taxonomy of patients' comprehension errors. Eighty participants, all healthy volunteers, read and retold two medical documents. A data-driven content analysis procedure was used to extract and classify retelling errors. The resulting hierarchical classification scheme contains nine categories and 23 subcategories. The most common error made by the participants involved incorrectly recalling brand names of medications. Other common errors included misunderstanding clinical concepts, misreporting the objective of a clinical research study and physician's findings during a patient's visit, and confusing and misspelling clinical terms. A combination of informatics support and health education is likely to improve the accuracy of lay comprehension of medical documents. Published by Elsevier Inc.
A Summary of the Space-Time Conservation Element and Solution Element (CESE) Method
NASA Technical Reports Server (NTRS)
Wang, Xiao-Yen J.
2015-01-01
The space-time Conservation Element and Solution Element (CESE) method for solving conservation laws is examined for its development motivation and design requirements. The characteristics of the resulting scheme are discussed. The discretization of the Euler equations is presented to show readers how to construct a scheme based on the CESE method. The differences and similarities between the CESE method and other traditional methods are discussed. The strengths and weaknesses of the method are also addressed.
NASA Technical Reports Server (NTRS)
Saleeb, A. F.; Chang, T. Y. P.; Wilt, T.; Iskovitz, I.
1989-01-01
The research work performed during the past year on finite element implementation and computational techniques pertaining to high temperature composites is outlined. In the present research, two main issues are addressed: efficient geometric modeling of composite structures and expedient numerical integration techniques dealing with constitutive rate equations. In the first issue, mixed finite elements for modeling laminated plates and shells were examined in terms of numerical accuracy, locking property and computational efficiency. Element applications include (currently available) linearly elastic analysis and future extension to material nonlinearity for damage predictions and large deformations. On the material level, various integration methods to integrate nonlinear constitutive rate equations for finite element implementation were studied. These include explicit, implicit and automatic subincrementing schemes. In all cases, examples are included to illustrate the numerical characteristics of various methods that were considered.
Modular magnetic tweezers for single-molecule characterizations of helicases.
Kemmerich, Felix E; Kasaciunaite, Kristina; Seidel, Ralf
2016-10-01
Magnetic tweezers provide a versatile toolkit supporting the mechanistic investigation of helicases. In the present article, we show that custom magnetic tweezers setups are straightforward to construct and can easily be extended to provide adaptable platforms, capable of addressing a multitude of enquiries regarding the functions of these fascinating molecular machines. We first address the fundamental components of a basic magnetic tweezers scheme and review some previous results to demonstrate the versatility of this instrument. We then elaborate on several extensions to the basic magnetic tweezers scheme, and demonstrate their applications with data from ongoing research. As our methodological overview illustrates, magnetic tweezers are an extremely useful tool for the characterization of helicases and a custom built instrument can be specifically tailored to suit the experimenter's needs. Copyright © 2016 Elsevier Inc. All rights reserved.
A Temporal Locality-Aware Page-Mapped Flash Translation Layer
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kim, Youngjae; Gupta, Aayush; Urgaonkar, Bhuvan
2013-01-01
The poor performance of random writes has been a cause of major concern which needs to be addressed to better utilize the potential of flash in enterprise-scale environments. We examine one of the important causes of this poor performance: the design of the flash translation layer (FTL) which performs the virtual-to-physical address translations and hides the erase-before-write characteristics of flash. We propose a complete paradigm shift in the design of the core FTL engine from the existing techniques with our Demand-Based Flash Translation Layer (DFTL) which selectively caches page- level address mappings. Our experimental evaluation using FlashSim with realistic enterprise-scalemore » workloads endorses the utility of DFTL in enterprise-scale storage systems by demonstrating: 1) improved performance, 2) reduced garbage collection overhead and 3) better overload behavior compared with hybrid FTL schemes which are the most popular implementation methods. For example, a predominantly random-write dominant I/O trace from an OLTP application running at a large financial institution shows a 78% improvement in average response time (due to a 3-fold reduction in operations of the garbage collector), compared with the hybrid FTL scheme. Even for the well-known read-dominant TPC-H benchmark, for which DFTL introduces additional overheads, we improve system response time by 56%. Moreover, interestingly, when write-back cache on DFTL-based SSD is enabled, DFTL even outperforms the page-based FTL scheme, improving their response time by 72% in Financial trace.« less
An Enhanced Privacy-Preserving Authentication Scheme for Vehicle Sensor Networks.
Zhou, Yousheng; Zhao, Xiaofeng; Jiang, Yi; Shang, Fengjun; Deng, Shaojiang; Wang, Xiaojun
2017-12-08
Vehicle sensor networks (VSNs) are ushering in a promising future by enabling more intelligent transportation systems and providing a more efficient driving experience. However, because of their inherent openness, VSNs are subject to a large number of potential security threats. Although various authentication schemes have been proposed for addressing security problems, they are not suitable for VSN applications because of their high computation and communication costs. Chuang and Lee have developed a trust-extended authentication mechanism (TEAM) for vehicle-to-vehicle communication using a transitive trust relationship, which they claim can resist various attacks. However, it fails to counter internal attacks because of the utilization of a shared secret key. In this paper, to eliminate the vulnerability of TEAM, an enhanced privacy-preserving authentication scheme for VSNs is constructed. The security of our proposed scheme is proven under the random oracle model based on the assumption of the computational Diffie-Hellman problem.
Privacy-Enhanced and Multifunctional Health Data Aggregation under Differential Privacy Guarantees
Ren, Hao; Li, Hongwei; Liang, Xiaohui; He, Shibo; Dai, Yuanshun; Zhao, Lian
2016-01-01
With the rapid growth of the health data scale, the limited storage and computation resources of wireless body area sensor networks (WBANs) is becoming a barrier to their development. Therefore, outsourcing the encrypted health data to the cloud has been an appealing strategy. However, date aggregation will become difficult. Some recently-proposed schemes try to address this problem. However, there are still some functions and privacy issues that are not discussed. In this paper, we propose a privacy-enhanced and multifunctional health data aggregation scheme (PMHA-DP) under differential privacy. Specifically, we achieve a new aggregation function, weighted average (WAAS), and design a privacy-enhanced aggregation scheme (PAAS) to protect the aggregated data from cloud servers. Besides, a histogram aggregation scheme with high accuracy is proposed. PMHA-DP supports fault tolerance while preserving data privacy. The performance evaluation shows that the proposal leads to less communication overhead than the existing one. PMID:27626417
An Enhanced Privacy-Preserving Authentication Scheme for Vehicle Sensor Networks
Zhou, Yousheng; Zhao, Xiaofeng; Jiang, Yi; Shang, Fengjun; Deng, Shaojiang; Wang, Xiaojun
2017-01-01
Vehicle sensor networks (VSNs) are ushering in a promising future by enabling more intelligent transportation systems and providing a more efficient driving experience. However, because of their inherent openness, VSNs are subject to a large number of potential security threats. Although various authentication schemes have been proposed for addressing security problems, they are not suitable for VSN applications because of their high computation and communication costs. Chuang and Lee have developed a trust-extended authentication mechanism (TEAM) for vehicle-to-vehicle communication using a transitive trust relationship, which they claim can resist various attacks. However, it fails to counter internal attacks because of the utilization of a shared secret key. In this paper, to eliminate the vulnerability of TEAM, an enhanced privacy-preserving authentication scheme for VSNs is constructed. The security of our proposed scheme is proven under the random oracle model based on the assumption of the computational Diffie–Hellman problem. PMID:29292792
Privacy-Enhanced and Multifunctional Health Data Aggregation under Differential Privacy Guarantees.
Ren, Hao; Li, Hongwei; Liang, Xiaohui; He, Shibo; Dai, Yuanshun; Zhao, Lian
2016-09-10
With the rapid growth of the health data scale, the limited storage and computation resources of wireless body area sensor networks (WBANs) is becoming a barrier to their development. Therefore, outsourcing the encrypted health data to the cloud has been an appealing strategy. However, date aggregation will become difficult. Some recently-proposed schemes try to address this problem. However, there are still some functions and privacy issues that are not discussed. In this paper, we propose a privacy-enhanced and multifunctional health data aggregation scheme (PMHA-DP) under differential privacy. Specifically, we achieve a new aggregation function, weighted average (WAAS), and design a privacy-enhanced aggregation scheme (PAAS) to protect the aggregated data from cloud servers. Besides, a histogram aggregation scheme with high accuracy is proposed. PMHA-DP supports fault tolerance while preserving data privacy. The performance evaluation shows that the proposal leads to less communication overhead than the existing one.
Robust Stabilization of T-S Fuzzy Stochastic Descriptor Systems via Integral Sliding Modes.
Li, Jinghao; Zhang, Qingling; Yan, Xing-Gang; Spurgeon, Sarah K
2017-09-19
This paper addresses the robust stabilization problem for T-S fuzzy stochastic descriptor systems using an integral sliding mode control paradigm. A classical integral sliding mode control scheme and a nonparallel distributed compensation (Non-PDC) integral sliding mode control scheme are presented. It is shown that two restrictive assumptions previously adopted developing sliding mode controllers for Takagi-Sugeno (T-S) fuzzy stochastic systems are not required with the proposed framework. A unified framework for sliding mode control of T-S fuzzy systems is formulated. The proposed Non-PDC integral sliding mode control scheme encompasses existing schemes when the previously imposed assumptions hold. Stability of the sliding motion is analyzed and the sliding mode controller is parameterized in terms of the solutions of a set of linear matrix inequalities which facilitates design. The methodology is applied to an inverted pendulum model to validate the effectiveness of the results presented.
Method and apparatus for conversion of carbonaceous materials to liquid fuel
Lux, Kenneth W.; Namazian, Mehdi; Kelly, John T.
2015-12-01
Embodiments of the invention relates to conversion of hydrocarbon material including but not limited to coal and biomass to a synthetic liquid transportation fuel. The invention includes the integration of a non-catalytic first reaction scheme, which converts carbonaceous materials into a solid product that includes char and ash and a gaseous product; a non-catalytic second reaction scheme, which converts a portion of the gaseous product from the first reaction scheme to light olefins and liquid byproducts; a traditional gas-cleanup operations; and the third reaction scheme to combine the olefins from the second reaction scheme to produce a targeted fuel like liquid transportation fuels.
Addressing the Big-Earth-Data Variety Challenge with the Hierarchical Triangular Mesh
NASA Technical Reports Server (NTRS)
Rilee, Michael L.; Kuo, Kwo-Sen; Clune, Thomas; Oloso, Amidu; Brown, Paul G.; Yu, Honfeng
2016-01-01
We have implemented an updated Hierarchical Triangular Mesh (HTM) as the basis for a unified data model and an indexing scheme for geoscience data to address the variety challenge of Big Earth Data. We observe that, in the absence of variety, the volume challenge of Big Data is relatively easily addressable with parallel processing. The more important challenge in achieving optimal value with a Big Data solution for Earth Science (ES) data analysis, however, is being able to achieve good scalability with variety. With HTM unifying at least the three popular data models, i.e. Grid, Swath, and Point, used by current ES data products, data preparation time for integrative analysis of diverse datasets can be drastically reduced and better variety scaling can be achieved. In addition, since HTM is also an indexing scheme, when it is used to index all ES datasets, data placement alignment (or co-location) on the shared nothing architecture, which most Big Data systems are based on, is guaranteed and better performance is ensured. Moreover, our updated HTM encoding turns most geospatial set operations into integer interval operations, gaining further performance advantages.
PRESAGE: Protecting Structured Address Generation against Soft Errors
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sharma, Vishal C.; Gopalakrishnan, Ganesh; Krishnamoorthy, Sriram
Modern computer scaling trends in pursuit of larger component counts and power efficiency have, unfortunately, lead to less reliable hardware and consequently soft errors escaping into application data ("silent data corruptions"). Techniques to enhance system resilience hinge on the availability of efficient error detectors that have high detection rates, low false positive rates, and lower computational overhead. Unfortunately, efficient detectors to detect faults during address generation (to index large arrays) have not been widely researched. We present a novel lightweight compiler-driven technique called PRESAGE for detecting bit-flips affecting structured address computations. A key insight underlying PRESAGE is that any addressmore » computation scheme that flows an already incurred error is better than a scheme that corrupts one particular array access but otherwise (falsely) appears to compute perfectly. Enabling the flow of errors allows one to situate detectors at loop exit points, and helps turn silent corruptions into easily detectable error situations. Our experiments using PolyBench benchmark suite indicate that PRESAGE-based error detectors have a high error-detection rate while incurring low overheads.« less
A Target Coverage Scheduling Scheme Based on Genetic Algorithms in Directional Sensor Networks
Gil, Joon-Min; Han, Youn-Hee
2011-01-01
As a promising tool for monitoring the physical world, directional sensor networks (DSNs) consisting of a large number of directional sensors are attracting increasing attention. As directional sensors in DSNs have limited battery power and restricted angles of sensing range, maximizing the network lifetime while monitoring all the targets in a given area remains a challenge. A major technique to conserve the energy of directional sensors is to use a node wake-up scheduling protocol by which some sensors remain active to provide sensing services, while the others are inactive to conserve their energy. In this paper, we first address a Maximum Set Covers for DSNs (MSCD) problem, which is known to be NP-complete, and present a greedy algorithm-based target coverage scheduling scheme that can solve this problem by heuristics. This scheme is used as a baseline for comparison. We then propose a target coverage scheduling scheme based on a genetic algorithm that can find the optimal cover sets to extend the network lifetime while monitoring all targets by the evolutionary global search technique. To verify and evaluate these schemes, we conducted simulations and showed that the schemes can contribute to extending the network lifetime. Simulation results indicated that the genetic algorithm-based scheduling scheme had better performance than the greedy algorithm-based scheme in terms of maximizing network lifetime. PMID:22319387
An Energy-Aware Hybrid ARQ Scheme with Multi-ACKs for Data Sensing Wireless Sensor Networks.
Zhang, Jinhuan; Long, Jun
2017-06-12
Wireless sensor networks (WSNs) are one of the important supporting technologies of edge computing. In WSNs, reliable communications are essential for most applications due to the unreliability of wireless links. In addition, network lifetime is also an important performance metric and needs to be considered in many WSN studies. In the paper, an energy-aware hybrid Automatic Repeat-reQuest protocol (ARQ) scheme is proposed to ensure energy efficiency under the guarantee of network transmission reliability. In the scheme, the source node sends data packets continuously with the correct window size and it does not need to wait for the acknowledgement (ACK) confirmation for each data packet. When the destination receives K data packets, it will return multiple copies of one ACK for confirmation to avoid ACK packet loss. The energy consumption of each node in flat circle network applying the proposed scheme is statistical analyzed and the cases under which it is more energy efficiency than the original scheme is discussed. Moreover, how to select parameters of the scheme is addressed to extend the network lifetime under the constraint of the network reliability. In addition, the energy efficiency of the proposed schemes is evaluated. Simulation results are presented to demonstrate that a node energy consumption reduction could be gained and the network lifetime is prolonged.
NASA Astrophysics Data System (ADS)
Montane, F.; Fox, A. M.; Arellano, A. F.; Alexander, M. R.; Moore, D. J.
2016-12-01
Carbon (C) allocation to different plant tissues (leaves, stem and roots) remains a central challenge for understanding the global C cycle, as it determines C residence time. We used a diverse set of observations (AmeriFlux eddy covariance towers, biomass estimates from tree-ring data, and Leaf Area Index measurements) to compare C fluxes, pools, and Leaf Area Index (LAI) data with the Community Land Model (CLM). We ran CLM for seven temperate forests in North America (including evergreen and deciduous sites) between 1980 and 2013 using different C allocation schemes: i) standard C allocation scheme in CLM, which allocates C to the stem and leaves as a dynamic function of annual net primary productivity (NPP); ii) two fixed C allocation schemes, one representative of evergreen and the other one of deciduous forests, based on Luyssaert et al. 2007; iii) an alternative C allocation scheme, which allocated C to stem and leaves, and to stem and coarse roots, as a dynamic function of annual NPP, based on Litton et al. 2007. At our sites CLM usually overestimated gross primary production and ecosystem respiration, and underestimated net ecosystem exchange. Initial aboveground biomass in 1980 was largely overestimated for deciduous forests, whereas aboveground biomass accumulation between 1980 and 2011 was highly underestimated for both evergreen and deciduous sites due to the lower turnover rate in the sites than the one used in the model. CLM overestimated LAI in both evergreen and deciduous sites because the Leaf C-LAI relationship in the model did not match the observed Leaf C-LAI relationship in our sites. Although the different C allocation schemes gave similar results for aggregated C fluxes, they translated to important differences in long-term aboveground biomass accumulation and aboveground NPP. For deciduous forests, one of the alternative C allocation schemes used (iii) gave more realistic stem C/leaf C ratios, and highly reduced the overestimation of initial aboveground biomass, and accumulated aboveground NPP for deciduous forests by CLM. Our results would suggest using different C allocation schemes for evergreen and deciduous forests. It is crucial to improve CLM in the near future to minimize data-model mismatches, and to address some of the current model structural errors and parameter uncertainties.
Assessing Teachers' Science Content Knowledge: A Strategy for Assessing Depth of Understanding
NASA Astrophysics Data System (ADS)
McConnell, Tom J.; Parker, Joyce M.; Eberhardt, Jan
2013-06-01
One of the characteristics of effective science teachers is a deep understanding of science concepts. The ability to identify, explain and apply concepts is critical in designing, delivering and assessing instruction. Because some teachers have not completed extensive courses in some areas of science, especially in middle and elementary grades, many professional development programs attempt to strengthen teachers' content knowledge. Assessing this content knowledge is challenging. Concept inventories are reliable and efficient, but do not reveal depth of knowledge. Interviews and observations are time-consuming. The Problem Based Learning Project for Teachers implemented a strategy that includes pre-post instruments in eight content strands that permits blind coding of responses and comparison across teachers and groups of teachers. The instruments include two types of open-ended questions that assess both general knowledge and the ability to apply Big Ideas related to specific science topics. The coding scheme is useful in revealing patterns in prior knowledge and learning, and identifying ideas that are challenging or not addressed by learning activities. The strengths and limitations of the scoring scheme are identified through comparison of the findings to case studies of four participating teachers from middle and elementary schools. The cases include examples of coded pre- and post-test responses to illustrate some of the themes seen in teacher learning. The findings raise questions for future investigation that can be conducted using analyses of the coded responses.
Photovoltaic utility/customer interface study
NASA Astrophysics Data System (ADS)
Eichler, C. H.; Hayes, T. P.; Matthews, M. M.; Wilraker, V. F.
1980-12-01
The technical, economic, and legal and regulatory issues of interconnecting small, privately-owned, on-site photovoltaic generating systems to an electric utility are addressed. Baseline residential, commercial and industrial class photovoltaic systems were developed. Technical issues of concern affecting this interconnection were identified and included fault protection, undervoltage protection, lamp flicker, revenue metering, loss of synchromism, electrical safety, prevention of backfeeding a de-energized utility feeder, effects of on-site generation on utility relaying schemes, effects of power conditioner harmonic distortion on the electric utility, system isolation, electromagnetic interference and site power factor as seen by the utility. Typical interconnection wiring diagrams were developed for interconnecting each class of baseline photovoltaic generating system.
NASA Astrophysics Data System (ADS)
Wang, Botao; Ünal, F. Nur; Eckardt, André
2018-06-01
The insertion of a local magnetic flux, as the one created by a thin solenoid, plays an important role in gedanken experiments of quantum Hall physics. By combining Floquet engineering of artificial magnetic fields with the ability of single-site addressing in quantum gas microscopes, we propose a scheme for the realization of such local solenoid-type magnetic fields in optical lattices. We show that it can be employed to manipulate and probe elementary excitations of a topological Chern insulator. This includes quantized adiabatic charge pumping along tailored paths inside the bulk, as well as the controlled population of edge modes.
Predictive momentum management for the Space Station
NASA Technical Reports Server (NTRS)
Hatis, P. D.
1986-01-01
Space station control moment gyro momentum management is addressed by posing a deterministic optimization problem with a performance index that includes station external torque loading, gyro control torque demand, and excursions from desired reference attitudes. It is shown that a simple analytic desired attitude solution exists for all axes with pitch prescription decoupled, but roll and yaw coupled. Continuous gyro desaturation is shown to fit neatly into the scheme. Example results for pitch axis control of the NASA power tower Space Station are shown based on predictive attitude prescription. Control effector loading is shown to be reduced by this method when compared to more conventional momentum management techniques.
Preliminary study, analysis and design for a power switch for digital engine actuators
NASA Technical Reports Server (NTRS)
Beattie, E. C.; Zickwolf, H. C., Jr.
1979-01-01
Innovative control configurations using high temperature switches to operate actuator driving solenoids were studied. The impact on engine control system life cycle costs and reliability of electronic control and (ECU) heat dissipation due to power conditioning and interface drivers were addressed. Various power supply and actuation schemes were investigated, including optical signal transmission and electronics on the actuator, engine driven alternator, and inside the ECU. The use of a switching shunt power conditioner results in the most significant decrease in heat dissipation within the ECU. No overall control system reliability improvement is projected by the use of remote high temperature switches for solenoid drivers.
Airborne Data Link Study Report
DOT National Transportation Integrated Search
1996-01-01
This report represents evaluations of Data Link products and services in a simulated aviation opearation. The study addresses key issues related to alerting schemes for Data Link messages, positioning of Data Link displays, and mode of presentation o...
Matsuoka, Sadatoshi; Obara, Hiromi; Nagai, Mari; Murakami, Hitoshi; Chan Lon, Rasmey
2014-07-01
Though Cambodia made impressive gains in immunization coverage between the years 2000 and 2005, it recognized several health system challenges to greater coverage of immunization and sustainability. The Global Alliance for Vaccines and Immunization (GAVI) opened a Health System Strengthening (HSS) funding window in 2006. To address the health system challenges, Cambodia has been receiving the GAVI HSS fund since October 2007. The major component of the support is performance-based financing (PBF) for maternal, neonatal and child health (MNCH) services. To examine the impact of the PBF scheme on MNCH services and administrative management in rural Cambodia. Quantitative and qualitative studies were conducted in Kroch Chhmar Operational District (OD), Cambodia. Quantitative analyses were conducted on the trends of the numbers of MNCH services. A brief analysis was conducted using qualitative data. After the commencement of the PBF support, the volume of MNCH services was significantly boosted. In addition, strengthened financial and operational management was observed in the study area. However, the quality of the MNCH services was not ensured. Technical assistance, rather than the PBF scheme, was perceived by stakeholders to play a vital role in increasing the quality of the services. To improve the quality of the health services provided, it is better to include indicators on the quality of care in the PBF scheme. Mutual co-operation between PBF models and technical assistance may ensure better service quality while boosting the quantity. A robust but feasible data validation mechanism should be in place, as a PBF could incentivize inaccurate reporting. The capacity for financial management should be strengthened in PBF recipient ODs. To address the broader aspects of MNCH, a balanced input of resources and strengthening of all six building blocks of a health system are necessary. Published by Oxford University Press in association with The London School of Hygiene and Tropical Medicine © The Author 2013; all rights reserved.
Multiresolution motion planning for autonomous agents via wavelet-based cell decompositions.
Cowlagi, Raghvendra V; Tsiotras, Panagiotis
2012-10-01
We present a path- and motion-planning scheme that is "multiresolution" both in the sense of representing the environment with high accuracy only locally and in the sense of addressing the vehicle kinematic and dynamic constraints only locally. The proposed scheme uses rectangular multiresolution cell decompositions, efficiently generated using the wavelet transform. The wavelet transform is widely used in signal and image processing, with emerging applications in autonomous sensing and perception systems. The proposed motion planner enables the simultaneous use of the wavelet transform in both the perception and in the motion-planning layers of vehicle autonomy, thus potentially reducing online computations. We rigorously prove the completeness of the proposed path-planning scheme, and we provide numerical simulation results to illustrate its efficacy.
Examination of a Capabilities-based Prioritization Scheme for Service-Oriented Architecture Afloat
2012-09-01
Oriented Architecture Afloat 5. FUNDING NUMBERS 6. AUTHOR(S) Matthew C. Horton 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS (ES) Naval...Postgraduate School Monterey, CA 93943–5000 8. PERFORMING ORGANIZATION REPORT NUMBER 9. SPONSORING /MONITORING AGENCY NAME(S) AND ADDRESS (ES) N/A...within the Internet Protocol Version 4 ( IPv4 ) header (Xiao & Ni, 1999). By manipulating three bits within this byte, applications may specify
A Discrete Approximation Framework for Hereditary Systems.
1980-05-01
schemes which are included in the general framework and which may be implemented directly on high-speed computing machines are developed. A numerical...an appropriately chosen Hilbert space. We then proceed to develop general approximation schemes for the solutions to the homogeneous AEE which in turn...rich classes of these schemes . In addition, two particular families of approximation schemes included in the general framework are developed and
NASA Technical Reports Server (NTRS)
Yuan, Lu; LeBlanc, James
1998-01-01
This thesis investigates the effects of the High Power Amplifier (HPA) and the filters over a satellite or telemetry channel. The Volterra series expression is presented for the nonlinear channel with memory, and the algorithm is based on the finite-state machine model. A RAM-based algorithm operating on the receiver side, Pre-cursor Enhanced RAM-FSE Canceler (PERC) is developed. A high order modulation scheme , 16-QAM is used for simulation, the results show that PERC provides an efficient and reliable method to transmit data on the bandlimited nonlinear channel. The contribution of PERC algorithm is that it includes both pre-cursors and post-cursors as the RAM address lines, and suggests a new way to make decision on the pre-addresses. Compared with the RAM-DFE structure that only includes post- addresses, the BER versus Eb/NO performance of PERC is substantially enhanced. Experiments are performed for PERC algorithms with different parameters on AWGN channels, and the results are compared and analyzed. The investigation of this thesis includes software simulation and hardware verification. Hardware is setup to collect actual TWT data. Simulation on both the software-generated data and the real-world data are performed. Practical limitations are considered for the hardware collected data. Simulation results verified the reliability of the PERC algorithm. This work was conducted at NMSU in the Center for Space Telemetering and Telecommunications Systems in the Klipsch School of Electrical and Computer Engineering Department.
NASA Technical Reports Server (NTRS)
Abramopoulos, Frank
1988-01-01
The conditions under which finite difference schemes for the shallow water equations can conserve both total energy and potential enstrophy are considered. A method of deriving such schemes using operator formalism is developed. Several such schemes are derived for the A-, B- and C-grids. The derived schemes include second-order schemes and pseudo-fourth-order schemes. The simplest B-grid pseudo-fourth-order schemes are presented.
Condition Number Regularized Covariance Estimation*
Won, Joong-Ho; Lim, Johan; Kim, Seung-Jean; Rajaratnam, Bala
2012-01-01
Estimation of high-dimensional covariance matrices is known to be a difficult problem, has many applications, and is of current interest to the larger statistics community. In many applications including so-called the “large p small n” setting, the estimate of the covariance matrix is required to be not only invertible, but also well-conditioned. Although many regularization schemes attempt to do this, none of them address the ill-conditioning problem directly. In this paper, we propose a maximum likelihood approach, with the direct goal of obtaining a well-conditioned estimator. No sparsity assumption on either the covariance matrix or its inverse are are imposed, thus making our procedure more widely applicable. We demonstrate that the proposed regularization scheme is computationally efficient, yields a type of Steinian shrinkage estimator, and has a natural Bayesian interpretation. We investigate the theoretical properties of the regularized covariance estimator comprehensively, including its regularization path, and proceed to develop an approach that adaptively determines the level of regularization that is required. Finally, we demonstrate the performance of the regularized estimator in decision-theoretic comparisons and in the financial portfolio optimization setting. The proposed approach has desirable properties, and can serve as a competitive procedure, especially when the sample size is small and when a well-conditioned estimator is required. PMID:23730197
Condition Number Regularized Covariance Estimation.
Won, Joong-Ho; Lim, Johan; Kim, Seung-Jean; Rajaratnam, Bala
2013-06-01
Estimation of high-dimensional covariance matrices is known to be a difficult problem, has many applications, and is of current interest to the larger statistics community. In many applications including so-called the "large p small n " setting, the estimate of the covariance matrix is required to be not only invertible, but also well-conditioned. Although many regularization schemes attempt to do this, none of them address the ill-conditioning problem directly. In this paper, we propose a maximum likelihood approach, with the direct goal of obtaining a well-conditioned estimator. No sparsity assumption on either the covariance matrix or its inverse are are imposed, thus making our procedure more widely applicable. We demonstrate that the proposed regularization scheme is computationally efficient, yields a type of Steinian shrinkage estimator, and has a natural Bayesian interpretation. We investigate the theoretical properties of the regularized covariance estimator comprehensively, including its regularization path, and proceed to develop an approach that adaptively determines the level of regularization that is required. Finally, we demonstrate the performance of the regularized estimator in decision-theoretic comparisons and in the financial portfolio optimization setting. The proposed approach has desirable properties, and can serve as a competitive procedure, especially when the sample size is small and when a well-conditioned estimator is required.
The QKD network: model and routing scheme
NASA Astrophysics Data System (ADS)
Yang, Chao; Zhang, Hongqi; Su, Jinhai
2017-11-01
Quantum key distribution (QKD) technology can establish unconditional secure keys between two communicating parties. Although this technology has some inherent constraints, such as the distance and point-to-point mode limits, building a QKD network with multiple point-to-point QKD devices can overcome these constraints. Considering the development level of current technology, the trust relaying QKD network is the first choice to build a practical QKD network. However, the previous research didn't address a routing method on the trust relaying QKD network in detail. This paper focuses on the routing issues, builds a model of the trust relaying QKD network for easily analysing and understanding this network, and proposes a dynamical routing scheme for this network. From the viewpoint of designing a dynamical routing scheme in classical network, the proposed scheme consists of three components: a Hello protocol helping share the network topology information, a routing algorithm to select a set of suitable paths and establish the routing table and a link state update mechanism helping keep the routing table newly. Experiments and evaluation demonstrates the validity and effectiveness of the proposed routing scheme.
Fast rerouting schemes for protected mobile IP over MPLS networks
NASA Astrophysics Data System (ADS)
Wen, Chih-Chao; Chang, Sheng-Yi; Chen, Huan; Chen, Kim-Joan
2005-10-01
Fast rerouting is a critical traffic engineering operation in the MPLS networks. To implement the Mobile IP service over the MPLS network, one can collaborate with the fast rerouting operation to enhance the availability and survivability. MPLS can protect critical LSP tunnel between Home Agent (HA) and Foreign Agent (FA) using the fast rerouting scheme. In this paper, we propose a simple but efficient algorithm to address the triangle routing problem for the Mobile IP over the MPLS networks. We consider this routing issue as a link weighting and capacity assignment (LW-CA) problem. The derived solution is used to plan the fast restoration mechanism to protect the link or node failure. In this paper, we first model the LW-CA problem as a mixed integer optimization problem. Our goal is to minimize the call blocking probability on the most congested working truck for the mobile IP connections. Many existing network topologies are used to evaluate the performance of our scheme. Results show that our proposed scheme can obtain the best performance in terms of the smallest blocking probability compared to other schemes.
Gilioli, G; Schrader, G; Baker, R H A; Ceglarska, E; Kertész, V K; Lövei, G; Navajas, M; Rossi, V; Tramontini, S; van Lenteren, J C
2014-01-15
The current methods to assess the environmental impacts of plant pests differ in their approaches and there is a lack of the standardized procedures necessary to provide accurate and consistent results, demonstrating the complexity of developing a commonly accepted scheme for this purpose. By including both the structural and functional components of the environment threatened by invasive alien species (IAS), in particular plant pests, we propose an environmental risk assessment scheme that addresses this complexity. Structural components are investigated by evaluating the impacts of the plant pest on genetic, species and landscape diversity. Functional components are evaluated by estimating how plant pests modify ecosystem services in order to determine the extent to which an IAS changes the functional traits that influence ecosystem services. A scenario study at a defined spatial and temporal resolution is then used to explore how an IAS, as an exogenous driving force, may trigger modifications in the target environment. The method presented here provides a standardized approach to generate comparable and reproducible results for environmental risk assessment as a component of Pest Risk Analysis. The method enables the assessment of overall environmental risk which integrates the impacts on different components of the environment and their probabilities of occurrence. The application of the proposed scheme is illustrated by evaluating the environmental impacts of the invasive citrus long-horn beetle, Anoplophora chinensis. © 2013.
NASA Technical Reports Server (NTRS)
Chan, Kai-Wing; Zhang, William W.; Schofield, Mark J.; Numata, Ai; Mazzarella, James R.; Saha, Timo T.; Biskach, Michael P.; McCelland, Ryan S.; Niemeyer, Jason; Sharpe, Marton V.;
2016-01-01
High-resolution, high throughput optics for x-ray astronomy requires fabrication of well-formed mirror segments and their integration with arc-second level precision. Recently, advances of fabrication of silicon mirrors developed at NASA/Goddard prompted us to develop a new method of mirror integration. The new integration scheme takes advantage of the stiffer, more thermally conductive, and lower-CTE silicon, compared to glass, to build a telescope of much lighter weight. In this paper, we address issues of aligning and bonding mirrors with this method. In this preliminary work, we demonstrated the basic viability of such scheme. Using glass mirrors, we demonstrated that alignment error of 1" and bonding error 2" can be achieved for mirrors in a single shell. We will address the immediate plan to demonstrate the bonding reliability and to develop technology to build up a mirror stack and a whole "meta-shell".
Report on Pairing-based Cryptography.
Moody, Dustin; Peralta, Rene; Perlner, Ray; Regenscheid, Andrew; Roginsky, Allen; Chen, Lily
2015-01-01
This report summarizes study results on pairing-based cryptography. The main purpose of the study is to form NIST's position on standardizing and recommending pairing-based cryptography schemes currently published in research literature and standardized in other standard bodies. The report reviews the mathematical background of pairings. This includes topics such as pairing-friendly elliptic curves and how to compute various pairings. It includes a brief introduction to existing identity-based encryption (IBE) schemes and other cryptographic schemes using pairing technology. The report provides a complete study of the current status of standard activities on pairing-based cryptographic schemes. It explores different application scenarios for pairing-based cryptography schemes. As an important aspect of adopting pairing-based schemes, the report also considers the challenges inherent in validation testing of cryptographic algorithms and modules. Based on the study, the report suggests an approach for including pairing-based cryptography schemes in the NIST cryptographic toolkit. The report also outlines several questions that will require further study if this approach is followed.
Report on Pairing-based Cryptography
Moody, Dustin; Peralta, Rene; Perlner, Ray; Regenscheid, Andrew; Roginsky, Allen; Chen, Lily
2015-01-01
This report summarizes study results on pairing-based cryptography. The main purpose of the study is to form NIST’s position on standardizing and recommending pairing-based cryptography schemes currently published in research literature and standardized in other standard bodies. The report reviews the mathematical background of pairings. This includes topics such as pairing-friendly elliptic curves and how to compute various pairings. It includes a brief introduction to existing identity-based encryption (IBE) schemes and other cryptographic schemes using pairing technology. The report provides a complete study of the current status of standard activities on pairing-based cryptographic schemes. It explores different application scenarios for pairing-based cryptography schemes. As an important aspect of adopting pairing-based schemes, the report also considers the challenges inherent in validation testing of cryptographic algorithms and modules. Based on the study, the report suggests an approach for including pairing-based cryptography schemes in the NIST cryptographic toolkit. The report also outlines several questions that will require further study if this approach is followed. PMID:26958435
PAVS: A New Privacy-Preserving Data Aggregation Scheme for Vehicle Sensing Systems.
Xu, Chang; Lu, Rongxing; Wang, Huaxiong; Zhu, Liehuang; Huang, Cheng
2017-03-03
Air pollution has become one of the most pressing environmental issues in recent years. According to a World Health Organization (WHO) report, air pollution has led to the deaths of millions of people worldwide. Accordingly, expensive and complex air-monitoring instruments have been exploited to measure air pollution. Comparatively, a vehicle sensing system (VSS), as it can be effectively used for many purposes and can bring huge financial benefits in reducing high maintenance and repair costs, has received considerable attention. However, the privacy issues of VSS including vehicles' location privacy have not been well addressed. Therefore, in this paper, we propose a new privacy-preserving data aggregation scheme, called PAVS, for VSS. Specifically, PAVS combines privacy-preserving classification and privacy-preserving statistics on both the mean E(·) and variance Var(·), which makes VSS more promising, as, with minimal privacy leakage, more vehicles are willing to participate in sensing. Detailed analysis shows that the proposed PAVS can achieve the properties of privacy preservation, data accuracy and scalability. In addition, the performance evaluations via extensive simulations also demonstrate its efficiency.
Model-based elastography: a survey of approaches to the inverse elasticity problem
Doyley, M M
2012-01-01
Elastography is emerging as an imaging modality that can distinguish normal versus diseased tissues via their biomechanical properties. This article reviews current approaches to elastography in three areas — quasi-static, harmonic, and transient — and describes inversion schemes for each elastographic imaging approach. Approaches include: first-order approximation methods; direct and iterative inversion schemes for linear elastic; isotropic materials; and advanced reconstruction methods for recovering parameters that characterize complex mechanical behavior. The paper’s objective is to document efforts to develop elastography within the framework of solving an inverse problem, so that elastography may provide reliable estimates of shear modulus and other mechanical parameters. We discuss issues that must be addressed if model-based elastography is to become the prevailing approach to quasi-static, harmonic, and transient elastography: (1) developing practical techniques to transform the ill-posed problem with a well-posed one; (2) devising better forward models to capture the transient behavior of soft tissue; and (3) developing better test procedures to evaluate the performance of modulus elastograms. PMID:22222839
Onwujekwe, Obinna; Onoka, Chima; Uguru, Nkoli; Nnenna, Tasie; Uzochukwu, Benjamin; Eze, Soludo; Kirigia, Joses; Petu, Amos
2010-06-12
It is important that community-based health insurance (CBHI) schemes are designed in such a way as to ensure the relevance of the benefit packages to potential clients. Hence, this paper provides an understanding of the preferred benefit packages by different economic status groups as well as urban and rural dwellers for CBHI in Southeast Nigeria. The study took place in rural, urban and semi-urban communities of south-east Nigeria. A questionnaire was used to collect information from 3070 randomly picked household heads. Focus group discussions were used to collect qualitative data. Data was examined for links between preferences for benefit packages with SES and geographic residence of the respondents. Respondents in the rural areas and in the lower SES preferred a comprehensive benefit package which includes all inpatient, outpatient and emergencies services, while those in urban areas as well as those in the higher SES group showed a preference for benefit packages which will cover only basic disease control interventions. Equity concerns in preferences for services to be offered by the CBHI scheme should be addressed for CBHI to succeed in different contexts.
Explicit robust schemes for implementation of general principal value-based constitutive models
NASA Technical Reports Server (NTRS)
Arnold, S. M.; Saleeb, A. F.; Tan, H. Q.; Zhang, Y.
1993-01-01
The issue of developing effective and robust schemes to implement general hyperelastic constitutive models is addressed. To this end, special purpose functions are used to symbolically derive, evaluate, and automatically generate the associated FORTRAN code for the explicit forms of the corresponding stress function and material tangent stiffness tensors. These explicit forms are valid for the entire deformation range. The analytical form of these explicit expressions is given here for the case in which the strain-energy potential is taken as a nonseparable polynomial function of the principle stretches.
Conditional equivalence testing: An alternative remedy for publication bias
Gustafson, Paul
2018-01-01
We introduce a publication policy that incorporates “conditional equivalence testing” (CET), a two-stage testing scheme in which standard NHST is followed conditionally by testing for equivalence. The idea of CET is carefully considered as it has the potential to address recent concerns about reproducibility and the limited publication of null results. In this paper we detail the implementation of CET, investigate similarities with a Bayesian testing scheme, and outline the basis for how a scientific journal could proceed to reduce publication bias while remaining relevant. PMID:29652891
unmarked: An R package for fitting hierarchical models of wildlife occurrence and abundance
Fiske, Ian J.; Chandler, Richard B.
2011-01-01
Ecological research uses data collection techniques that are prone to substantial and unique types of measurement error to address scientific questions about species abundance and distribution. These data collection schemes include a number of survey methods in which unmarked individuals are counted, or determined to be present, at spatially- referenced sites. Examples include site occupancy sampling, repeated counts, distance sampling, removal sampling, and double observer sampling. To appropriately analyze these data, hierarchical models have been developed to separately model explanatory variables of both a latent abundance or occurrence process and a conditional detection process. Because these models have a straightforward interpretation paralleling mechanisms under which the data arose, they have recently gained immense popularity. The common hierarchical structure of these models is well-suited for a unified modeling interface. The R package unmarked provides such a unified modeling framework, including tools for data exploration, model fitting, model criticism, post-hoc analysis, and model comparison.
Wang, Zhan-Ke; Chen, Rong-Jian; Wang, Shi-Liang; Li, Guang-Wei; Zhu, Zhong-Zhen; Huang, Qiang; Chen, Zi-Li; Chen, Fan-Chang; Deng, Lei; Lan, Xiao-Peng; Hu, Tian
2018-01-01
A novel diagnostic scheme that includes pancreatic β‑cell dysfunction analysis for the diagnosis of traumatic multiple organ dysfunction syndrome (MODS) was investigated to assist in the early diagnosis and detection of MODS. Early intervention and treatment of MODS has been associated with a reduced mortality rate. A total of 2,876 trauma patients (including patients post‑major surgery) were admitted to the intensive care unit of the authors' hospital between December 2010 and December 2015 and enrolled in the present study. There were 205 cases where the patient succumbed to their injuries. In addition to the conventional diagnostic scheme for traumatic MODS, indexes of pancreatic β‑cell dysfunction [fasting blood‑glucose (FBG), homeostatic model assessment‑β and (blood insulin concentration 30 min following glucose loading‑fasting insulin concentration)/(blood glucose concentration 30 min following glucose loading‑FBG concentration)] were included to establish an improved diagnostic scheme for traumatic MODS. The novel scheme was subsequently used in clinical practice alongside the conventional scheme and its effect was evaluated. The novel scheme had a significantly higher positive number of MODS diagnoses for all trauma patients compared with the conventional scheme (12.48 vs. 8.87%; P<0.01). No significant difference was identified in the final percentage of positive of MODS diagnoses for trauma‑associated mortality patients between the novel (88.30%) and the conventional scheme (86.34%). The novel scheme had a significantly higher positive number of MODS diagnoses for trauma‑associated mortality patients 3 days prior to patients succumbing to MODS compared with the conventional scheme (80.98 vs. 64.39%; P<0.01). The consensus of the MODS diagnosis of all trauma patients between the novel scheme and the conventional scheme was 100%; however, out of the patients diagnosed as positive by novel scheme 71.03% were positive by the conventional scheme. The consensus between the final MODS diagnosis and the MODS diagnosis 3 days prior to patients succumbing to their injuries between the novel scheme and the conventional scheme was 100%; however, out of the patients diagnosed as positive by novel scheme 97.79 were positive by the conventional scheme of the 205 patients who succumbed to MODS and out of the patients diagnosed as positive for MODS by novel scheme 3 days prior to succumbing, 79.52% were positive by the conventional scheme. The results of the present study demonstrated that the novel diagnostic scheme using the relevant indexes of pancreatic β‑cell dysfunction for diagnosis of traumatic MODS, was able to diagnose MODS early without excessively extending the diagnostic scope. Its clinical application should be promoted.
The role of agri-environment schemes in conservation and environmental management.
Batáry, Péter; Dicks, Lynn V; Kleijn, David; Sutherland, William J
2015-08-01
Over half of the European landscape is under agricultural management and has been for millennia. Many species and ecosystems of conservation concern in Europe depend on agricultural management and are showing ongoing declines. Agri-environment schemes (AES) are designed partly to address this. They are a major source of nature conservation funding within the European Union (EU) and the highest conservation expenditure in Europe. We reviewed the structure of current AES across Europe. Since a 2003 review questioned the overall effectiveness of AES for biodiversity, there has been a plethora of case studies and meta-analyses examining their effectiveness. Most syntheses demonstrate general increases in farmland biodiversity in response to AES, with the size of the effect depending on the structure and management of the surrounding landscape. This is important in the light of successive EU enlargement and ongoing reforms of AES. We examined the change in effect size over time by merging the data sets of 3 recent meta-analyses and found that schemes implemented after revision of the EU's agri-environmental programs in 2007 were not more effective than schemes implemented before revision. Furthermore, schemes aimed at areas out of production (such as field margins and hedgerows) are more effective at enhancing species richness than those aimed at productive areas (such as arable crops or grasslands). Outstanding research questions include whether AES enhance ecosystem services, whether they are more effective in agriculturally marginal areas than in intensively farmed areas, whether they are more or less cost-effective for farmland biodiversity than protected areas, and how much their effectiveness is influenced by farmer training and advice? The general lesson from the European experience is that AES can be effective for conserving wildlife on farmland, but they are expensive and need to be carefully designed and targeted. © 2015 The Authors. Conservation Biology published by Wiley Periodicals, Inc. on behalf of Society for Conservation Biology.
Stimulated Deep Neural Network for Speech Recognition
2016-09-08
making network regularization and robust adaptation challenging. Stimulated training has recently been proposed to address this problem by encouraging...potential to improve regularization and adaptation. This paper investigates stimulated training of DNNs for both of these options. These schemes take
The Solution to Pollution is Distribution: Design Your Own Chaotic Flow
NASA Astrophysics Data System (ADS)
Tigera, R. G.; Roth, E. J.; Neupauer, R.; Mays, D. C.
2015-12-01
Plume spreading promotes the molecular mixing that drives chemical reactions in porous media in general, and remediation reactions in groundwater aquifers in particular. Theoretical analysis suggests that engineered injection and extraction, a specific sequence of pumping through wells surrounding a contaminant plume, can improve groundwater remediation through chaotic advection. Selection of an engineered injection and extraction scheme is difficult, however, because the engineer is faced with the difficulty of recommending a pumping scheme for a contaminated site without having any previous knowledge of how the scheme will perform. To address this difficulty, this presentation describes a Graphical User Interface (GUI) designed to help engineers develop, test, and observe pumping schemes as described in previous research (Mays, D.C. and Neupauer, R.M., 2012, Plume spreading in groundwater by stretching and folding, Water Resour. Res., 48, W07501, doi:10.1029/2011WR011567). The inputs allow the user to manipulate the model conditions such as number of wells, plume size, and pumping scheme. Plume evolution is modeled, assuming no diffusion or dispersion, using analytical solutions for injection or extraction through individual wells or pairs or wells (i.e., dipoles). Using the GUI, an engineered injection and extraction scheme can be determined that best fits the remediation needs of the contaminated site. By creating multiple injection and extraction schemes, the user can learn about the plume shapes created from different schemes and, ultimately, recommend a pumping scheme based on some experience of fluid flow as shown in the GUI. The pumping schemes developed through this GUI are expected to guide more advanced modeling and laboratory studies that account for the crucial role of dispersion in groundwater remediation.
Addressing poverty through disease control programmes: examples from Tuberculosis control in India.
Kamineni, Vishnu Vardhan; Wilson, Nevin; Das, Anand; Satyanarayana, Srinath; Chadha, Sarabjit; Sachdeva, Kuldeep Singh; Chauhan, Lakbir Singh
2012-03-26
Tuberculosis remains a major public health problem in India with the country accounting for one-fifth or 21% of all tuberculosis cases reported globally. The purpose of the study was to obtain an understanding on pro-poor initiatives within the framework of tuberculosis control programme in India and to identify mechanisms to improve the uptake and access to TB services among the poor. A national level workshop was held with participation from all relevant stakeholder groups. This study conducted during the stakeholder workshop adopted participatory research methods. The data was elicited through consultative and collegiate processes. The research study also factored information from primary and secondary sources that included literature review examining poverty headcount ratios and below poverty line population in the country; and quasi-profiling assessments to identify poor, backward and tribal districts as defined by the TB programme in India. Results revealed that current pro-poor initiatives in TB control included collaboration with private providers and engaging community to improve access among the poor to TB diagnostic and treatment services. The participants identified gaps in existing pro-poor strategies that related to implementation of advocacy, communication and social mobilisation; decentralisation of DOT; and incentives for the poor through the available schemes for public-private partnerships and provided key recommendations for action. Synergies between TB control programme and centrally sponsored social welfare schemes and state specific social welfare programmes aimed at benefitting the poor were unclear. Further in-depth analysis and systems/policy/operations research exploring pro-poor initiatives, in particular examining service delivery synergies between existing poverty alleviation schemes and TB control programme is essential. The understanding, reflection and knowledge of the key stakeholders during this participatory workshop provides recommendations for action, further planning and research on pro-poor TB centric interventions in the country.
Gao, Yuyan; Li, Li; Schwebel, David C.; Ning, Peishan; Cheng, Peixia
2018-01-01
Social medical insurance schemes are crucial for realizing universal health coverage and health equity. The aim of this study was to investigate whether and how reimbursement for injury-induced medical expenses is addressed in Chinese legislative documents relevant to social medical insurance. We retrieved legislative documents from the China National Knowledge Infrastructure and the Lawyee databases. Four types of social medical insurance schemes were included: urban employee basic medical insurance, urban resident basic medical insurance, new rural cooperative medical system, and urban and rural resident medical insurance. Text analyses were conducted on all identified legislative documents. As a result, one national law and 1,037 local legislative documents were identified. 1,012 of the 1,038 documents provided for reimbursement. Of the 1,012 documents, 828 (82%) provided reimbursement only for injuries without a legally responsible person/party or not caused by self-harm, alcohol use, drug use, or other law violations, and 162 (16%) did not include any details concerning implementation. Furthermore, 760 (92%) of the 828 did not provide an exception clause applying to injuries when a responsible person/party could not be contacted or for situations when the injured person cannot obtain reimbursement from the responsible person/party. Thus, most Chinese legislative documents related to social medical insurance do not provide reimbursement for medical expenses from injuries having a legally responsible person/party or those caused by illegal behaviors. We argue that all injury-induced medical expenses should be covered by legislative documents related to social medical insurance in China, no matter what the cause of the injury. Further research is needed to explore the acceptability and feasibility of such policy changes. PMID:29543913
A suggested color scheme for reducing perception-related accidents on construction work sites.
Yi, June-seong; Kim, Yong-woo; Kim, Ki-aeng; Koo, Bonsang
2012-09-01
Changes in workforce demographics have led to the need for more sophisticated approaches to addressing the safety requirements of the construction industry. Despite extensive research in other industry domains, the construction industry has been passive in exploring the impact of a color scheme; perception-related accidents have been effectively diminished by its implementation. The research demonstrated that the use of appropriate color schemes could improve the actions and psychology of workers on site, thereby increasing their perceptions of potentially dangerous situations. As a preliminary study, the objects selected by rigorous analysis on accident reports were workwear, safety net, gondola, scaffolding, and safety passage. The colors modified on site for temporary facilities were adopted from existing theoretical and empirical research that suggests the use of certain colors and their combinations to improve visibility and conspicuity while minimizing work fatigue. The color schemes were also tested and confirmed through two workshops with workers and managers currently involved in actual projects. The impacts of color schemes suggested in this paper are summarized as follows. First, the color schemes improve the conspicuity of facilities with other on site components, enabling workers to quickly discern and orient themselves in their work environment. Secondly, the color schemes have been selected to minimize the visual work fatigue and monotony that can potentially increase accidents. Copyright © 2011 Elsevier Ltd. All rights reserved.
Mashup Scheme Design of Map Tiles Using Lightweight Open Source Webgis Platform
NASA Astrophysics Data System (ADS)
Hu, T.; Fan, J.; He, H.; Qin, L.; Li, G.
2018-04-01
To address the difficulty involved when using existing commercial Geographic Information System platforms to integrate multi-source image data fusion, this research proposes the loading of multi-source local tile data based on CesiumJS and examines the tile data organization mechanisms and spatial reference differences of the CesiumJS platform, as well as various tile data sources, such as Google maps, Map World, and Bing maps. Two types of tile data loading schemes have been designed for the mashup of tiles, the single data source loading scheme and the multi-data source loading scheme. The multi-sources of digital map tiles used in this paper cover two different but mainstream spatial references, the WGS84 coordinate system and the Web Mercator coordinate system. According to the experimental results, the single data source loading scheme and the multi-data source loading scheme with the same spatial coordinate system showed favorable visualization effects; however, the multi-data source loading scheme was prone to lead to tile image deformation when loading multi-source tile data with different spatial references. The resulting method provides a low cost and highly flexible solution for small and medium-scale GIS programs and has a certain potential for practical application values. The problem of deformation during the transition of different spatial references is an important topic for further research.
Renormalization scheme dependence of high-order perturbative QCD predictions
NASA Astrophysics Data System (ADS)
Ma, Yang; Wu, Xing-Gang
2018-02-01
Conventionally, one adopts typical momentum flow of a physical observable as the renormalization scale for its perturbative QCD (pQCD) approximant. This simple treatment leads to renormalization scheme-and-scale ambiguities due to the renormalization scheme and scale dependence of the strong coupling and the perturbative coefficients do not exactly cancel at any fixed order. It is believed that those ambiguities will be softened by including more higher-order terms. In the paper, to show how the renormalization scheme dependence changes when more loop terms have been included, we discuss the sensitivity of pQCD prediction on the scheme parameters by using the scheme-dependent {βm ≥2}-terms. We adopt two four-loop examples, e+e-→hadrons and τ decays into hadrons, for detailed analysis. Our results show that under the conventional scale setting, by including more-and-more loop terms, the scheme dependence of the pQCD prediction cannot be reduced as efficiently as that of the scale dependence. Thus a proper scale-setting approach should be important to reduce the scheme dependence. We observe that the principle of minimum sensitivity could be such a scale-setting approach, which provides a practical way to achieve optimal scheme and scale by requiring the pQCD approximate be independent to the "unphysical" theoretical conventions.
Immunity-based detection, identification, and evaluation of aircraft sub-system failures
NASA Astrophysics Data System (ADS)
Moncayo, Hever Y.
This thesis describes the design, development, and flight-simulation testing of an integrated Artificial Immune System (AIS) for detection, identification, and evaluation of a wide variety of sensor, actuator, propulsion, and structural failures/damages including the prediction of the achievable states and other limitations on performance and handling qualities. The AIS scheme achieves high detection rate and low number of false alarms for all the failure categories considered. Data collected using a motion-based flight simulator are used to define the self for an extended sub-region of the flight envelope. The NASA IFCS F-15 research aircraft model is used and represents a supersonic fighter which include model following adaptive control laws based on non-linear dynamic inversion and artificial neural network augmentation. The flight simulation tests are designed to analyze and demonstrate the performance of the immunity-based aircraft failure detection, identification and evaluation (FDIE) scheme. A general robustness analysis is also presented by determining the achievable limits for a desired performance in the presence of atmospheric perturbations. For the purpose of this work, the integrated AIS scheme is implemented based on three main components. The first component performs the detection when one of the considered failures is present in the system. The second component consists in the identification of the failure category and the classification according to the failed element. During the third phase a general evaluation of the failure is performed with the estimation of the magnitude/severity of the failure and the prediction of its effect on reducing the flight envelope of the aircraft system. Solutions and alternatives to specific design issues of the AIS scheme, such as data clustering and empty space optimization, data fusion and duplication removal, definition of features, dimensionality reduction, and selection of cluster/detector shape are also analyzed in this thesis. They showed to have an important effect on detection performance and are a critical aspect when designing the configuration of the AIS. The results presented in this thesis show that the AIS paradigm addresses directly the complexity and multi-dimensionality associated with a damaged aircraft dynamic response and provides the tools necessary for a comprehensive/integrated solution to the FDIE problem. Excellent detection, identification, and evaluation performance has been recorded for all types of failures considered. The implementation of the proposed AIS-based scheme can potentially have a significant impact on the safety of aircraft operation. The output information obtained from the scheme will be useful to increase pilot situational awareness and determine automated compensation.
Multidimensional FEM-FCT schemes for arbitrary time stepping
NASA Astrophysics Data System (ADS)
Kuzmin, D.; Möller, M.; Turek, S.
2003-05-01
The flux-corrected-transport paradigm is generalized to finite-element schemes based on arbitrary time stepping. A conservative flux decomposition procedure is proposed for both convective and diffusive terms. Mathematical properties of positivity-preserving schemes are reviewed. A nonoscillatory low-order method is constructed by elimination of negative off-diagonal entries of the discrete transport operator. The linearization of source terms and extension to hyperbolic systems are discussed. Zalesak's multidimensional limiter is employed to switch between linear discretizations of high and low order. A rigorous proof of positivity is provided. The treatment of non-linearities and iterative solution of linear systems are addressed. The performance of the new algorithm is illustrated by numerical examples for the shock tube problem in one dimension and scalar transport equations in two dimensions.
Enhancing Community Detection By Affinity-based Edge Weighting Scheme
DOE Office of Scientific and Technical Information (OSTI.GOV)
Yoo, Andy; Sanders, Geoffrey; Henson, Van
Community detection refers to an important graph analytics problem of finding a set of densely-connected subgraphs in a graph and has gained a great deal of interest recently. The performance of current community detection algorithms is limited by an inherent constraint of unweighted graphs that offer very little information on their internal community structures. In this paper, we propose a new scheme to address this issue that weights the edges in a given graph based on recently proposed vertex affinity. The vertex affinity quantifies the proximity between two vertices in terms of their clustering strength, and therefore, it is idealmore » for graph analytics applications such as community detection. We also demonstrate that the affinity-based edge weighting scheme can improve the performance of community detection algorithms significantly.« less
Mi, Shichao; Han, Hui; Chen, Cailian; Yan, Jian; Guan, Xinping
2016-02-19
Heterogeneous wireless sensor networks (HWSNs) can achieve more tasks and prolong the network lifetime. However, they are vulnerable to attacks from the environment or malicious nodes. This paper is concerned with the issues of a consensus secure scheme in HWSNs consisting of two types of sensor nodes. Sensor nodes (SNs) have more computation power, while relay nodes (RNs) with low power can only transmit information for sensor nodes. To address the security issues of distributed estimation in HWSNs, we apply the heterogeneity of responsibilities between the two types of sensors and then propose a parameter adjusted-based consensus scheme (PACS) to mitigate the effect of the malicious node. Finally, the convergence property is proven to be guaranteed, and the simulation results validate the effectiveness and efficiency of PACS.
7 CFR 1450.11 - Scheme or device.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 7 Agriculture 10 2014-01-01 2014-01-01 false Scheme or device. 1450.11 Section 1450.11 Agriculture... § 1450.11 Scheme or device. (a) If CCC determines that a person or legal entity has employed a scheme or...) A scheme or device includes, but is not limited to, coercion, fraud, misrepresentation, depriving...
7 CFR 1450.11 - Scheme or device.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 7 Agriculture 10 2013-01-01 2013-01-01 false Scheme or device. 1450.11 Section 1450.11 Agriculture... § 1450.11 Scheme or device. (a) If CCC determines that a person or legal entity has employed a scheme or...) A scheme or device includes, but is not limited to, coercion, fraud, misrepresentation, depriving...
7 CFR 1450.11 - Scheme or device.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 7 Agriculture 10 2011-01-01 2011-01-01 false Scheme or device. 1450.11 Section 1450.11 Agriculture... § 1450.11 Scheme or device. (a) If CCC determines that a person or legal entity has employed a scheme or...) A scheme or device includes, but is not limited to, coercion, fraud, misrepresentation, depriving...
7 CFR 1450.11 - Scheme or device.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 7 Agriculture 10 2012-01-01 2012-01-01 false Scheme or device. 1450.11 Section 1450.11 Agriculture... § 1450.11 Scheme or device. (a) If CCC determines that a person or legal entity has employed a scheme or...) A scheme or device includes, but is not limited to, coercion, fraud, misrepresentation, depriving...
NASA Astrophysics Data System (ADS)
Zhang, Shuwen; Li, Haorui; Zhang, Weidong; Qiu, Chongjian; Li, Xin
2005-11-01
The paper investigates the ability to retrieve the true soil moisture profile by assimilating near-surface soil moisture into a soil moisture model with an ensemble Kaiman filter (EnKF) assimilation scheme, including the effect of ensemble size, update interval and nonlinearities in the profile retrieval, the required time for full retrieval of the soil moisture profiles, and the possible influence of the depth of the soil moisture observation. These questions are addressed by a desktop study using synthetic data. The “true” soil moisture profiles are generated from the soil moisture model under the boundary condition of 0.5 cm d-1 evaporation. To test the assimilation schemes, the model is initialized with a poor initial guess of the soil moisture profile, and different ensemble sizes are tested showing that an ensemble of 40 members is enough to represent the covariance of the model forecasts. Also compared are the results with those from the direct insertion assimilation scheme, showing that the EnKF is superior to the direct insertion assimilation scheme, for hourly observations, with retrieval of the soil moisture profile being achieved in 16 h as compared to 12 days or more. For daily observations, the true soil moisture profile is achieved in about 15 days with the EnKF, but it is impossible to approximate the true moisture within 18 days by using direct insertion. It is also found that observation depth does not have a significant effect on profile retrieval time for the EnKF. The nonlinearities have some negative influence on the optimal estimates of soil moisture profile but not very seriously.
Käser, Michael; Maure, Christine; Halpaap, Beatrice M M; Vahedi, Mahnaz; Yamaka, Sara; Launois, Pascal; Casamitjana, Núria
2016-05-01
Between August 2012 and April 2013 the Career Development Fellowship programme of the Special Programme for Research and Training in Tropical Diseases (World Health Organization) underwent an external evaluation to assess its past performance and determine recommendations for future programme development and continuous performance improvement. The programme provides a year-long training experience for qualified researchers from low and middle income countries at pharmaceutical companies or product development partnerships. Independent evaluators from the Swiss Tropical and Public Health Institute and the Barcelona Institute for Global Health used a results-based methodology to review the programme. Data were gathered through document review, surveys, and interviews with a range of programme participants. The final evaluation report found the Career Development Fellowship to be relevant to organizers' and programme objectives, efficient in its operations, and effective in its training scheme, which was found to address needs and gaps for both fellows and their home institutions. Evaluators found that the programme has the potential for impact and sustainability beyond the programme period, especially with the successful reintegration of fellows into their home institutions, through which newly-developed skills can be shared at the institutional level. Recommendations included the development of a scheme to support the re-integration of fellows into their home institutions post-fellowship and to seek partnerships to facilitate the scaling-up of the programme. The impact of the Professional Membership Scheme, an online professional development tool launched through the programme, beyond the scope of the Career Development Fellowship programme itself to other applications, has been identified as a positive unintended outcome. The results of this evaluation may be of interest for other efforts in the field of research capacity strengthening in LMICs or, generally, to other professional development schemes of a similar structure.
Designing Adaptive Low-Dissipative High Order Schemes for Long-Time Integrations. Chapter 1
NASA Technical Reports Server (NTRS)
Yee, Helen C.; Sjoegreen, B.; Mansour, Nagi N. (Technical Monitor)
2001-01-01
A general framework for the design of adaptive low-dissipative high order schemes is presented. It encompasses a rather complete treatment of the numerical approach based on four integrated design criteria: (1) For stability considerations, condition the governing equations before the application of the appropriate numerical scheme whenever it is possible; (2) For consistency, compatible schemes that possess stability properties, including physical and numerical boundary condition treatments, similar to those of the discrete analogue of the continuum are preferred; (3) For the minimization of numerical dissipation contamination, efficient and adaptive numerical dissipation control to further improve nonlinear stability and accuracy should be used; and (4) For practical considerations, the numerical approach should be efficient and applicable to general geometries, and an efficient and reliable dynamic grid adaptation should be used if necessary. These design criteria are, in general, very useful to a wide spectrum of flow simulations. However, the demand on the overall numerical approach for nonlinear stability and accuracy is much more stringent for long-time integration of complex multiscale viscous shock/shear/turbulence/acoustics interactions and numerical combustion. Robust classical numerical methods for less complex flow physics are not suitable or practical for such applications. The present approach is designed expressly to address such flow problems, especially unsteady flows. The minimization of employing very fine grids to overcome the production of spurious numerical solutions and/or instability due to under-resolved grids is also sought. The incremental studies to illustrate the performance of the approach are summarized. Extensive testing and full implementation of the approach is forthcoming. The results shown so far are very encouraging.
NASA Astrophysics Data System (ADS)
Lee, El-Hang; Lee, Seung-Gol; O, Beom Hoan; Park, Se Geun
2004-08-01
Scientific and technological issues and considerations regarding the integration of miniaturized microphotonic devices, circuits and systems in micron, submicron, and quantum scale, are presented. First, we examine the issues regarding the miniaturization of photonic devices including the size effect, proximity effect, energy confinement effect, microcavity effect, optical and quantum interference effect, high field effect, nonlinear effect, noise effect, quantum optical effect, and chaotic effect. Secondly, we examine the issues regarding the interconnection including the optical alignment, minimizing the interconnection losses, and maintaining optical modes. Thirdly, we address the issues regarding the two-dimensional or three-dimensional integration either in a hybrid format or in a monolithic format between active devices and passive devices of varying functions. We find that the concept of optical printed circuit board (O-PCB) that we propose is highly attractive as a platform for micro/nano/quantum-scale photonic integration. We examine the technological issues to be addressed in the process of fabrication, characterization, and packaging for actual implementation of the miniaturization, interconnection and integration. Devices that we have used for our study include: mode conversion schemes, micro-ring and micro-racetrack resonator devices, multimode interference devices, lasers, vertical cavity surface emitting microlasers, and their arrays. Future prospects are also discussed.
On the Conservation and Convergence to Weak Solutions of Global Schemes
NASA Technical Reports Server (NTRS)
Carpenter, Mark H.; Gottlieb, David; Shu, Chi-Wang
2001-01-01
In this paper we discuss the issue of conservation and convergence to weak solutions of several global schemes, including the commonly used compact schemes and spectral collocation schemes, for solving hyperbolic conservation laws. It is shown that such schemes, if convergent boundedly almost everywhere, will converge to weak solutions. The results are extensions of the classical Lax-Wendroff theorem concerning conservative schemes.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Yan, Rui; Praggastis, Brenda L.; Smith, William P.
While streaming data have become increasingly more popular in business and research communities, semantic models and processing software for streaming data have not kept pace. Traditional semantic solutions have not addressed transient data streams. Semantic web languages (e.g., RDF, OWL) have typically addressed static data settings and linked data approaches have predominantly addressed static or growing data repositories. Streaming data settings have some fundamental differences; in particular, data are consumed on the fly and data may expire. Stream reasoning, a combination of stream processing and semantic reasoning, has emerged with the vision of providing "smart" processing of streaming data. C-SPARQLmore » is a prominent stream reasoning system that handles semantic (RDF) data streams. Many stream reasoning systems including C-SPARQL use a sliding window and use data arrival time to evict data. For data streams that include expiration times, a simple arrival time scheme is inadequate if the window size does not match the expiration period. In this paper, we propose a cache-enabled, order-aware, ontology-based stream reasoning framework. This framework consumes RDF streams with expiration timestamps assigned by the streaming source. Our framework utilizes both arrival and expiration timestamps in its cache eviction policies. In addition, we introduce the notion of "semantic importance" which aims to address the relevance of data to the expected reasoning, thus enabling the eviction algorithms to be more context- and reasoning-aware when choosing what data to maintain for question answering. We evaluate this framework by implementing three different prototypes and utilizing five metrics. The trade-offs of deploying the proposed framework are also discussed.« less
Zand, Pouria; Dilo, Arta; Havinga, Paul
2013-06-27
Current wireless technologies for industrial applications, such as WirelessHART and ISA100.11a, use a centralized management approach where a central network manager handles the requirements of the static network. However, such a centralized approach has several drawbacks. For example, it cannot cope with dynamicity/disturbance in large-scale networks in a real-time manner and it incurs a high communication overhead and latency for exchanging management traffic. In this paper, we therefore propose a distributed network management scheme, D-MSR. It enables the network devices to join the network, schedule their communications, establish end-to-end connections by reserving the communication resources for addressing real-time requirements, and cope with network dynamicity (e.g., node/edge failures) in a distributed manner. According to our knowledge, this is the first distributed management scheme based on IEEE 802.15.4e standard, which guides the nodes in different phases from joining until publishing their sensor data in the network. We demonstrate via simulation that D-MSR can address real-time and reliable communication as well as the high throughput requirements of industrial automation wireless networks, while also achieving higher efficiency in network management than WirelessHART, in terms of delay and overhead.
Zand, Pouria; Dilo, Arta; Havinga, Paul
2013-01-01
Current wireless technologies for industrial applications, such as WirelessHART and ISA100.11a, use a centralized management approach where a central network manager handles the requirements of the static network. However, such a centralized approach has several drawbacks. For example, it cannot cope with dynamicity/disturbance in large-scale networks in a real-time manner and it incurs a high communication overhead and latency for exchanging management traffic. In this paper, we therefore propose a distributed network management scheme, D-MSR. It enables the network devices to join the network, schedule their communications, establish end-to-end connections by reserving the communication resources for addressing real-time requirements, and cope with network dynamicity (e.g., node/edge failures) in a distributed manner. According to our knowledge, this is the first distributed management scheme based on IEEE 802.15.4e standard, which guides the nodes in different phases from joining until publishing their sensor data in the network. We demonstrate via simulation that D-MSR can address real-time and reliable communication as well as the high throughput requirements of industrial automation wireless networks, while also achieving higher efficiency in network management than WirelessHART, in terms of delay and overhead. PMID:23807687
Optical burst switching for the next generation Optical Internet
NASA Astrophysics Data System (ADS)
Yoo, Myungsik
2000-11-01
In recent years, Internet Protocol (IP) over Wavelength Division Multiplexing (WDM) networks for the next generation Internet (or the so-called Optical Internet) have received enormous attention. There are two main drivers for an Optical Internet. One is the explosion of Internet traffic, which seems to keep growing exponentially. The other driver is the rapid advance in the WDM optical networking technology. In this study, key issues in the optical (WDM) layer will be investigated. As a novel switching paradigm for Optical Internet, Optical Burst Switching (OBS) is discussed. By leveraging the attractive properties of optical communications and at the same time, taking into account its limitations, OBS can combine the best of optical circuit-switching and packet/cell switching. The general concept of JET-based OBS protocol is described, including offset time and delayed reservation. In the next generation Optical Internet, one must address how to support Quality of Service (QoS) at the WDM layer since current IP provides only best effort services. The offset-time- based QoS scheme is proposed as a way of supporting QoS at the WDM layer. Unlike existing QoS schemes, offset- time-based QoS scheme does not mandate the use of buffer to differentiate services. For the bufferless WDM switch, the performance of offset- time-based QoS scheme is evaluated in term of blocking probability. In addition, the extra offset time required for class isolation is quantified and the theoretical bounds on blocking probability are analyzed. The offset-time-based scheme is applied to WDM switch with limited fiber delay line (FDL) buffer. We evaluate the effect of having a FDL buffer on the QoS performance of the offset-time-based scheme in terms of the loss probability and queuing delay of bursts. Finally, in order to dimension the network resources in Optical Internet backbone networks, the performance of the offset-time-based QoS scheme is evaluated for the multi-hop case. In particular, we consider very high performance Backbone Network Service (vBNS) backbone network. Various policies such as drop, retransmission, deflection routing and buffering are considered for performance evaluation. The performance results obtained under these policies are compared to decide the most efficient policy for the WDM backbone network.
Vora, Kranti Suresh; Koblinsky, Sally A; Koblinsky, Marge A
2015-07-31
India leads all nations in numbers of maternal deaths, with poor, rural women contributing disproportionately to the high maternal mortality ratio. In 2005, India launched the world's largest conditional cash transfer scheme, Janani Suraksha Yojana (JSY), to increase poor women's access to institutional delivery, anticipating that facility-based birthing would decrease deaths. Indian states have taken different approaches to implementing JSY. Tamil Nadu adopted JSY with a reorganization of its public health system, and Gujarat augmented JSY with the state-funded Chiranjeevi Yojana (CY) scheme, contracting with private physicians for delivery services. Given scarce evidence of the outcomes of these approaches, especially in states with more optimal health indicators, this cross-sectional study examined the role of JSY/CY and other healthcare system and social factors in predicting poor, rural women's use of maternal health services in Gujarat and Tamil Nadu. Using the District Level Household Survey (DLHS)-3, the sample included 1584 Gujarati and 601 Tamil rural women in the lowest two wealth quintiles. Multivariate logistic regression analyses examined associations between JSY/CY and other salient health system, socio-demographic, and obstetric factors with three outcomes: adequate antenatal care, institutional delivery, and Cesarean-section. Tamil women reported greater use of maternal healthcare services than Gujarati women. JSY/CY participation predicted institutional delivery in Gujarat (AOR = 3.9), but JSY assistance failed to predict institutional delivery in Tamil Nadu, where mothers received some cash for home births under another scheme. JSY/CY assistance failed to predict adequate antenatal care, which was not incentivized. All-weather road access predicted institutional delivery in both Tamil Nadu (AOR = 3.4) and Gujarat (AOR = 1.4). Women's education predicted institutional delivery and Cesarean-section in Tamil Nadu, while husbands' education predicted institutional delivery in Gujarat. Overall, assistance from health financing schemes, good road access to health facilities, and socio-demographic and obstetric factors were associated with differential use of maternity health services by poor, rural women in the two states. Policymakers and practitioners should promote financing schemes to increase access, including consideration of incentives for antenatal care, and address health system and social factors in designing state-level interventions to promote safe motherhood.
Hybrid architecture for building secure sensor networks
NASA Astrophysics Data System (ADS)
Owens, Ken R., Jr.; Watkins, Steve E.
2012-04-01
Sensor networks have various communication and security architectural concerns. Three approaches are defined to address these concerns for sensor networks. The first area is the utilization of new computing architectures that leverage embedded virtualization software on the sensor. Deploying a small, embedded virtualization operating system on the sensor nodes that is designed to communicate to low-cost cloud computing infrastructure in the network is the foundation to delivering low-cost, secure sensor networks. The second area focuses on securing the sensor. Sensor security components include developing an identification scheme, and leveraging authentication algorithms and protocols that address security assurance within the physical, communication network, and application layers. This function will primarily be accomplished through encrypting the communication channel and integrating sensor network firewall and intrusion detection/prevention components to the sensor network architecture. Hence, sensor networks will be able to maintain high levels of security. The third area addresses the real-time and high priority nature of the data that sensor networks collect. This function requires that a quality-of-service (QoS) definition and algorithm be developed for delivering the right data at the right time. A hybrid architecture is proposed that combines software and hardware features to handle network traffic with diverse QoS requirements.
Calculating with light using a chip-scale all-optical abacus.
Feldmann, J; Stegmaier, M; Gruhler, N; Ríos, C; Bhaskaran, H; Wright, C D; Pernice, W H P
2017-11-02
Machines that simultaneously process and store multistate data at one and the same location can provide a new class of fast, powerful and efficient general-purpose computers. We demonstrate the central element of an all-optical calculator, a photonic abacus, which provides multistate compute-and-store operation by integrating functional phase-change materials with nanophotonic chips. With picosecond optical pulses we perform the fundamental arithmetic operations of addition, subtraction, multiplication, and division, including a carryover into multiple cells. This basic processing unit is embedded into a scalable phase-change photonic network and addressed optically through a two-pulse random access scheme. Our framework provides first steps towards light-based non-von Neumann arithmetic.
Modeling of high speed chemically reacting flow-fields
NASA Technical Reports Server (NTRS)
Drummond, J. P.; Carpenter, Mark H.; Kamath, H.
1989-01-01
The SPARK3D and SPARK3D-PNS computer programs were developed to model 3-D supersonic, chemically reacting flow-fields. The SPARK3D code is a full Navier-Stokes solver, and is suitable for use in scramjet combustors and other regions where recirculation may be present. The SPARK3D-PNS is a parabolized Navier-Stokes solver and provides an efficient means of calculating steady-state combustor far-fields and nozzles. Each code has a generalized chemistry package, making modeling of any chemically reacting flow possible. Research activities by the Langley group range from addressing fundamental theoretical issues to simulating problems of practical importance. Algorithmic development includes work on higher order and upwind spatial difference schemes. Direct numerical simulations employ these algorithms to address the fundamental issues of flow stability and transition, and the chemical reaction of supersonic mixing layers and jets. It is believed that this work will lend greater insight into phenomenological model development for simulating supersonic chemically reacting flows in practical combustors. Currently, the SPARK3D and SPARK3D-PNS codes are used to study problems of engineering interest, including various injector designs and 3-D combustor-nozzle configurations. Examples, which demonstrate the capabilities of each code are presented.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-01
... FAA-approved repair scheme/modification and incorporate the repair scheme/ modification. Due to FAA policy, the repair scheme/modification for crack damage must include an immediate repair of the crack. The repair scheme cannot be by repetitive inspection only. The repair scheme/modification may...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-09
... FAA-approved repair scheme/modification and incorporate the repair scheme/ modification. Due to FAA policy, the repair scheme/modification for crack damage must include an immediate repair of the crack. The repair scheme cannot be by repetitive inspection only. The repair scheme/modification may...
NASA Technical Reports Server (NTRS)
Yee, H. C.; Sjogreen, B.; Sandham, N. D.; Hadjadj, A.; Kwak, Dochan (Technical Monitor)
2000-01-01
In a series of papers, Olsson (1994, 1995), Olsson & Oliger (1994), Strand (1994), Gerritsen Olsson (1996), Yee et al. (1999a,b, 2000) and Sandham & Yee (2000), the issue of nonlinear stability of the compressible Euler and Navier-Stokes Equations, including physical boundaries, and the corresponding development of the discrete analogue of nonlinear stable high order schemes, including boundary schemes, were developed, extended and evaluated for various fluid flows. High order here refers to spatial schemes that are essentially fourth-order or higher away from shock and shear regions. The objective of this paper is to give an overview of the progress of the low dissipative high order shock-capturing schemes proposed by Yee et al. (1999a,b, 2000). This class of schemes consists of simple non-dissipative high order compact or non-compact central spatial differencings and adaptive nonlinear numerical dissipation operators to minimize the use of numerical dissipation. The amount of numerical dissipation is further minimized by applying the scheme to the entropy splitting form of the inviscid flux derivatives, and by rewriting the viscous terms to minimize odd-even decoupling before the application of the central scheme (Sandham & Yee). The efficiency and accuracy of these scheme are compared with spectral, TVD and fifth- order WENO schemes. A new approach of Sjogreen & Yee (2000) utilizing non-orthogonal multi-resolution wavelet basis functions as sensors to dynamically determine the appropriate amount of numerical dissipation to be added to the non-dissipative high order spatial scheme at each grid point will be discussed. Numerical experiments of long time integration of smooth flows, shock-turbulence interactions, direct numerical simulations of a 3-D compressible turbulent plane channel flow, and various mixing layer problems indicate that these schemes are especially suitable for practical complex problems in nonlinear aeroacoustics, rotorcraft dynamics, direct numerical simulation or large eddy simulation of compressible turbulent flows at various speeds including high-speed shock-turbulence interactions, and general long time wave propagation problems. These schemes, including entropy splitting, have also been extended to freestream preserving schemes on curvilinear moving grids for a thermally perfect gas (Vinokur & Yee 2000).
National mental health programme: Manpower development scheme of eleventh five-year plan.
Sinha, Suman K; Kaur, Jagdish
2011-07-01
Mental disorders impose a massive burden in the society. The National Mental Health Programme (NMHP) is being implemented by the Government of India to support state governments in providing mental health services in the country. India is facing shortage of qualified mental health manpower for District Mental Health Programme (DMHP) in particular and for the whole mental health sector in general. Recognizing this key constraint Government of India has formulated manpower development schemes under NMHP to address this issue. Under the scheme 11 centers of excellence in mental health, 120 PG departments in mental health specialties, upgradation of psychiatric wings of medical colleges, modernization of state-run mental hospitals will be supported. The expected outcome of the Manpower Development schemes is 104 psychiatrists, 416 clinical psychologists, 416 PSWs and 820 psychiatric nurses annually once these institutes/ departments are established. Together with other components such as DMHP with added services, Information, education and communication activities, NGO component, dedicated monitoring mechanism, research and training, this scheme has the potential to make a facelift of the mental health sector in the country which is essentially dependent on the availability and equitable distribution mental health manpower in the country.
Efficient Network Coding-Based Loss Recovery for Reliable Multicast in Wireless Networks
NASA Astrophysics Data System (ADS)
Chi, Kaikai; Jiang, Xiaohong; Ye, Baoliu; Horiguchi, Susumu
Recently, network coding has been applied to the loss recovery of reliable multicast in wireless networks [19], where multiple lost packets are XOR-ed together as one packet and forwarded via single retransmission, resulting in a significant reduction of bandwidth consumption. In this paper, we first prove that maximizing the number of lost packets for XOR-ing, which is the key part of the available network coding-based reliable multicast schemes, is actually a complex NP-complete problem. To address this limitation, we then propose an efficient heuristic algorithm for finding an approximately optimal solution of this optimization problem. Furthermore, we show that the packet coding principle of maximizing the number of lost packets for XOR-ing sometimes cannot fully exploit the potential coding opportunities, and we then further propose new heuristic-based schemes with a new coding principle. Simulation results demonstrate that the heuristic-based schemes have very low computational complexity and can achieve almost the same transmission efficiency as the current coding-based high-complexity schemes. Furthermore, the heuristic-based schemes with the new coding principle not only have very low complexity, but also slightly outperform the current high-complexity ones.
Competency based advanced training in Intellectual Disability Psychiatry: a NSW prototype.
Johnson, Keith; Bowden, Michael; Coyne, David; Trollor, Julian
2013-08-01
This paper describes a competency based advanced training year in adult Intellectual Disability Psychiatry enabled through a partnership between disability and mental health sectors. This training experience could be viewed as a prototype for further specialised training schemes in Intellectual Disability Psychiatry, and has relevance for the implementation of competency based psychiatric training schemes in Australia. The need for a specific training curriculum in Intellectual Disability Psychiatry is outlined with reference to epidemiological evidence and human rights. The formulation of the training programme and the training experience itself is described and evaluated. Conclusions on the implications of this experience for the future competency based training schemes are drawn. Building a skilled workforce is necessary to address the significant inequalities in mental health experienced by people with intellectual and developmental disabilities. A significant initial step for this would be the development of a specialised training curriculum. Service provision for this population is scattered across many disciplines and organisations with historically little mutual cooperation. Additionally, proposed competency-based training schemes stipulate that a medical expert develops a wide skill set across multiple domains. Thus, formal cross sector collaboration is fundamental for any competency based training scheme to be feasible.
National mental health programme: Manpower development scheme of eleventh five-year plan
Sinha, Suman K.; Kaur, Jagdish
2011-01-01
Mental disorders impose a massive burden in the society. The National Mental Health Programme (NMHP) is being implemented by the Government of India to support state governments in providing mental health services in the country. India is facing shortage of qualified mental health manpower for District Mental Health Programme (DMHP) in particular and for the whole mental health sector in general. Recognizing this key constraint Government of India has formulated manpower development schemes under NMHP to address this issue. Under the scheme 11 centers of excellence in mental health, 120 PG departments in mental health specialties, upgradation of psychiatric wings of medical colleges, modernization of state-run mental hospitals will be supported. The expected outcome of the Manpower Development schemes is 104 psychiatrists, 416 clinical psychologists, 416 PSWs and 820 psychiatric nurses annually once these institutes/ departments are established. Together with other components such as DMHP with added services, Information, education and communication activities, NGO component, dedicated monitoring mechanism, research and training, this scheme has the potential to make a facelift of the mental health sector in the country which is essentially dependent on the availability and equitable distribution mental health manpower in the country. PMID:22135448
Cruza, Norberto Sotelo; Fierros, Luis E
2006-01-01
The present study was done at the internal medicine service oft he Hospital lnfantil in the State of Sonora, Mexico. We tried to address the question of the use of conceptual schemes and mind maps and its impact on the teaching-learning-evaluation process among medical residents. Analyze the effects of conceptual schemes, and mind maps as a teaching and evaluation tool and compare them with multiple choice exams among Pediatric residents. Twenty two residents (RI, RII, RIII)on service rotation during six months were assessed initially, followed by a lecture on a medical subject. Conceptual schemes and mind maps were then introduced as a teaching-learning-evaluation instrument. Comprehension impact and comparison with a standard multiple choice evaluation was done. The statistical package (JMP version 5, SAS inst. 2004) was used. We noted that when we used conceptual schemes and mind mapping, learning improvement was noticeable among the three groups of residents (P < 0.001) and constitutes a better evaluation tool when compared with multiple choice exams (P < 0.0005). Based on our experience we recommend the use of this educational technique for medical residents in training.
Towards a Low-Cost Remote Memory Attestation for the Smart Grid
Yang, Xinyu; He, Xiaofei; Yu, Wei; Lin, Jie; Li, Rui; Yang, Qingyu; Song, Houbing
2015-01-01
In the smart grid, measurement devices may be compromised by adversaries, and their operations could be disrupted by attacks. A number of schemes to efficiently and accurately detect these compromised devices remotely have been proposed. Nonetheless, most of the existing schemes detecting compromised devices depend on the incremental response time in the attestation process, which are sensitive to data transmission delay and lead to high computation and network overhead. To address the issue, in this paper, we propose a low-cost remote memory attestation scheme (LRMA), which can efficiently and accurately detect compromised smart meters considering real-time network delay and achieve low computation and network overhead. In LRMA, the impact of real-time network delay on detecting compromised nodes can be eliminated via investigating the time differences reported from relay nodes. Furthermore, the attestation frequency in LRMA is dynamically adjusted with the compromised probability of each node, and then, the total number of attestations could be reduced while low computation and network overhead can be achieved. Through a combination of extensive theoretical analysis and evaluations, our data demonstrate that our proposed scheme can achieve better detection capacity and lower computation and network overhead in comparison to existing schemes. PMID:26307998
Towards a Low-Cost Remote Memory Attestation for the Smart Grid.
Yang, Xinyu; He, Xiaofei; Yu, Wei; Lin, Jie; Li, Rui; Yang, Qingyu; Song, Houbing
2015-08-21
In the smart grid, measurement devices may be compromised by adversaries, and their operations could be disrupted by attacks. A number of schemes to efficiently and accurately detect these compromised devices remotely have been proposed. Nonetheless, most of the existing schemes detecting compromised devices depend on the incremental response time in the attestation process, which are sensitive to data transmission delay and lead to high computation and network overhead. To address the issue, in this paper, we propose a low-cost remote memory attestation scheme (LRMA), which can efficiently and accurately detect compromised smart meters considering real-time network delay and achieve low computation and network overhead. In LRMA, the impact of real-time network delay on detecting compromised nodes can be eliminated via investigating the time differences reported from relay nodes. Furthermore, the attestation frequency in LRMA is dynamically adjusted with the compromised probability of each node, and then, the total number of attestations could be reduced while low computation and network overhead can be achieved. Through a combination of extensive theoretical analysis and evaluations, our data demonstrate that our proposed scheme can achieve better detection capacity and lower computation and network overhead in comparison to existing schemes.
ECG compression using non-recursive wavelet transform with quality control
NASA Astrophysics Data System (ADS)
Liu, Je-Hung; Hung, King-Chu; Wu, Tsung-Ching
2016-09-01
While wavelet-based electrocardiogram (ECG) data compression using scalar quantisation (SQ) yields excellent compression performance, a wavelet's SQ scheme, however, must select a set of multilevel quantisers for each quantisation process. As a result of the properties of multiple-to-one mapping, however, this scheme is not conducive for reconstruction error control. In order to address this problem, this paper presents a single-variable control SQ scheme able to guarantee the reconstruction quality of wavelet-based ECG data compression. Based on the reversible round-off non-recursive discrete periodised wavelet transform (RRO-NRDPWT), the SQ scheme is derived with a three-stage design process that first uses genetic algorithm (GA) for high compression ratio (CR), followed by a quadratic curve fitting for linear distortion control, and the third uses a fuzzy decision-making for minimising data dependency effect and selecting the optimal SQ. The two databases, Physikalisch-Technische Bundesanstalt (PTB) and Massachusetts Institute of Technology (MIT) arrhythmia, are used to evaluate quality control performance. Experimental results show that the design method guarantees a high compression performance SQ scheme with statistically linear distortion. This property can be independent of training data and can facilitate rapid error control.
Consensus-based distributed cooperative learning from closed-loop neural control systems.
Chen, Weisheng; Hua, Shaoyong; Zhang, Huaguang
2015-02-01
In this paper, the neural tracking problem is addressed for a group of uncertain nonlinear systems where the system structures are identical but the reference signals are different. This paper focuses on studying the learning capability of neural networks (NNs) during the control process. First, we propose a novel control scheme called distributed cooperative learning (DCL) control scheme, by establishing the communication topology among adaptive laws of NN weights to share their learned knowledge online. It is further proved that if the communication topology is undirected and connected, all estimated weights of NNs can converge to small neighborhoods around their optimal values over a domain consisting of the union of all state orbits. Second, as a corollary it is shown that the conclusion on the deterministic learning still holds in the decentralized adaptive neural control scheme where, however, the estimated weights of NNs just converge to small neighborhoods of the optimal values along their own state orbits. Thus, the learned controllers obtained by DCL scheme have the better generalization capability than ones obtained by decentralized learning method. A simulation example is provided to verify the effectiveness and advantages of the control schemes proposed in this paper.
Adewole, David A.; Adebayo, Ayodeji M.; Udeh, Emeka I.; Shaahu, Vivian N.; Dairo, Magbagbeola D.
2015-01-01
Health insurance coverage of the informal sector is a challenge in Nigeria. This study assessed the methods of payment for health care and awareness about the National Health Insurance Scheme (NHIS) among members of selected households in a rural area in the southwest of Nigeria. Using a multistage sampling technique, a semi-structured, pretested interviewer-administered questionnaire was used to collect data from 345 households. The majority of the people still pay for health care by out-of-pocket (OOP) method. Awareness about the NHIS in Nigeria was poor, but attitude to it was encouraging; and from the responses obtained, the people implied that they were willing to enroll in the scheme if the opportunity is offered. However, lack of trust in government social policies, religious belief, and poverty were some of the factors that might impede the implementation and expansion of the NHIS in the informal sector. Stakeholders should promote socioculturally appropriate awareness program about the NHIS and its benefits. Factors that might present challenges to the scheme should be adequately addressed by the government and other stakeholders associated with prepayment schemes in Nigeria. PMID:26195464
Adewole, David A; Adebayo, Ayodeji M; Udeh, Emeka I; Shaahu, Vivian N; Dairo, Magbagbeola D
2015-09-01
Health insurance coverage of the informal sector is a challenge in Nigeria. This study assessed the methods of payment for health care and awareness about the National Health Insurance Scheme (NHIS) among members of selected households in a rural area in the southwest of Nigeria. Using a multistage sampling technique, a semi-structured, pretested interviewer-administered questionnaire was used to collect data from 345 households. The majority of the people still pay for health care by out-of-pocket (OOP) method. Awareness about the NHIS in Nigeria was poor, but attitude to it was encouraging; and from the responses obtained, the people implied that they were willing to enroll in the scheme if the opportunity is offered. However, lack of trust in government social policies, religious belief, and poverty were some of the factors that might impede the implementation and expansion of the NHIS in the informal sector. Stakeholders should promote socioculturally appropriate awareness program about the NHIS and its benefits. Factors that might present challenges to the scheme should be adequately addressed by the government and other stakeholders associated with prepayment schemes in Nigeria. © The American Society of Tropical Medicine and Hygiene.
NASA Astrophysics Data System (ADS)
Jiang, Jiamin; Younis, Rami M.
2017-10-01
In the presence of counter-current flow, nonlinear convergence problems may arise in implicit time-stepping when the popular phase-potential upwinding (PPU) scheme is used. The PPU numerical flux is non-differentiable across the co-current/counter-current flow regimes. This may lead to cycles or divergence in the Newton iterations. Recently proposed methods address improved smoothness of the numerical flux. The objective of this work is to devise and analyze an alternative numerical flux scheme called C1-PPU that, in addition to improving smoothness with respect to saturations and phase potentials, also improves the level of scalar nonlinearity and accuracy. C1-PPU involves a novel use of the flux limiter concept from the context of high-resolution methods, and allows a smooth variation between the co-current/counter-current flow regimes. The scheme is general and applies to fully coupled flow and transport formulations with an arbitrary number of phases. We analyze the consistency property of the C1-PPU scheme, and derive saturation and pressure estimates, which are used to prove the solution existence. Several numerical examples for two- and three-phase flows in heterogeneous and multi-dimensional reservoirs are presented. The proposed scheme is compared to the conventional PPU and the recently proposed Hybrid Upwinding schemes. We investigate three properties of these numerical fluxes: smoothness, nonlinearity, and accuracy. The results indicate that in addition to smoothness, nonlinearity may also be critical for convergence behavior and thus needs to be considered in the design of an efficient numerical flux scheme. Moreover, the numerical examples show that the C1-PPU scheme exhibits superior convergence properties for large time steps compared to the other alternatives.
Rao, M; Ramachandra, S S; Bandyopadhyay, S; Chandran, A; Shidhaye, R; Tamisettynarayana, S; Thippaiah, A; Sitamma, M; Sunil George, M; Singh, V; Sivasankaran, S; Bangdiwala, S I
2011-01-01
Families living below the poverty line in countries which do not have universal healthcare coverage are drawn into indebtedness and bankruptcy. The state of Andhra Pradesh in India established the Rajiv Aarogyasri Community Health Insurance Scheme (RACHIS) in 2007 with the aim of breaking this cycle by improving the access of below the poverty line (BPL) families to secondary and tertiary healthcare. It covered a wide range of surgical and medical treatments for serious illnesses requiring specialist healthcare resources not always available at district-level government hospitals. The impact of this scheme was evaluated by a rapid assessment, commissioned by the government of Andhra Pradesh. The aim of the assessment was to explore the contribution of the scheme to the reduction of catastrophic health expenditure among the poor and to recommend ways by which delivery of the scheme could be improved. We report the findings of this assessment. Two types of data were used for the assessment. Patient data pertaining to 89 699 treatment requests approved by the scheme during its first 18 months were examined. Second, surveys of scheme beneficiaries and providers were undertaken in 6 randomly selected districts of Andhra Pradesh. This novel scheme was beginning to reach the BPL households in the state and providing access to free secondary and tertiary healthcare to seriously ill poor people. An integrated model encompassing primary, secondary and tertiary care would be of greater benefit to families below the poverty line and more cost-effective for the government. There is considerable potential for the government to build on this successful start and to strengthen equity of access and the quality of care provided by the scheme. Copyright 2011, NMJI.
OCLC Participating Institutions: Arranged by Network and Subarranged by Institution Name.
ERIC Educational Resources Information Center
OCLC Online Computer Library Center, Inc., Dublin, OH.
This directory of institutions participating in the Ohio College Library Center (OCLC) presents the following information for each: assigned OCLC symbol, institution name and address, affiliated network, classification scheme in use, and identification symbol assigned by Library of Congress. (SC)
Pharmacogenetic tests: the need for a level playing field.
Pirmohamed, Munir; Hughes, Dyfrig A
2013-01-01
The delivery of more personalized medicinecould be accelerated by addressing the substantial differences in the level of evidence required for the inclusion of pharmacogenetic tests in treatment guidelines, drug labelling and reimbursement schemes compared with that needed for non-genetic diagnostic tests.
Muenchberger, Heidi; Ehrlich, Carolyn; Parekh, Sanjoti; Crozier, Michelle
2016-01-01
To investigate the role of philanthropic micro-grants (maximum of $10,000) in the provision of aids and equipment for adults (aged 18-65 years of age) with complex disabilities and examine key trends in aids and equipment requests. This study examined, through quantitative and qualitative analysis, aids and equipment requests (n = 371 individual applications as represented by 136 service organisations in three Australian states) received by a not-for-profit (NFP) organisation across five consecutive years of an innovative micro-grants scheme. Findings highlight that living situation (living with family or living independently) significantly influences the nature of requests for respite, aids, equipment and home modifications. Specifically, people with complex disabilities living with their families require greater combined service provision (higher equipment need, respite support, home modifications) than those living independently (equipment need only). Type of disability did not influence request type. Qualitative data further indicated the "last resort" nature of respite requests, particularly for younger applicants (under 45 years of age) indicating critical unmet needs in the community. Results demonstrate the vital role of NFP organisations and philanthropic funds in supporting daily lifestyle aids and equipment (including respite) that might otherwise not be funded for people with complex disabilities. Although preliminary in its scope and prior to implementation of a National Disability Insurance Scheme (NDIS) in Australia, findings suggest both opportunity and risk to the uptake of community-based micro-grant funding: opportunity for users through the provision of essential aids and lifestyle supports, and risk through over-subscription and devolving of responsibility for critical support resources from public sector. The aids and equipment needs of adults under the age of 65 appear to have been underestimated, poorly defined and under-serviced. Service users need more assistance for their carers (i.e. equipment to facilitate safe lifting, urgent breaks from care routines) as well as aids, equipment and modifications to help them to live a more normal life (e.g. going to the beach). Living situation (i.e. independently or with family) significantly influences the nature and extent of aids and equipment requested. Supporting adults up to the age of 65 to live more independently would positively influence carers and family, while at the same time providing opportunities for more targeted personal care supports. Philanthropic and not-for-profit schemes are helping to address these needs through micro-grant schemes for purchases under $10 000, but sustainability is questioned. The introduction of Australia's National Disability Insurance Scheme (NDIS) presents an opportunity to consider the lifestyle needs of service users and carers, and determine who is best placed to address them.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Suzuki, Shigenari; Department of Electronics and Electrical Engineering, Keio University, 3-14-1, Hiyoshi, Kohoku-ku, Yokohama, 223-8522; Takeoka, Masahiro
2006-04-15
We present a simple protocol to purify a coherent-state superposition that has undergone a linear lossy channel. The scheme constitutes only a single beam splitter and a homodyne detector, and thus is experimentally feasible. In practice, a superposition of coherent states is transformed into a classical mixture of coherent states by linear loss, which is usually the dominant decoherence mechanism in optical systems. We also address the possibility of producing a larger amplitude superposition state from decohered states, and show that in most cases the decoherence of the states are amplified along with the amplitude.
NASA Technical Reports Server (NTRS)
Sellers, P. J.; Berry, J. A.; Collatz, G. J.; Field, C. B.; Hall, F. G.
1992-01-01
The theoretical analyses of Sellers (1985, 1987), which linked canopy spectral reflectance properties to (unstressed) photosynthetic rates and conductances, are critically reviewed and significant shortcomings are identified. These are addressed in this article principally through the incorporation of a more sophisticated and realistic treatment of leaf physiological processes within a new canopy integration scheme. The results indicate that area-averaged spectral vegetation indices, as obtained from coarse resolution satellite sensors, may give good estimates of the area-integrals of photosynthesis and conductance even for spatially heterogenous (though physiologically uniform) vegetation covers.
Integer cosine transform for image compression
NASA Technical Reports Server (NTRS)
Cheung, K.-M.; Pollara, F.; Shahshahani, M.
1991-01-01
This article describes a recently introduced transform algorithm called the integer cosine transform (ICT), which is used in transform-based data compression schemes. The ICT algorithm requires only integer operations on small integers and at the same time gives a rate-distortion performance comparable to that offered by the floating-point discrete cosine transform (DCT). The article addresses the issue of implementation complexity, which is of prime concern for source coding applications of interest in deep-space communications. Complexity reduction in the transform stage of the compression scheme is particularly relevant, since this stage accounts for most (typically over 80 percent) of the computational load.
NASA Technical Reports Server (NTRS)
Arnold, S. M.; Saleeb, A. F.; Tan, H. Q.; Zhang, Y.
1993-01-01
The issue of developing effective and robust schemes to implement a class of the Ogden-type hyperelastic constitutive models is addressed. To this end, special purpose functions (running under MACSYMA) are developed for the symbolic derivation, evaluation, and automatic FORTRAN code generation of explicit expressions for the corresponding stress function and material tangent stiffness tensors. These explicit forms are valid over the entire deformation range, since the singularities resulting from repeated principal-stretch values have been theoretically removed. The required computational algorithms are outlined, and the resulting FORTRAN computer code is presented.
Modeling of confined turbulent fluid-particle flows using Eulerian and Lagrangian schemes
NASA Technical Reports Server (NTRS)
Adeniji-Fashola, A.; Chen, C. P.
1990-01-01
Two important aspects of fluid-particulate interaction in dilute gas-particle turbulent flows (the turbulent particle dispersion and the turbulence modulation effects) are addressed, using the Eulerian and Lagrangian modeling approaches to describe the particulate phase. Gradient-diffusion approximations are employed in the Eulerian formulation, while a stochastic procedure is utilized to simulate turbulent dispersion in the Lagrangina formulation. The k-epsilon turbulence model is used to characterize the time and length scales of the continuous phase turbulence. Models proposed for both schemes are used to predict turbulent fully-developed gas-solid vertical pipe flow with reasonable accuracy.
Zhang, Peng; Liu, Ru-Xun; Wong, S C
2005-05-01
This paper develops macroscopic traffic flow models for a highway section with variable lanes and free-flow velocities, that involve spatially varying flux functions. To address this complex physical property, we develop a Riemann solver that derives the exact flux values at the interface of the Riemann problem. Based on this solver, we formulate Godunov-type numerical schemes to solve the traffic flow models. Numerical examples that simulate the traffic flow around a bottleneck that arises from a drop in traffic capacity on the highway section are given to illustrate the efficiency of these schemes.
Sperling, Daniel
2017-06-01
Recent professional guidelines published by the General Medical Council instruct physicians in the UK to be honest and open in any financial agreements they have with their patients and third parties. These guidelines are in addition to a European policy addressing disclosure of physician financial interests in the industry. Similarly, In the US, a national open payments program as well as Federal regulations under the Affordable Care Act re-address the issue of disclosure of physician financial interests in America. These new professional and legal changes make us rethink the fiduciary duties of providers working under new organizational and financial schemes, specifically their clinical fidelity and their moral and professional obligations to act in the best interests of patients. The article describes the legal changes providing the background for such proposals and offers a prima facie ethical analysis of these evolving issues. It is argued that although disclosure of conflicting interest may increase trust it may not necessarily be beneficial to patients nor accord with their expectations and needs. Due to the extra burden associated with disclosure as well as its implications on the medical profession and the therapeutic relationship, it should be held that transparency of physician financial interest should not result in mandatory disclosure of such interest by physicians. It could lead, as some initiatives in Europe and the US already demonstrate, to voluntary or mandatory disclosure schemes carried out by the industry itself. Such schemes should be in addition to medical education and the address of the more general phenomenon of physician conflict of interest in ethical codes and ethical training of the parties involved.
Development of Implicit Methods in CFD NASA Ames Research Center 1970's - 1980's
NASA Technical Reports Server (NTRS)
Pulliam, Thomas H.
2010-01-01
The focus here is on the early development (mid 1970's-1980's) at NASA Ames Research Center of implicit methods in Computational Fluid Dynamics (CFD). A class of implicit finite difference schemes of the Beam and Warming approximate factorization type will be addressed. The emphasis will be on the Euler equations. A review of material pertinent to the solution of the Euler equations within the framework of implicit methods will be presented. The eigensystem of the equations will be used extensively in developing a framework for various methods applied to the Euler equations. The development and analysis of various aspects of this class of schemes will be given along with the motivations behind many of the choices. Various acceleration and efficiency modifications such as matrix reduction, diagonalization and flux split schemes will be presented.
Pang, Junbiao; Qin, Lei; Zhang, Chunjie; Zhang, Weigang; Huang, Qingming; Yin, Baocai
2015-12-01
Local coordinate coding (LCC) is a framework to approximate a Lipschitz smooth function by combining linear functions into a nonlinear one. For locally linear classification, LCC requires a coding scheme that heavily determines the nonlinear approximation ability, posing two main challenges: 1) the locality making faraway anchors have smaller influences on current data and 2) the flexibility balancing well between the reconstruction of current data and the locality. In this paper, we address the problem from the theoretical analysis of the simplest local coding schemes, i.e., local Gaussian coding and local student coding, and propose local Laplacian coding (LPC) to achieve the locality and the flexibility. We apply LPC into locally linear classifiers to solve diverse classification tasks. The comparable or exceeded performances of state-of-the-art methods demonstrate the effectiveness of the proposed method.
Quadratic trigonometric B-spline for image interpolation using GA
Abbas, Samreen; Irshad, Misbah
2017-01-01
In this article, a new quadratic trigonometric B-spline with control parameters is constructed to address the problems related to two dimensional digital image interpolation. The newly constructed spline is then used to design an image interpolation scheme together with one of the soft computing techniques named as Genetic Algorithm (GA). The idea of GA has been formed to optimize the control parameters in the description of newly constructed spline. The Feature SIMilarity (FSIM), Structure SIMilarity (SSIM) and Multi-Scale Structure SIMilarity (MS-SSIM) indices along with traditional Peak Signal-to-Noise Ratio (PSNR) are employed as image quality metrics to analyze and compare the outcomes of approach offered in this work, with three of the present digital image interpolation schemes. The upshots show that the proposed scheme is better choice to deal with the problems associated to image interpolation. PMID:28640906
Quadratic trigonometric B-spline for image interpolation using GA.
Hussain, Malik Zawwar; Abbas, Samreen; Irshad, Misbah
2017-01-01
In this article, a new quadratic trigonometric B-spline with control parameters is constructed to address the problems related to two dimensional digital image interpolation. The newly constructed spline is then used to design an image interpolation scheme together with one of the soft computing techniques named as Genetic Algorithm (GA). The idea of GA has been formed to optimize the control parameters in the description of newly constructed spline. The Feature SIMilarity (FSIM), Structure SIMilarity (SSIM) and Multi-Scale Structure SIMilarity (MS-SSIM) indices along with traditional Peak Signal-to-Noise Ratio (PSNR) are employed as image quality metrics to analyze and compare the outcomes of approach offered in this work, with three of the present digital image interpolation schemes. The upshots show that the proposed scheme is better choice to deal with the problems associated to image interpolation.
Shaikh, Riaz Ahmed; Jameel, Hassan; d'Auriol, Brian J; Lee, Heejo; Lee, Sungyoung; Song, Young-Jae
2009-01-01
Existing anomaly and intrusion detection schemes of wireless sensor networks have mainly focused on the detection of intrusions. Once the intrusion is detected, an alerts or claims will be generated. However, any unidentified malicious nodes in the network could send faulty anomaly and intrusion claims about the legitimate nodes to the other nodes. Verifying the validity of such claims is a critical and challenging issue that is not considered in the existing cooperative-based distributed anomaly and intrusion detection schemes of wireless sensor networks. In this paper, we propose a validation algorithm that addresses this problem. This algorithm utilizes the concept of intrusion-aware reliability that helps to provide adequate reliability at a modest communication cost. In this paper, we also provide a security resiliency analysis of the proposed intrusion-aware alert validation algorithm.
Shaikh, Riaz Ahmed; Jameel, Hassan; d’Auriol, Brian J.; Lee, Heejo; Lee, Sungyoung; Song, Young-Jae
2009-01-01
Existing anomaly and intrusion detection schemes of wireless sensor networks have mainly focused on the detection of intrusions. Once the intrusion is detected, an alerts or claims will be generated. However, any unidentified malicious nodes in the network could send faulty anomaly and intrusion claims about the legitimate nodes to the other nodes. Verifying the validity of such claims is a critical and challenging issue that is not considered in the existing cooperative-based distributed anomaly and intrusion detection schemes of wireless sensor networks. In this paper, we propose a validation algorithm that addresses this problem. This algorithm utilizes the concept of intrusion-aware reliability that helps to provide adequate reliability at a modest communication cost. In this paper, we also provide a security resiliency analysis of the proposed intrusion-aware alert validation algorithm. PMID:22454568
Huang, Yi-Shao; Liu, Wel-Ping; Wu, Min; Wang, Zheng-Wu
2014-09-01
This paper presents a novel observer-based decentralized hybrid adaptive fuzzy control scheme for a class of large-scale continuous-time multiple-input multiple-output (MIMO) uncertain nonlinear systems whose state variables are unmeasurable. The scheme integrates fuzzy logic systems, state observers, and strictly positive real conditions to deal with three issues in the control of a large-scale MIMO uncertain nonlinear system: algorithm design, controller singularity, and transient response. Then, the design of the hybrid adaptive fuzzy controller is extended to address a general large-scale uncertain nonlinear system. It is shown that the resultant closed-loop large-scale system keeps asymptotically stable and the tracking error converges to zero. The better characteristics of our scheme are demonstrated by simulations. Copyright © 2014. Published by Elsevier Ltd.
What are the emerging features of community health insurance schemes in East Africa?
Basaza, Robert; Pariyo, George; Criel, Bart
2009-01-01
Background The three East African countries of Uganda, Tanzania, and Kenya are characterized by high poverty levels, population growth rates, prevalence of HIV/AIDS, under-funding of the health sector, poor access to quality health care, and small health insurance coverage. Tanzania and Kenya have user-fees whereas Uganda abolished user-fees in public-owned health units. Objective To provide comparative description of community health insurance (CHI) schemes in three East African countries of Uganda, Tanzania, and Kenya and thereafter provide a basis for future policy research for development of CHI schemes. Methods An analytical grid of 10 distinctive items pertaining to the nature of CHI schemes was developed so as to have a uniform lens of comparing country situations of CHI. Results and conclusions The majority of the schemes have been in existence for a relatively short time of less than 10 years and their number remains small. There is need for further research to identify what is the mix and weight of factors that cause people to refrain from joining schemes. Specific issues that could also be addressed in subsequent studies are whether the current schemes provide financial protection, increase access to quality of care and impact on the equity of health services financing and delivery. On the basis of this knowledge, rational policy decisions can be taken. The governments thereafter could consider an option of playing more roles in advocacy, paying for the poorest, and developing an enabling policy and legal framework. PMID:22312207
Application of neuroanatomical ontologies for neuroimaging data annotation.
Turner, Jessica A; Mejino, Jose L V; Brinkley, James F; Detwiler, Landon T; Lee, Hyo Jong; Martone, Maryann E; Rubin, Daniel L
2010-01-01
The annotation of functional neuroimaging results for data sharing and re-use is particularly challenging, due to the diversity of terminologies of neuroanatomical structures and cortical parcellation schemes. To address this challenge, we extended the Foundational Model of Anatomy Ontology (FMA) to include cytoarchitectural, Brodmann area labels, and a morphological cortical labeling scheme (e.g., the part of Brodmann area 6 in the left precentral gyrus). This representation was also used to augment the neuroanatomical axis of RadLex, the ontology for clinical imaging. The resulting neuroanatomical ontology contains explicit relationships indicating which brain regions are "part of" which other regions, across cytoarchitectural and morphological labeling schemas. We annotated a large functional neuroimaging dataset with terms from the ontology and applied a reasoning engine to analyze this dataset in conjunction with the ontology, and achieved successful inferences from the most specific level (e.g., how many subjects showed activation in a subpart of the middle frontal gyrus) to more general (how many activations were found in areas connected via a known white matter tract?). In summary, we have produced a neuroanatomical ontology that harmonizes several different terminologies of neuroanatomical structures and cortical parcellation schemes. This neuroanatomical ontology is publicly available as a view of FMA at the Bioportal website. The ontological encoding of anatomic knowledge can be exploited by computer reasoning engines to make inferences about neuroanatomical relationships described in imaging datasets using different terminologies. This approach could ultimately enable knowledge discovery from large, distributed fMRI studies or medical record mining.
An Adaptive Prediction-Based Approach to Lossless Compression of Floating-Point Volume Data.
Fout, N; Ma, Kwan-Liu
2012-12-01
In this work, we address the problem of lossless compression of scientific and medical floating-point volume data. We propose two prediction-based compression methods that share a common framework, which consists of a switched prediction scheme wherein the best predictor out of a preset group of linear predictors is selected. Such a scheme is able to adapt to different datasets as well as to varying statistics within the data. The first method, called APE (Adaptive Polynomial Encoder), uses a family of structured interpolating polynomials for prediction, while the second method, which we refer to as ACE (Adaptive Combined Encoder), combines predictors from previous work with the polynomial predictors to yield a more flexible, powerful encoder that is able to effectively decorrelate a wide range of data. In addition, in order to facilitate efficient visualization of compressed data, our scheme provides an option to partition floating-point values in such a way as to provide a progressive representation. We compare our two compressors to existing state-of-the-art lossless floating-point compressors for scientific data, with our data suite including both computer simulations and observational measurements. The results demonstrate that our polynomial predictor, APE, is comparable to previous approaches in terms of speed but achieves better compression rates on average. ACE, our combined predictor, while somewhat slower, is able to achieve the best compression rate on all datasets, with significantly better rates on most of the datasets.
Hackett, Julia; Glidewell, Liz; West, Robert; Carder, Paul; Doran, Tim; Foy, Robbie
2014-10-25
A range of policy initiatives have addressed inequalities in healthcare and health outcomes. Local pay-for-performance schemes for primary care have been advocated as means of enhancing clinical ownership of the quality agenda and better targeting local need compared with national schemes such as the UK Quality and Outcomes Framework (QOF). We investigated whether professionals' experience of a local scheme in one English National Health Service (NHS) former primary care trust (PCT) differed from that of the national QOF in relation to the goal of reducing inequalities. We conducted retrospective semi-structured interviews with primary care professionals implementing the scheme and those involved in its development. We purposively sampled practices with varying levels of population socio-economic deprivation and achievement. Interviews explored perceptions of the scheme and indicators, likely mechanisms of influence on practice, perceived benefits and harms, and how future schemes could be improved. We used a framework approach to analysis. Thirty-eight professionals from 16 general practices and six professionals involved in developing local indicators participated. Our findings cover four themes: ownership, credibility of the indicators, influences on behaviour, and exacerbated tensions. We found little evidence that the scheme engendered any distinctive sense of ownership or experiences different from the national scheme. Although the indicators and their evidence base were seldom actively questioned, doubts were expressed about their focus on health promotion given that eventual benefits relied upon patient action and availability of local resources. Whilst practices serving more affluent populations reported status and patient benefit as motivators for participating in the scheme, those serving more deprived populations highlighted financial reward. The scheme exacerbated tensions between patient and professional consultation agendas, general practitioners benefitting directly from incentives and nurses who did much of the work, and practices serving more and less affluent populations which faced different challenges in achieving targets. The contentious nature of pay-for-performance was not necessarily reduced by local adaptation. Those developing future schemes should consider differential rewards and supportive resources for practices serving more deprived populations, and employing a wider range of levers to promote professional understanding and ownership of indicators.
Electrorecycling of Critical and Value Metals from Mobile Electronics
DOE Office of Scientific and Technical Information (OSTI.GOV)
Tedd E. Lister; Peming Wang; Andre Anderko
2014-09-01
Mobile electronic devices such as smart phones and tablets are a significant source of valuable metals that should be recycled. Each year over a billion devices are sold world-wide and the average life is only a couple years. Value metals in phones are gold, palladium, silver, copper, cobalt and nickel. Devices now contain increasing amounts of rare earth elements (REE). In recent years the supply chain for REE has moved almost exclusively to China. They are contained in displays, speakers and vibrators within the devices. By US Department of Energy (DOE) classification, specific REEs (Nd, Dy, Eu, Tb and Y)more » are considered critical while others (Ce, La and Pr) are deemed near critical. Effective recycling schemes should include the recovery of these critical materials. By including more value materials in a recovery scheme, more value can be obtained by product diversification and less waste metals remains to be disposed of. REEs are mined as a group such that when specific elements become critical significantly more ore must be processed to capture the dilute but valuable critical elements. Targeted recycling of items containing the more of the less available critical materials could address their future criticality. This presentation will describe work in developing aqueous electrochemistry-based schemes for recycling metals from scrap mobile electronics. The electrorecycling process generates oxidizing agents at an anode while reducing dissolved metals at the cathode. E vs pH diagrams and metals dissolution experiments are used to assess effectiveness of various solution chemistries. Although several schemes were envisioned, a two stages process has been the focus of work: 1) initial dissolution of Cu, Sn, Ag and magnet materials using Fe+3 generated in acidic sulfate and 2) final dissolution of Pd and Au using Cl2 generated in an HCl solution. Experiments were performed using simulated metal mixtures. Both Cu and Ag were recovered at ~ 97% using Fe+3 while leaving Au and Ag intact. REE were extracted from the dissolved mixture using conventional methods. A discussion of future research directions will be discussed.« less
Tangcharoensathien, Viroj; Pitayarangsarit, Siriwan; Patcharanarumol, Walaiporn; Prakongsai, Phusit; Sumalee, Hathaichanok; Tosanguan, Jiraboon; Mills, Anne
2013-08-06
Empirical evidence demonstrates that the Thai Universal Coverage Scheme (UCS) has improved equity of health financing and provided a relatively high level of financial risk protection. Several UCS design features contribute to these outcomes: a tax-financed scheme, a comprehensive benefit package and gradual extension of coverage to illnesses that can lead to catastrophic household costs, and capacity of the National Health Security Office (NHSO) to mobilise adequate resources. This study assesses the policy processes related to making decisions on these features. The study employs qualitative methods including reviews of relevant documents, in-depth interviews of 25 key informants, and triangulation amongst information sources. Continued political and financial commitments to the UCS, despite political rivalry, played a key role. The Thai Rak Thai (TRT)-led coalition government introduced UCS; staying in power 8 of the 11 years between 2001 and 2011 was long enough to nurture and strengthen the UCS and overcome resistance from various opponents. Prime Minister Surayud's government, replacing the ousted TRT government, introduced universal renal replacement therapy, which deepened financial risk protection.Commitment to their manifesto and fiscal capacity pushed the TRT to adopt a general tax-financed universal scheme; collecting premiums from people engaged in the informal sector was neither politically palatable nor technically feasible. The relatively stable tenure of NHSO Secretary Generals and the chairs of the Financing and the Benefit Package subcommittees provided a platform for continued deepening of financial risk protection. NHSO exerted monopsonistic purchasing power to control prices, resulting in greater patient access and better systems efficiency than might have been the case with a different design.The approach of proposing an annual per capita budget changed the conventional line-item programme budgeting system by basing negotiations between the Bureau of Budget, the NHSO and other stakeholders on evidence of service utilization and unit costs. Future success of Thai UCS requires coverage of effective interventions that address primary and secondary prevention of non-communicable diseases and long-term care policies in view of epidemiologic and demographic transitions. Lessons for other countries include the importance of continued political support, evidence informed decisions, and a capable purchaser organization.
Kotoh, Agnes Millicent; Van der Geest, Sjaak
2016-02-25
The National Health Insurance Scheme (NHIS) was introduced in Ghana to ensure equity in healthcare access. Presently, some low and middle income countries including Ghana are using social health insurance schemes to reduce inequity in access to healthcare. In Ghana, the NHIS was introduced to address the problem of inequity in healthcare access in a period that was characterised by user-fee regimes. The premium is heavily subsidised and exemption provided for the poorest, yet studies reveal that they are least enrolled in the scheme. We used a multi-level perspective as conceptual and methodological tool to examine why the NHIS is not reaching the poor as envisaged. Fifteen communities in the Central and Eastern Regions of Ghana were surveyed after implementing a 20 months intervention programme aimed at ensuring that community members have adequate knowledge of the NHIS' principles and benefits and improve enrollment and retention rates. Observation and in-depth interviews were used to gather information about the effects of the intervention in seven selected communities, health facilities and District Health Insurance Schemes in the Central Region. The results showed a distinct rise in the NHIS' enrollment among the general population but the poor were less covered. Of the 6790 individuals covered in the survey, less than half (40.3 %) of the population were currently insured in the NHIS and 22.4 % were previously insured. The poorest had the lowest enrollment rate: poorest 17.6 %, poor 31.3 %, rich 46.4 % and richest 44.4 % (p = 0.000). Previous enrollment rates were: poorest (15.4 %) and richest (23.8 %), (p = 0.000). Ironically, the poor's low enrollment was widely attributed to their poverty. The underlying structural cause, however, was policy makers' and implementers' lack of commitment to pursue NHIS' equity goal. Inequity in healthcare access persists because of the social and institutional environment in which the NHIS operates. There is a need to effectively engage stakeholders to develop interventions to ensure that the poor are included in the NHIS.
2005-07-01
as an access graft is addressed using statistical methods below. Graft consistency can be defined statistically as the variance associated with the...addressed using statistical methods below. Graft consistency can be defined statistically as the variance associated with the sample of grafts tested in...measured using a refractometer (Brix % method). The equilibration data are shown in Graph 1. The results suggest the following equilibration scheme: 40% v/v
A Hardware-Supported Algorithm for Self-Managed and Choreographed Task Execution in Sensor Networks.
Bordel, Borja; Miguel, Carlos; Alcarria, Ramón; Robles, Tomás
2018-03-07
Nowadays, sensor networks are composed of a great number of tiny resource-constraint nodes, whose management is increasingly more complex. In fact, although collaborative or choreographic task execution schemes are which fit in the most perfect way with the nature of sensor networks, they are rarely implemented because of the high resource consumption of these algorithms (especially if networks include many resource-constrained devices). On the contrary, hierarchical networks are usually designed, in whose cusp it is included a heavy orchestrator with a remarkable processing power, being able to implement any necessary management solution. However, although this orchestration approach solves most practical management problems of sensor networks, a great amount of the operation time is wasted while nodes request the orchestrator to address a conflict and they obtain the required instructions to operate. Therefore, in this paper it is proposed a new mechanism for self-managed and choreographed task execution in sensor networks. The proposed solution considers only a lightweight gateway instead of traditional heavy orchestrators and a hardware-supported algorithm, which consume a negligible amount of resources in sensor nodes. The gateway avoids the congestion of the entire sensor network and the hardware-supported algorithm enables a choreographed task execution scheme, so no particular node is overloaded. The performance of the proposed solution is evaluated through numerical and electronic ModelSim-based simulations.
A Hardware-Supported Algorithm for Self-Managed and Choreographed Task Execution in Sensor Networks
2018-01-01
Nowadays, sensor networks are composed of a great number of tiny resource-constraint nodes, whose management is increasingly more complex. In fact, although collaborative or choreographic task execution schemes are which fit in the most perfect way with the nature of sensor networks, they are rarely implemented because of the high resource consumption of these algorithms (especially if networks include many resource-constrained devices). On the contrary, hierarchical networks are usually designed, in whose cusp it is included a heavy orchestrator with a remarkable processing power, being able to implement any necessary management solution. However, although this orchestration approach solves most practical management problems of sensor networks, a great amount of the operation time is wasted while nodes request the orchestrator to address a conflict and they obtain the required instructions to operate. Therefore, in this paper it is proposed a new mechanism for self-managed and choreographed task execution in sensor networks. The proposed solution considers only a lightweight gateway instead of traditional heavy orchestrators and a hardware-supported algorithm, which consume a negligible amount of resources in sensor nodes. The gateway avoids the congestion of the entire sensor network and the hardware-supported algorithm enables a choreographed task execution scheme, so no particular node is overloaded. The performance of the proposed solution is evaluated through numerical and electronic ModelSim-based simulations. PMID:29518986
REMOVAL OF CHLORINATED ALKENE SOLVENTS FROM DRINKING WATER BY VARIOUS REVERSE OSMOSIS MEMBRANES
Historically, membranes have been used to desalinate water. As new membrane materials are developed, traditional water treatment schemes may incorporate membrane technologies, such as reverse osmosis, to address a variety of new concerns such as low molecular weight volatile org...
Vanpool trip planning based on evolutionary multiple objective optimization
NASA Astrophysics Data System (ADS)
Zhao, Ming; Yang, Disheng; Feng, Shibing; Liu, Hengchang
2017-08-01
Carpool and vanpool draw a lot of researchers’ attention, which is the emphasis of this paper. A concrete vanpool operation definition is given, based on the given definition, this paper tackles vanpool operation optimization using user experience decline index(UEDI). This paper is focused on making each user having identical UEDI and the system having minimum sum of all users’ UEDI. Three contributions are made, the first contribution is a vanpool operation scheme diagram, each component of the scheme is explained in detail. The second contribution is getting all customer’s UEDI as a set, standard deviation and sum of all users’ UEDI set are used as objectives in multiple objective optimization to decide trip start address, trip start time and trip destination address. The third contribution is a trip planning algorithm, which tries to minimize the sum of all users’ UEDI. Geographical distribution of the charging stations and utilization rate of the charging stations are considered in the trip planning process.
Risk selection and risk adjustment: improving insurance in the individual and small group markets.
Baicker, Katherine; Dow, William H
2009-01-01
Insurance market reforms face the key challenge of addressing the threat that risk selection poses to the availability, of stable, high-value insurance policies that provide long-term risk protection. Many of the strategies in use today fail to address this breakdown in risk pooling, and some even exacerbate it. Flexible risk adjustment schemes are a promising avenue for promoting market stability and limiting insurer cream-skimming, potentially providing greater benefits at lower cost. Reforms intended to increase insurance coverage and the value of care delivered will be much more effective if implemented in conjunction with policies that address these fundamental selection issues.
Self-consistent DFT +U method for real-space time-dependent density functional theory calculations
NASA Astrophysics Data System (ADS)
Tancogne-Dejean, Nicolas; Oliveira, Micael J. T.; Rubio, Angel
2017-12-01
We implemented various DFT+U schemes, including the Agapito, Curtarolo, and Buongiorno Nardelli functional (ACBN0) self-consistent density-functional version of the DFT +U method [Phys. Rev. X 5, 011006 (2015), 10.1103/PhysRevX.5.011006] within the massively parallel real-space time-dependent density functional theory (TDDFT) code octopus. We further extended the method to the case of the calculation of response functions with real-time TDDFT+U and to the description of noncollinear spin systems. The implementation is tested by investigating the ground-state and optical properties of various transition-metal oxides, bulk topological insulators, and molecules. Our results are found to be in good agreement with previously published results for both the electronic band structure and structural properties. The self-consistent calculated values of U and J are also in good agreement with the values commonly used in the literature. We found that the time-dependent extension of the self-consistent DFT+U method yields improved optical properties when compared to the empirical TDDFT+U scheme. This work thus opens a different theoretical framework to address the nonequilibrium properties of correlated systems.
Multi-dimensional upwinding-based implicit LES for the vorticity transport equations
NASA Astrophysics Data System (ADS)
Foti, Daniel; Duraisamy, Karthik
2017-11-01
Complex turbulent flows such as rotorcraft and wind turbine wakes are characterized by the presence of strong coherent structures that can be compactly described by vorticity variables. The vorticity-velocity formulation of the incompressible Navier-Stokes equations is employed to increase numerical efficiency. Compared to the traditional velocity-pressure formulation, high order numerical methods and sub-grid scale models for the vorticity transport equation (VTE) have not been fully investigated. Consistent treatment of the convection and stretching terms also needs to be addressed. Our belief is that, by carefully designing sharp gradient-capturing numerical schemes, coherent structures can be more efficiently captured using the vorticity-velocity formulation. In this work, a multidimensional upwind approach for the VTE is developed using the generalized Riemann problem-based scheme devised by Parish et al. (Computers & Fluids, 2016). The algorithm obtains high resolution by augmenting the upwind fluxes with transverse and normal direction corrections. The approach is investigated with several canonical vortex-dominated flows including isolated and interacting vortices and turbulent flows. The capability of the technique to represent sub-grid scale effects is also assessed. Navy contract titled ``Turbulence Modelling Across Disparate Length Scales for Naval Computational Fluid Dynamics Applications,'' through Continuum Dynamics, Inc.
2010-01-01
Background It is important that community-based health insurance (CBHI) schemes are designed in such a way as to ensure the relevance of the benefit packages to potential clients. Hence, this paper provides an understanding of the preferred benefit packages by different economic status groups as well as urban and rural dwellers for CBHI in Southeast Nigeria. Methods The study took place in rural, urban and semi-urban communities of south-east Nigeria. A questionnaire was used to collect information from 3070 randomly picked household heads. Focus group discussions were used to collect qualitative data. Data was examined for links between preferences for benefit packages with SES and geographic residence of the respondents. Results Respondents in the rural areas and in the lower SES preferred a comprehensive benefit package which includes all inpatient, outpatient and emergencies services, while those in urban areas as well as those in the higher SES group showed a preference for benefit packages which will cover only basic disease control interventions. Conclusion Equity concerns in preferences for services to be offered by the CBHI scheme should be addressed for CBHI to succeed in different contexts. PMID:20540787
Digital audio watermarking using moment-preserving thresholding
NASA Astrophysics Data System (ADS)
Choi, DooSeop; Jung, Hae Kyung; Choi, Hyuk; Kim, Taejeong
2007-09-01
The Moment-Preserving Thresholding technique for digital images has been used in digital image processing for decades, especially in image binarization and image compression. Its main strength lies in that the binary values that the MPT produces as a result, called representative values, are usually unaffected when the signal being thresholded goes through a signal processing operation. The two representative values in MPT together with the threshold value are obtained by solving the system of the preservation equations for the first, second, and third moment. Relying on this robustness of the representative values to various signal processing attacks considered in the watermarking context, this paper proposes a new watermarking scheme for audio signals. The watermark is embedded in the root-sum-square (RSS) of the two representative values of each signal block using the quantization technique. As a result, the RSS values are modified by scaling the signal according to the watermark bit sequence under the constraint of inaudibility relative to the human psycho-acoustic model. We also address and suggest solutions to the problem of synchronization and power scaling attacks. Experimental results show that the proposed scheme maintains high audio quality and robustness to various attacks including MP3 compression, re-sampling, jittering, and, DA/AD conversion.
The multilocus sequence typing network: mlst.net.
Aanensen, David M; Spratt, Brian G
2005-07-01
The unambiguous characterization of strains of a pathogen is crucial for addressing questions relating to its epidemiology, population and evolutionary biology. Multilocus sequence typing (MLST), which defines strains from the sequences at seven house-keeping loci, has become the method of choice for molecular typing of many bacterial and fungal pathogens (and non-pathogens), and MLST schemes and strain databases are available for a growing number of prokaryotic and eukaryotic organisms. Sequence data are ideal for strain characterization as they are unambiguous, meaning strains can readily be compared between laboratories via the Internet. Laboratories undertaking MLST can quickly progress from sequencing the seven gene fragments to characterizing their strains and relating them to those submitted by others and to the population as a whole. We provide the gateway to a number of MLST schemes, each of which contain a set of tools for the initial characterization of strains, and methods for relating query strains to other strains of the species, including clustering based on differences in allelic profiles, phylogenetic trees based on concatenated sequences, and a recently developed method (eBURST) for identifying clonal complexes within a species and displaying the overall structure of the population. This network of MLST websites is available at http://www.mlst.net.
Production of oxygen from lunar ilmenite
NASA Technical Reports Server (NTRS)
Zhao, Y.; Shadman, F.
1990-01-01
The following subjects are addressed: (1) the mechanism and kinetics of carbothermal reduction of simulated lunar ilmenite using carbon and, particularly, CO as reducing agents; (2) the determination of the rate-limiting steps; (3) the investigation of the effect of impurities, particularly magnesium; (4) the search for catalysts suitable for enhancement of the rate-limiting step; (5) the comparison of the kinetics of carbothermal reduction with those of hydrogen reduction; (6) the study of the combined use of CO and hydrogen as products of gasification of carbonaceous solids; (7) the development of reduction methods based on the use of waste carbonaceous compounds for the process; (8) the development of a carbothermal reaction path that utilizes gasification of carbonaceous solids to reducing gaseous species (hydrocarbons and carbon monoxide) to facilitate the reduction reaction kinetics and make the process more flexible in using various forms of carbonaceous feeds; (9) the development of advanced gas separation techniques, including the use of high-temperature ceramic membranes; (10) the development of an optimum process flow sheet for carbothermal reduction, and comparison of this process with the hydrogen reduction scheme, as well as a general comparison with other leading oxygen production schemes; and (11) the use of new and advanced material processing and separation techniques.
Hill, Mary C.; Faunt, Claudia C.; Belcher, Wayne; Sweetkind, Donald; Tiedeman, Claire; Kavetski, Dmitri
2013-01-01
This work demonstrates how available knowledge can be used to build more transparent and refutable computer models of groundwater systems. The Death Valley regional groundwater flow system, which surrounds a proposed site for a high level nuclear waste repository of the United States of America, and the Nevada National Security Site (NNSS), where nuclear weapons were tested, is used to explore model adequacy, identify parameters important to (and informed by) observations, and identify existing old and potential new observations important to predictions. Model development is pursued using a set of fundamental questions addressed with carefully designed metrics. Critical methods include using a hydrogeologic model, managing model nonlinearity by designing models that are robust while maintaining realism, using error-based weighting to combine disparate types of data, and identifying important and unimportant parameters and observations and optimizing parameter values with computationally frugal schemes. The frugal schemes employed in this study require relatively few (10–1000 s), parallelizable model runs. This is beneficial because models able to approximate the complex site geology defensibly tend to have high computational cost. The issue of model defensibility is particularly important given the contentious political issues involved.
Scoring Rubric Development: Validity and Reliability.
ERIC Educational Resources Information Center
Moskal, Barbara M.; Leydens, Jon A.
2000-01-01
Provides clear definitions of the terms "validity" and "reliability" in the context of developing scoring rubrics and illustrates these definitions through examples. Also clarifies how validity and reliability may be addressed in the development of scoring rubrics, defined as descriptive scoring schemes developed to guide the analysis of the…
Huang, Ai-Mei; Nguyen, Truong
2009-04-01
In this paper, we address the problems of unreliable motion vectors that cause visual artifacts but cannot be detected by high residual energy or bidirectional prediction difference in motion-compensated frame interpolation. A correlation-based motion vector processing method is proposed to detect and correct those unreliable motion vectors by explicitly considering motion vector correlation in the motion vector reliability classification, motion vector correction, and frame interpolation stages. Since our method gradually corrects unreliable motion vectors based on their reliability, we can effectively discover the areas where no motion is reliable to be used, such as occlusions and deformed structures. We also propose an adaptive frame interpolation scheme for the occlusion areas based on the analysis of their surrounding motion distribution. As a result, the interpolated frames using the proposed scheme have clearer structure edges and ghost artifacts are also greatly reduced. Experimental results show that our interpolated results have better visual quality than other methods. In addition, the proposed scheme is robust even for those video sequences that contain multiple and fast motions.
NASA Astrophysics Data System (ADS)
Pan, M.-Ch.; Chu, W.-Ch.; Le, Duc-Do
2016-12-01
The paper presents an alternative Vold-Kalman filter order tracking (VKF_OT) method, i.e. adaptive angular-velocity VKF_OT technique, to extract and characterize order components in an adaptive manner for the condition monitoring and fault diagnosis of rotary machinery. The order/spectral waveforms to be tracked can be recursively solved by using Kalman filter based on the one-step state prediction. The paper comprises theoretical derivation of computation scheme, numerical implementation, and parameter investigation. Comparisons of the adaptive VKF_OT scheme with two other ones are performed through processing synthetic signals of designated order components. Processing parameters such as the weighting factor and the correlation matrix of process noise, and data conditions like the sampling frequency, which influence tracking behavior, are explored. The merits such as adaptive processing nature and computation efficiency brought by the proposed scheme are addressed although the computation was performed in off-line conditions. The proposed scheme can simultaneously extract multiple spectral components, and effectively decouple close and crossing orders associated with multi-axial reference rotating speeds.
Path scheduling for multiple mobile actors in wireless sensor network
NASA Astrophysics Data System (ADS)
Trapasiya, Samir D.; Soni, Himanshu B.
2017-05-01
In wireless sensor network (WSN), energy is the main constraint. In this work we have addressed this issue for single as well as multiple mobile sensor actor network. In this work, we have proposed Rendezvous Point Selection Scheme (RPSS) in which Rendezvous Nodes are selected by set covering problem approach and from that, Rendezvous Points are selected in a way to reduce the tour length. The mobile actors tour is scheduled to pass through those Rendezvous Points as per Travelling Salesman Problem (TSP). We have also proposed novel rendezvous node rotation scheme for fair utilisation of all the nodes. We have compared RPSS with Stationery Actor scheme as well as RD-VT, RD-VT-SMT and WRP-SMT for performance metrics like energy consumption, network lifetime, route length and found the better outcome in all the cases for single actor. We have also applied RPSS for multiple mobile actor case like Multi-Actor Single Depot (MASD) termination and Multi-Actor Multiple Depot (MAMD) termination and observed by extensive simulation that MAMD saves the network energy in optimised way and enhance network lifetime compared to all other schemes.
DNS of Supersonic Turbulent Flows in a DLR Scramjet Intake
NASA Astrophysics Data System (ADS)
Li, Xinliang; Yu, Changping
2014-11-01
Direct numerical simulation (DNS) of supersonic/hypersonic flow through a DLR scramjet intake GK01 is performed. The free stream Mach numbers are 3, 5 and 7, and the angle of attack is zero degree. The DNS cases are performed by using an optimized MP scheme with adaptive dissipation (OMP-AD) developed by the authors, and the blow-and-suction perturbations near the leading edge are used to trigger the transition. To stabilize the simulation, locally non-linear flittering is used in high-Mach-number case. The transition, separation, and shock-turbulent boundary layer interaction are studied by using both flow visualization and statistical analysis. A new method, OMP-AD, is also addressed in this paper. The OMP-AD scheme is developed by using joint MP method and optimized technique, and the coefficients in the scheme are flexible to show low dissipation in the smoothing region, and to show high robust (but high dissipation) in the large gradient region. Numerical tests show that the OMP-AD is more robust than the original MP schemes, and the numerical dissipation of OMP-AD is very low.
NASA Astrophysics Data System (ADS)
Piatkowski, Marian; Müthing, Steffen; Bastian, Peter
2018-03-01
In this paper we consider discontinuous Galerkin (DG) methods for the incompressible Navier-Stokes equations in the framework of projection methods. In particular we employ symmetric interior penalty DG methods within the second-order rotational incremental pressure correction scheme. The major focus of the paper is threefold: i) We propose a modified upwind scheme based on the Vijayasundaram numerical flux that has favourable properties in the context of DG. ii) We present a novel postprocessing technique in the Helmholtz projection step based on H (div) reconstruction of the pressure correction that is computed locally, is a projection in the discrete setting and ensures that the projected velocity satisfies the discrete continuity equation exactly. As a consequence it also provides local mass conservation of the projected velocity. iii) Numerical results demonstrate the properties of the scheme for different polynomial degrees applied to two-dimensional problems with known solution as well as large-scale three-dimensional problems. In particular we address second-order convergence in time of the splitting scheme as well as its long-time stability.
A physics based multiscale modeling of cavitating flows.
Ma, Jingsen; Hsiao, Chao-Tsung; Chahine, Georges L
2017-03-02
Numerical modeling of cavitating bubbly flows is challenging due to the wide range of characteristic lengths of the physics at play: from micrometers (e.g., bubble nuclei radius) to meters (e.g., propeller diameter or sheet cavity length). To address this, we present here a multiscale approach which integrates a Discrete Singularities Model (DSM) for dispersed microbubbles and a two-phase Navier Stokes solver for the bubbly medium, which includes a level set approach to describe large cavities or gaseous pockets. Inter-scale schemes are used to smoothly bridge the two transitioning subgrid DSM bubbles into larger discretized cavities. This approach is demonstrated on several problems including cavitation inception and vapor core formation in a vortex flow, sheet-to-cloud cavitation over a hydrofoil, cavitation behind a blunt body, and cavitation on a propeller. These examples highlight the capabilities of the developed multiscale model in simulating various form of cavitation.
Advances in multi-sensor data fusion: algorithms and applications.
Dong, Jiang; Zhuang, Dafang; Huang, Yaohuan; Fu, Jingying
2009-01-01
With the development of satellite and remote sensing techniques, more and more image data from airborne/satellite sensors have become available. Multi-sensor image fusion seeks to combine information from different images to obtain more inferences than can be derived from a single sensor. In image-based application fields, image fusion has emerged as a promising research area since the end of the last century. The paper presents an overview of recent advances in multi-sensor satellite image fusion. Firstly, the most popular existing fusion algorithms are introduced, with emphasis on their recent improvements. Advances in main applications fields in remote sensing, including object identification, classification, change detection and maneuvering targets tracking, are described. Both advantages and limitations of those applications are then discussed. Recommendations are addressed, including: (1) Improvements of fusion algorithms; (2) Development of "algorithm fusion" methods; (3) Establishment of an automatic quality assessment scheme.
A physics based multiscale modeling of cavitating flows
Ma, Jingsen; Hsiao, Chao-Tsung; Chahine, Georges L.
2018-01-01
Numerical modeling of cavitating bubbly flows is challenging due to the wide range of characteristic lengths of the physics at play: from micrometers (e.g., bubble nuclei radius) to meters (e.g., propeller diameter or sheet cavity length). To address this, we present here a multiscale approach which integrates a Discrete Singularities Model (DSM) for dispersed microbubbles and a two-phase Navier Stokes solver for the bubbly medium, which includes a level set approach to describe large cavities or gaseous pockets. Inter-scale schemes are used to smoothly bridge the two transitioning subgrid DSM bubbles into larger discretized cavities. This approach is demonstrated on several problems including cavitation inception and vapor core formation in a vortex flow, sheet-to-cloud cavitation over a hydrofoil, cavitation behind a blunt body, and cavitation on a propeller. These examples highlight the capabilities of the developed multiscale model in simulating various form of cavitation. PMID:29720773
DOE Office of Scientific and Technical Information (OSTI.GOV)
Cox, James V.; Wellman, Gerald William; Emery, John M.
2011-09-01
Fracture or tearing of ductile metals is a pervasive engineering concern, yet accurate prediction of the critical conditions of fracture remains elusive. Sandia National Laboratories has been developing and implementing several new modeling methodologies to address problems in fracture, including both new physical models and new numerical schemes. The present study provides a double-blind quantitative assessment of several computational capabilities including tearing parameters embedded in a conventional finite element code, localization elements, extended finite elements (XFEM), and peridynamics. For this assessment, each of four teams reported blind predictions for three challenge problems spanning crack initiation and crack propagation. After predictionsmore » had been reported, the predictions were compared to experimentally observed behavior. The metal alloys for these three problems were aluminum alloy 2024-T3 and precipitation hardened stainless steel PH13-8Mo H950. The predictive accuracies of the various methods are demonstrated, and the potential sources of error are discussed.« less
Okpani, Arnold I; Abimbola, Seye
2016-01-01
The federal government of Nigeria started the Midwives Service Scheme in 2009 to address the scarcity of skilled health workers in rural communities by temporarily redistributing midwives from urban to rural communities. The scheme was designed as a collaboration among federal, state and local governments. Six years on, this study examines the contextual factors that account for the differences in performance of the scheme in Benue and Kogi, two contiguous states in central Nigeria. We obtained qualitative data through 14 in-depth interviews and 2 focus group discussions: 14 government officials at the federal, state and local government levels were interviewed to explore their perceptions on the design, implementation and sustainability of the Midwives Service Scheme. In addition, mothers in rural communities participated in 2 focus group discussions (one in each state) to elicit their views on Midwives Service Scheme services. The qualitative data were analysed for themes. The inability of the federal government to substantially influence the health care agenda of sub-national governments was a significant impediment to the achievement of the objectives of the Midwives Service Scheme. Participants identified differences in government prioritisation of primary health care between Benue and Kogi as relevant to maternal and child health outcomes in those states: Kogi was far more supportive of the Midwives Service Scheme and primary health care more broadly. High user fees in Benue was a significant barrier to the uptake of available maternal and child health services. Differential levels of political support and prioritisation, alongside financial barriers, contribute substantially to the uptake of maternal and child health services. For collaborative health sector strategies to gain sufficient traction, where federating units determine their health care priorities, they must be accompanied by strong and enforceable commitment by sub-national governments.
QCA Gray Code Converter Circuits Using LTEx Methodology
NASA Astrophysics Data System (ADS)
Mukherjee, Chiradeep; Panda, Saradindu; Mukhopadhyay, Asish Kumar; Maji, Bansibadan
2018-07-01
The Quantum-dot Cellular Automata (QCA) is the prominent paradigm of nanotechnology considered to continue the computation at deep sub-micron regime. The QCA realizations of several multilevel circuit of arithmetic logic unit have been introduced in the recent years. However, as high fan-in Binary to Gray (B2G) and Gray to Binary (G2B) Converters exist in the processor based architecture, no attention has been paid towards the QCA instantiation of the Gray Code Converters which are anticipated to be used in 8-bit, 16-bit, 32-bit or even more bit addressable machines of Gray Code Addressing schemes. In this work the two-input Layered T module is presented to exploit the operation of an Exclusive-OR Gate (namely LTEx module) as an elemental block. The "defect-tolerant analysis" of the two-input LTEx module has been analyzed to establish the scalability and reproducibility of the LTEx module in the complex circuits. The novel formulations exploiting the operability of the LTEx module have been proposed to instantiate area-delay efficient B2G and G2B Converters which can be exclusively used in Gray Code Addressing schemes. Moreover this work formulates the QCA design metrics such as O-Cost, Effective area, Delay and Cost α for the n-bit converter layouts.
QCA Gray Code Converter Circuits Using LTEx Methodology
NASA Astrophysics Data System (ADS)
Mukherjee, Chiradeep; Panda, Saradindu; Mukhopadhyay, Asish Kumar; Maji, Bansibadan
2018-04-01
The Quantum-dot Cellular Automata (QCA) is the prominent paradigm of nanotechnology considered to continue the computation at deep sub-micron regime. The QCA realizations of several multilevel circuit of arithmetic logic unit have been introduced in the recent years. However, as high fan-in Binary to Gray (B2G) and Gray to Binary (G2B) Converters exist in the processor based architecture, no attention has been paid towards the QCA instantiation of the Gray Code Converters which are anticipated to be used in 8-bit, 16-bit, 32-bit or even more bit addressable machines of Gray Code Addressing schemes. In this work the two-input Layered T module is presented to exploit the operation of an Exclusive-OR Gate (namely LTEx module) as an elemental block. The "defect-tolerant analysis" of the two-input LTEx module has been analyzed to establish the scalability and reproducibility of the LTEx module in the complex circuits. The novel formulations exploiting the operability of the LTEx module have been proposed to instantiate area-delay efficient B2G and G2B Converters which can be exclusively used in Gray Code Addressing schemes. Moreover this work formulates the QCA design metrics such as O-Cost, Effective area, Delay and Cost α for the n-bit converter layouts.
NASA Astrophysics Data System (ADS)
Rababaah, Haroun; Shirkhodaie, Amir
2009-04-01
The rapidly advancing hardware technology, smart sensors and sensor networks are advancing environment sensing. One major potential of this technology is Large-Scale Surveillance Systems (LS3) especially for, homeland security, battlefield intelligence, facility guarding and other civilian applications. The efficient and effective deployment of LS3 requires addressing number of aspects impacting the scalability of such systems. The scalability factors are related to: computation and memory utilization efficiency, communication bandwidth utilization, network topology (e.g., centralized, ad-hoc, hierarchical or hybrid), network communication protocol and data routing schemes; and local and global data/information fusion scheme for situational awareness. Although, many models have been proposed to address one aspect or another of these issues but, few have addressed the need for a multi-modality multi-agent data/information fusion that has characteristics satisfying the requirements of current and future intelligent sensors and sensor networks. In this paper, we have presented a novel scalable fusion engine for multi-modality multi-agent information fusion for LS3. The new fusion engine is based on a concept we call: Energy Logic. Experimental results of this work as compared to a Fuzzy logic model strongly supported the validity of the new model and inspired future directions for different levels of fusion and different applications.
A Highly Flexible and Efficient Passive Optical Network Employing Dynamic Wavelength Allocation
NASA Astrophysics Data System (ADS)
Hsueh, Yu-Li; Rogge, Matthew S.; Yamamoto, Shu; Kazovsky, Leonid G.
2005-01-01
A novel and high-performance passive optical network (PON), the SUCCESS-DWA PON, employs dynamic wavelength allocation to provide bandwidth sharing across multiple physical PONs. In the downstream, tunable lasers, an arrayed waveguide grating, and coarse/fine filtering combine to create a flexible new optical access solution. In the upstream, several distributed and centralized schemes are proposed and investigated. The network performance is compared to conventional TDM-PONs under different traffic models, including the self-similar traffic model and the transaction-oriented model. Broadcast support and deployment issues are addressed. The network's excellent scalability can bridge the gap between conventional TDM-PONs and WDM-PONs. The powerful architecture is a promising candidate for next generation optical access networks.
Limpanuparb, Taweetham; Milthorpe, Josh; Rendell, Alistair P
2014-10-30
Use of the modern parallel programming language X10 for computing long-range Coulomb and exchange interactions is presented. By using X10, a partitioned global address space language with support for task parallelism and the explicit representation of data locality, the resolution of the Ewald operator can be parallelized in a straightforward manner including use of both intranode and internode parallelism. We evaluate four different schemes for dynamic load balancing of integral calculation using X10's work stealing runtime, and report performance results for long-range HF energy calculation of large molecule/high quality basis running on up to 1024 cores of a high performance cluster machine. Copyright © 2014 Wiley Periodicals, Inc.
Approximate treatment of semicore states in GW calculations with application to Au clusters.
Xian, Jiawei; Baroni, Stefano; Umari, P
2014-03-28
We address the treatment of transition metal atoms in GW electronic-structure calculations within the plane-wave pseudo-potential formalism. The contributions of s and p semi-core electrons to the self-energy, which are essential to grant an acceptable accuracy, are dealt with using a recently proposed scheme whereby the exchange components are treated exactly at the G0W0 level, whereas a suitable approximation to the correlation components is devised. This scheme is benchmarked for small gold nano-clusters, resulting in ionization potentials, electron affinities, and density of states in very good agreement with those obtained from calculations where s and p semicore states are treated as valence orbitals, and allowing us to apply this same scheme to clusters of intermediate size, Au20 and Au32, that would be otherwise very difficult to deal with.
A fast and accurate dihedral interpolation loop subdivision scheme
NASA Astrophysics Data System (ADS)
Shi, Zhuo; An, Yalei; Wang, Zhongshuai; Yu, Ke; Zhong, Si; Lan, Rushi; Luo, Xiaonan
2018-04-01
In this paper, we propose a fast and accurate dihedral interpolation Loop subdivision scheme for subdivision surfaces based on triangular meshes. In order to solve the problem of surface shrinkage, we keep the limit condition unchanged, which is important. Extraordinary vertices are handled using modified Butterfly rules. Subdivision schemes are computationally costly as the number of faces grows exponentially at higher levels of subdivision. To address this problem, our approach is to use local surface information to adaptively refine the model. This is achieved simply by changing the threshold value of the dihedral angle parameter, i.e., the angle between the normals of a triangular face and its adjacent faces. We then demonstrate the effectiveness of the proposed method for various 3D graphic triangular meshes, and extensive experimental results show that it can match or exceed the expected results at lower computational cost.
A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing.
Fan, Kai; Wang, Junxiong; Wang, Xin; Li, Hui; Yang, Yintang
2017-07-24
With the rapid development of big data and Internet of things (IOT), the number of networking devices and data volume are increasing dramatically. Fog computing, which extends cloud computing to the edge of the network can effectively solve the bottleneck problems of data transmission and data storage. However, security and privacy challenges are also arising in the fog-cloud computing environment. Ciphertext-policy attribute-based encryption (CP-ABE) can be adopted to realize data access control in fog-cloud computing systems. In this paper, we propose a verifiable outsourced multi-authority access control scheme, named VO-MAACS. In our construction, most encryption and decryption computations are outsourced to fog devices and the computation results can be verified by using our verification method. Meanwhile, to address the revocation issue, we design an efficient user and attribute revocation method for it. Finally, analysis and simulation results show that our scheme is both secure and highly efficient.
Approximate treatment of semicore states in GW calculations with application to Au clusters
DOE Office of Scientific and Technical Information (OSTI.GOV)
Xian, Jiawei; Baroni, Stefano; CNR-IOM Democritos, Theory-Elettra group, Trieste
We address the treatment of transition metal atoms in GW electronic-structure calculations within the plane-wave pseudo-potential formalism. The contributions of s and p semi-core electrons to the self-energy, which are essential to grant an acceptable accuracy, are dealt with using a recently proposed scheme whereby the exchange components are treated exactly at the G{sub 0}W{sub 0} level, whereas a suitable approximation to the correlation components is devised. This scheme is benchmarked for small gold nano-clusters, resulting in ionization potentials, electron affinities, and density of states in very good agreement with those obtained from calculations where s and p semicore statesmore » are treated as valence orbitals, and allowing us to apply this same scheme to clusters of intermediate size, Au{sub 20} and Au{sub 32}, that would be otherwise very difficult to deal with.« less
Arabaci, Murat; Djordjevic, Ivan B; Saunders, Ross; Marcoccia, Roberto M
2010-02-01
In order to achieve high-speed transmission over optical transport networks (OTNs) and maximize its throughput, we propose using a rate-adaptive polarization-multiplexed coded multilevel modulation with coherent detection based on component non-binary quasi-cyclic (QC) LDPC codes. Compared to prior-art bit-interleaved LDPC-coded modulation (BI-LDPC-CM) scheme, the proposed non-binary LDPC-coded modulation (NB-LDPC-CM) scheme not only reduces latency due to symbol- instead of bit-level processing but also provides either impressive reduction in computational complexity or striking improvements in coding gain depending on the constellation size. As the paper presents, compared to its prior-art binary counterpart, the proposed NB-LDPC-CM scheme addresses the needs of future OTNs, which are achieving the target BER performance and providing maximum possible throughput both over the entire lifetime of the OTN, better.
ULTRA-SHARP solution of the Smith-Hutton problem
NASA Technical Reports Server (NTRS)
Leonard, B. P.; Mokhtari, Simin
1992-01-01
Highly convective scalar transport involving near-discontinuities and strong streamline curvature was addressed in a paper by Smith and Hutton in 1982, comparing several different convection schemes applied to a specially devised test problem. First order methods showed significant artificial diffusion, whereas higher order methods gave less smearing but had a tendency to overshoot and oscillate. Perhaps because unphysical oscillations are more obvious than unphysical smearing, the intervening period has seen a rise in popularity of low order artificially diffusive schemes, especially in the numerical heat transfer industry. The present paper describes an alternate strategy of using non-artificially diffusive high order methods, while maintaining strictly monotonic transitions through the use of simple flux limited constraints. Limited third order upwinding is usually found to be the most cost effective basic convection scheme. Tighter resolution of discontinuities can be obtained at little additional cost by using automatic adaptive stencil expansion to higher order in local regions, as needed.
NetCoDer: A Retransmission Mechanism for WSNs Based on Cooperative Relays and Network Coding
Valle, Odilson T.; Montez, Carlos; Medeiros de Araujo, Gustavo; Vasques, Francisco; Moraes, Ricardo
2016-01-01
Some of the most difficult problems to deal with when using Wireless Sensor Networks (WSNs) are related to the unreliable nature of communication channels. In this context, the use of cooperative diversity techniques and the application of network coding concepts may be promising solutions to improve the communication reliability. In this paper, we propose the NetCoDer scheme to address this problem. Its design is based on merging cooperative diversity techniques and network coding concepts. We evaluate the effectiveness of the NetCoDer scheme through both an experimental setup with real WSN nodes and a simulation assessment, comparing NetCoDer performance against state-of-the-art TDMA-based (Time Division Multiple Access) retransmission techniques: BlockACK, Master/Slave and Redundant TDMA. The obtained results highlight that the proposed NetCoDer scheme clearly improves the network performance when compared with other retransmission techniques. PMID:27258280
Quantum Optimal Multiple Assignment Scheme for Realizing General Access Structure of Secret Sharing
NASA Astrophysics Data System (ADS)
Matsumoto, Ryutaroh
The multiple assignment scheme is to assign one or more shares to single participant so that any kind of access structure can be realized by classical secret sharing schemes. We propose its quantum version including ramp secret sharing schemes. Then we propose an integer optimization approach to minimize the average share size.
75 FR 53846 - Airworthiness Directives; GA 8 Airvan (Pty) Ltd Models GA8 and GA8-TC320 Airplanes
Federal Register 2010, 2011, 2012, 2013, 2014
2010-09-02
..., or working (loose) rivet is found, before further flight, obtain an FAA-approved repair scheme from the manufacturer and incorporate this repair scheme. Due to FAA policy, the repair scheme/modification for crack damage must include an immediate repair of the crack. The repair scheme cannot be by...
The best prostate biopsy scheme is dictated by the gland volume: a monocentric study.
Dell'Atti, L
2015-08-01
Accuracy of biopsy scheme depends on different parameters. Prostate-specific antigen (PSA) level and digital rectal examination (DRE) influenced the detection rate and suggested the biopsy scheme to approach each patient. Another parameter is the prostate volume. Sampling accuracy tends to decrease progressively with an increasing prostate volume. We prospectively observed detection cancer rate in suspicious prostate cancer (PCa) and improved by applying a protocol biopsy according to prostate volume (PV). Clinical data and pathological features of these 1356 patients were analysed and included in this study. This protocol is a combined scheme that includes transrectal (TR) 12-core PBx (TR12PBx) for PV ≤ 30 cc, TR 14-core PBx (TR14PBx) for PV > 30 cc but < 60 cc, TR 18-core PBx (TR18PBx) for PV ≥ 60 cc. Out of a total of 1356 patients, in 111 (8.2%) PCa was identified through TR12PBx scheme, in 198 (14.6%) through TR14PBx scheme and in 253 (18.6%) through TR18PBx scheme. The PCa detection rate was increased by 44% by adding two TZ cores (TR14PBx scheme). The TR18PBx scheme increased this rate by 21.7% vs. TR14PBx scheme. The diagnostic yield offered by TR18PBx was statistically significant compared to the detection rate offered by the TR14PBx scheme (p < 0.003). The biopsy Gleason score and the percentage of core involvement were comparable between PCa detected by the TR14PBx scheme diagnostic yield and those detected by the TR18PBx scheme (p = 0.362). The only PV parameter, in our opinion, can be significant in choosing the best biopsy scheme to approach in a first setting of biopsies increasing PCa detection rate.
IP Network Design and Implementation for the Caltech-USGS Element of TriNet
NASA Astrophysics Data System (ADS)
Johnson, M. L.; Busby, R.; Watkins, M.; Schwarz, S.; Hauksson, E.
2001-12-01
The new seismic network IP numbering scheme for the Caltech-USGS element of TriNet is designed to provide emergency response plans for computer outages and/or telemetry circuit failures so that data acquisition may continue with minimal interruption. IP numbers from the seismic stations through the Caltech acquisition machines are numbered using private, non-routable IP addresses, which allows the network administrator to create redundancy in the network design, more freedom in choosing IP numbers, and uniformity in the LAN and WAN network addressing. The network scheme used by the Caltech-USGS element of TriNet is designed to create redundancy and load sharing over three or more T1 circuits. A T1 circuit can support 80 dataloggers sending data at a design rate of 19.2 kbps or 120 dataloggers transmitting at a nominal rate of 12.8 kbps. During a circuit detour, the 80 dataloggers on the failed T1 are equally divided between the remaining two circuits. This increases the loads on the remaining two circuits to 120 dataloggers, which is the maximum load each T1 can handle at the nominal rate. Each T1 circuit has a router interface onto a LAN at Caltech with an independent subnet address. Some devices, such as Solaris computers, allow a single interface to be numbered with several IP addresses, a so called "multinetted" interface. This allows the central acquisition computers to appear with distinct addresses that are routable via different T1 circuits, but simplifies the physical cables between devices. We identify these T1 circuits as T1-1, T1-2, and T1-3. At the remote end, each Frame Relay Access Device (FRAD) and connected datalogger(s) is a subnetted LAN. The numbering is arranged so the second octet in the LAN IP address of the FRAD and datalogger identify the datalogger's primary and alternate T1 circuits. For example; a LAN with an IP address of 10.12.0.0/24 has T1-1 as its primary T1, and T1-2 as its alternate circuit. Stations with this number scheme are sometimes referred to as group "12". LANs with IP addresses of 10.23.0.0/24 have T1-2 as the primary circuit, and T1-3 as the alternate circuit. Static routes on the acquisition system are used to direct traffic through the primary T1. The network can operate in one of three modes. The most common and desirable mode is "normal", where all three T1's are operational and Caltech has both a primary and secondary central acquisition system running. The second mode is a "failover", where the primary acquisition system is down (due to maintenance or failure) and the secondary acquisition system assumes the primary role. This includes sending acknowledgments to dataloggers and multicasts to the rest of the network. The third mode is a circuit detour. The port numbers on the central acquisition system for the dataloggers on the failed T1 are changed to match the auxiliary ports on the dataloggers. This allows for the auxiliary ports on the dataloggers to receive acknowledgements from the acquiring system through the detoured circuit. The static routes on the system are changed to go through the detoured circuit as specified by the group's IP numbers. At this point the two working T1's will be running at full capacity but the data acquisition will continue with minimal interruption while the third T1 is being restored. The primary acquisition computer continues to listen for data on the failed T1 should things improve spontaneously.
Unmarked: An R package for fitting hierarchical models of wildlife occurrence and abundance
Fiske, I.J.; Chandler, R.B.
2011-01-01
Ecological research uses data collection techniques that are prone to substantial and unique types of measurement error to address scientic questions about species abundance and distribution. These data collection schemes include a number of survey methods in which unmarked individuals are counted, or determined to be present, at spatially- referenced sites. Examples include site occupancy sampling, repeated counts, distance sampling, removal sampling, and double observer sampling. To appropriately analyze these data, hierarchical models have been developed to separately model explanatory variables of both a latent abundance or occurrence process and a conditional detection process. Because these models have a straightforward interpretation paralleling mecha- nisms under which the data arose, they have recently gained immense popularity. The common hierarchical structure of these models is well-suited for a unied modeling in- terface. The R package unmarked provides such a unied modeling framework, including tools for data exploration, model tting, model criticism, post-hoc analysis, and model comparison.
Parametric optimization of optical signal detectors employing the direct photodetection scheme
NASA Astrophysics Data System (ADS)
Kirakosiants, V. E.; Loginov, V. A.
1984-08-01
The problem of optimization of the optical signal detection scheme parameters is addressed using the concept of a receiver with direct photodetection. An expression is derived which accurately approximates the field of view (FOV) values obtained by a direct computer minimization of the probability of missing a signal; optimum values of the receiver FOV were found for different atmospheric conditions characterized by the number of coherence spots and the intensity fluctuations of a plane wave. It is further pointed out that the criterion presented can be possibly used for parametric optimization of detectors operating in accordance with the Neumann-Pearson criterion.
Advances in numerical and applied mathematics
NASA Technical Reports Server (NTRS)
South, J. C., Jr. (Editor); Hussaini, M. Y. (Editor)
1986-01-01
This collection of papers covers some recent developments in numerical analysis and computational fluid dynamics. Some of these studies are of a fundamental nature. They address basic issues such as intermediate boundary conditions for approximate factorization schemes, existence and uniqueness of steady states for time dependent problems, and pitfalls of implicit time stepping. The other studies deal with modern numerical methods such as total variation diminishing schemes, higher order variants of vortex and particle methods, spectral multidomain techniques, and front tracking techniques. There is also a paper on adaptive grids. The fluid dynamics papers treat the classical problems of imcompressible flows in helically coiled pipes, vortex breakdown, and transonic flows.
Smith, Olivia; Galey, Jessica
2018-07-01
English and Welsh responses to rape have long been critically examined, leading to attempted improvements in the criminal justice system. Despite this, little attention has been paid to the Criminal Injuries Compensation Scheme (CICS) and the difficulties applying it to rape. To begin addressing this gap, researchers interviewed three, and qualitatively surveyed 22, Independent Sexual Violence Advisors. The findings suggest that CICS may not only reinforce rape myths and disadvantage vulnerable survivors, but is also a source of validation and contributes to survivor justice. The study, while exploratory, therefore, highlights the need for further discussion about rape survivor compensation.
Event-triggered output feedback control for distributed networked systems.
Mahmoud, Magdi S; Sabih, Muhammad; Elshafei, Moustafa
2016-01-01
This paper addresses the problem of output-feedback communication and control with event-triggered framework in the context of distributed networked control systems. The design problem of the event-triggered output-feedback control is proposed as a linear matrix inequality (LMI) feasibility problem. The scheme is developed for the distributed system where only partial states are available. In this scheme, a subsystem uses local observers and share its information to its neighbors only when the subsystem's local error exceeds a specified threshold. The developed method is illustrated by using a coupled cart example from the literature. Copyright © 2015 ISA. Published by Elsevier Ltd. All rights reserved.
Preparation of two-qubit steady entanglement through driving a single qubit.
Shen, Li-Tuo; Chen, Rong-Xin; Yang, Zhen-Biao; Wu, Huai-Zhi; Zheng, Shi-Biao
2014-10-15
Inspired by a recent paper [J. Phys. B 47, 055502 (2014)], we propose a simplified scheme to generate and stabilize a Bell state of two qubits coupled to a resonator. In the scheme only one qubit is needed to be driven by external classical fields, and the entanglement dynamics is independent of the phases of these fields and insensitive to their amplitude fluctuations. This is a distinct advantage as compared with the previous ones that require each qubit to be addressed by well-controlled classical fields. Numerical simulation shows that the steady singlet state with high fidelity can be obtained with currently available techniques in circuit quantum electrodynamics.
Decentralized adaptive control of interconnected nonlinear systems with unknown control directions.
Huang, Jiangshuai; Wang, Qing-Guo
2018-03-01
In this paper, we propose a decentralized adaptive control scheme for a class of interconnected strict-feedback nonlinear systems without a priori knowledge of subsystems' control directions. To address this problem, a novel Nussbaum-type function is proposed and a key theorem is drawn which involves quantifying the interconnections of multiple Nussbaum-type functions of the subsystems with different control directions in a single inequality. Global stability of the closed-loop system and asymptotic stabilization of subsystems' output are proved and a simulation example is given to illustrate the effectiveness of the proposed control scheme. Copyright © 2018 ISA. Published by Elsevier Ltd. All rights reserved.
Time cycle analysis and simulation of material flow in MOX process layout
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chakraborty, S.; Saraswat, A.; Danny, K.M.
The (U,Pu)O{sub 2} MOX fuel is the driver fuel for the upcoming PFBR (Prototype Fast Breeder Reactor). The fuel has around 30% PuO{sub 2}. The presence of high percentages of reprocessed PuO{sub 2} necessitates the design of optimized fuel fabrication process line which will address both production need as well as meet regulatory norms regarding radiological safety criteria. The powder pellet route has highly unbalanced time cycle. This difficulty can be overcome by optimizing process layout in terms of equipment redundancy and scheduling of input powder batches. Different schemes are tested before implementing in the process line with the helpmore » of a software. This software simulates the material movement through the optimized process layout. The different material processing schemes have been devised and validity of the schemes are tested with the software. Schemes in which production batches are meeting at any glove box location are considered invalid. A valid scheme ensures adequate spacing between the production batches and at the same time it meets the production target. This software can be further improved by accurately calculating material movement time through glove box train. One important factor is considering material handling time with automation systems in place.« less
Multiple grid problems on concurrent-processing computers
NASA Technical Reports Server (NTRS)
Eberhardt, D. S.; Baganoff, D.
1986-01-01
Three computer codes were studied which make use of concurrent processing computer architectures in computational fluid dynamics (CFD). The three parallel codes were tested on a two processor multiple-instruction/multiple-data (MIMD) facility at NASA Ames Research Center, and are suggested for efficient parallel computations. The first code is a well-known program which makes use of the Beam and Warming, implicit, approximate factored algorithm. This study demonstrates the parallelism found in a well-known scheme and it achieved speedups exceeding 1.9 on the two processor MIMD test facility. The second code studied made use of an embedded grid scheme which is used to solve problems having complex geometries. The particular application for this study considered an airfoil/flap geometry in an incompressible flow. The scheme eliminates some of the inherent difficulties found in adapting approximate factorization techniques onto MIMD machines and allows the use of chaotic relaxation and asynchronous iteration techniques. The third code studied is an application of overset grids to a supersonic blunt body problem. The code addresses the difficulties encountered when using embedded grids on a compressible, and therefore nonlinear, problem. The complex numerical boundary system associated with overset grids is discussed and several boundary schemes are suggested. A boundary scheme based on the method of characteristics achieved the best results.
Multicomponent-flow analyses by multimode method of characteristics
Lai, Chintu
1994-01-01
For unsteady open-channel flows having N interacting unknown variables, a system of N mutually independent, partial differential equations can be used to describe the flow-field. The system generally belongs to marching-type problems and permits transformation into characteristic equations that are associated with N distinct characteristics directions. Because characteristics can be considered 'wave' or 'disturbance' propagation, a fluvial system so described can be viewed as adequately definable using these N component waves. A numerical algorithm to solve the N families of characteristics can then be introduced for formulation of an N-component flow-simulation model. The multimode method of characteristics (MMOC), a new numerical scheme that has a combined capacity of several specified-time-interval (STI) schemes of the method of characteristics, makes numerical modeling of such N-component riverine flows feasible and attainable. Merging different STI schemes yields different kinds of MMOC schemes, for which two kinds are displayed herein. With the MMOC, each characteristics is dynamically treated by an appropriate numerical mode, which should lead to an effective and suitable global simulation, covering various types of unsteady flow. The scheme is always linearly stable and its numerical accuracy can be systematically analyzed. By increasing the N value, one can develop a progressively sophisticated model that addresses increasingly complex river-mechanics problems.
NASA Astrophysics Data System (ADS)
Schroeder, Sascha Thorsten; Costa, Ana; Obé, Elisabeth
In recent years, fuel cell based micro-combined heat and power (mCHP) has received increasing attention due to its potential contribution to European energy policy goals, i.e., sustainability, competitiveness and security of supply. Besides technical advances, regulatory framework and ownership structures are of crucial importance in order to achieve greater diffusion of the technology in residential applications. This paper analyses the interplay of policy and ownership structures for the future deployment of mCHP. Furthermore, it regards the three country cases Denmark, France and Portugal. Firstly, the implications of different kinds of support schemes on investment risk and the diffusion of a technology are explained conceptually. Secondly, ownership arrangements are addressed. Then, a cross-country comparison on present support schemes for mCHP and competing technologies discusses the national implementation of European legislation in Denmark, France and Portugal. Finally, resulting implications for ownership arrangements on the choice of support scheme are explained. From a conceptual point of view, investment support, feed-in tariffs and price premiums are the most appropriate schemes for fuel cell mCHP. This can be used for improved analysis of operational strategies. The interaction of this plethora of elements necessitates careful balancing from a private- and socio-economic point of view.
Constraining Stochastic Parametrisation Schemes Using High-Resolution Model Simulations
NASA Astrophysics Data System (ADS)
Christensen, H. M.; Dawson, A.; Palmer, T.
2017-12-01
Stochastic parametrisations are used in weather and climate models as a physically motivated way to represent model error due to unresolved processes. Designing new stochastic schemes has been the target of much innovative research over the last decade. While a focus has been on developing physically motivated approaches, many successful stochastic parametrisation schemes are very simple, such as the European Centre for Medium-Range Weather Forecasts (ECMWF) multiplicative scheme `Stochastically Perturbed Parametrisation Tendencies' (SPPT). The SPPT scheme improves the skill of probabilistic weather and seasonal forecasts, and so is widely used. However, little work has focused on assessing the physical basis of the SPPT scheme. We address this matter by using high-resolution model simulations to explicitly measure the `error' in the parametrised tendency that SPPT seeks to represent. The high resolution simulations are first coarse-grained to the desired forecast model resolution before they are used to produce initial conditions and forcing data needed to drive the ECMWF Single Column Model (SCM). By comparing SCM forecast tendencies with the evolution of the high resolution model, we can measure the `error' in the forecast tendencies. In this way, we provide justification for the multiplicative nature of SPPT, and for the temporal and spatial scales of the stochastic perturbations. However, we also identify issues with the SPPT scheme. It is therefore hoped these measurements will improve both holistic and process based approaches to stochastic parametrisation. Figure caption: Instantaneous snapshot of the optimal SPPT stochastic perturbation, derived by comparing high-resolution simulations with a low resolution forecast model.
High-speed low-power voltage-programmed driving scheme for AMOLED displays
NASA Astrophysics Data System (ADS)
Xingheng, Xia; Weijing, Wu; Xiaofeng, Song; Guanming, Li; Lei, Zhou; Lirong, Zhang; Miao, Xu; Lei, Wang; Junbiao, Peng
2015-12-01
A new voltage-programmed driving scheme named the mixed parallel addressing scheme is presented for AMOLED displays, in which one compensation interval can be divided into the first compensation frame and the consequent N -1 post-compensation frames without periods of initialization and threshold voltage detection. The proposed driving scheme has the advantages of both high speed and low driving power due to the mixture of the pipeline technology and the threshold voltage one-time detection technology. Corresponding to the proposed driving scheme, we also propose a new voltage-programmed compensation pixel circuit, which consists of five TFTs and two capacitors (5T2C). In-Zn-O thin-film transistors (IZO TFTs) are used to build the proposed 5T2C pixel circuit. It is shown that the non-uniformity of the proposed pixel circuit is considerably reduced compared with that of the conventional 2T1C pixel circuit. The number of frames (N) preserved in the proposed driving scheme are measured and can be up to 35 with the variation of the OLED current remaining in an acceptable range. Moreover, the proposed voltage-programmed driving scheme can be more valuable for an AMOLED display with high resolution, and may also be applied to other compensation pixel circuits. Project supported by the State Key Development Program for Basic Research of China (No. 2015CB655000) the National Natural Science Foundation of China (Nos. 61204089, 61306099, 61036007, 51173049, U1301243), and the Fundamental Research Funds for the Central Universities (Nos. 2013ZZ0046, 2014ZZ0028).
Feasibility Studies of Optical Processing of Image Bandwidth Compression Schemes.
1983-05-15
R.N. STRICKIAND AFOSR-81-O170 R.A. SCHOWENGERDT S. PERFORMING ORGANIZATION NAME AND ADDRESS 10. PROGRAM ELEMENT, PROJECT. TASK Ur,;t. o4 o . AREA & WORK...is the intent of research sponsored under this Grant to direct investi- gation into the following issues: () formulation of alternative architechtural
Status of Disabled People in India--Policy and Inclusion.
ERIC Educational Resources Information Center
Alur, Mithu
2002-01-01
This article addresses the contextual background of India's Integrated Child Development Scheme (ICDS) and examines why the ICDS policy does not refer to individuals with special needs. It concludes that exclusion has been deeply rooted within the socio-political system. Policy shifts promoting sustainable strategies of inclusion are explored.…
Parallel Processable Cryptographic Methods with Unbounded Practical Security.
ERIC Educational Resources Information Center
Rothstein, Jerome
Addressing the problem of protecting confidential information and data stored in computer databases from access by unauthorized parties, this paper details coding schemes which present such astronomical work factors to potential code breakers that security breaches are hopeless in any practical sense. Two procedures which can be used to encode for…
Computer Security Products Technology Overview
1988-10-01
13 3. DATABASE MANAGEMENT SYSTEMS ................................... 15 Definition...this paper addresses fall into the areas of multi-user hosts, database management systems (DBMS), workstations, networks, guards and gateways, and...provide a portion of that protection, for example, a password scheme, a file protection mechanism, a secure database management system, or even a
Consumer Frauds and Deceptions: A Learning Module.
ERIC Educational Resources Information Center
Waddell, Fred E.; And Others
This manual is designed to assist helping professionals responsible for developing consumer education programs for older adults on the topic of consumer fraud and deception. In a modular presentation format, the materials address the following areas of concern: (1) types of frauds and deceptions such as money schemes, mail order fraud,…
Toward computational models of magma genesis and geochemical transport in subduction zones
NASA Astrophysics Data System (ADS)
Katz, R.; Spiegelman, M.
2003-04-01
The chemistry of material erupted from subduction-related volcanoes records important information about the processes that lead to its formation at depth in the Earth. Self-consistent numerical simulations provide a useful tool for interpreting this data as they can explore the non-linear feedbacks between processes that control the generation and transport of magma. A model capable of addressing such issues should include three critical components: (1) a variable viscosity solid flow solver with smooth and accurate pressure and velocity fields, (2) a parameterization of mass transfer reactions between the solid and fluid phases and (3) a consistent fluid flow and reactive transport code. We report on progress on each of these parts. To handle variable-viscosity solid-flow in the mantle wedge, we are adapting a Patankar-based FAS multigrid scheme developed by Albers (2000, J. Comp. Phys.). The pressure field in this scheme is the solution to an elliptic equation on a staggered grid. Thus we expect computed pressure fields to have smooth gradient fields suitable for porous flow calculations, unlike those of commonly used penalty-method schemes. Use of a temperature and strain-rate dependent mantle rheology has been shown to have important consequences for the pattern of flow and the temperature structure in the wedge. For computing thermal structure we present a novel scheme that is a hybrid of Crank-Nicholson (CN) and Semi-Lagrangian (SL) methods. We have tested the SLCN scheme on advection across a broad range of Peclet numbers and show the results. This scheme is also useful for low-diffusivity chemical transport. We also describe our parameterization of hydrous mantle melting [Katz et. al., G3, 2002 in review]. This parameterization is designed to capture the melting behavior of peridotite--water systems over parameter ranges relevant to subduction. The parameterization incorporates data and intuition gained from laboratory experiments and thermodynamic calculations yet it remains flexible and computationally efficient. Given accurate solid-flow fields, a parameterization of hydrous melting and a method for calculating thermal structure (enforcing energy conservation), the final step is to integrate these components into a consistent framework for reactive-flow and chemical transport in deformable porous media. We present preliminary results for reactive flow in 2-D static and upwelling columns and discuss possible mechanical and chemical consequences of open system reactive melting with application to arcs.
NASA Technical Reports Server (NTRS)
Wu, Di; Dong, Xiquan; Xi, Baike; Feng, Zhe; Kennedy, Aaron; Mullendore, Gretchen; Gilmore, Matthew; Tao, Wei-Kuo
2013-01-01
This study investigates the impact of snow, graupel, and hail processes on simulated squall lines over the Southern Great Plains in the United States. The Weather Research and Forecasting (WRF) model is used to simulate two squall line events in Oklahoma during May 2007, and the simulations are validated against radar and surface observations. Several microphysics schemes are tested in this study, including the WRF 5-Class Microphysics (WSM5), WRF 6-Class Microphysics (WSM6), Goddard Cumulus Ensemble (GCE) Three Ice (3-ice) with graupel, Goddard Two Ice (2-ice), and Goddard 3-ice hail schemes. Simulated surface precipitation is sensitive to the microphysics scheme when the graupel or hail categories are included. All of the 3-ice schemes overestimate the total precipitation with WSM6 having the largest bias. The 2-ice schemes, without a graupel/hail category, produce less total precipitation than the 3-ice schemes. By applying a radar-based convective/stratiform partitioning algorithm, we find that including graupel/hail processes increases the convective areal coverage, precipitation intensity, updraft, and downdraft intensities, and reduces the stratiform areal coverage and precipitation intensity. For vertical structures, simulations have higher reflectivity values distributed aloft than the observed values in both the convective and stratiform regions. Three-ice schemes produce more high reflectivity values in convective regions, while 2-ice schemes produce more high reflectivity values in stratiform regions. In addition, this study has demonstrated that the radar-based convective/stratiform partitioning algorithm can reasonably identify WRF-simulated precipitation, wind, and microphysical fields in both convective and stratiform regions.
Lu, Yanrong; Li, Lixiang; Yang, Xing; Yang, Yixian
2015-01-01
Biometrics authenticated schemes using smart cards have attracted much attention in multi-server environments. Several schemes of this type where proposed in the past. However, many of them were found to have some design flaws. This paper concentrates on the security weaknesses of the three-factor authentication scheme by Mishra et al. After careful analysis, we find their scheme does not really resist replay attack while failing to provide an efficient password change phase. We further propose an improvement of Mishra et al.'s scheme with the purpose of preventing the security threats of their scheme. We demonstrate the proposed scheme is given to strong authentication against several attacks including attacks shown in the original scheme. In addition, we compare the performance and functionality with other multi-server authenticated key schemes.
Lu, Yanrong; Li, Lixiang; Yang, Xing; Yang, Yixian
2015-01-01
Biometrics authenticated schemes using smart cards have attracted much attention in multi-server environments. Several schemes of this type where proposed in the past. However, many of them were found to have some design flaws. This paper concentrates on the security weaknesses of the three-factor authentication scheme by Mishra et al. After careful analysis, we find their scheme does not really resist replay attack while failing to provide an efficient password change phase. We further propose an improvement of Mishra et al.’s scheme with the purpose of preventing the security threats of their scheme. We demonstrate the proposed scheme is given to strong authentication against several attacks including attacks shown in the original scheme. In addition, we compare the performance and functionality with other multi-server authenticated key schemes. PMID:25978373
NASA Astrophysics Data System (ADS)
Stanford, McKenna W.
The High Altitude Ice Crystals - High Ice Water Content (HAIC-HIWC) field campaign produced aircraft retrievals of total condensed water content (TWC), hydrometeor particle size distributions, and vertical velocity (w) in high ice water content regions of tropical mesoscale convective systems (MCSs). These observations are used to evaluate deep convective updraft properties in high-resolution nested Weather Research and Forecasting (WRF) simulations of observed MCSs. Because simulated hydrometeor properties are highly sensitive to the parameterization of microphysics, three commonly used microphysical parameterizations are tested, including two bulk schemes (Thompson and Morrison) and one bin scheme (Fast Spectral Bin Microphysics). A commonly documented bias in cloud-resolving simulations is the exaggeration of simulated radar reflectivities aloft in tropical MCSs. This may result from overly strong convective updrafts that loft excessive condensate mass and from simplified approximations of hydrometeor size distributions, properties, species separation, and microphysical processes. The degree to which the reflectivity bias is a separate function of convective dynamics, condensate mass, and hydrometeor size has yet to be addressed. This research untangles these components by comparing simulated and observed relationships between w, TWC, and hydrometer size as a function of temperature. All microphysics schemes produce median mass diameters that are generally larger than observed for temperatures between -10 °C and -40 °C and TWC > 1 g m-3. Observations produce a prominent mode in the composite mass size distribution around 300 microm, but under most conditions, all schemes shift the distribution mode to larger sizes. Despite a much greater number of samples, all simulations fail to reproduce observed high TWC or high w conditions between -20 °C and -40 °C in which only a small fraction of condensate mass is found in relatively large particle sizes. Increasing model resolution and employing explicit cloud droplet nucleation decrease the size bias, but not nearly enough to reproduce observations. Because simulated particle sizes are too large across all schemes when controlling for temperature, w, and TWC, this bias is hypothesized to partly result from errors in parameterized microphysical processes in addition to overly simplified hydrometeor properties such as mass-size relationships and particle size distribution parameters.
Goldschmidt, Andrea B.
2017-01-01
Background Binge eating is a marker of weight gain and obesity, and a hallmark feature of eating disorders. Yet, its component constructs—overeating and loss of control (LOC) while eating—are poorly understood and difficult to measure. Objective To critically review the human literature concerning the validity of LOC and overeating across the age and weight spectrum. Data sources English-language articles addressing the face, convergent, discriminant, and predictive validity of LOC and overeating were included. Results LOC and overeating appear to have adequate face validity. Emerging evidence supports the convergent and predictive validity of the LOC construct, given its unique cross-sectional and prospective associations with numerous anthropometric, psychosocial, and eating behavior-related factors. Overeating may be best conceptualized as a marker of excess weight status. Limitations Binge eating constructs, particularly in the context of subjectively large episodes, are challenging to measure reliably. Few studies addressed overeating in the absence of LOC, thereby limiting conclusions about the validity of the overeating construct independent of LOC. Additional studies addressing the discriminant validity of both constructs are warranted. Discussion Suggestions for future weight-related research and for appropriately defining binge eating in the eating disorders diagnostic scheme are presented. PMID:28165655
2013-01-01
Background The burden of disease due to non-communicable diseases (NCDs) is rising in low- and middle-income countries (LMICs) and funding for global health is increasingly limited. As a large contributor of development assistance for health, the US government has the potential to influence overall trends in NCDs. Results-based financing (RBF) has been proposed as a strategy to increase aid effectiveness and efficiency through incentives for positive performance and results in health programs, but its potential for addressing NCDs has not been explored. Methods Qualitative methods including literature review and key informant interviews were used to identify promising RBF mechanisms for addressing NCDs in resource-limited settings. Eight key informants identified by area of expertise participated in semi-structured interviews. Results The majority of RBF schemes to date have been applied to maternal and child health. Evidence from existing RBF programs suggests that RBF principles can be applied to health programs for NCDs. Several options were identified for US involvement with RBF for NCDs. Conclusion There is potential for the US to have a significant impact on NCDs in LMICs through a comprehensive RBF strategy for global health. RBF mechanisms should be tested for use in NCD programs through pilot programs incorporating robust impact evaluations. PMID:23368959
Beane, Chelsey R; Hobbs, Suzanne Havala; Thirumurthy, Harsha
2013-02-01
The burden of disease due to non-communicable diseases (NCDs) is rising in low- and middle-income countries (LMICs) and funding for global health is increasingly limited. As a large contributor of development assistance for health, the US government has the potential to influence overall trends in NCDs. Results-based financing (RBF) has been proposed as a strategy to increase aid effectiveness and efficiency through incentives for positive performance and results in health programs, but its potential for addressing NCDs has not been explored. Qualitative methods including literature review and key informant interviews were used to identify promising RBF mechanisms for addressing NCDs in resource-limited settings. Eight key informants identified by area of expertise participated in semi-structured interviews. The majority of RBF schemes to date have been applied to maternal and child health. Evidence from existing RBF programs suggests that RBF principles can be applied to health programs for NCDs. Several options were identified for US involvement with RBF for NCDs. There is potential for the US to have a significant impact on NCDs in LMICs through a comprehensive RBF strategy for global health. RBF mechanisms should be tested for use in NCD programs through pilot programs incorporating robust impact evaluations.
GSRP/David Marshall: Fully Automated Cartesian Grid CFD Application for MDO in High Speed Flows
NASA Technical Reports Server (NTRS)
2003-01-01
With the renewed interest in Cartesian gridding methodologies for the ease and speed of gridding complex geometries in addition to the simplicity of the control volumes used in the computations, it has become important to investigate ways of extending the existing Cartesian grid solver functionalities. This includes developing methods of modeling the viscous effects in order to utilize Cartesian grids solvers for accurate drag predictions and addressing the issues related to the distributed memory parallelization of Cartesian solvers. This research presents advances in two areas of interest in Cartesian grid solvers, viscous effects modeling and MPI parallelization. The development of viscous effects modeling using solely Cartesian grids has been hampered by the widely varying control volume sizes associated with the mesh refinement and the cut cells associated with the solid surface. This problem is being addressed by using physically based modeling techniques to update the state vectors of the cut cells and removing them from the finite volume integration scheme. This work is performed on a new Cartesian grid solver, NASCART-GT, with modifications to its cut cell functionality. The development of MPI parallelization addresses issues associated with utilizing Cartesian solvers on distributed memory parallel environments. This work is performed on an existing Cartesian grid solver, CART3D, with modifications to its parallelization methodology.
2013-06-21
potential temperature (Tripoli and Cotton , 1981), total wa- ter mixing ratio and cloud microphysics. The microphysics scheme has categories for cloud droplets...components, with diurnal variation, are both activated when the radiation scheme is included. A simpler scheme developed by Chen and Cotton (1987) is an...radiation. Additionally, one more simula- tion, Experiment 17, was conducted using the Chen– Cotton radiation scheme instead of the Harrington scheme
Performance improvement of robots using a learning control scheme
NASA Technical Reports Server (NTRS)
Krishna, Ramuhalli; Chiang, Pen-Tai; Yang, Jackson C. S.
1987-01-01
Many applications of robots require that the same task be repeated a number of times. In such applications, the errors associated with one cycle are also repeated every cycle of the operation. An off-line learning control scheme is used here to modify the command function which would result in smaller errors in the next operation. The learning scheme is based on a knowledge of the errors and error rates associated with each cycle. Necessary conditions for the iterative scheme to converge to zero errors are derived analytically considering a second order servosystem model. Computer simulations show that the errors are reduced at a faster rate if the error rate is included in the iteration scheme. The results also indicate that the scheme may increase the magnitude of errors if the rate information is not included in the iteration scheme. Modification of the command input using a phase and gain adjustment is also proposed to reduce the errors with one attempt. The scheme is then applied to a computer model of a robot system similar to PUMA 560. Improved performance of the robot is shown by considering various cases of trajectory tracing. The scheme can be successfully used to improve the performance of actual robots within the limitations of the repeatability and noise characteristics of the robot.
LevelScheme: A level scheme drawing and scientific figure preparation system for Mathematica
NASA Astrophysics Data System (ADS)
Caprio, M. A.
2005-09-01
LevelScheme is a scientific figure preparation system for Mathematica. The main emphasis is upon the construction of level schemes, or level energy diagrams, as used in nuclear, atomic, molecular, and hadronic physics. LevelScheme also provides a general infrastructure for the preparation of publication-quality figures, including support for multipanel and inset plotting, customizable tick mark generation, and various drawing and labeling tasks. Coupled with Mathematica's plotting functions and powerful programming language, LevelScheme provides a flexible system for the creation of figures combining diagrams, mathematical plots, and data plots. Program summaryTitle of program:LevelScheme Catalogue identifier:ADVZ Program obtainable from: CPC Program Library, Queen's University of Belfast, N. Ireland Program summary URL:http://cpc.cs.qub.ac.uk/summaries/ADVZ Operating systems:Any which supports Mathematica; tested under Microsoft Windows XP, Macintosh OS X, and Linux Programming language used:Mathematica 4 Number of bytes in distributed program, including test and documentation:3 051 807 Distribution format:tar.gz Nature of problem:Creation of level scheme diagrams. Creation of publication-quality multipart figures incorporating diagrams and plots. Method of solution:A set of Mathematica packages has been developed, providing a library of level scheme drawing objects, tools for figure construction and labeling, and control code for producing the graphics.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Berg, Larry K.; Kassianov, Evgueni I.; Long, Charles N.
2006-03-30
In previous work, Berg and Stull (2005) developed a new parameterization for Fair-Weather Cumuli (FWC). Preliminary testing of the new scheme used data collected during a field experiment conducted during the summer of 1996. This campaign included a few research flights conducted over three locations within the Atmospheric Radiation Measurement (ARM) Climate Research Facility (ACRF) Southern Great Plains (SGP) site. A more comprehensive verification of the new scheme requires a detailed climatology of FWC. Several cloud climatologies have been completed for the ACRF SGP, but these efforts have focused on either broad categories of clouds grouped by height and seasonmore » (e.g., Lazarus et al. 1999) or height and time of day (e.g., Dong et al. 2005). In these two examples, the low clouds were not separated by the type of cloud, either stratiform or cumuliform, nor were the horizontal chord length (the length of the cloud slice that passed directly overhead) or cloud aspect ratio (defined as the ratio of the cloud thickness to the cloud chord length) reported. Lane et al. (2002) presented distributions of cloud chord length, but only for one year. The work presented here addresses these shortcomings by looking explicitly at cases with FWC over five summers. Specifically, we will address the following questions: •Does the cloud fraction (CF), cloud-base height (CBH), and cloud-top height (CTH) of FWC change with the time of day or the year? •What is the distribution of FWC chord lengths? •Is there a relationship between the cloud chord length and the cloud thickness?« less
A Mixed Integer Linear Program for Airport Departure Scheduling
NASA Technical Reports Server (NTRS)
Gupta, Gautam; Jung, Yoon Chul
2009-01-01
Aircraft departing from an airport are subject to numerous constraints while scheduling departure times. These constraints include wake-separation constraints for successive departures, miles-in-trail separation for aircraft bound for the same departure fixes, and time-window or prioritization constraints for individual flights. Besides these, emissions as well as increased fuel consumption due to inefficient scheduling need to be included. Addressing all the above constraints in a single framework while allowing for resequencing of the aircraft using runway queues is critical to the implementation of the Next Generation Air Transport System (NextGen) concepts. Prior work on airport departure scheduling has addressed some of the above. However, existing methods use pre-determined runway queues, and schedule aircraft from these departure queues. The source of such pre-determined queues is not explicit, and could potentially be a subjective controller input. Determining runway queues and scheduling within the same framework would potentially result in better scheduling. This paper presents a mixed integer linear program (MILP) for the departure-scheduling problem. The program takes as input the incoming sequence of aircraft for departure from a runway, along with their earliest departure times and an optional prioritization scheme based on time-window of departure for each aircraft. The program then assigns these aircraft to the available departure queues and schedules departure times, explicitly considering wake separation and departure fix restrictions to minimize total delay for all aircraft. The approach is generalized and can be used in a variety of situations, and allows for aircraft prioritization based on operational as well as environmental considerations. We present the MILP in the paper, along with benefits over the first-come-first-serve (FCFS) scheme for numerous randomized problems based on real-world settings. The MILP results in substantially reduced delays as compared to FCFS, and the magnitude of the savings depends on the queue and departure fix structure. The MILP assumes deterministic aircraft arrival times at the runway queues. However, due to taxi time uncertainty, aircraft might arrive either earlier or later than these deterministic times. Thus, to incorporate this uncertainty, we present a method for using the MILP with "overlap discounted rolling planning horizon". The approach is based on valuing near-term decision results more than future ones. We develop a model of taxitime uncertainty based on real-world data, and then compare the baseline FCFS delays with delays using the above MILP in a simple rolling-horizon method and in the overlap discounted scheme.
75 FR 34953 - Airworthiness Directives; GA 8 Airvan (Pty) Ltd Models GA8 and GA8-TC320 Airplanes
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-21
...) rivet is found, before further flight, obtain an FAA-approved repair scheme from the manufacturer and incorporate this repair scheme. Due to FAA policy, the repair scheme/modification for crack damage must include an immediate repair of the crack. The repair scheme cannot be by repetitive inspection only. The...
A search for space energy alternatives
NASA Technical Reports Server (NTRS)
Gilbreath, W. P.; Billman, K. W.
1978-01-01
This paper takes a look at a number of schemes for converting radiant energy in space to useful energy for man. These schemes are possible alternatives to the currently most studied solar power satellite concept. Possible primary collection and conversion devices discussed include the space particle flux devices, solar windmills, photovoltaic devices, photochemical cells, photoemissive converters, heat engines, dielectric energy conversion, electrostatic generators, plasma solar collectors, and thermionic schemes. Transmission devices reviewed include lasers and masers.
Fuel quality/processing study. Volume 3: Fuel upgrading studies
NASA Technical Reports Server (NTRS)
Jones, G. E., Jr.; Bruggink, P.; Sinnett, C.
1981-01-01
The methods used to calculate the refinery selling prices for the turbine fuels of low quality are described. Detailed descriptions and economics of the upgrading schemes are included. These descriptions include flow diagrams showing the interconnection between processes and the stream flows involved. Each scheme is in a complete, integrated, stand alone facility. Except for the purchase of electricity and water, each scheme provides its own fuel and manufactures, when appropriate, its own hydrogen.
On the computational aspects of comminution in discrete element method
NASA Astrophysics Data System (ADS)
Chaudry, Mohsin Ali; Wriggers, Peter
2018-04-01
In this paper, computational aspects of crushing/comminution of granular materials are addressed. For crushing, maximum tensile stress-based criterion is used. Crushing model in discrete element method (DEM) is prone to problems of mass conservation and reduction in critical time step. The first problem is addressed by using an iterative scheme which, depending on geometric voids, recovers mass of a particle. In addition, a global-local framework for DEM problem is proposed which tends to alleviate the local unstable motion of particles and increases the computational efficiency.
Costs and economic consequences of a help-at-home scheme for older people in England.
Bauer, Annette; Knapp, Martin; Wistow, Gerald; Perkins, Margaret; King, Derek; Iemmi, Valentina
2017-03-01
Solutions to support older people to live independently and reduce the cost of an ageing population are high on the political agenda of most developed countries. Help-at-home schemes offer a mix of community support with the aim to address a range of well-being needs. However, not much is currently known about the costs, outcomes and economic consequences of such schemes. Understanding their impact on individuals' well-being and the economic consequences for local and central government can contribute to decisions about sustainable long-term care financing. This article presents results from a mixed-methods study of a voluntary sector-provided help-at-home scheme in England for people of 55 years and older. The study followed a participatory approach, which involved staff and volunteers. Data were collected during 2012 and 2013. Social care-related quality of life was measured with the Adult Social Care Outcomes Toolkit for 24 service users (59% response rate) when they started using the scheme and 4-6 months later. A customised questionnaire that captured resource use and well-being information was sent to 1064 service users (63% response rate). The same tool was used in assessment with service users who started using the scheme between November 2012 and April 2013 (100% response rate). Costs of the scheme were established from local budget and activity data. The scheme was likely to achieve a mean net benefit of £1568 per person from a local government and National Health Service (NHS) perspective and £3766 from the perspective of the individual. An expenditure of £2851 per person accrued to central government for the additional redistribution of benefit payments to older people. This article highlights the potential contribution of voluntary sector-run help-at-home schemes to an affordable welfare system for ageing societies. © 2016 John Wiley & Sons Ltd.
The Impact of STTP on the GEFS Forecast of Week-2 and Beyond in the Presence of Stochastic Physics
NASA Astrophysics Data System (ADS)
Hou, D.
2015-12-01
The Stochastic Total Tendency Perturbation (STTP) scheme was designed to represent the model related uncertainties not considered in the numerical model itself and the physics based stochastic schemes. It has been applied in NCEP's Global Ensemble Forecast System (GEFS) since 2010, showing significant positive impacts on the forecast with improved spread-error ratio and probabilistic forecast skills. The scheme is robust and it went well with the resolution increases and model improvements in 2012 and 2015 with minimum changes. Recently, a set of stochastic physics schemes are coded in the Global Forecast System model and tested in the GEFS package. With these schemes turned on and STTP off, the forecast performance is comparable or even superior to the operational GEFS, in which STTP is the only contributor to the model related uncertainties. This is true especially in week one. However, over the second week and beyond, both the experimental and the operational GEFS has insufficient spread, especially over the warmer seasons. This is a major challenge when the GEFS is extended to sub-seasonal (week 4-6) time scales. The impact of STTP on the GEFS forecast in the presence of stochastic physics is investigated by turning both the stochastic physics schemes and STTP on and carefully tuning their amplitudes. Analysis will be focused on the forecast of extended range, especially week 2. Its impacts on week 3-4 will also be addressed.
Advanced Three-Dimensional Display System
NASA Technical Reports Server (NTRS)
Geng, Jason
2005-01-01
A desktop-scale, computer-controlled display system, initially developed for NASA and now known as the VolumeViewer(TradeMark), generates three-dimensional (3D) images of 3D objects in a display volume. This system differs fundamentally from stereoscopic and holographic display systems: The images generated by this system are truly 3D in that they can be viewed from almost any angle, without the aid of special eyeglasses. It is possible to walk around the system while gazing at its display volume to see a displayed object from a changing perspective, and multiple observers standing at different positions around the display can view the object simultaneously from their individual perspectives, as though the displayed object were a real 3D object. At the time of writing this article, only partial information on the design and principle of operation of the system was available. It is known that the system includes a high-speed, silicon-backplane, ferroelectric-liquid-crystal spatial light modulator (SLM), multiple high-power lasers for projecting images in multiple colors, a rotating helix that serves as a moving screen for displaying voxels [volume cells or volume elements, in analogy to pixels (picture cells or picture elements) in two-dimensional (2D) images], and a host computer. The rotating helix and its motor drive are the only moving parts. Under control by the host computer, a stream of 2D image patterns is generated on the SLM and projected through optics onto the surface of the rotating helix. The system utilizes a parallel pixel/voxel-addressing scheme: All the pixels of the 2D pattern on the SLM are addressed simultaneously by laser beams. This parallel addressing scheme overcomes the difficulty of achieving both high resolution and a high frame rate in a raster scanning or serial addressing scheme. It has been reported that the structure of the system is simple and easy to build, that the optical design and alignment are not difficult, and that the system can be built by use of commercial off-the-shelf products. A prototype of the system displays an image of 1,024 by 768 by 170 (=133,693,440) voxels. In future designs, the resolution could be increased. The maximum number of voxels that can be generated depends upon the spatial resolution of SLM and the speed of rotation of the helix. For example, one could use an available SLM that has 1,024 by 1,024 pixels. Incidentally, this SLM is capable of operation at a switching speed of 300,000 frames per second. Implementation of full-color displays in future versions of the system would be straightforward: One could use three SLMs for red, green, and blue, respectively, and the colors of the voxels could be automatically controlled. An optically simpler alternative would be to use a single red/green/ blue light projector and synchronize the projection of each color with the generation of patterns for that color on a single SLM.
Carlson, Josh J; Sullivan, Sean D; Garrison, Louis P; Neumann, Peter J; Veenstra, David L
2010-08-01
To identify, categorize and examine performance-based health outcomes reimbursement schemes for medical technology. We performed a review of performance-based health outcomes reimbursement schemes over the past 10 years (7/98-010/09) using publicly available databases, web and grey literature searches, and input from healthcare reimbursement experts. We developed a taxonomy of scheme types by inductively organizing the schemes identified according to the timing, execution, and health outcomes measured in the schemes. Our search yielded 34 coverage with evidence development schemes, 10 conditional treatment continuation schemes, and 14 performance-linked reimbursement schemes. The majority of schemes are in Europe and Australia, with an increasing number in Canada and the U.S. These schemes have the potential to alter the reimbursement and pricing landscape for medical technology, but significant challenges, including high transaction costs and insufficient information systems, may limit their long-term impact. Future studies regarding experiences and outcomes of implemented schemes are necessary. Copyright 2010 Elsevier Ireland Ltd. All rights reserved.
Unified Approach To Control Of Motions Of Mobile Robots
NASA Technical Reports Server (NTRS)
Seraji, Homayoun
1995-01-01
Improved computationally efficient scheme developed for on-line coordinated control of both manipulation and mobility of robots that include manipulator arms mounted on mobile bases. Present scheme similar to one described in "Coordinated Control of Mobile Robotic Manipulators" (NPO-19109). Both schemes based on configuration-control formalism. Present one incorporates explicit distinction between holonomic and nonholonomic constraints. Several other prior articles in NASA Tech Briefs discussed aspects of configuration-control formalism. These include "Increasing the Dexterity of Redundant Robots" (NPO-17801), "Redundant Robot Can Avoid Obstacles" (NPO-17852), "Configuration-Control Scheme Copes with Singularities" (NPO-18556), "More Uses for Configuration Control of Robots" (NPO-18607/NPO-18608).
A Review of High-Order and Optimized Finite-Difference Methods for Simulating Linear Wave Phenomena
NASA Technical Reports Server (NTRS)
Zingg, David W.
1996-01-01
This paper presents a review of high-order and optimized finite-difference methods for numerically simulating the propagation and scattering of linear waves, such as electromagnetic, acoustic, or elastic waves. The spatial operators reviewed include compact schemes, non-compact schemes, schemes on staggered grids, and schemes which are optimized to produce specific characteristics. The time-marching methods discussed include Runge-Kutta methods, Adams-Bashforth methods, and the leapfrog method. In addition, the following fourth-order fully-discrete finite-difference methods are considered: a one-step implicit scheme with a three-point spatial stencil, a one-step explicit scheme with a five-point spatial stencil, and a two-step explicit scheme with a five-point spatial stencil. For each method studied, the number of grid points per wavelength required for accurate simulation of wave propagation over large distances is presented. Recommendations are made with respect to the suitability of the methods for specific problems and practical aspects of their use, such as appropriate Courant numbers and grid densities. Avenues for future research are suggested.
Hybrid detection of lung nodules on CT scan images
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lu, Lin; Tan, Yongqiang; Schwartz, Lawrence H.
Purpose: The diversity of lung nodules poses difficulty for the current computer-aided diagnostic (CAD) schemes for lung nodule detection on computed tomography (CT) scan images, especially in large-scale CT screening studies. We proposed a novel CAD scheme based on a hybrid method to address the challenges of detection in diverse lung nodules. Methods: The hybrid method proposed in this paper integrates several existing and widely used algorithms in the field of nodule detection, including morphological operation, dot-enhancement based on Hessian matrix, fuzzy connectedness segmentation, local density maximum algorithm, geodesic distance map, and regression tree classification. All of the adopted algorithmsmore » were organized into tree structures with multi-nodes. Each node in the tree structure aimed to deal with one type of lung nodule. Results: The method has been evaluated on 294 CT scans from the Lung Image Database Consortium (LIDC) dataset. The CT scans were randomly divided into two independent subsets: a training set (196 scans) and a test set (98 scans). In total, the 294 CT scans contained 631 lung nodules, which were annotated by at least two radiologists participating in the LIDC project. The sensitivity and false positive per scan for the training set were 87% and 2.61%. The sensitivity and false positive per scan for the testing set were 85.2% and 3.13%. Conclusions: The proposed hybrid method yielded high performance on the evaluation dataset and exhibits advantages over existing CAD schemes. We believe that the present method would be useful for a wide variety of CT imaging protocols used in both routine diagnosis and screening studies.« less
Healthcare Finance in the Kingdom of Saudi Arabia: A Qualitative Study of Householders' Attitudes.
Al-Hanawi, Mohammed Khaled; Alsharqi, Omar; Almazrou, Saja; Vaidya, Kirit
2018-02-01
The public sector healthcare system in Saudi Arabia, essentially financed by oil revenues and 'free at the point of delivery', is coming under increasing strain due to escalating expenditure and an increasingly volatile oil market and is likely to be unsustainable in the medium to long term. This study examines how satisfied the Saudi people are with their public sector healthcare services and assesses their willingness to contribute to financing the system through a national health insurance scheme. The study also examines public preferences and expectations of a future national health insurance system. A total of 36 heads of households participated in face-to-face audio-recorded semi-structured interviews. The participants were purposefully selected based on different socio-economic and socio-demographic factors from urban and rural areas to represent the geographical diversity that would presumably influence individual views, expectations, preferences and healthcare experiences. The evidence showed some dissatisfaction with the provision and quality of current public sector healthcare services, including the availability of appointments, waiting times and the availability of drugs. The households indicated a willingness to contribute to a national insurance scheme, conditional upon improvements in the quality of public sector healthcare services. The results also revealed a variety of preferences and expectations regarding the proposed national health insurance scheme. Quality improvement is a key factor that could motivate the Saudi people to contribute to financing the healthcare system. A new authority, consisting of a partnership between the public and private sectors under government supervision, could represent an acceptable option for addressing the variation in public preferences.
A Numerical Study of Cirrus Clouds. Part I: Model Description.
NASA Astrophysics Data System (ADS)
Liu, Hui-Chun; Wang, Pao K.; Schlesinger, Robert E.
2003-04-01
This article, the first of a two-part series, presents a detailed description of a two-dimensional numerical cloud model directed toward elucidating the physical processes governing the evolution of cirrus clouds. The two primary scientific purposes of this work are (a) to determine the evolution and maintenance mechanisms of cirrus clouds and try to explain why some cirrus can persist for a long time; and (b) to investigate the influence of certain physical factors such as radiation, ice crystal habit, latent heat, ventilation effects, and aggregation mechanisms on the evolution of cirrus. The second part will discuss sets of model experiments that were run to address objectives (a) and (b), respectively.As set forth in this paper, the aforementioned two-dimensional numerical model, which comprises the research tool for this study, is organized into three modules that embody dynamics, microphysics, and radiation. The dynamic module develops a set of equations to describe shallow moist convection, also parameterizing turbulence by using a 1.5-order closure scheme. The microphysical module uses a double-moment scheme to simulate the evolution of the size distribution of ice particles. Heterogeneous and homogeneous nucleation of haze particles are included, along with other ice crystal processes such as diffusional growth, sedimentation, and aggregation. The radiation module uses a two-stream radiative transfer scheme to determine the radiative fluxes and heating rates, while the cloud optical properties are determined by the modified anomalous diffraction theory (MADT) for ice particles. One of the main advantages of this cirrus model is its explicit formulation of the microphysical and radiative properties as functions of ice crystal habit.
Qualitative analysis scheme based on the properties of ion exchangers (in French)
DOE Office of Scientific and Technical Information (OSTI.GOV)
Machiroux, R.; Merciny, E.; Schreiber, A.
1973-01-01
A systematic scheme of qualitative analysis of some cations is presented. For didactic purposes the properties of cationic and anionic ion exchangers were used. At the present time, this scheme is limited to 23 ions, including Sr. (auth)
An extrapolation scheme for solid-state NMR chemical shift calculations
NASA Astrophysics Data System (ADS)
Nakajima, Takahito
2017-06-01
Conventional quantum chemical and solid-state physical approaches include several problems to accurately calculate solid-state nuclear magnetic resonance (NMR) properties. We propose a reliable computational scheme for solid-state NMR chemical shifts using an extrapolation scheme that retains the advantages of these approaches but reduces their disadvantages. Our scheme can satisfactorily yield solid-state NMR magnetic shielding constants. The estimated values have only a small dependence on the low-level density functional theory calculation with the extrapolation scheme. Thus, our approach is efficient because the rough calculation can be performed in the extrapolation scheme.
NASA Technical Reports Server (NTRS)
Yefet, Amir; Petropoulos, Peter G.
1999-01-01
We consider a divergence-free non-dissipative fourth-order explicit staggered finite difference scheme for the hyperbolic Maxwell's equations. Special one-sided difference operators are derived in order to implement the scheme near metal boundaries and dielectric interfaces. Numerical results show the scheme is long-time stable, and is fourth-order convergent over complex domains that include dielectric interfaces and perfectly conducting surfaces. We also examine the scheme's behavior near metal surfaces that are not aligned with the grid axes, and compare its accuracy to that obtained by the Yee scheme.
Simulation of the West African Monsoon using the MIT Regional Climate Model
NASA Astrophysics Data System (ADS)
Im, Eun-Soon; Gianotti, Rebecca L.; Eltahir, Elfatih A. B.
2013-04-01
We test the performance of the MIT Regional Climate Model (MRCM) in simulating the West African Monsoon. MRCM introduces several improvements over Regional Climate Model version 3 (RegCM3) including coupling of Integrated Biosphere Simulator (IBIS) land surface scheme, a new albedo assignment method, a new convective cloud and rainfall auto-conversion scheme, and a modified boundary layer height and cloud scheme. Using MRCM, we carried out a series of experiments implementing two different land surface schemes (IBIS and BATS) and three convection schemes (Grell with the Fritsch-Chappell closure, standard Emanuel, and modified Emanuel that includes the new convective cloud scheme). Our analysis primarily focused on comparing the precipitation characteristics, surface energy balance and large scale circulations against various observations. We document a significant sensitivity of the West African monsoon simulation to the choices of the land surface and convection schemes. In spite of several deficiencies, the simulation with the combination of IBIS and modified Emanuel schemes shows the best performance reflected in a marked improvement of precipitation in terms of spatial distribution and monsoon features. In particular, the coupling of IBIS leads to representations of the surface energy balance and partitioning that are consistent with observations. Therefore, the major components of the surface energy budget (including radiation fluxes) in the IBIS simulations are in better agreement with observation than those from our BATS simulation, or from previous similar studies (e.g Steiner et al., 2009), both qualitatively and quantitatively. The IBIS simulations also reasonably reproduce the dynamical structure of vertically stratified behavior of the atmospheric circulation with three major components: westerly monsoon flow, African Easterly Jet (AEJ), and Tropical Easterly Jet (TEJ). In addition, since the modified Emanuel scheme tends to reduce the precipitation amount, it improves the precipitation over regions suffering from systematic wet bias.
Addressing poverty through disease control programmes: examples from Tuberculosis control in India
2012-01-01
Introduction Tuberculosis remains a major public health problem in India with the country accounting for one-fifth or 21% of all tuberculosis cases reported globally. The purpose of the study was to obtain an understanding on pro-poor initiatives within the framework of tuberculosis control programme in India and to identify mechanisms to improve the uptake and access to TB services among the poor. Methodology A national level workshop was held with participation from all relevant stakeholder groups. This study conducted during the stakeholder workshop adopted participatory research methods. The data was elicited through consultative and collegiate processes. The research study also factored information from primary and secondary sources that included literature review examining poverty headcount ratios and below poverty line population in the country; and quasi-profiling assessments to identify poor, backward and tribal districts as defined by the TB programme in India. Results Results revealed that current pro-poor initiatives in TB control included collaboration with private providers and engaging community to improve access among the poor to TB diagnostic and treatment services. The participants identified gaps in existing pro-poor strategies that related to implementation of advocacy, communication and social mobilisation; decentralisation of DOT; and incentives for the poor through the available schemes for public-private partnerships and provided key recommendations for action. Synergies between TB control programme and centrally sponsored social welfare schemes and state specific social welfare programmes aimed at benefitting the poor were unclear. Conclusion Further in-depth analysis and systems/policy/operations research exploring pro-poor initiatives, in particular examining service delivery synergies between existing poverty alleviation schemes and TB control programme is essential. The understanding, reflection and knowledge of the key stakeholders during this participatory workshop provides recommendations for action, further planning and research on pro-poor TB centric interventions in the country. PMID:22449205
DISSECT: a new mnemonic-based approach to the categorization of aortic dissection.
Dake, M D; Thompson, M; van Sambeek, M; Vermassen, F; Morales, J P
2013-08-01
Classification systems for aortic dissection provide important guides to clinical decision-making, but the relevance of traditional categorization schemes is being questioned in an era when endovascular techniques are assuming a growing role in the management of this frequently complex and catastrophic entity. In recognition of the expanding range of interventional therapies now used as alternatives to conventional treatment approaches, the Working Group on Aortic Diseases of the DEFINE Project developed a categorization system that features the specific anatomic and clinical manifestations of the disease process that are most relevant to contemporary decision-making. The DISSECT classification system is a mnemonic-based approach to the evaluation of aortic dissection. It guides clinicians through an assessment of six critical characteristics that facilitate optimal communication of the most salient details that currently influence the selection of a therapeutic option, including those findings that are key when considering an endovascular procedure, but are not taken into account by the DeBakey or Stanford categorization schemes. The six features of aortic dissection include: duration of disease; intimal tear location; size of the dissected aorta; segmental extent of aortic involvement; clinical complications of the dissection, and thrombus within the aortic false lumen. In current clinical practice, endovascular therapy is increasingly considered as an alternative to medical management or open surgical repair in select cases of type B aortic dissection. Currently, endovascular aortic repair is not used for patients with type A aortic dissection, but catheter-based techniques directed at peripheral branch vessel ischemia that may complicate type A dissection are considered valuable adjunctive interventions, when indicated. The use of a new system for categorization of aortic dissection, DISSECT, addresses the shortcomings of well-known established schemes devised more than 40 years ago, before the introduction of endovascular techniques. It will serve as a guide to support a critical analysis of contemporary therapeutic options and inform management decisions based on specific features of the disease process. Copyright © 2013 European Society for Vascular Surgery. All rights reserved.
Adebayo, Esther F; Uthman, Olalekan A; Wiysonge, Charles S; Stern, Erin A; Lamont, Kim T; Ataguba, John E
2015-12-08
Low-income and middle-income countries (LMICs) have difficulties achieving universal financial protection, which is primordial for universal health coverage. A promising avenue to provide universal financial protection for the informal sector and the rural populace is community-based health insurance (CBHI). We systematically assessed and synthesised factors associated with CBHI enrolment in LMICs. We searched PubMed, Scopus, ERIC, PsychInfo, Africa-Wide Information, Academic Search Premier, Business Source Premier, WHOLIS, CINAHL, Cochrane Library, conference proceedings, and reference lists for eligible studies available by 31 October 2013; regardless of publication status. We included both quantitative and qualitative studies in the review. Both quantitative and qualitative studies demonstrated low levels of income and lack of financial resources as major factors affecting enrolment. Also, poor healthcare quality (including stock-outs of drugs and medical supplies, poor healthcare worker attitudes, and long waiting times) was found to be associated with low CBHI coverage. Trust in both the CBHI scheme and healthcare providers were also found to affect enrolment. Educational attainment (less educated are willing to pay less than highly educated), sex (men are willing to pay more than women), age (younger are willing to pay more than older individuals), and household size (larger households are willing to pay more than households with fewer members) also influenced CBHI enrolment. In LMICs, while CBHI schemes may be helpful in the short term to address the issue of improving the rural population and informal workers' access to health services, they still face challenges. Lack of funds, poor quality of care, and lack of trust are major reasons for low CBHI coverage in LMICs. If CBHI schemes are to serve as a means to providing access to health services, at least in the short term, then attention should be paid to the issues that militate against their success.
Uncertainties in modelling the climate impact of irrigation
NASA Astrophysics Data System (ADS)
de Vrese, Philipp; Hagemann, Stefan
2017-11-01
Irrigation-based agriculture constitutes an essential factor for food security as well as fresh water resources and has a distinct impact on regional and global climate. Many issues related to irrigation's climate impact are addressed in studies that apply a wide range of models. These involve substantial uncertainties related to differences in the model's structure and its parametrizations on the one hand and the need for simplifying assumptions for the representation of irrigation on the other hand. To address these uncertainties, we used the Max Planck Institute for Meteorology's Earth System model into which a simple irrigation scheme was implemented. In order to estimate possible uncertainties with regard to the model's more general structure, we compared the climate impact of irrigation between three simulations that use different schemes for the land-surface-atmosphere coupling. Here, it can be shown that the choice of coupling scheme does not only affect the magnitude of possible impacts but even their direction. For example, when using a scheme that does not explicitly resolve spatial subgrid scale heterogeneity at the surface, irrigation reduces the atmospheric water content, even in heavily irrigated regions. Contrarily, in simulations that use a coupling scheme that resolves heterogeneity at the surface or even within the lowest layers of the atmosphere, irrigation increases the average atmospheric specific humidity. A second experiment targeted possible uncertainties related to the representation of irrigation characteristics. Here, in four simulations the irrigation effectiveness (controlled by the target soil moisture and the non-vegetated fraction of the grid box that receives irrigation) and the timing of delivery were varied. The second experiment shows that uncertainties related to the modelled irrigation characteristics, especially the irrigation effectiveness, are also substantial. In general the impact of irrigation on the state of the land surface is more than three times larger when assuming a low irrigation effectiveness than when a high effectiveness is assumed. For certain variables, such as the vertically integrated water vapour, the impact is almost an order of magnitude larger. The timing of irrigation also has non-negligible effects on the simulated climate impacts and it can strongly alter their seasonality.
Ensuring Data Storage Security in Tree cast Routing Architecture for Sensor Networks
NASA Astrophysics Data System (ADS)
Kumar, K. E. Naresh; Sagar, U. Vidya; Waheed, Mohd. Abdul
2010-10-01
In this paper presents recent advances in technology have made low-cost, low-power wireless sensors with efficient energy consumption. A network of such nodes can coordinate among themselves for distributed sensing and processing of certain data. For which, we propose an architecture to provide a stateless solution in sensor networks for efficient routing in wireless sensor networks. This type of architecture is known as Tree Cast. We propose a unique method of address allocation, building up multiple disjoint trees which are geographically inter-twined and rooted at the data sink. Using these trees, routing messages to and from the sink node without maintaining any routing state in the sensor nodes is possible. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, this routing architecture moves the application software and databases to the large data centers, where the management of the data and services may not be fully trustworthy. This unique attribute, however, poses many new security challenges which have not been well understood. In this paper, we focus on data storage security, which has always been an important aspect of quality of service. To ensure the correctness of users' data in this architecture, we propose an effective and flexible distributed scheme with two salient features, opposing to its predecessors. By utilizing the homomorphic token with distributed verification of erasure-coded data, our scheme achieves the integration of storage correctness insurance and data error localization, i.e., the identification of misbehaving server(s). Unlike most prior works, the new scheme further supports secure and efficient dynamic operations on data blocks, including: data update, delete and append. Extensive security and performance analysis shows that the proposed scheme is highly efficient and resilient against Byzantine failure, malicious data modification attack, and even server colluding attacks.
NASA Astrophysics Data System (ADS)
Lamraoui, F.; Booth, J. F.; Naud, C. M.
2017-12-01
The representation of subgrid-scale processes of low-level marine clouds located in the post-cold-frontal region poses a serious challenge for climate models. More precisely, the boundary layer parameterizations are predominantly designed for individual regimes that can evolve gradually over time and does not accommodate the cold front passage that can overly modify the boundary layer rapidly. Also, the microphysics schemes respond differently to the quick development of the boundary layer schemes, especially under unstable conditions. To improve the understanding of cloud physics in the post-cold frontal region, the present study focuses on exploring the relationship between cloud properties, the local processes and large-scale conditions. In order to address these questions, we explore the WRF sensitivity to the interaction between various combinations of the boundary layer and microphysics parameterizations, including the Community Atmospheric Model version 5 (CAM5) physical package in a perturbed physics ensemble. Then, we evaluate these simulations against ground-based ARM observations over the Azores. The WRF-based simulations demonstrate particular sensitivities of the marine cold front passage and the associated post-cold frontal clouds to the domain size, the resolution and the physical parameterizations. First, it is found that in multiple different case studies the model cannot generate the cold front passage when the domain size is larger than 3000 km2. Instead, the modeled cold front stalls, which shows the importance of properly capturing the synoptic scale conditions. The simulation reveals persistent delay in capturing the cold front passage and also an underestimated duration of the post-cold-frontal conditions. Analysis of the perturbed physics ensemble shows that changing the microphysics scheme leads to larger differences in the modeled clouds than changing the boundary layer scheme. The in-cloud heating tendencies are analyzed to explain this sensitivity.
Meyer, Markus A.; Chand, Tanzila; Priess, Joerg A.
2015-01-01
Biomass for bioenergy is debated for its potential synergies or tradeoffs with other provisioning and regulating ecosystem services (ESS). This biomass may originate from different production systems and may be purposefully grown or obtained from residues. Increased concerns globally about the sustainable production of biomass for bioenergy has resulted in numerous certification schemes focusing on best management practices, mostly operating at the plot/field scale. In this study, we compare the ESS of two watersheds in the southeastern US. We show the ESS tradeoffs and synergies of plantation forestry, i.e., pine poles, and agricultural production, i.e., wheat straw and corn stover, with the counterfactual natural or semi-natural forest in both watersheds. The plantation forestry showed less distinct tradeoffs than did corn and wheat production, i.e., for carbon storage, P and sediment retention, groundwater recharge, and biodiversity. Using indicators of landscape composition and configuration, we showed that landscape planning can affect the overall ESS supply and can partly determine if locally set environmental thresholds are being met. Indicators on landscape composition, configuration and naturalness explained more than 30% of the variation in ESS supply. Landscape elements such as largely connected forest patches or more complex agricultural patches, e.g., mosaics with shrub and grassland patches, may enhance ESS supply in both of the bioenergy production systems. If tradeoffs between biomass production and other ESS are not addressed by landscape planning, it may be reasonable to include rules in certification schemes that require, e.g., the connectivity of natural or semi-natural forest patches in plantation forestry or semi-natural landscape elements in agricultural production systems. Integrating indicators on landscape configuration and composition into certification schemes is particularly relevant considering that certification schemes are governance tools used to ensure comparable sustainability standards for biomass produced in countries with variable or absent legal frameworks for landscape planning. PMID:25768660
NASA Technical Reports Server (NTRS)
Jameson, Antony
1994-01-01
The effect of artificial diffusion on discrete shock structures is examined for a family of schemes which includes scalar diffusion, convective upwind and split pressure (CUSP) schemes, and upwind schemes with characteristics splitting. The analysis leads to conditions on the diffusive flux such that stationary discrete shocks can contain a single interior point. The simplest formulation which meets these conditions is a CUSP scheme in which the coefficients of the pressure differences is fully determined by the coefficient of convective diffusion. It is also shown how both the characteristic and CUSP schemes can be modified to preserve constant stagnation enthalpy in steady flow, leading to four variants, the E and H-characteristic schemes, and the E and H-CUSP schemes. Numerical results are presented which confirm the properties of these schemes.
NASA Technical Reports Server (NTRS)
Przekwas, A. J.; Yang, H. Q.
1989-01-01
The capability of accurate nonlinear flow analysis of resonance systems is essential in many problems, including combustion instability. Classical numerical schemes are either too diffusive or too dispersive especially for transient problems. In the last few years, significant progress has been made in the numerical methods for flows with shocks. The objective was to assess advanced shock capturing schemes on transient flows. Several numerical schemes were tested including TVD, MUSCL, ENO, FCT, and Riemann Solver Godunov type schemes. A systematic assessment was performed on scalar transport, Burgers' and gas dynamic problems. Several shock capturing schemes are compared on fast transient resonant pipe flow problems. A system of 1-D nonlinear hyperbolic gas dynamics equations is solved to predict propagation of finite amplitude waves, the wave steepening, formation, propagation, and reflection of shocks for several hundred wave cycles. It is shown that high accuracy schemes can be used for direct, exact nonlinear analysis of combustion instability problems, preserving high harmonic energy content for long periods of time.
High Order Schemes in Bats-R-US for Faster and More Accurate Predictions
NASA Astrophysics Data System (ADS)
Chen, Y.; Toth, G.; Gombosi, T. I.
2014-12-01
BATS-R-US is a widely used global magnetohydrodynamics model that originally employed second order accurate TVD schemes combined with block based Adaptive Mesh Refinement (AMR) to achieve high resolution in the regions of interest. In the last years we have implemented fifth order accurate finite difference schemes CWENO5 and MP5 for uniform Cartesian grids. Now the high order schemes have been extended to generalized coordinates, including spherical grids and also to the non-uniform AMR grids including dynamic regridding. We present numerical tests that verify the preservation of free-stream solution and high-order accuracy as well as robust oscillation-free behavior near discontinuities. We apply the new high order accurate schemes to both heliospheric and magnetospheric simulations and show that it is robust and can achieve the same accuracy as the second order scheme with much less computational resources. This is especially important for space weather prediction that requires faster than real time code execution.
NASA Technical Reports Server (NTRS)
Shu, Chi-Wang
1992-01-01
The nonlinear stability of compact schemes for shock calculations is investigated. In recent years compact schemes were used in various numerical simulations including direct numerical simulation of turbulence. However to apply them to problems containing shocks, one has to resolve the problem of spurious numerical oscillation and nonlinear instability. A framework to apply nonlinear limiting to a local mean is introduced. The resulting scheme can be proven total variation (1D) or maximum norm (multi D) stable and produces nice numerical results in the test cases. The result is summarized in the preprint entitled 'Nonlinearly Stable Compact Schemes for Shock Calculations', which was submitted to SIAM Journal on Numerical Analysis. Research was continued on issues related to two and three dimensional essentially non-oscillatory (ENO) schemes. The main research topics include: parallel implementation of ENO schemes on Connection Machines; boundary conditions; shock interaction with hydrogen bubbles, a preparation for the full combustion simulation; and direct numerical simulation of compressible sheared turbulence.
NASA Astrophysics Data System (ADS)
Kyle, P.; Patel, P.; Calvin, K. V.
2014-12-01
Global integrated assessment models used for understanding the linkages between the future energy, agriculture, and climate systems typically represent between 8 and 30 geopolitical macro-regions, balancing the benefits of geographic resolution with the costs of additional data collection, processing, analysis, and computing resources. As these models are continually being improved and updated in order to address new questions for the research and policy communities, it is worth examining the consequences of the country-to-region mapping schemes used for model results. This study presents an application of a data processing system built for the GCAM integrated assessment model that allows any country-to-region assignments, with a minimum of four geopolitical regions and a maximum of 185. We test ten different mapping schemes, including the specific mappings used in existing major integrated assessment models. We also explore the impacts of clustering nations into regions according to the similarity of the structure of each nation's energy and agricultural sectors, as indicated by multivariate analysis. Scenarios examined include a reference scenario, a low-emissions scenario, and scenarios with agricultural and buildings sector climate change impacts. We find that at the global level, the major output variables (primary energy, agricultural land use) are surprisingly similar regardless of regional assignments, but at finer geographic scales, differences are pronounced. We suggest that enhancing geographic resolution is advantageous for analysis of climate impacts on the buildings and agricultural sectors, due to the spatial heterogeneity of these drivers.
Application of LAC-type processes and concepts to nonrecreation management issues in protected areas
Linda Merigliano; David N. Cole; David J. Parsons
1997-01-01
When Limits of Acceptable Change concepts are applied to nonrecreational issues, two primary problems are encountered: (1) developing zoning schemes which are compatible when multiple issues are addressed, and (2) defining the desired condition and establishing measurable standards for ecosystem attributes which change in unpredictable ways. Approaches to overcome...
ERIC Educational Resources Information Center
Sparrman, Carl-Axel, Ed.; Williams, Michael, Ed.
This report describes a 1-week residential in-service course dealing with intercultural education and attended by European teachers from ten countries. The following presentations are reviewed: (1) "Welcoming Address" (D. Lawton); (2) "Interculturalism and the New Swedish Teacher-Training Programme" (C. Sparrman); (3)…
Efficient Cryptography for the Next Generation Secure Cloud
ERIC Educational Resources Information Center
Kupcu, Alptekin
2010-01-01
Peer-to-peer (P2P) systems, and client-server type storage and computation outsourcing constitute some of the major applications that the next generation cloud schemes will address. Since these applications are just emerging, it is the perfect time to design them with security and privacy in mind. Furthermore, considering the high-churn…
Rethinking Assessment: Managing Behaviour and Reducing Disaffection
ERIC Educational Resources Information Center
Didaskalou, Eleni; Millward, Alan
2007-01-01
Disaffection and behaviour problems continue to be a cause of concern in many schools. Although many schemes and initiatives have attempted to address these issues, few have proved completely successful. It is suggested that in the light of the current phase of educational reforms, with its emphasis on raising standards and target setting, the…
Green chemistry for chemical synthesis
Li, Chao-Jun; Trost, Barry M.
2008-01-01
Green chemistry for chemical synthesis addresses our future challenges in working with chemical processes and products by inventing novel reactions that can maximize the desired products and minimize by-products, designing new synthetic schemes and apparati that can simplify operations in chemical productions, and seeking greener solvents that are inherently environmentally and ecologically benign. PMID:18768813
Some Critical Differences between Self-Help and Therapy Groups.
ERIC Educational Resources Information Center
Riordan, Richard J.; Beggs, Marilyn S.
1988-01-01
Presents a scheme for addressing differences between self-help groups and therapy groups, characterizing a list of group work parameters according to emphasis placed on each in therapy groups in contrast with self-help groups. Distinguishes between support groups, started by professional helping organizations or individuals, and self-help groups,…
A Simple Computer Application for the Identification of Conifer Genera
ERIC Educational Resources Information Center
Strain, Steven R.; Chmielewski, Jerry G.
2010-01-01
The National Science Education Standards prescribe that an understanding of the importance of classifying organisms be one component of a student's educational experience in the life sciences. The use of a classification scheme to identify organisms is one way of addressing this goal. We describe Conifer ID, a computer application that assists…
Survey Measurement of Father Involvement in Childrearing: A Reliability and Validity Study.
ERIC Educational Resources Information Center
Riley, Dave
The purpose of this paper is to describe a specific method of measuring fathers' childrearing involvement. The conceptual scheme underlying the method addresses involvement in routine child care, play with the child, and school-related interactions. Measures involved the father's share of childrearing (as compared with the mother's) and the…
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-25
... proposed color scheme and general design so that the two agencies' labels could work together as a... Programs AGENCY: Environmental Protection Agency (EPA). ACTION: Final rule. SUMMARY: In two recent actions... Damage d. Addressing Non-English Speakers e. Portable Fuel Containers f. Color, Size, Shape, Font, and...
On delay adjustment for dynamic load balancing in distributed virtual environments.
Deng, Yunhua; Lau, Rynson W H
2012-04-01
Distributed virtual environments (DVEs) are becoming very popular in recent years, due to the rapid growing of applications, such as massive multiplayer online games (MMOGs). As the number of concurrent users increases, scalability becomes one of the major challenges in designing an interactive DVE system. One solution to address this scalability problem is to adopt a multi-server architecture. While some methods focus on the quality of partitioning the load among the servers, others focus on the efficiency of the partitioning process itself. However, all these methods neglect the effect of network delay among the servers on the accuracy of the load balancing solutions. As we show in this paper, the change in the load of the servers due to network delay would affect the performance of the load balancing algorithm. In this work, we conduct a formal analysis of this problem and discuss two efficient delay adjustment schemes to address the problem. Our experimental results show that our proposed schemes can significantly improve the performance of the load balancing algorithm with neglectable computation overhead.
Alesbury, Roger J; Bailey, Stephen R
2014-03-01
Thirteen member societies of the International Occupational Hygiene Association (IOHA), all 11 national certification bodies, and IOHA itself are now cooperating in a new international training and qualification system. The structure broadens access to occupational hygiene education and training worldwide and complements existing professional accreditation schemes. There are currently 46 Approved Training Providers in the scheme and up to the end of June 2013, approaching 200 courses had been delivered in more than 32 countries, with nearly 2400 examinations taken in 7 languages. This influx of students, particularly in developing countries, is helping to address the worldwide need to combat occupational illness and is creating the foundation for sustainable growth in provision of occupational hygiene globally. The scheme originated in 2006, when the authors were instrumental in bringing together a group of senior hygienists to review the needs of industry. The resulting position paper, reflecting the perspective of major multi-national companies, was subject to widespread consultation with a diverse group of stakeholders from across the world. This led to the formation of the Occupational Hygiene Training Association (OHTA), as a not-for-profit organization, to operate the system. It is accessible through the OHlearning website that provides free downloads of educational materials and details of training events. In this commentary, we outline the needs that brought this about, identify the key stakeholders involved, review what has been done so far, and discuss some plans for the future.
Optical asymmetric watermarking using modified wavelet fusion and diffractive imaging
NASA Astrophysics Data System (ADS)
Mehra, Isha; Nishchal, Naveen K.
2015-05-01
In most of the existing image encryption algorithms the generated keys are in the form of a noise like distribution with a uniform distributed histogram. However, the noise like distribution is an apparent sign indicating the presence of the keys. If the keys are to be transferred through some communication channels, then this may lead to a security problem. This is because; the noise like features may easily catch people's attention and bring more attacks. To address this problem it is required to transfer the keys to some other meaningful images to disguise the attackers. The watermarking schemes are complementary to image encryption schemes. In most of the iterative encryption schemes, support constraints play an important role of the keys in order to decrypt the meaningful data. In this article, we have transferred the support constraints which are generated by axial translation of CCD camera using amplitude-, and phase- truncation approach, into different meaningful images. This has been done by developing modified fusion technique in wavelet transform domain. The second issue is, in case, the meaningful images are caught by the attacker then how to solve the copyright protection. To resolve this issue, watermark detection plays a crucial role. For this purpose, it is necessary to recover the original image using the retrieved watermarks/support constraints. To address this issue, four asymmetric keys have been generated corresponding to each watermarked image to retrieve the watermarks. For decryption, an iterative phase retrieval algorithm is applied to extract the plain-texts from corresponding retrieved watermarks.
Changeable HA to improve MIPv6 protocol
NASA Astrophysics Data System (ADS)
Hu, Qing-gui
2015-12-01
For mobile IPv6, home agent (HA) plays an important role. Each mobile node (MN) has a home IP address, it will be not changeable. Also, the home agent (HA) of MN is not changeable. This rule provides the convenient for the ongoing communication without interruption. But it has some obvious drawbacks. Here, the new variable HA scheme is proposed. Every MN has a dynamic cache table, recording the information such as its home address, care-of address, and history address etc. If the accumulated time in one region exceeds that in the hometown, the foreign agent (FA) could become home agent (HA), the home agent could become history agent. Later, the performance of the new protocol is simulated with OPNET software, whose result shows the performance of the new protocol works better than that of the traditional protocol.
Factors affecting sustainability of rural water schemes in Swaziland
NASA Astrophysics Data System (ADS)
Peter, Graciana; Nkambule, Sizwe E.
The Millennium Development Goal (MDG) target to reduce the proportion of people without sustainable access to safe drinking water by the year 2015 has been met as of 2010, but huge disparities exist. Some regions, particularly Sub-Saharan Africa are lagging behind it is also in this region where up to 30% of the rural schemes are not functional at any given time. There is need for more studies on factors affecting sustainability and necessary measures which when implemented will improve the sustainability of rural water schemes. The main objective of this study was to assess the main factors affecting the sustainability of rural water schemes in Swaziland using a Multi-Criteria Analysis Approach. The main factors considered were: financial, social, technical, environmental and institutional. The study was done in Lubombo region. Fifteen functional water schemes in 11 communities were studied. Data was collected using questionnaires, checklist and focused group discussion guide. A total of 174 heads of households were interviewed. Statistical Package for Social Sciences (SPSS) was used to analyse the data and to calculate sustainability scores for water schemes. SPSS was also used to classify sustainability scores according to sustainability categories: sustainable, partially sustainable and non-sustainable. The averages of the ratings for the different sub-factors studied and the results on the sustainability scores for the sustainable, partially sustainable and non-sustainable schemes were then computed and compared to establish the main factors influencing sustainability of the water schemes. The results indicated technical and social factors as most critical while financial and institutional, although important, played a lesser role. Factors which contributed to the sustainability of water schemes were: functionality; design flow; water fetching time; ability to meet additional demand; use by population; equity; participation in decision making on operation and maintenance; existence of fund for operation and maintenance; willingness to contribute money; existence of a user’s committee; participation in the initial planning and design of the water scheme; and coordination between the local leaders and user’s committee. The main factors which made the schemes unsustainable were: long fetching time; non-involvement in decision making; lack of willingness to contribute funds; absence of users committee; and lack of cooperation between local leaders and the users committee. Water service providers should address the technical, social, financial and institutional factors identified affecting sustainability in their planning and implementation of rural water schemes.
National Rural Employment Guarantee Scheme, poverty and prices in rural India.
Gaiha, Raghav; Kulkarni, Vani S; Pandey, Manoj K; Imai, Katsushi S
2010-01-01
The objective of this analysis is mainly to construct an intuitive measure of the performance of the National Rural Employment Guarantee Scheme (NREGS) in India. The focus is on divergence between demand and supply at the district level. Some related issues addressed are: (i) whether the gap between demand and supply responds to poverty; and (ii) whether recent hikes in NREGS wages are inflationary. Our analysis confirms responsiveness of the positive gap between demand and supply to poverty. Also, apprehensions expressed about the inflationary potential of recent hikes in NREGS wages have been confirmed. More importantly, higher NREGS wages are likely to undermine self-selection of the poor in it.
Innovative hazard detection and avoidance strategy for autonomous safe planetary landing
NASA Astrophysics Data System (ADS)
Jiang, Xiuqiang; Li, Shuang; Tao, Ting
2016-09-01
Autonomous hazard detection and avoidance (AHDA) is one of the key technologies for future safe planetary landing missions. In this paper, we address the latest progress on planetary autonomous hazard detection and avoidance technologies. First, the innovative autonomous relay hazard detection and avoidance strategy adopted in Chang'e-3 lunar soft landing mission and its flight results are reported in detail. Second, two new conceptual candidate schemes of hazard detection and avoidance are presented based on the Chang'e-3 AHDA system and the latest developing technologies for the future planetary missions, and some preliminary testing results are also given. Finally, the related supporting technologies for the two candidate schemes above are analyzed.
Lattice-Assisted Spectroscopy: A Generalized Scanning Tunneling Microscope for Ultracold Atoms.
Kantian, A; Schollwöck, U; Giamarchi, T
2015-10-16
We propose a scheme to measure the frequency-resolved local particle and hole spectra of any optical lattice-confined system of correlated ultracold atoms that offers single-site addressing and imaging, which is now an experimental reality. Combining perturbation theory and time-dependent density matrix renormalization group simulations, we quantitatively test and validate this approach of lattice-assisted spectroscopy on several one-dimensional example systems, such as the superfluid and Mott insulator, with and without a parabolic trap, and finally on edge states of the bosonic Su-Schrieffer-Heeger model. We highlight extensions of our basic scheme to obtain an even wider variety of interesting and important frequency resolved spectra.
Peer-mentoring junior surgical trainees in the United Kingdom: a pilot program
Vulliamy, Paul; Junaid, Islam
2013-01-01
Background Peer-mentoring has attracted substantial interest in various healthcare professions, but has not been formally integrated into postgraduate surgical training. This study aimed to assess the feasibility and acceptability of a peer-mentor scheme among junior surgical trainees in the United Kingdom. Method Trainees entering the first year of core surgical training (CST) in a single postgraduate school of surgery were allocated a mentor in the second year of CST. Allocation was based on location of the initial clinical placement. An anonymised questionnaire regarding the mentorship scheme was sent to all participants in the third month following its introduction. Results 18 trainees participated in the scheme, of whom 12 (67%) responded to the questionnaire. All respondents had made contact with their allocated mentor or mentee, and no trainees had opted out of the scheme. Areas in which the mentees received guidance included examinations (83%), CV development (67%), and workplace-based assessments (67%). All respondents felt that the mentor scheme was a good addition to CST. Suggestions for improvement of the scheme included introduction of structured meetings and greater engagement with allocated mentors. Conclusions A pilot peer-mentoring scheme was well received by junior surgical trainees. Consideration should be given to expansion of this scheme and more rigorous assessment of its value. PMID:23594462
Peer-mentoring junior surgical trainees in the United Kingdom: a pilot program.
Vulliamy, Paul; Junaid, Islam
2012-04-16
Peer-mentoring has attracted substantial interest in various healthcare professions, but has not been formally integrated into postgraduate surgical training. This study aimed to assess the feasibility and acceptability of a peer-mentor scheme among junior surgical trainees in the United Kingdom. Trainees entering the first year of core surgical training (CST) in a single postgraduate school of surgery were allocated a mentor in the second year of CST. Allocation was based on location of the initial clinical placement. An anonymised questionnaire regarding the mentorship scheme was sent to all participants in the third month following its introduction. 18 trainees participated in the scheme, of whom 12 (67%) responded to the questionnaire. All respondents had made contact with their allocated mentor or mentee, and no trainees had opted out of the scheme. Areas in which the mentees received guidance included examinations (83%), CV development (67%), and workplace-based assessments (67%). All respondents felt that the mentor scheme was a good addition to CST. Suggestions for improvement of the scheme included introduction of structured meetings and greater engagement with allocated mentors. A pilot peer-mentoring scheme was well received by junior surgical trainees. Consideration should be given to expansion of this scheme and more rigorous assessment of its value.
Study on advanced information processing system
NASA Technical Reports Server (NTRS)
Shin, Kang G.; Liu, Jyh-Charn
1992-01-01
Issues related to the reliability of a redundant system with large main memory are addressed. In particular, the Fault-Tolerant Processor (FTP) for Advanced Launch System (ALS) is used as a basis for our presentation. When the system is free of latent faults, the probability of system crash due to nearly-coincident channel faults is shown to be insignificant even when the outputs of computing channels are infrequently voted on. In particular, using channel error maskers (CEMs) is shown to improve reliability more effectively than increasing the number of channels for applications with long mission times. Even without using a voter, most memory errors can be immediately corrected by CEMs implemented with conventional coding techniques. In addition to their ability to enhance system reliability, CEMs--with a low hardware overhead--can be used to reduce not only the need of memory realignment, but also the time required to realign channel memories in case, albeit rare, such a need arises. Using CEMs, we have developed two schemes, called Scheme 1 and Scheme 2, to solve the memory realignment problem. In both schemes, most errors are corrected by CEMs, and the remaining errors are masked by a voter.
Coherent population trapping with polarization modulation
DOE Office of Scientific and Technical Information (OSTI.GOV)
Yun, Peter, E-mail: enxue.yun@obspm.fr; Guérandel, Stéphane; Clercq, Emeric de
Coherent population trapping (CPT) is extensively studied for future vapor cell clocks of high frequency stability. In the constructive polarization modulation CPT scheme, a bichromatic laser field with polarization and phase synchronously modulated is applied on an atomic medium. A high contrast CPT signal is observed in this so-called double-modulation configuration, due to the fact that the atomic population does not leak to the extreme Zeeman states, and that the two CPT dark states, which are produced successively by the alternate polarizations, add constructively. Here, we experimentally investigate CPT signal dynamics first in the usual configuration, a single circular polarization.more » The double-modulation scheme is then addressed in both cases: one pulse Rabi interaction and two pulses Ramsey interaction. The impact and the optimization of the experimental parameters involved in the time sequence are reviewed. We show that a simple seven-level model explains the experimental observations. The double-modulation scheme yields a high contrast similar to the one of other high contrast configurations like push-pull optical pumping or crossed linear polarization scheme, with a setup allowing a higher compactness. The constructive polarization modulation is attractive for atomic clock, atomic magnetometer, and high precision spectroscopy applications.« less
Effect of asynchrony on numerical simulations of fluid flow phenomena
NASA Astrophysics Data System (ADS)
Konduri, Aditya; Mahoney, Bryan; Donzis, Diego
2015-11-01
Designing scalable CFD codes on massively parallel computers is a challenge. This is mainly due to the large number of communications between processing elements (PEs) and their synchronization, leading to idling of PEs. Indeed, communication will likely be the bottleneck in the scalability of codes on Exascale machines. Our recent work on asynchronous computing for PDEs based on finite-differences has shown that it is possible to relax synchronization between PEs at a mathematical level. Computations then proceed regardless of the status of communication, reducing the idle time of PEs and improving the scalability. However, accuracy of the schemes is greatly affected. We have proposed asynchrony-tolerant (AT) schemes to address this issue. In this work, we study the effect of asynchrony on the solution of fluid flow problems using standard and AT schemes. We show that asynchrony creates additional scales with low energy content. The specific wavenumbers affected can be shown to be due to two distinct effects: the randomness in the arrival of messages and the corresponding switching between schemes. Understanding these errors allow us to effectively control them, rendering the method's feasibility in solving turbulent flows at realistic conditions on future computing systems.
NASA Astrophysics Data System (ADS)
Kim, Hyo-Su; Kim, Dong-Hoi
The dynamic channel allocation (DCA) scheme in multi-cell systems causes serious inter-cell interference (ICI) problem to some existing calls when channels for new calls are allocated. Such a problem can be addressed by advanced centralized DCA design that is able to minimize ICI. Thus, in this paper, a centralized DCA is developed for the downlink of multi-cell orthogonal frequency division multiple access (OFDMA) systems with full spectral reuse. However, in practice, as the search space of channel assignment for centralized DCA scheme in multi-cell systems grows exponentially with the increase of the number of required calls, channels, and cells, it becomes an NP-hard problem and is currently too complicated to find an optimum channel allocation. In this paper, we propose an ant colony optimization (ACO) based DCA scheme using a low-complexity ACO algorithm which is a kind of heuristic algorithm in order to solve the aforementioned problem. Simulation results demonstrate significant performance improvements compared to the existing schemes in terms of the grade of service (GoS) performance and the forced termination probability of existing calls without degrading the system performance of the average throughput.
Kim, Bongseok; Kim, Sangdong; Lee, Jonghun
2018-01-01
We propose a novel discrete Fourier transform (DFT)-based direction of arrival (DOA) estimation by a virtual array extension using simple multiplications for frequency modulated continuous wave (FMCW) radar. DFT-based DOA estimation is usually employed in radar systems because it provides the advantage of low complexity for real-time signal processing. In order to enhance the resolution of DOA estimation or to decrease the missing detection probability, it is essential to have a considerable number of channel signals. However, due to constraints of space and cost, it is not easy to increase the number of channel signals. In order to address this issue, we increase the number of effective channel signals by generating virtual channel signals using simple multiplications of the given channel signals. The increase in channel signals allows the proposed scheme to detect DOA more accurately than the conventional scheme while using the same number of channel signals. Simulation results show that the proposed scheme achieves improved DOA estimation compared to the conventional DFT-based method. Furthermore, the effectiveness of the proposed scheme in a practical environment is verified through the experiment. PMID:29758016
Ibeas, Asier; de la Sen, Manuel
2006-10-01
The problem of controlling a tandem of robotic manipulators composing a teleoperation system with force reflection is addressed in this paper. The final objective of this paper is twofold: 1) to design a robust control law capable of ensuring closed-loop stability for robots with uncertainties and 2) to use the so-obtained control law to improve the tracking of each robot to its corresponding reference model in comparison with previously existing controllers when the slave is interacting with the obstacle. In this way, a multiestimation-based adaptive controller is proposed. Thus, the master robot is able to follow more accurately the constrained motion defined by the slave when interacting with an obstacle than when a single-estimation-based controller is used, improving the transparency property of the teleoperation scheme. The closed-loop stability is guaranteed if a minimum residence time, which might be updated online when unknown, between different controller parameterizations is respected. Furthermore, the analysis of the teleoperation and stability capabilities of the overall scheme is carried out. Finally, some simulation examples showing the working of the multiestimation scheme complete this paper.
A Lifetime Maximization Relay Selection Scheme in Wireless Body Area Networks.
Zhang, Yu; Zhang, Bing; Zhang, Shi
2017-06-02
Network Lifetime is one of the most important metrics in Wireless Body Area Networks (WBANs). In this paper, a relay selection scheme is proposed under the topology constrains specified in the IEEE 802.15.6 standard to maximize the lifetime of WBANs through formulating and solving an optimization problem where relay selection of each node acts as optimization variable. Considering the diversity of the sensor nodes in WBANs, the optimization problem takes not only energy consumption rate but also energy difference among sensor nodes into account to improve the network lifetime performance. Since it is Non-deterministic Polynomial-hard (NP-hard) and intractable, a heuristic solution is then designed to rapidly address the optimization. The simulation results indicate that the proposed relay selection scheme has better performance in network lifetime compared with existing algorithms and that the heuristic solution has low time complexity with only a negligible performance degradation gap from optimal value. Furthermore, we also conduct simulations based on a general WBAN model to comprehensively illustrate the advantages of the proposed algorithm. At the end of the evaluation, we validate the feasibility of our proposed scheme via an implementation discussion.
A computerized scheme for lung nodule detection in multiprojection chest radiography
DOE Office of Scientific and Technical Information (OSTI.GOV)
Guo Wei; Li Qiang; Boyce, Sarah J.
2012-04-15
Purpose: Our previous study indicated that multiprojection chest radiography could significantly improve radiologists' performance for lung nodule detection in clinical practice. In this study, the authors further verify that multiprojection chest radiography can greatly improve the performance of a computer-aided diagnostic (CAD) scheme. Methods: Our database consisted of 59 subjects, including 43 subjects with 45 nodules and 16 subjects without nodules. The 45 nodules included 7 real and 38 simulated ones. The authors developed a conventional CAD scheme and a new fusion CAD scheme to detect lung nodules. The conventional CAD scheme consisted of four steps for (1) identification ofmore » initial nodule candidates inside lungs, (2) nodule candidate segmentation based on dynamic programming, (3) extraction of 33 features from nodule candidates, and (4) false positive reduction using a piecewise linear classifier. The conventional CAD scheme processed each of the three projection images of a subject independently and discarded the correlation information between the three images. The fusion CAD scheme included the four steps in the conventional CAD scheme and two additional steps for (5) registration of all candidates in the three images of a subject, and (6) integration of correlation information between the registered candidates in the three images. The integration step retained all candidates detected at least twice in the three images of a subject and removed those detected only once in the three images as false positives. A leave-one-subject-out testing method was used for evaluation of the performance levels of the two CAD schemes. Results: At the sensitivities of 70%, 65%, and 60%, our conventional CAD scheme reported 14.7, 11.3, and 8.6 false positives per image, respectively, whereas our fusion CAD scheme reported 3.9, 1.9, and 1.2 false positives per image, and 5.5, 2.8, and 1.7 false positives per patient, respectively. The low performance of the conventional CAD scheme may be attributed to the high noise level in chest radiography, and the small size and low contrast of most nodules. Conclusions: This study indicated that the fusion of correlation information in multiprojection chest radiography can markedly improve the performance of CAD scheme for lung nodule detection.« less
LAN attack detection using Discrete Event Systems.
Hubballi, Neminath; Biswas, Santosh; Roopa, S; Ratti, Ritesh; Nandi, Sukumar
2011-01-01
Address Resolution Protocol (ARP) is used for determining the link layer or Medium Access Control (MAC) address of a network host, given its Internet Layer (IP) or Network Layer address. ARP is a stateless protocol and any IP-MAC pairing sent by a host is accepted without verification. This weakness in the ARP may be exploited by malicious hosts in a Local Area Network (LAN) by spoofing IP-MAC pairs. Several schemes have been proposed in the literature to circumvent these attacks; however, these techniques either make IP-MAC pairing static, modify the existing ARP, patch operating systems of all the hosts etc. In this paper we propose a Discrete Event System (DES) approach for Intrusion Detection System (IDS) for LAN specific attacks which do not require any extra constraint like static IP-MAC, changing the ARP etc. A DES model is built for the LAN under both a normal and compromised (i.e., spoofed request/response) situation based on the sequences of ARP related packets. Sequences of ARP events in normal and spoofed scenarios are similar thereby rendering the same DES models for both the cases. To create different ARP events under normal and spoofed conditions the proposed technique uses active ARP probing. However, this probing adds extra ARP traffic in the LAN. Following that a DES detector is built to determine from observed ARP related events, whether the LAN is operating under a normal or compromised situation. The scheme also minimizes extra ARP traffic by probing the source IP-MAC pair of only those ARP packets which are yet to be determined as genuine/spoofed by the detector. Also, spoofed IP-MAC pairs determined by the detector are stored in tables to detect other LAN attacks triggered by spoofing namely, man-in-the-middle (MiTM), denial of service etc. The scheme is successfully validated in a test bed. Copyright © 2010 ISA. Published by Elsevier Ltd. All rights reserved.
Motta, Mario; Zhang, Shiwei
2017-11-14
We address the computation of ground-state properties of chemical systems and realistic materials within the auxiliary-field quantum Monte Carlo method. The phase constraint to control the Fermion phase problem requires the random walks in Slater determinant space to be open-ended with branching. This in turn makes it necessary to use back-propagation (BP) to compute averages and correlation functions of operators that do not commute with the Hamiltonian. Several BP schemes are investigated, and their optimization with respect to the phaseless constraint is considered. We propose a modified BP method for the computation of observables in electronic systems, discuss its numerical stability and computational complexity, and assess its performance by computing ground-state properties in several molecular systems, including small organic molecules.
Multilayer Optimization of Heterogeneous Networks Using Grammatical Genetic Programming.
Fenton, Michael; Lynch, David; Kucera, Stepan; Claussen, Holger; O'Neill, Michael
2017-09-01
Heterogeneous cellular networks are composed of macro cells (MCs) and small cells (SCs) in which all cells occupy the same bandwidth. Provision has been made under the third generation partnership project-long term evolution framework for enhanced intercell interference coordination (eICIC) between cell tiers. Expanding on previous works, this paper instruments grammatical genetic programming to evolve control heuristics for heterogeneous networks. Three aspects of the eICIC framework are addressed including setting SC powers and selection biases, MC duty cycles, and scheduling of user equipments (UEs) at SCs. The evolved heuristics yield minimum downlink rates three times higher than a baseline method, and twice that of a state-of-the-art benchmark. Furthermore, a greater number of UEs receive transmissions under the proposed scheme than in either the baseline or benchmark cases.
Optimal guidance with obstacle avoidance for nap-of-the-earth flight
NASA Technical Reports Server (NTRS)
Pekelsma, Nicholas J.
1988-01-01
The development of automatic guidance is discussed for helicopter Nap-of-the-Earth (NOE) and near-NOE flight. It deals with algorithm refinements relating to automated real-time flight path planning and to mission planning. With regard to path planning, it relates rotorcraft trajectory characteristics to the NOE computation scheme and addresses real-time computing issues and both ride quality issues and pilot-vehicle interfaces. The automated mission planning algorithm refinements include route optimization, automatic waypoint generation, interactive applications, and provisions for integrating the results into the real-time path planning software. A microcomputer based mission planning workstation was developed and is described. Further, the application of Defense Mapping Agency (DMA) digital terrain to both the mission planning workstation and to automatic guidance is both discussed and illustrated.
A robust direct-integration method for rotorcraft maneuver and periodic response
NASA Technical Reports Server (NTRS)
Panda, Brahmananda
1992-01-01
The Newmark-Beta method and the Newton-Raphson iteration scheme are combined to develop a direct-integration method for evaluating the maneuver and periodic-response expressions for rotorcraft. The method requires the generation of Jacobians and includes higher derivatives in the formulation of the geometric stiffness matrix to enhance the convergence of the system. The method leads to effective convergence with nonlinear structural dynamics and aerodynamic terms. Singularities in the matrices can be addressed with the method as they arise from a Lagrange multiplier approach for coupling equations with nonlinear constraints. The method is also shown to be general enough to handle singularities from quasisteady control-system models. The method is shown to be more general and robust than the similar 2GCHAS method for analyzing rotorcraft dynamics.
GEWEX Cloud Systems Study (GCSS)
NASA Technical Reports Server (NTRS)
Moncrieff, Mitch
1993-01-01
The Global Energy and Water Cycle Experiment (GEWEX) Cloud Systems Study (GCSS) program seeks to improve the physical understanding of sub-grid scale cloud processes and their representation in parameterization schemes. By improving the description and understanding of key cloud system processes, GCSS aims to develop the necessary parameterizations in climate and numerical weather prediction (NWP) models. GCSS will address these issues mainly through the development and use of cloud-resolving or cumulus ensemble models to generate realizations of a set of archetypal cloud systems. The focus of GCSS is on mesoscale cloud systems, including precipitating convectively-driven cloud systems like MCS's and boundary layer clouds, rather than individual clouds, and on their large-scale effects. Some of the key scientific issues confronting GCSS that particularly relate to research activities in the central U.S. are presented.
A systematic approach for evaluating and scoring human data.
Money, Chris D; Tomenson, John A; Penman, Michael G; Boogaard, Peter J; Jeffrey Lewis, R
2013-07-01
An approach is described for how the quality of human data can be systematically assessed and categorised. The approach mirrors the animal data quality considerations set out by Klimisch et al., in order that human data quality can be addressed in a complementary manner and to help facilitate transparent (and repeatable) weight of evidence comparisons. Definitions are proposed for the quality and adequacy of data. Quality is differentiated into four categories. A description of how the scheme can be used for evaluating data reliability, especially for use when contributing entries to the IUCLID database, is shown. A discussion of how the criteria might also be used when determining overall data relevance is included. The approach is intended to help harmonise human data evaluation processes worldwide. Copyright © 2013 Elsevier Inc. All rights reserved.
Electron-correlated fragment-molecular-orbital calculations for biomolecular and nano systems.
Tanaka, Shigenori; Mochizuki, Yuji; Komeiji, Yuto; Okiyama, Yoshio; Fukuzawa, Kaori
2014-06-14
Recent developments in the fragment molecular orbital (FMO) method for theoretical formulation, implementation, and application to nano and biomolecular systems are reviewed. The FMO method has enabled ab initio quantum-mechanical calculations for large molecular systems such as protein-ligand complexes at a reasonable computational cost in a parallelized way. There have been a wealth of application outcomes from the FMO method in the fields of biochemistry, medicinal chemistry and nanotechnology, in which the electron correlation effects play vital roles. With the aid of the advances in high-performance computing, the FMO method promises larger, faster, and more accurate simulations of biomolecular and related systems, including the descriptions of dynamical behaviors in solvent environments. The current status and future prospects of the FMO scheme are addressed in these contexts.
Design and implementation of a secure wireless mote-based medical sensor network.
Malasri, Kriangsiri; Wang, Lan
2009-01-01
A medical sensor network can wirelessly monitor vital signs of humans, making it useful for long-term health care without sacrificing patient comfort and mobility. For such a network to be viable, its design must protect data privacy and authenticity given that medical data are highly sensitive. We identify the unique security challenges of such a sensor network and propose a set of resource-efficient mechanisms to address these challenges. Our solution includes (1) a novel two-tier scheme for verifying the authenticity of patient data, (2) a secure key agreement protocol to set up shared keys between sensor nodes and base stations, and (3) symmetric encryption/decryption for protecting data confidentiality and integrity. We have implemented the proposed mechanisms on a wireless mote platform, and our results confirm their feasibility.
Kabir, Muhammad N.; Alginahi, Yasser M.
2014-01-01
This paper addresses the problems and threats associated with verification of integrity, proof of authenticity, tamper detection, and copyright protection for digital-text content. Such issues were largely addressed in the literature for images, audio, and video, with only a few papers addressing the challenge of sensitive plain-text media under known constraints. Specifically, with text as the predominant online communication medium, it becomes crucial that techniques are deployed to protect such information. A number of digital-signature, hashing, and watermarking schemes have been proposed that essentially bind source data or embed invisible data in a cover media to achieve its goal. While many such complex schemes with resource redundancies are sufficient in offline and less-sensitive texts, this paper proposes a hybrid approach based on zero-watermarking and digital-signature-like manipulations for sensitive text documents in order to achieve content originality and integrity verification without physically modifying the cover text in anyway. The proposed algorithm was implemented and shown to be robust against undetected content modifications and is capable of confirming proof of originality whilst detecting and locating deliberate/nondeliberate tampering. Additionally, enhancements in resource utilisation and reduced redundancies were achieved in comparison to traditional encryption-based approaches. Finally, analysis and remarks are made about the current state of the art, and future research issues are discussed under the given constraints. PMID:25254247
Onyango, Laura A.; Quinn, Chloe; Tng, Keng H.; Wood, James G.; Leslie, Greg
2015-01-01
Potable reuse is implemented in several countries around the world to augment strained water supplies. This article presents a public health perspective on potable reuse by comparing the critical infrastructure and institutional capacity characteristics of two well-established potable reuse schemes with conventional drinking water schemes in developed nations that have experienced waterborne outbreaks. Analysis of failure events in conventional water systems between 2003 and 2013 showed that despite advances in water treatment technologies, drinking water outbreaks caused by microbial contamination were still frequent in developed countries and can be attributed to failures in infrastructure or institutional practices. Numerous institutional failures linked to ineffective treatment protocols, poor operational practices, and negligence were detected. In contrast, potable reuse schemes that use multiple barriers, online instrumentation, and operational measures were found to address the events that have resulted in waterborne outbreaks in conventional systems in the past decade. Syndromic surveillance has emerged as a tool in outbreak detection and was useful in detecting some outbreaks; increases in emergency department visits and GP consultations being the most common data source, suggesting potential for an increasing role in public health surveillance of waterborne outbreaks. These results highlight desirable characteristics of potable reuse schemes from a public health perspective with potential for guiding policy on surveillance activities. PMID:27053920
Onyango, Laura A; Quinn, Chloe; Tng, Keng H; Wood, James G; Leslie, Greg
2015-01-01
Potable reuse is implemented in several countries around the world to augment strained water supplies. This article presents a public health perspective on potable reuse by comparing the critical infrastructure and institutional capacity characteristics of two well-established potable reuse schemes with conventional drinking water schemes in developed nations that have experienced waterborne outbreaks. Analysis of failure events in conventional water systems between 2003 and 2013 showed that despite advances in water treatment technologies, drinking water outbreaks caused by microbial contamination were still frequent in developed countries and can be attributed to failures in infrastructure or institutional practices. Numerous institutional failures linked to ineffective treatment protocols, poor operational practices, and negligence were detected. In contrast, potable reuse schemes that use multiple barriers, online instrumentation, and operational measures were found to address the events that have resulted in waterborne outbreaks in conventional systems in the past decade. Syndromic surveillance has emerged as a tool in outbreak detection and was useful in detecting some outbreaks; increases in emergency department visits and GP consultations being the most common data source, suggesting potential for an increasing role in public health surveillance of waterborne outbreaks. These results highlight desirable characteristics of potable reuse schemes from a public health perspective with potential for guiding policy on surveillance activities.
A Comparison of Some Difference Schemes for a Parabolic Problem of Zero-Coupon Bond Pricing
NASA Astrophysics Data System (ADS)
Chernogorova, Tatiana; Vulkov, Lubin
2009-11-01
This paper describes a comparison of some numerical methods for solving a convection-diffusion equation subjected by dynamical boundary conditions which arises in the zero-coupon bond pricing. The one-dimensional convection-diffusion equation is solved by using difference schemes with weights including standard difference schemes as the monotone Samarskii's scheme, FTCS and Crank-Nicolson methods. The schemes are free of spurious oscillations and satisfy the positivity and maximum principle as demanded for the financial and diffusive solution. Numerical results are compared with analytical solutions.
A Succinct Naming Convention for Lengthy Hexadecimal Numbers
NASA Technical Reports Server (NTRS)
Grant, Michael S.
1997-01-01
Engineers, computer scientists, mathematicians and others must often deal with lengthy hexadecimal numbers. As memory requirements for software increase, the associated memory address space for systems necessitates the use of longer and longer strings of hexadecimal characters to describe a given number. For example, the address space of some digital signal processors (DSP's) now ranges in the billions of words, requiring eight hexadecimal characters for many of the addresses. This technical memorandum proposes a simple grouping scheme for more clearly representing lengthy hexadecimal numbers in written material, as well as a "code" for naming and more quickly verbalizing such numbers. This should facilitate communications among colleagues in engineering and related fields, and aid in comprehension and temporary memorization of important hexadecimal numbers during design work.
NASA Astrophysics Data System (ADS)
Braghiere, Renato; Quaife, Tristan; Black, Emily
2016-04-01
Incoming shortwave radiation is the primary source of energy driving the majority of the Earth's climate system. The partitioning of shortwave radiation by vegetation into absorbed, reflected, and transmitted terms is important for most of biogeophysical processes, including leaf temperature changes and photosynthesis, and it is currently calculated by most of land surface schemes (LSS) of climate and/or numerical weather prediction models. The most commonly used radiative transfer scheme in LSS is the two-stream approximation, however it does not explicitly account for vegetation architectural effects on shortwave radiation partitioning. Detailed three-dimensional (3D) canopy radiative transfer schemes have been developed, but they are too computationally expensive to address large-scale related studies over long time periods. Using a straightforward one-dimensional (1D) parameterisation proposed by Pinty et al. (2006), we modified a two-stream radiative transfer scheme by including a simple function of Sun zenith angle, so-called "structure factor", which does not require an explicit description and understanding of the complex phenomena arising from the presence of vegetation heterogeneous architecture, and it guarantees accurate simulations of the radiative balance consistently with 3D representations. In order to evaluate the ability of the proposed parameterisation in accurately represent the radiative balance of more complex 3D schemes, a comparison between the modified two-stream approximation with the "structure factor" parameterisation and state-of-art 3D radiative transfer schemes was conducted, following a set of virtual scenarios described in the RAMI4PILPS experiment. These experiments have been evaluating the radiative balance of several models under perfectly controlled conditions in order to eliminate uncertainties arising from an incomplete or erroneous knowledge of the structural, spectral and illumination related canopy characteristics typical of model comparisons with in-situ observations. The structure factor parameters were obtained for each canopy structure through the inversion against direct and diffuse fraction of absorbed photosynthetically active radiation (fAPAR), and albedo PAR. Overall, the modified two-stream approximation consistently showed a good agreement with the RAMI4PILPS reference values under direct and diffuse illumination conditions. It is an efficient and accurate tool to derive PAR absorptance and reflectance for scenarios with different canopy densities, leaf densities and soil background albedos, with especial attention to brighter backgrounds, i.e., snowy. The major difficulty of its applicability in the real world is to acquire the parameterisation parameters from in-situ observations. The derivation of parameters from Digital Hemispherical Photographs (DHP) is highly promising at forest stands scales. DHP provide a permanent record and are a valuable information source for position, size, density, and distribution of canopy gaps. The modified two-stream approximation parameters were derived from gap probability data extracted from DHP obtained in a woody savannah in California, USA. Values of fAPAR and albedo PAR were evaluated against a tree-based vegetation canopy model, MAESPA, which used airborne LiDAR data to define the individual-tree locations, and extract structural information such as tree height and crown diameter. The parameterisation improved the performance of a two-stream approximation by making it achieves comparable results to complex 3D model calculations under observed conditions.
Issues and recent advances in optimal experimental design for site investigation (Invited)
NASA Astrophysics Data System (ADS)
Nowak, W.
2013-12-01
This presentation provides an overview over issues and recent advances in model-based experimental design for site exploration. The addressed issues and advances are (1) how to provide an adequate envelope to prior uncertainty, (2) how to define the information needs in a task-oriented manner, (3) how to measure the expected impact of a data set that it not yet available but only planned to be collected, and (4) how to perform best the optimization of the data collection plan. Among other shortcomings of the state-of-the-art, it is identified that there is a lack of demonstrator studies where exploration schemes based on expert judgment are compared to exploration schemes obtained by optimal experimental design. Such studies will be necessary do address the often voiced concern that experimental design is an academic exercise with little improvement potential over the well- trained gut feeling of field experts. When addressing this concern, a specific focus has to be given to uncertainty in model structure, parameterizations and parameter values, and to related surprises that data often bring about in field studies, but never in synthetic-data based studies. The background of this concern is that, initially, conceptual uncertainty may be so large that surprises are the rule rather than the exception. In such situations, field experts have a large body of experience in handling the surprises, and expert judgment may be good enough compared to meticulous optimization based on a model that is about to be falsified by the incoming data. In order to meet surprises accordingly and adapt to them, there needs to be a sufficient representation of conceptual uncertainty within the models used. Also, it is useless to optimize an entire design under this initial range of uncertainty. Thus, the goal setting of the optimization should include the objective to reduce conceptual uncertainty. A possible way out is to upgrade experimental design theory towards real-time interaction with the ongoing site investigation, such that surprises in the data are immediately accounted for to restrict the conceptual uncertainty and update the optimization of the plan.
75 FR 68568 - Port Access Route Study: In the Bering Strait
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-08
... traffic separation scheme and the adjacent coast, to be used in accordance with the provisions of Rule 10... boundary. Traffic Separation Scheme (TSS) means a routing measure aimed at the separation of opposing... includes traffic separation schemes, two-way routes, recommended tracks, areas to be avoided, no anchoring...
76 FR 35805 - Port Access Route Study: The Approaches to San Francisco
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-20
... boundary. Traffic Separation Scheme or TSS means a routing measure aimed at the separation of opposing... includes traffic separation schemes, two-way routes, recommended tracks, areas to be avoided, no anchoring... study in February, 2011. The study area encompassed the traffic separation scheme off San Francisco and...
Mishra, Dheerendra; Srinivas, Jangirala; Mukhopadhyay, Sourav
2014-10-01
Advancement in network technology provides new ways to utilize telecare medicine information systems (TMIS) for patient care. Although TMIS usually faces various attacks as the services are provided over the public network. Recently, Jiang et al. proposed a chaotic map-based remote user authentication scheme for TMIS. Their scheme has the merits of low cost and session key agreement using Chaos theory. It enhances the security of the system by resisting various attacks. In this paper, we analyze the security of Jiang et al.'s scheme and demonstrate that their scheme is vulnerable to denial of service attack. Moreover, we demonstrate flaws in password change phase of their scheme. Further, our aim is to propose a new chaos map-based anonymous user authentication scheme for TMIS to overcome the weaknesses of Jiang et al.'s scheme, while also retaining the original merits of their scheme. We also show that our scheme is secure against various known attacks including the attacks found in Jiang et al.'s scheme. The proposed scheme is comparable in terms of the communication and computational overheads with Jiang et al.'s scheme and other related existing schemes. Moreover, we demonstrate the validity of the proposed scheme through the BAN (Burrows, Abadi, and Needham) logic.
NASA Astrophysics Data System (ADS)
Gao, Qian
For both the conventional radio frequency and the comparably recent optical wireless communication systems, extensive effort from the academia had been made in improving the network spectrum efficiency and/or reducing the error rate. To achieve these goals, many fundamental challenges such as power efficient constellation design, nonlinear distortion mitigation, channel training design, network scheduling and etc. need to be properly addressed. In this dissertation, novel schemes are proposed accordingly to deal with specific problems falling in category of these challenges. Rigorous proofs and analyses are provided for each of our work to make a fair comparison with the corresponding peer works to clearly demonstrate the advantages. The first part of this dissertation considers a multi-carrier optical wireless system employing intensity modulation (IM) and direct detection (DD). A block-wise constellation design is presented, which treats the DC-bias that conventionally used solely for biasing purpose as an information basis. Our scheme, we term it MSM-JDCM, takes advantage of the compactness of sphere packing in a higher dimensional space, and in turn power efficient constellations are obtained by solving an advanced convex optimization problem. Besides the significant power gains, the MSM-JDCM has many other merits such as being capable of mitigating nonlinear distortion by including a peak-to-power ratio (PAPR) constraint, minimizing inter-symbol-interference (ISI) caused by frequency-selective fading with a novel precoder designed and embedded, and further reducing the bit-error-rate (BER) by combining with an optimized labeling scheme. The second part addresses several optimization problems in a multi-color visible light communication system, including power efficient constellation design, joint pre-equalizer and constellation design, and modeling of different structured channels with cross-talks. Our novel constellation design scheme, termed CSK-Advanced, is compared with the conventional decoupled system with the same spectrum efficiency to demonstrate the power efficiency. Crucial lighting requirements are included as optimization constraints. To control non-linear distortion, the optical peak-to-average-power ratio (PAPR) of LEDs can be individually constrained. With a SVD-based pre-equalizer designed and employed, our scheme can achieve lower BER than counterparts applying zero-forcing (ZF) or linear minimum-mean-squared-error (LMMSE) based post-equalizers. Besides, a binary switching algorithm (BSA) is applied to improve BER performance. The third part looks into a problem of two-phase channel estimation in a relayed wireless network. The channel estimates in every phase are obtained by the linear minimum mean squared error (LMMSE) method. Inaccurate estimate of the relay to destination (RtD) channel in phase 1 could affect estimate of the source to relay (StR) channel in phase 2, which is made erroneous. We first derive a close-form expression for the averaged Bayesian mean-square estimation error (ABMSE) for both phase estimates in terms of the length of source and relay training slots, based on which an iterative searching algorithm is then proposed that optimally allocates training slots to the two phases such that estimation errors are balanced. Analysis shows how the ABMSE of the StD channel estimation varies with the lengths of relay training and source training slots, the relay amplification gain, and the channel prior information respectively. The last part deals with a transmission scheduling problem in a uplink multiple-input-multiple-output (MIMO) wireless network. Code division multiple access (CDMA) is assumed as a multiple access scheme and pseudo-random codes are employed for different users. We consider a heavy traffic scenario, in which each user always has packets to transmit in the scheduled time slots. If the relay is scheduled for transmission together with users, then it operates in a full-duplex mode, where the packets previously collected from users are transmitted to the destination while new packets are being collected from users. A novel expression of throughput is first derived and then used to develop a scheduling algorithm to maximize the throughput. Our full-duplex scheduling is compared with a half-duplex scheduling, random access, and time division multiple access (TDMA), and simulation results illustrate its superiority. Throughput gains due to employment of both MIMO and CDMA are observed.
Adaptive Numerical Dissipative Control in High Order Schemes for Multi-D Non-Ideal MHD
NASA Technical Reports Server (NTRS)
Yee, H. C.; Sjoegreen, B.
2004-01-01
The goal is to extend our adaptive numerical dissipation control in high order filter schemes and our new divergence-free methods for ideal MHD to non-ideal MHD that include viscosity and resistivity. The key idea consists of automatic detection of different flow features as distinct sensors to signal the appropriate type and amount of numerical dissipation/filter where needed and leave the rest of the region free of numerical dissipation contamination. These scheme-independent detectors are capable of distinguishing shocks/shears, flame sheets, turbulent fluctuations and spurious high-frequency oscillations. The detection algorithm is based on an artificial compression method (ACM) (for shocks/shears), and redundant multi-resolution wavelets (WAV) (for the above types of flow feature). These filter approaches also provide a natural and efficient way for the minimization of Div(B) numerical error. The filter scheme consists of spatially sixth order or higher non-dissipative spatial difference operators as the base scheme for the inviscid flux derivatives. If necessary, a small amount of high order linear dissipation is used to remove spurious high frequency oscillations. For example, an eighth-order centered linear dissipation (AD8) might be included in conjunction with a spatially sixth-order base scheme. The inviscid difference operator is applied twice for the viscous flux derivatives. After the completion of a full time step of the base scheme step, the solution is adaptively filtered by the product of a 'flow detector' and the 'nonlinear dissipative portion' of a high-resolution shock-capturing scheme. In addition, the scheme independent wavelet flow detector can be used in conjunction with spatially compact, spectral or spectral element type of base schemes. The ACM and wavelet filter schemes using the dissipative portion of a second-order shock-capturing scheme with sixth-order spatial central base scheme for both the inviscid and viscous MHD flux derivatives and a fourth-order Runge-Kutta method are denoted.
Undernutrition & tuberculosis in India: Situation analysis & the way forward
Padmapriyadarsini, C.; Shobana, M.; Lakshmi, M.; Beena, T.; Swaminathan, Soumya
2016-01-01
Undernutrition and tuberculosis (TB) are linked and have a bidirectional relationship. Undernutrition increases the risk of TB which in turn, can lead to malnutrition. Undernutrition not only is a risk factor for progression of latent TB infection to active disease, but also increases the risk of drug toxicity, relapse and death once TB develops. The dietary intake of TB patients in the country is inadequate. Nutritional supplementation in patients with TB is associated with faster sputum conversion, higher cure and treatment completion rates, significant gain in body weight and body composition as well as better performance status. The Government of India has various social support schemes (including nutrition supplementation schemes) and policies, at the Centre as well as State levels. Here we discuss some successful examples and suggest a few solutions to address this gap; like considering TB patients as a vulnerable group for “Targeted Public Distribution System” and providing extra rations for the duration of treatment. Recommendations for the research community, civil societies, government organizations, non-governmental and corporate sector on the actions needed to achieve the goals of the End TB Strategy are also provided. Ultimately, reduction of TB burden in India and its elimination will require improving the nutritional status of the community as a whole. PMID:27834321
Streptococcus mutans clonal variation revealed by multilocus sequence typing.
Nakano, Kazuhiko; Lapirattanakul, Jinthana; Nomura, Ryota; Nemoto, Hirotoshi; Alaluusua, Satu; Grönroos, Lisa; Vaara, Martti; Hamada, Shigeyuki; Ooshima, Takashi; Nakagawa, Ichiro
2007-08-01
Streptococcus mutans is the major pathogen of dental caries, a biofilm-dependent infectious disease, and occasionally causes infective endocarditis. S. mutans strains have been classified into four serotypes (c, e, f, and k). However, little is known about the S. mutans population, including the clonal relationships among strains of S. mutans, in relation to the particular clones that cause systemic diseases. To address this issue, we have developed a multilocus sequence typing (MLST) scheme for S. mutans. Eight housekeeping gene fragments were sequenced from each of 102 S. mutans isolates collected from the four serotypes in Japan and Finland. Between 14 and 23 alleles per locus were identified, allowing us theoretically to distinguish more than 1.2 x 10(10) sequence types. We identified 92 sequence types in these 102 isolates, indicating that S. mutans contains a diverse population. Whereas serotype c strains were widely distributed in the dendrogram, serotype e, f, and k strains were differentiated into clonal complexes. Therefore, we conclude that the ancestral strain of S. mutans was serotype c. No geographic specificity was identified. However, the distribution of the collagen-binding protein gene (cnm) and direct evidence of mother-to-child transmission were clearly evident. In conclusion, the superior discriminatory capacity of this MLST scheme for S. mutans may have important practical implications.
Topology-guided deformable registration with local importance preservation for biomedical images
NASA Astrophysics Data System (ADS)
Zheng, Chaojie; Wang, Xiuying; Zeng, Shan; Zhou, Jianlong; Yin, Yong; Feng, Dagan; Fulham, Michael
2018-01-01
The demons registration (DR) model is well recognized for its deformation capability. However, it might lead to misregistration due to erroneous diffusion direction when there are no overlaps between corresponding regions. We propose a novel registration energy function, introducing topology energy, and incorporating a local energy function into the DR in a progressive registration scheme, to address these shortcomings. The topology energy that is derived from the topological information of the images serves as a direction inference to guide diffusion transformation to retain the merits of DR. The local energy constrains the deformation disparity of neighbouring pixels to maintain important local texture and density features. The energy function is minimized in a progressive scheme steered by a topology tree graph and we refer to it as topology-guided deformable registration (TDR). We validated our TDR on 20 pairs of synthetic images with Gaussian noise, 20 phantom PET images with artificial deformations and 12 pairs of clinical PET-CT studies. We compared it to three methods: (1) free-form deformation registration method, (2) energy-based DR and (3) multi-resolution DR. The experimental results show that our TDR outperformed the other three methods in regard to structural correspondence and preservation of the local important information including texture and density, while retaining global correspondence.
An Attention-Information-Based Spatial Adaptation Framework for Browsing Videos via Mobile Devices
NASA Astrophysics Data System (ADS)
Li, Houqiang; Wang, Yi; Chen, Chang Wen
2007-12-01
With the growing popularity of personal digital assistant devices and smart phones, more and more consumers are becoming quite enthusiastic to appreciate videos via mobile devices. However, limited display size of the mobile devices has been imposing significant barriers for users to enjoy browsing high-resolution videos. In this paper, we present an attention-information-based spatial adaptation framework to address this problem. The whole framework includes two major parts: video content generation and video adaptation system. During video compression, the attention information in video sequences will be detected using an attention model and embedded into bitstreams with proposed supplement-enhanced information (SEI) structure. Furthermore, we also develop an innovative scheme to adaptively adjust quantization parameters in order to simultaneously improve the quality of overall encoding and the quality of transcoding the attention areas. When the high-resolution bitstream is transmitted to mobile users, a fast transcoding algorithm we developed earlier will be applied to generate a new bitstream for attention areas in frames. The new low-resolution bitstream containing mostly attention information, instead of the high-resolution one, will be sent to users for display on the mobile devices. Experimental results show that the proposed spatial adaptation scheme is able to improve both subjective and objective video qualities.
Townsend, Clare; White, Paul; Cullen, Jennifer; Wright, Courtney J; Zeeman, Heidi
2017-03-30
This article highlights the dearth of accurate evidence available to inform the National Disability Insurance Scheme (NDIS) regarding the extent and nature of neurocognitive disability amongst homeless Aboriginal and Torres Strait Islander people. Without accurate prevalence rates of neurocognitive disability, homeless Aboriginal and Torres Strait Islander people are in danger of not being counted by the NDIS and not receiving supports to which they are entitled. Addressing this knowledge gap is challenged by a range of factors, including: (1) the long-term effect of profound intergenerational disenfranchisement of Aboriginal and Torres Strait Islander people; (2) Aboriginal and Torres Strait Islander cultural perspectives around disability; (3) the generally unrecognised and poorly understood nature of neurocognitive disability; (4) the use of research methods that are not culturally safe; (5) research logistics; and (6) the absence of culturally appropriate assessment tools to identify prevalence. It is argued that an accurate evidence base that is informed by culturally safe research methods and assessment tools is needed to accurately guide the Commonwealth government and the National Disability Insurance Agency about the expected level of need for the NDIS. Research within this framework will contribute to the realisation of a truly inclusive NDIS.
NASA Astrophysics Data System (ADS)
Bin Hassan, M. F.; Bonello, P.
2017-05-01
Recently-proposed techniques for the simultaneous solution of foil-air bearing (FAB) rotor dynamic problems have been limited to a simple bump foil model in which the individual bumps were modelled as independent spring-damper (ISD) subsystems. The present paper addresses this limitation by introducing a modal model of the bump foil structure into the simultaneous solution scheme. The dynamics of the corrugated bump foil structure are first studied using the finite element (FE) technique. This study is experimentally validated using a purpose-made corrugated foil structure. Based on the findings of this study, it is proposed that the dynamics of the full foil structure, including bump interaction and foil inertia, can be represented by a modal model comprising a limited number of modes. This full foil structure modal model (FFSMM) is then adapted into the rotordynamic FAB problem solution scheme, instead of the ISD model. Preliminary results using the FFSMM under static and unbalance excitation conditions are proven to be reliable by comparison against the corresponding ISD foil model results and by cross-correlating different methods for computing the deflection of the full foil structure. The rotor-bearing model is also validated against experimental and theoretical results in the literature.
Heerkens, Yvonne F; de Weerd, Marjolein; Huber, Machteld; de Brouwer, Carin P M; van der Veen, Sabina; Perenboom, Rom J M; van Gool, Coen H; Ten Napel, Huib; van Bon-Martens, Marja; Stallinga, Hillegonda A; van Meeteren, Nico L U
2018-03-01
The ICF (International Classification of Functioning, Disability and Health) framework (used worldwide to describe 'functioning' and 'disability'), including the ICF scheme (visualization of functioning as result of interaction with health condition and contextual factors), needs reconsideration. The purpose of this article is to discuss alternative ICF schemes. Reconsideration of ICF via literature review and discussions with 23 Dutch ICF experts. Twenty-six experts were invited to rank the three resulting alternative schemes. The literature review provided five themes: 1) societal developments; 2) health and research influences; 3) conceptualization of health; 4) models/frameworks of health and disability; and 5) ICF-criticism (e.g. position of 'health condition' at the top and role of 'contextual factors'). Experts concluded that the ICF scheme gives the impression that the medical perspective is dominant instead of the biopsychosocial perspective. Three alternative ICF schemes were ranked by 16 (62%) experts, resulting in one preferred scheme. There is a need for a new ICF scheme, better reflecting the ICF framework, for further (inter)national consideration. These Dutch schemes should be reviewed on a global scale, to develop a scheme that is more consistent with current and foreseen developments and changing ideas on health. Implications for Rehabilitation We propose policy makers on community, regional and (inter)national level to consider the use of the alternative schemes of the International Classification of Functioning, Disability and Health within their plans to promote functioning and health of their citizens and researchers and teachers to incorporate the alternative schemes into their research and education to emphasize the biopsychosocial paradigm. We propose to set up an international Delphi procedure involving citizens (including patients), experts in healthcare, occupational care, research, education and policy, and planning to get consensus on an alternative scheme of the International Classification of Functioning, Disability and Health. We recommend to discuss the alternatives for the present scheme of the International Classification of Functioning, Disability and Health in the present update and revision process within the World Health Organization as a part of the discussion on the future of the International Classification of Functioning, Disability and Health framework (including ontology, title and relation with the International Classification of Diseases). We recommend to revise the definition of personal factors and to draft a list of personal factors that can be used in policy making, clinical practice, research, and education and to put effort in the revision of the present list of environmental factors to make it more useful in, e.g., occupational health care.
NASA Astrophysics Data System (ADS)
Marras, Simone; Kopera, Michal A.; Constantinescu, Emil M.; Suckale, Jenny; Giraldo, Francis X.
2018-04-01
The high-order numerical solution of the non-linear shallow water equations is susceptible to Gibbs oscillations in the proximity of strong gradients. In this paper, we tackle this issue by presenting a shock capturing model based on the numerical residual of the solution. Via numerical tests, we demonstrate that the model removes the spurious oscillations in the proximity of strong wave fronts while preserving their strength. Furthermore, for coarse grids, it prevents energy from building up at small wave-numbers. When applied to the continuity equation to stabilize the water surface, the addition of the shock capturing scheme does not affect mass conservation. We found that our model improves the continuous and discontinuous Galerkin solutions alike in the proximity of sharp fronts propagating on wet surfaces. In the presence of wet/dry interfaces, however, the model needs to be enhanced with the addition of an inundation scheme which, however, we do not address in this paper.
NASA Astrophysics Data System (ADS)
Sparaciari, Carlo; Paris, Matteo G. A.
2013-01-01
We address measurement schemes where certain observables Xk are chosen at random within a set of nondegenerate isospectral observables and then measured on repeated preparations of a physical system. Each observable has a probability zk to be measured, with ∑kzk=1, and the statistics of this generalized measurement is described by a positive operator-valued measure. This kind of scheme is referred to as quantum roulettes, since each observable Xk is chosen at random, e.g., according to the fluctuating value of an external parameter. Here we focus on quantum roulettes for qubits involving the measurements of Pauli matrices, and we explicitly evaluate their canonical Naimark extensions, i.e., their implementation as indirect measurements involving an interaction scheme with a probe system. We thus provide a concrete model to realize the roulette without destroying the signal state, which can be measured again after the measurement or can be transmitted. Finally, we apply our results to the description of Stern-Gerlach-like experiments on a two-level system.
A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing
Fan, Kai; Wang, Junxiong; Wang, Xin; Li, Hui; Yang, Yintang
2017-01-01
With the rapid development of big data and Internet of things (IOT), the number of networking devices and data volume are increasing dramatically. Fog computing, which extends cloud computing to the edge of the network can effectively solve the bottleneck problems of data transmission and data storage. However, security and privacy challenges are also arising in the fog-cloud computing environment. Ciphertext-policy attribute-based encryption (CP-ABE) can be adopted to realize data access control in fog-cloud computing systems. In this paper, we propose a verifiable outsourced multi-authority access control scheme, named VO-MAACS. In our construction, most encryption and decryption computations are outsourced to fog devices and the computation results can be verified by using our verification method. Meanwhile, to address the revocation issue, we design an efficient user and attribute revocation method for it. Finally, analysis and simulation results show that our scheme is both secure and highly efficient. PMID:28737733
Adaptive Failure Compensation for Aircraft Flight Control Using Engine Differentials: Regulation
NASA Technical Reports Server (NTRS)
Yu, Liu; Xidong, Tang; Gang, Tao; Joshi, Suresh M.
2005-01-01
The problem of using engine thrust differentials to compensate for rudder and aileron failures in aircraft flight control is addressed in this paper in a new framework. A nonlinear aircraft model that incorporates engine di erentials in the dynamic equations is employed and linearized to describe the aircraft s longitudinal and lateral motion. In this model two engine thrusts of an aircraft can be adjusted independently so as to provide the control flexibility for rudder or aileron failure compensation. A direct adaptive compensation scheme for asymptotic regulation is developed to handle uncertain actuator failures in the linearized system. A design condition is specified to characterize the system redundancy needed for failure compensation. The adaptive regulation control scheme is applied to the linearized model of a large transport aircraft in which the longitudinal and lateral motions are coupled as the result of using engine thrust differentials. Simulation results are presented to demonstrate the effectiveness of the adaptive compensation scheme.
NASA Astrophysics Data System (ADS)
Zeitz, Christian; Scheidat, Tobias; Dittmann, Jana; Vielhauer, Claus; González Agulla, Elisardo; Otero Muras, Enrique; García Mateo, Carmen; Alba Castro, José L.
2008-02-01
Beside the optimization of biometric error rates the overall security system performance in respect to intentional security attacks plays an important role for biometric enabled authentication schemes. As traditionally most user authentication schemes are knowledge and/or possession based, firstly in this paper we present a methodology for a security analysis of Internet-based biometric authentication systems by enhancing known methodologies such as the CERT attack-taxonomy with a more detailed view on the OSI-Model. Secondly as proof of concept, the guidelines extracted from this methodology are strictly applied to an open source Internet-based biometric authentication system (BioWebAuth). As case studies, two exemplary attacks, based on the found security leaks, are investigated and the attack performance is presented to show that during the biometric authentication schemes beside biometric error performance tuning also security issues need to be addressed. Finally, some design recommendations are given in order to ensure a minimum security level.
Toward an endovascular internal carotid artery classification system.
Shapiro, M; Becske, T; Riina, H A; Raz, E; Zumofen, D; Jafar, J J; Huang, P P; Nelson, P K
2014-02-01
Does the world need another ICA classification scheme? We believe so. The purpose of proposed angiography-driven classification is to optimize description of the carotid artery from the endovascular perspective. A review of existing, predominantly surgically-driven classifications is performed, and a new scheme, based on the study of NYU aneurysm angiographic and cross-sectional databases is proposed. Seven segments - cervical, petrous, cavernous, paraophthlamic, posterior communicating, choroidal, and terminus - are named. This nomenclature recognizes intrinsic uncertainty in precise angiographic and cross-sectional localization of aneurysms adjacent to the dural rings, regarding all lesions distal to the cavernous segment as potentially intradural. Rather than subdividing various transitional, ophthalmic, and hypophyseal aneurysm subtypes, as necessitated by their varied surgical approaches and risks, the proposed classification emphasizes their common endovascular treatment features, while recognizing that many complex, trans-segmental, and fusiform aneurysms not readily classifiable into presently available, saccular aneurysm-driven schemes, are being increasingly addressed by endovascular means. We believe this classification may find utility in standardizing nomenclature for outcome tracking, treatment trials and physician communication.
Study and simulation of low rate video coding schemes
NASA Technical Reports Server (NTRS)
Sayood, Khalid; Chen, Yun-Chung; Kipp, G.
1992-01-01
The semiannual report is included. Topics covered include communication, information science, data compression, remote sensing, color mapped images, robust coding scheme for packet video, recursively indexed differential pulse code modulation, image compression technique for use on token ring networks, and joint source/channel coder design.
Illustrating the practice of statistics
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hamada, Christina A; Hamada, Michael S
2009-01-01
The practice of statistics involves analyzing data and planning data collection schemes to answer scientific questions. Issues often arise with the data that must be dealt with and can lead to new procedures. In analyzing data, these issues can sometimes be addressed through the statistical models that are developed. Simulation can also be helpful in evaluating a new procedure. Moreover, simulation coupled with optimization can be used to plan a data collection scheme. The practice of statistics as just described is much more than just using a statistical package. In analyzing the data, it involves understanding the scientific problem andmore » incorporating the scientist's knowledge. In modeling the data, it involves understanding how the data were collected and accounting for limitations of the data where possible. Moreover, the modeling is likely to be iterative by considering a series of models and evaluating the fit of these models. Designing a data collection scheme involves understanding the scientist's goal and staying within hislher budget in terms of time and the available resources. Consequently, a practicing statistician is faced with such tasks and requires skills and tools to do them quickly. We have written this article for students to provide a glimpse of the practice of statistics. To illustrate the practice of statistics, we consider a problem motivated by some precipitation data that our relative, Masaru Hamada, collected some years ago. We describe his rain gauge observational study in Section 2. We describe modeling and an initial analysis of the precipitation data in Section 3. In Section 4, we consider alternative analyses that address potential issues with the precipitation data. In Section 5, we consider the impact of incorporating additional infonnation. We design a data collection scheme to illustrate the use of simulation and optimization in Section 6. We conclude this article in Section 7 with a discussion.« less
Richardson, Suzanna J; Brooks, Hannah L; Bramley, George; Coleman, Jamie J
2014-01-01
Self-administration of medicines is believed to increase patients' understanding about their medication and to promote their independence and autonomy in the hospital setting. The effect of inpatient self-administration of medication (SAM) schemes on patients, staff and institutions is currently unclear. To systematically review the literature relating to the effect of SAM schemes on the following outcomes: patient knowledge, patient compliance/medication errors, success in self-administration, patient satisfaction, staff satisfaction, staff workload, and costs. Keyword and text word searches of online databases were performed between January and March 2013. Included articles described and evaluated inpatient SAM schemes. Case studies and anecdotal studies were excluded. 43 papers were included for final analysis. Due to the heterogeneity of results and unclear findings it was not possible to perform a quantitative synthesis of results. Participation in SAM schemes often led to increased knowledge about drugs and drug regimens, but not side effects. However, the effect of SAM schemes on patient compliance/medication errors was inconclusive. Patients and staff were highly satisfied with their involvement in SAM schemes. SAM schemes appear to provide some benefits (e.g. increased patient knowledge), but their effect on other outcomes (e.g. compliance) is unclear. Few studies of high methodological quality using validated outcome measures exist. Inconsistencies in both measuring and reporting outcomes across studies make it challenging to compare results and draw substantive conclusions about the effectiveness of SAM schemes.
ERIC Educational Resources Information Center
McNeal, McKenzie, III.
2012-01-01
Current networking architectures and communication protocols used for Wireless Sensor Networks (WSNs) have been designed to be energy efficient, low latency, and long network lifetime. One major issue that must be addressed is the security in data communication. Due to the limited capabilities of low cost and small sized sensor nodes, designing…
ERIC Educational Resources Information Center
Schwab, Judith L., Ed.
1982-01-01
Documents which address the interface between forestry and the social sciences comprise this annotated bibliography. A subject-matter classification scheme is used to group publications by subheadings under five major heading: (1) social science applied to forestry at large; (2) applied to forestry's productive agents; (3) applied to forest…
ERIC Educational Resources Information Center
Martin, Beverly Barber
Implemented in an urban community college's child development teacher training program, this practicum project addressed the problem of discrepancies between training and work environments. General goals of the practicum were: (1) to design a learning styles training format for preschool teachers; (2) to provide teachers with factual information…
Second Careers for Women. A View from the San Francisco Peninsula.
ERIC Educational Resources Information Center
Fairbank, Jane D., Ed.; Bell, Susan Groag, Ed.
The Second Careers for Women conference is discussed as to its evolution and place in the scheme of continuing education programs for women. The keynote address, "A Decade of Innovation," by Martha Sturm White is reproduced, and summaries of 15 workshops are provided. The workshop summaries depict the situation for adult women seeking…
Recent Research on the Impact of Alternative Education Delivery Systems in Honduras.
ERIC Educational Resources Information Center
Spaulding, Seth
In Honduras, 88 percent of the rural population has 6 years or less of formal education. Several distance education schemes have been undertaken to address both low rural educational levels and the destruction of schools by Hurricane Mitch. This paper reports on recent studies of two distance education efforts with substantial international…
A Reflection on the Methodology Used for a Qualitative Longitudinal Study
ERIC Educational Resources Information Center
Evangelinou-Yiannakis, Angela
2017-01-01
This paper presents a reflection on the methodology used for a qualitative longitudinal study of the teaching of Modern Greek (Greek) in Western Australia under the Seconded Teachers from Greece Scheme (STGS). The study, a first of its kind, addressed an area of need in the teaching of Greek, investigating the perspectives of the key stakeholders…
Oxygen-Induced Cracking Distillation of Oil in the Continuous Flow Tank Reactor
ERIC Educational Resources Information Center
Shvets, Valeriy F.; Kozlovskiy, Roman A.; Luganskiy, Artur I.; Gorbunov, Andrey V.; Suchkov, Yuriy P.; Ushin, Nikolay S.; Cherepanov, Alexandr A.
2016-01-01
The article analyses problems of processing black oil fuel and addresses the possibility of increasing the depth of oil refining by a new processing scheme. The study examines various methods of increasing the depth of oil refining reveals their inadequacies and highlights a need to introduce a new method of processing atmospheric and vacuum…