Sample records for wall protection scheme

  1. Energy-efficient writing scheme for magnetic domain-wall motion memory

    NASA Astrophysics Data System (ADS)

    Kim, Kab-Jin; Yoshimura, Yoko; Ham, Woo Seung; Ernst, Rick; Hirata, Yuushou; Li, Tian; Kim, Sanghoon; Moriyama, Takahiro; Nakatani, Yoshinobu; Ono, Teruo

    2017-04-01

    We present an energy-efficient magnetic domain-writing scheme for domain wall (DW) motion-based memory devices. A cross-shaped nanowire is employed to inject a domain into the nanowire through current-induced DW propagation. The energy required for injecting the magnetic domain is more than one order of magnitude lower than that for the conventional field-based writing scheme. The proposed scheme is beneficial for device miniaturization because the threshold current for DW propagation scales with the device size, which cannot be achieved in the conventional field-based technique.

  2. Spacecraft wall design for increased protection against penetration by space debris impacts

    NASA Technical Reports Server (NTRS)

    Schonberg, William P.; Tullos, Randy J.

    1990-01-01

    All orbiting spacecraft are susceptible to impacts by meteoroids and pieces of orbital space debris. These impacts occur at extremely high speeds and can damage flight-critical systems, which can in turn lead to catastrophic failure of the spacecraft. The design of a spacecraft for a long-duration mission into the meteoroid and space debris environment must include adequate protection against perforation of pressurized components by such impacts. This paper presents the results of an investigation into the perforation resistance of dual-wall structural systems fabricated with monolithic bumper plates and with corrugated bumper plates of equal weight. A comparative analysis of the impact damage in dual-wall systems with corrugated bumper specimens and that in dual-wall specimens with monolithic bumpers of similar weight is performed to determine the advantages and disadvantages of employing corrugated bumpers in structural wall systems for long-duration spacecraft. The analysis indicates that a significant increase in perforation protection can be achieved if a monolithic bumper is replaced by a corrugated bumper of equal weight. The parameters of the corrugations in the corrugated bumper plates are optimized in a manner that minimizes the potential for the creation of ricochet debris in the event of an oblique hypervelocity impact. Several design examples using the optimization scheme are presented and discussed.

  3. Predicting Chest Wall Pain From Lung Stereotactic Body Radiotherapy for Different Fractionation Schemes

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Woody, Neil M.; Videtic, Gregory M.M.; Stephans, Kevin L.

    Purpose: Recent studies with two fractionation schemes predicted that the volume of chest wall receiving >30 Gy (V30) correlated with chest wall pain after stereotactic body radiation therapy (SBRT) to the lung. This study developed a predictive model of chest wall pain incorporating radiobiologic effects, using clinical data from four distinct SBRT fractionation schemes. Methods and Materials: 102 SBRT patients were treated with four different fractionations: 60 Gy in three fractions, 50 Gy in five fractions, 48 Gy in four fractions, and 50 Gy in 10 fractions. To account for radiobiologic effects, a modified equivalent uniform dose (mEUD) model calculatedmore » the dose to the chest wall with volume weighting. For comparison, V30 and maximum point dose were also reported. Using univariable logistic regression, the association of radiation dose and clinical variables with chest wall pain was assessed by uncertainty coefficient (U) and C statistic (C) of receiver operator curve. The significant associations from the univariable model were verified with a multivariable model. Results: 106 lesions in 102 patients with a mean age of 72 were included, with a mean of 25.5 (range, 12-55) months of follow-up. Twenty patients reported chest wall pain at a mean time of 8.1 (95% confidence interval, 6.3-9.8) months after treatment. The mEUD models, V30, and maximum point dose were significant predictors of chest wall pain (p < 0.0005). mEUD improved prediction of chest wall pain compared with V30 (C = 0.79 vs. 0.77 and U = 0.16 vs. 0.11). The mEUD with moderate weighting (a = 5) better predicted chest wall pain than did mEUD without weighting (a = 1) (C = 0.79 vs. 0.77 and U = 0.16 vs. 0.14). Body mass index (BMI) was significantly associated with chest wall pain (p = 0.008). On multivariable analysis, mEUD and BMI remained significant predictors of chest wall pain (p = 0.0003 and 0.03, respectively). Conclusion: mEUD with moderate weighting better predicted chest wall pain

  4. Quality of Recovery Evaluation of the Protection Schemes for Fiber-Wireless Access Networks

    NASA Astrophysics Data System (ADS)

    Fu, Minglei; Chai, Zhicheng; Le, Zichun

    2016-03-01

    With the rapid development of fiber-wireless (FiWi) access network, the protection schemes have got more and more attention due to the risk of huge data loss when failures occur. However, there are few studies on the performance evaluation of the FiWi protection schemes by the unified evaluation criterion. In this paper, quality of recovery (QoR) method was adopted to evaluate the performance of three typical protection schemes (MPMC scheme, OBOF scheme and RPMF scheme) against the segment-level failure in FiWi access network. The QoR models of the three schemes were derived in terms of availability, quality of backup path, recovery time and redundancy. To compare the performance of the three protection schemes comprehensively, five different classes of network services such as emergency service, prioritized elastic service, conversational service, etc. were utilized by means of assigning different QoR weights. Simulation results showed that, for the most service cases, RPMF scheme was proved to be the best solution to enhance the survivability when planning the FiWi access network.

  5. A Privacy-Protecting Authentication Scheme for Roaming Services with Smart Cards

    NASA Astrophysics Data System (ADS)

    Son, Kyungho; Han, Dong-Guk; Won, Dongho

    In this work we propose a novel smart card based privacy-protecting authentication scheme for roaming services. Our proposal achieves so-called Class 2 privacy protection, i.e., no information identifying a roaming user and also linking the user's behaviors is not revealed in a visited network. It can be used to overcome the inherent structural flaws of smart card based anonymous authentication schemes issued recently. As shown in our analysis, our scheme is computationally efficient for a mobile user.

  6. A novel protection scheme for a hybrid WDM/TDM PON

    NASA Astrophysics Data System (ADS)

    Chen, Jiajia; Wosinska, Lena; He, Sailing

    2007-11-01

    This paper proposes a novel protection scheme based on the cyclic property of an array waveguide grating (AWG) and neighboring connection pattern between two adjacent optical network units (ONUs) for the hybrid WDM/TDM passive optical networks (PONs). Our scheme uses 50% fewer wavelengths while offering one order of magnitude better connection availability than the existing scheme.

  7. Protective interior wall and attaching means for a fusion reactor vacuum vessel

    DOEpatents

    Phelps, R.D.; Upham, G.A.; Anderson, P.M.

    1985-03-01

    The wall basically consists of an array of small rectangular plates attached to the existing walls with threaded fasteners. The protective wall effectively conceals and protects all mounting hardware beneath the plate array, while providing a substantial surface area that will absorb plasma energy.

  8. Effect of different wall injection schemes on the flow-field of hydrogen fuelled strut-based scramjet combustor

    NASA Astrophysics Data System (ADS)

    Choubey, Gautam; Pandey, K. M.

    2018-04-01

    The multi-strut injector is one of the most favourable perspectives for the mixing improvement in between the hydrogen and the high-speed air, and its parametric investigation has drawn an increasing attention among the researchers. Hence the flow-field aspects of a particular multi-strut based scramjet combustor have been investigated numerically with the addition of four wall injectors and at the same time, the influence of combination of different strut as well as wall injector scheme on the performance of multi-strut scramjet engine has also been explored. Moreover, the current computational approach has been validated against the experimental data present in the open literature in case of single strut scramjet engine. The attained results reveal that the collaboration of multi-strut along with 2 wall injectors' improves the efficiency of scramjet as compared to other multi-strut + wall injection scheme as this combination achieve higher penetration height which will boost to a wider temperature and robust combustion area adjacent to the wall. Again, the appearance of extra H2 in the separated flow region precisely ahead of the wall injection region is mainly reasonable for the abrupt decrease in the mixing as well combustion efficiency plot in all the multi-strut + wall injection strategy.

  9. Novel Directional Protection Scheme for the FREEDM Smart Grid System

    NASA Astrophysics Data System (ADS)

    Sharma, Nitish

    This research primarily deals with the design and validation of the protection system for a large scale meshed distribution system. The large scale system simulation (LSSS) is a system level PSCAD model which is used to validate component models for different time-scale platforms, to provide a virtual testing platform for the Future Renewable Electric Energy Delivery and Management (FREEDM) system. It is also used to validate the cases of power system protection, renewable energy integration and storage, and load profiles. The protection of the FREEDM system against any abnormal condition is one of the important tasks. The addition of distributed generation and power electronic based solid state transformer adds to the complexity of the protection. The FREEDM loop system has a fault current limiter and in addition, the Solid State Transformer (SST) limits the fault current at 2.0 per unit. Former students at ASU have developed the protection scheme using fiber-optic cable. However, during the NSF-FREEDM site visit, the National Science Foundation (NSF) team regarded the system incompatible for the long distances. Hence, a new protection scheme with a wireless scheme is presented in this thesis. The use of wireless communication is extended to protect the large scale meshed distributed generation from any fault. The trip signal generated by the pilot protection system is used to trigger the FID (fault isolation device) which is an electronic circuit breaker operation (switched off/opening the FIDs). The trip signal must be received and accepted by the SST, and it must block the SST operation immediately. A comprehensive protection system for the large scale meshed distribution system has been developed in PSCAD with the ability to quickly detect the faults. The validation of the protection system is performed by building a hardware model using commercial relays at the ASU power laboratory.

  10. A comparison of two multi-variable integrator windup protection schemes

    NASA Technical Reports Server (NTRS)

    Mattern, Duane

    1993-01-01

    Two methods are examined for limit and integrator wind-up protection for multi-input, multi-output linear controllers subject to actuator constraints. The methods begin with an existing linear controller that satisfies the specifications for the nominal, small perturbation, linear model of the plant. The controllers are formulated to include an additional contribution to the state derivative calculations. The first method to be examined is the multi-variable version of the single-input, single-output, high gain, Conventional Anti-Windup (CAW) scheme. Except for the actuator limits, the CAW scheme is linear. The second scheme to be examined, denoted the Modified Anti-Windup (MAW) scheme, uses a scalar to modify the magnitude of the controller output vector while maintaining the vector direction. The calculation of the scalar modifier is a nonlinear function of the controller outputs and the actuator limits. In both cases the constrained actuator is tracked. These two integrator windup protection methods are demonstrated on a turbofan engine control system with five measurements, four control variables, and four actuators. The closed-loop responses of the two schemes are compared and contrasted during limit operation. The issue of maintaining the direction of the controller output vector using the Modified Anti-Windup scheme is discussed and the advantages and disadvantages of both of the IWP methods are presented.

  11. Fast rerouting schemes for protected mobile IP over MPLS networks

    NASA Astrophysics Data System (ADS)

    Wen, Chih-Chao; Chang, Sheng-Yi; Chen, Huan; Chen, Kim-Joan

    2005-10-01

    Fast rerouting is a critical traffic engineering operation in the MPLS networks. To implement the Mobile IP service over the MPLS network, one can collaborate with the fast rerouting operation to enhance the availability and survivability. MPLS can protect critical LSP tunnel between Home Agent (HA) and Foreign Agent (FA) using the fast rerouting scheme. In this paper, we propose a simple but efficient algorithm to address the triangle routing problem for the Mobile IP over the MPLS networks. We consider this routing issue as a link weighting and capacity assignment (LW-CA) problem. The derived solution is used to plan the fast restoration mechanism to protect the link or node failure. In this paper, we first model the LW-CA problem as a mixed integer optimization problem. Our goal is to minimize the call blocking probability on the most congested working truck for the mobile IP connections. Many existing network topologies are used to evaluate the performance of our scheme. Results show that our proposed scheme can obtain the best performance in terms of the smallest blocking probability compared to other schemes.

  12. A Secure Watermarking Scheme for Buyer-Seller Identification and Copyright Protection

    NASA Astrophysics Data System (ADS)

    Ahmed, Fawad; Sattar, Farook; Siyal, Mohammed Yakoob; Yu, Dan

    2006-12-01

    We propose a secure watermarking scheme that integrates watermarking with cryptography for addressing some important issues in copyright protection. We address three copyright protection issues—buyer-seller identification, copyright infringement, and ownership verification. By buyer-seller identification, we mean that a successful watermark extraction at the buyer's end will reveal the identities of the buyer and seller of the watermarked image. For copyright infringement, our proposed scheme enables the seller to identify the specific buyer from whom an illegal copy of the watermarked image has originated, and further prove this fact to a third party. For multiple ownership claims, our scheme enables a legal seller to claim his/her ownership in the court of law. We will show that the combination of cryptography with watermarking not only increases the security of the overall scheme, but it also enables to associate identities of buyer/seller with their respective watermarked images.

  13. A special protection scheme utilizing trajectory sensitivity analysis in power transmission

    NASA Astrophysics Data System (ADS)

    Suriyamongkol, Dan

    In recent years, new measurement techniques have provided opportunities to improve the North American Power System observability, control and protection. This dissertation discusses the formulation and design of a special protection scheme based on a novel utilization of trajectory sensitivity techniques with inputs consisting of system state variables and parameters. Trajectory sensitivity analysis (TSA) has been used in previous publications as a method for power system security and stability assessment, and the mathematical formulation of TSA lends itself well to some of the time domain power system simulation techniques. Existing special protection schemes often have limited sets of goals and control actions. The proposed scheme aims to maintain stability while using as many control actions as possible. The approach here will use the TSA in a novel way by using the sensitivities of system state variables with respect to state parameter variations to determine the state parameter controls required to achieve the desired state variable movements. The initial application will operate based on the assumption that the modeled power system has full system observability, and practical considerations will be discussed.

  14. A disclosure scheme for protecting the victims of domestic violence.

    PubMed

    Griffith, Richard

    2017-06-08

    Richard Griffith, Senior Lecturer in Health Law at Swansea University, explains how the Domestic Violence Disclosure Scheme aims to protect potential victims by allowing disclosure of a partner's previous crimes.

  15. BossPro: a biometrics-based obfuscation scheme for software protection

    NASA Astrophysics Data System (ADS)

    Kuseler, Torben; Lami, Ihsan A.; Al-Assam, Hisham

    2013-05-01

    This paper proposes to integrate biometric-based key generation into an obfuscated interpretation algorithm to protect authentication application software from illegitimate use or reverse-engineering. This is especially necessary for mCommerce because application programmes on mobile devices, such as Smartphones and Tablet-PCs are typically open for misuse by hackers. Therefore, the scheme proposed in this paper ensures that a correct interpretation / execution of the obfuscated program code of the authentication application requires a valid biometric generated key of the actual person to be authenticated, in real-time. Without this key, the real semantics of the program cannot be understood by an attacker even if he/she gains access to this application code. Furthermore, the security provided by this scheme can be a vital aspect in protecting any application running on mobile devices that are increasingly used to perform business/financial or other security related applications, but are easily lost or stolen. The scheme starts by creating a personalised copy of any application based on the biometric key generated during an enrolment process with the authenticator as well as a nuance created at the time of communication between the client and the authenticator. The obfuscated code is then shipped to the client's mobile devise and integrated with real-time biometric extracted data of the client to form the unlocking key during execution. The novelty of this scheme is achieved by the close binding of this application program to the biometric key of the client, thus making this application unusable for others. Trials and experimental results on biometric key generation, based on client's faces, and an implemented scheme prototype, based on the Android emulator, prove the concept and novelty of this proposed scheme.

  16. Protection of Health Imagery by Region Based Lossless Reversible Watermarking Scheme

    PubMed Central

    Priya, R. Lakshmi; Sadasivam, V.

    2015-01-01

    Providing authentication and integrity in medical images is a problem and this work proposes a new blind fragile region based lossless reversible watermarking technique to improve trustworthiness of medical images. The proposed technique embeds the watermark using a reversible least significant bit embedding scheme. The scheme combines hashing, compression, and digital signature techniques to create a content dependent watermark making use of compressed region of interest (ROI) for recovery of ROI as reported in literature. The experiments were carried out to prove the performance of the scheme and its assessment reveals that ROI is extracted in an intact manner and PSNR values obtained lead to realization that the presented scheme offers greater protection for health imageries. PMID:26649328

  17. Wavelet Based Protection Scheme for Multi Terminal Transmission System with PV and Wind Generation

    NASA Astrophysics Data System (ADS)

    Manju Sree, Y.; Goli, Ravi kumar; Ramaiah, V.

    2017-08-01

    A hybrid generation is a part of large power system in which number of sources usually attached to a power electronic converter and loads are clustered can operate independent of the main power system. The protection scheme is crucial against faults based on traditional over current protection since there are adequate problems due to fault currents in the mode of operation. This paper adopts a new approach for detection, discrimination of the faults for multi terminal transmission line protection in presence of hybrid generation. Transient current based protection scheme is developed with discrete wavelet transform. Fault indices of all phase currents at all terminals are obtained by analyzing the detail coefficients of current signals using bior 1.5 mother wavelet. This scheme is tested for different types of faults and is found effective for detection and discrimination of fault with various fault inception angle and fault impedance.

  18. A patient privacy protection scheme for medical information system.

    PubMed

    Lu, Chenglang; Wu, Zongda; Liu, Mingyong; Chen, Wei; Guo, Junfang

    2013-12-01

    In medical information systems, there are a lot of confidential information about patient privacy. It is therefore an important problem how to prevent patient's personal privacy information from being disclosed. Although traditional security protection strategies (such as identity authentication and authorization access control) can well ensure data integrity, they cannot prevent system's internal staff (such as administrators) from accessing and disclosing patient privacy information. In this paper, we present an effective scheme to protect patients' personal privacy for a medical information system. In the scheme, privacy data before being stored in the database of the server of a medical information system would be encrypted using traditional encryption algorithms, so that the data even if being disclosed are also difficult to be decrypted and understood. However, to execute various kinds of query operations over the encrypted data efficiently, we would also augment the encrypted data with additional index, so as to process as much of the query as possible at the server side, without the need to decrypt the data. Thus, in this paper, we mainly explore how the index of privacy data is constructed, and how a query operation over privacy data is translated into a new query over the corresponding index so that it can be executed at the server side immediately. Finally, both theoretical analysis and experimental evaluation validate the practicality and effectiveness of our proposed scheme.

  19. Privacy Protection for Telecare Medicine Information Systems Using a Chaotic Map-Based Three-Factor Authenticated Key Agreement Scheme.

    PubMed

    Zhang, Liping; Zhu, Shaohui; Tang, Shanyu

    2017-03-01

    Telecare medicine information systems (TMIS) provide flexible and convenient e-health care. However, the medical records transmitted in TMIS are exposed to unsecured public networks, so TMIS are more vulnerable to various types of security threats and attacks. To provide privacy protection for TMIS, a secure and efficient authenticated key agreement scheme is urgently needed to protect the sensitive medical data. Recently, Mishra et al. proposed a biometrics-based authenticated key agreement scheme for TMIS by using hash function and nonce, they claimed that their scheme could eliminate the security weaknesses of Yan et al.'s scheme and provide dynamic identity protection and user anonymity. In this paper, however, we demonstrate that Mishra et al.'s scheme suffers from replay attacks, man-in-the-middle attacks and fails to provide perfect forward secrecy. To overcome the weaknesses of Mishra et al.'s scheme, we then propose a three-factor authenticated key agreement scheme to enable the patient to enjoy the remote healthcare services via TMIS with privacy protection. The chaotic map-based cryptography is employed in the proposed scheme to achieve a delicate balance of security and performance. Security analysis demonstrates that the proposed scheme resists various attacks and provides several attractive security properties. Performance evaluation shows that the proposed scheme increases efficiency in comparison with other related schemes.

  20. Privacy protection schemes for fingerprint recognition systems

    NASA Astrophysics Data System (ADS)

    Marasco, Emanuela; Cukic, Bojan

    2015-05-01

    The deployment of fingerprint recognition systems has always raised concerns related to personal privacy. A fingerprint is permanently associated with an individual and, generally, it cannot be reset if compromised in one application. Given that fingerprints are not a secret, potential misuses besides personal recognition represent privacy threats and may lead to public distrust. Privacy mechanisms control access to personal information and limit the likelihood of intrusions. In this paper, image- and feature-level schemes for privacy protection in fingerprint recognition systems are reviewed. Storing only key features of a biometric signature can reduce the likelihood of biometric data being used for unintended purposes. In biometric cryptosystems and biometric-based key release, the biometric component verifies the identity of the user, while the cryptographic key protects the communication channel. Transformation-based approaches only a transformed version of the original biometric signature is stored. Different applications can use different transforms. Matching is performed in the transformed domain which enable the preservation of low error rates. Since such templates do not reveal information about individuals, they are referred to as cancelable templates. A compromised template can be re-issued using a different transform. At image-level, de-identification schemes can remove identifiers disclosed for objectives unrelated to the original purpose, while permitting other authorized uses of personal information. Fingerprint images can be de-identified by, for example, mixing fingerprints or removing gender signature. In both cases, degradation of matching performance is minimized.

  1. 4. VIEW OF CASTIRON WALL PLATE PROTECTING BRICK DOORWAY, MARKED ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    4. VIEW OF CAST-IRON WALL PLATE PROTECTING BRICK DOORWAY, MARKED '1880 B & O.' - Baltimore & Ohio Railroad, Locust Point Tobacco Warehouse, Northeast side of Fort Avenue, Baltimore, Independent City, MD

  2. Effects of Distributed Generation on Overcurrent Relay Coordination and an Adaptive Protection Scheme

    NASA Astrophysics Data System (ADS)

    Ilik, Semih C.; Arsoy, Aysen B.

    2017-07-01

    Integration of distributed generation (DG) such as renewable energy sources to electrical network becomes more prevalent in recent years. Grid connection of DG has effects on load flow directions, voltage profile, short circuit power and especially protection selectivity. Applying traditional overcurrent protection scheme is inconvenient when system reliability and sustainability are considered. If a fault happens in DG connected network, short circuit contribution of DG, creates additional branch element feeding the fault current; compels to consider directional overcurrent (OC) protection scheme. Protection coordination might get lost for changing working conditions when DG sources are connected. Directional overcurrent relay parameters are determined for downstream and upstream relays when different combinations of DG connected singular or plural, on radial test system. With the help of proposed flow chart, relay parameters are updated and coordination between relays kept sustained for different working conditions in DigSILENT PowerFactory program.

  3. A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection Against Splitting

    NASA Astrophysics Data System (ADS)

    Chen, Liqun; Escalante B., Alberto N.; Löhr, Hans; Manulis, Mark; Sadeghi, Ahmad-Reza

    A multi-coupon (MC) represents a collection of k coupons that a user can redeem to a vendor in exchange for some goods or services. Nguyen (FC 2006), deepening the ideas of Chen et al. (FC 2005), introduced an unforgeable privacy-protecting MC system with constant complexity for issuing and redemption of MCs, that discourages sharing of coupons through a property called weak unsplittability, where sharing of a single coupon implies sharing of the whole multi-coupon (all-or-nothing sharing). Both schemes still lack some features required by many applications in practice, and also stronger forms of unsplittability are desirable. In this paper, we propose a new security model for MC systems with stronger definitions, followed by a concrete realization where single coupons within a MC may represent different goods or services, have independent validity periods, and must be redeemed sequentially ensuring a stronger version of unsplittability compared to all-or-nothing sharing. The complexity of the proposed scheme is linear in k for the generation of multi-coupons and constant for each redeemed single coupon.

  4. A data protection scheme for medical research networks. Review after five years of operation.

    PubMed

    Helbing, K; Demiroglu, S Y; Rakebrandt, F; Pommerening, K; Rienhoff, O; Sax, U

    2010-01-01

    The data protection requirements matured in parallel to new clinical tests generating more personal data since the 1960s. About ten years ago it was recognized that a generic data protection scheme for medical research networks is required, which reinforces patient rights but also allows economically feasible medical research compared to "hand-carved" individual solutions. To give recommendations for more efficient IT infrastructures for medical research networks in compliance with data protection requirements. The IT infrastructures of three medical research networks were reviewed with respect to the relevant data management modules. Recommendations are derived to increase cost efficiency in research networks assessing the consequences of a service provider approach without lowering the data protection level. The existing data protection schemes are very complex. Smaller research networks cannot afford the implementation of such schemes. Larger networks struggle to keep them sustainable. Due to a modular redesign in the medical research network community, a new approach offers opportunities for an efficient sustainable IT infrastructure involving a service provider concept. For standard components 70-80% of the costs could be cut down, for open source components about 37% over a three-year period. Future research networks should switch to a service-oriented approach to achieve a sustainable, cost-efficient IT infrastructure.

  5. 7. REMAINS OF PLANK WALL WITHIN CANAL CONSTRUCTED TO PROTECT ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    7. REMAINS OF PLANK WALL WITHIN CANAL CONSTRUCTED TO PROTECT OUTSIDE CANAL BANK, LOOKING SOUTHWEST. NOTE CROSS SUPPORT POLES EXTENDING TO HILLSIDE. - Snake River Ditch, Headgate on north bank of Snake River, Dillon, Summit County, CO

  6. Robust ECC-based authenticated key agreement scheme with privacy protection for Telecare medicine information systems.

    PubMed

    Zhang, Liping; Zhu, Shaohui

    2015-05-01

    To protect the transmission of the sensitive medical data, a secure and efficient authenticated key agreement scheme should be deployed when the healthcare delivery session is established via Telecare Medicine Information Systems (TMIS) over the unsecure public network. Recently, Islam and Khan proposed an authenticated key agreement scheme using elliptic curve cryptography for TMIS. They claimed that their proposed scheme is provably secure against various attacks in random oracle model and enjoys some good properties such as user anonymity. In this paper, however, we point out that any legal but malicious patient can reveal other user's identity. Consequently, their scheme suffers from server spoofing attack and off-line password guessing attack. Moreover, if the malicious patient performs the same time of the registration as other users, she can further launch the impersonation attack, man-in-the-middle attack, modification attack, replay attack, and strong replay attack successfully. To eliminate these weaknesses, we propose an improved ECC-based authenticated key agreement scheme. Security analysis demonstrates that the proposed scheme can resist various attacks and enables the patient to enjoy the remote healthcare services with privacy protection. Through the performance evaluation, we show that the proposed scheme achieves a desired balance between security and performance in comparisons with other related schemes.

  7. Indian community health insurance schemes provide partial protection against catastrophic health expenditure.

    PubMed

    Devadasan, Narayanan; Criel, Bart; Van Damme, Wim; Ranson, Kent; Van der Stuyft, Patrick

    2007-03-15

    More than 72% of health expenditure in India is financed by individual households at the time of illness through out-of-pocket payments. This is a highly regressive way of financing health care and sometimes leads to impoverishment. Health insurance is recommended as a measure to protect households from such catastrophic health expenditure (CHE). We studied two Indian community health insurance (CHI) schemes, ACCORD and SEWA, to determine whether insured households are protected from CHE. ACCORD provides health insurance cover for the indigenous population, living in Gudalur, Tamil Nadu. SEWA provides insurance cover for self employed women in the state of Gujarat. Both cover hospitalisation expenses, but only upto a maximum limit of US$23 and US$45, respectively. We reviewed the insurance claims registers in both schemes and identified patients who were hospitalised during the period 01/04/2003 to 31/03/2004. Details of their diagnoses, places and costs of treatment and self-reported annual incomes were obtained. There is no single definition of CHE and none of these have been validated. For this research, we used the following definition; "annual hospital expenditure greater than 10% of annual income," to identify those who experienced CHE. There were a total of 683 and 3152 hospital admissions at ACCORD and SEWA, respectively. In the absence of the CHI scheme, all of the patients at ACCORD and SEWA would have had to pay OOP for their hospitalisation. With the CHI scheme, 67% and 34% of patients did not have to make any out-of-pocket (OOP) payment for their hospital expenses at ACCORD and SEWA, respectively. Both CHI schemes halved the number of households that would have experienced CHE by covering hospital costs. However, despite this, 4% and 23% of households with admissions still experienced CHE at ACCORD and SEWA, respectively. This was related to the following conditions: low annual income, benefit packages with low maximum limits, exclusion of some

  8. A security-awareness virtual machine management scheme based on Chinese wall policy in cloud computing.

    PubMed

    Yu, Si; Gui, Xiaolin; Lin, Jiancai; Tian, Feng; Zhao, Jianqiang; Dai, Min

    2014-01-01

    Cloud computing gets increasing attention for its capacity to leverage developers from infrastructure management tasks. However, recent works reveal that side channel attacks can lead to privacy leakage in the cloud. Enhancing isolation between users is an effective solution to eliminate the attack. In this paper, to eliminate side channel attacks, we investigate the isolation enhancement scheme from the aspect of virtual machine (VM) management. The security-awareness VMs management scheme (SVMS), a VMs isolation enhancement scheme to defend against side channel attacks, is proposed. First, we use the aggressive conflict of interest relation (ACIR) and aggressive in ally with relation (AIAR) to describe user constraint relations. Second, based on the Chinese wall policy, we put forward four isolation rules. Third, the VMs placement and migration algorithms are designed to enforce VMs isolation between the conflict users. Finally, based on the normal distribution, we conduct a series of experiments to evaluate SVMS. The experimental results show that SVMS is efficient in guaranteeing isolation between VMs owned by conflict users, while the resource utilization rate decreases but not by much.

  9. A Security-Awareness Virtual Machine Management Scheme Based on Chinese Wall Policy in Cloud Computing

    PubMed Central

    Gui, Xiaolin; Lin, Jiancai; Tian, Feng; Zhao, Jianqiang; Dai, Min

    2014-01-01

    Cloud computing gets increasing attention for its capacity to leverage developers from infrastructure management tasks. However, recent works reveal that side channel attacks can lead to privacy leakage in the cloud. Enhancing isolation between users is an effective solution to eliminate the attack. In this paper, to eliminate side channel attacks, we investigate the isolation enhancement scheme from the aspect of virtual machine (VM) management. The security-awareness VMs management scheme (SVMS), a VMs isolation enhancement scheme to defend against side channel attacks, is proposed. First, we use the aggressive conflict of interest relation (ACIR) and aggressive in ally with relation (AIAR) to describe user constraint relations. Second, based on the Chinese wall policy, we put forward four isolation rules. Third, the VMs placement and migration algorithms are designed to enforce VMs isolation between the conflict users. Finally, based on the normal distribution, we conduct a series of experiments to evaluate SVMS. The experimental results show that SVMS is efficient in guaranteeing isolation between VMs owned by conflict users, while the resource utilization rate decreases but not by much. PMID:24688434

  10. Collaborative Protection and Control Schemes for Shipboard Electrical Systems

    DTIC Science & Technology

    2007-03-26

    VSCs ) for fault current limiting and interruption. Revisions needed on the VSCs to perform these functions have been identified, and feasibility of this...disturbances very fast - less than 3-4 ms [3]. Next section summarizes the details of the agent based protection scheme that uses the VSC as the...fault currents. In our previous work [2, 3], it has been demonstrated that this new functionally for VSC can be achieved by proper selection of

  11. Radiation Protection Using Single-Wall Carbon Nanotube Derivatives

    NASA Technical Reports Server (NTRS)

    Tour, James M.; Lu, Meng; Lucente-Schultz, Rebecca; Leonard, Ashley; Doyle, Condell Dewayne; Kosynkin, Dimitry V.; Price, Brandi Katherine

    2011-01-01

    This invention is a means of radiation protection, or cellular oxidative stress mitigation, via a sequence of quenching radical species using nano-engineered scaffolds, specifically single-wall carbon nanotubes (SWNTs) and their derivatives. The material can be used as a means of radiation protection by reducing the number of free radicals within, or nearby, organelles, cells, tissue, organs, or living organisms, thereby reducing the risk of damage to DNA and other cellular components (i.e., RNA, mitochondria, membranes, etc.) that can lead to chronic and/or acute pathologies, including but not limited to cancer, cardiovascular disease, immuno-suppression, and disorders of the central nervous system. In addition, this innovation could be used as a prophylactic or antidote for accidental radiation exposure, during high-altitude or space travel where exposure to radiation is anticipated, or to protect from exposure from deliberate terrorist or wartime use of radiation- containing weapons.

  12. A protection system for the JET ITER-like wall based on imaging diagnostics.

    PubMed

    Arnoux, G; Devaux, S; Alves, D; Balboa, I; Balorin, C; Balshaw, N; Beldishevski, M; Carvalho, P; Clever, M; Cramp, S; de Pablos, J-L; de la Cal, E; Falie, D; Garcia-Sanchez, P; Felton, R; Gervaise, V; Goodyear, A; Horton, A; Jachmich, S; Huber, A; Jouve, M; Kinna, D; Kruezi, U; Manzanares, A; Martin, V; McCullen, P; Moncada, V; Obrejan, K; Patel, K; Lomas, P J; Neto, A; Rimini, F; Ruset, C; Schweer, B; Sergienko, G; Sieglin, B; Soleto, A; Stamp, M; Stephen, A; Thomas, P D; Valcárcel, D F; Williams, J; Wilson, J; Zastrow, K-D

    2012-10-01

    The new JET ITER-like wall (made of beryllium and tungsten) is more fragile than the former carbon fiber composite wall and requires active protection to prevent excessive heat loads on the plasma facing components (PFC). Analog CCD cameras operating in the near infrared wavelength are used to measure surface temperature of the PFCs. Region of interest (ROI) analysis is performed in real time and the maximum temperature measured in each ROI is sent to the vessel thermal map. The protection of the ITER-like wall system started in October 2011 and has already successfully led to a safe landing of the plasma when hot spots were observed on the Be main chamber PFCs. Divertor protection is more of a challenge due to dust deposits that often generate false hot spots. In this contribution we describe the camera, data capture and real time processing systems. We discuss the calibration strategy for the temperature measurements with cross validation with thermal IR cameras and bi-color pyrometers. Most importantly, we demonstrate that a protection system based on CCD cameras can work and show examples of hot spot detections that stop the plasma pulse. The limits of such a design and the associated constraints on the operations are also presented.

  13. A protection system for the JET ITER-like wall based on imaging diagnosticsa)

    NASA Astrophysics Data System (ADS)

    Arnoux, G.; Devaux, S.; Alves, D.; Balboa, I.; Balorin, C.; Balshaw, N.; Beldishevski, M.; Carvalho, P.; Clever, M.; Cramp, S.; de Pablos, J.-L.; de la Cal, E.; Falie, D.; Garcia-Sanchez, P.; Felton, R.; Gervaise, V.; Goodyear, A.; Horton, A.; Jachmich, S.; Huber, A.; Jouve, M.; Kinna, D.; Kruezi, U.; Manzanares, A.; Martin, V.; McCullen, P.; Moncada, V.; Obrejan, K.; Patel, K.; Lomas, P. J.; Neto, A.; Rimini, F.; Ruset, C.; Schweer, B.; Sergienko, G.; Sieglin, B.; Soleto, A.; Stamp, M.; Stephen, A.; Thomas, P. D.; Valcárcel, D. F.; Williams, J.; Wilson, J.; Zastrow, K.-D.; JET-EFDA Contributors

    2012-10-01

    The new JET ITER-like wall (made of beryllium and tungsten) is more fragile than the former carbon fiber composite wall and requires active protection to prevent excessive heat loads on the plasma facing components (PFC). Analog CCD cameras operating in the near infrared wavelength are used to measure surface temperature of the PFCs. Region of interest (ROI) analysis is performed in real time and the maximum temperature measured in each ROI is sent to the vessel thermal map. The protection of the ITER-like wall system started in October 2011 and has already successfully led to a safe landing of the plasma when hot spots were observed on the Be main chamber PFCs. Divertor protection is more of a challenge due to dust deposits that often generate false hot spots. In this contribution we describe the camera, data capture and real time processing systems. We discuss the calibration strategy for the temperature measurements with cross validation with thermal IR cameras and bi-color pyrometers. Most importantly, we demonstrate that a protection system based on CCD cameras can work and show examples of hot spot detections that stop the plasma pulse. The limits of such a design and the associated constraints on the operations are also presented.

  14. Indian community health insurance schemes provide partial protection against catastrophic health expenditure

    PubMed Central

    Devadasan, Narayanan; Criel, Bart; Van Damme, Wim; Ranson, Kent; Van der Stuyft, Patrick

    2007-01-01

    Background More than 72% of health expenditure in India is financed by individual households at the time of illness through out-of-pocket payments. This is a highly regressive way of financing health care and sometimes leads to impoverishment. Health insurance is recommended as a measure to protect households from such catastrophic health expenditure (CHE). We studied two Indian community health insurance (CHI) schemes, ACCORD and SEWA, to determine whether insured households are protected from CHE. Methods ACCORD provides health insurance cover for the indigenous population, living in Gudalur, Tamil Nadu. SEWA provides insurance cover for self employed women in the state of Gujarat. Both cover hospitalisation expenses, but only upto a maximum limit of US$23 and US$45, respectively. We reviewed the insurance claims registers in both schemes and identified patients who were hospitalised during the period 01/04/2003 to 31/03/2004. Details of their diagnoses, places and costs of treatment and self-reported annual incomes were obtained. There is no single definition of CHE and none of these have been validated. For this research, we used the following definition; "annual hospital expenditure greater than 10% of annual income," to identify those who experienced CHE. Results There were a total of 683 and 3152 hospital admissions at ACCORD and SEWA, respectively. In the absence of the CHI scheme, all of the patients at ACCORD and SEWA would have had to pay OOP for their hospitalisation. With the CHI scheme, 67% and 34% of patients did not have to make any out-of-pocket (OOP) payment for their hospital expenses at ACCORD and SEWA, respectively. Both CHI schemes halved the number of households that would have experienced CHE by covering hospital costs. However, despite this, 4% and 23% of households with admissions still experienced CHE at ACCORD and SEWA, respectively. This was related to the following conditions: low annual income, benefit packages with low maximum limits

  15. The role of heat shock proteins in protection and pathophysiology of the arterial wall.

    PubMed

    Xu, Q; Wick, G

    1996-09-01

    The arterial wall is an integrated functional component of the circulatory system that is continually remodelling in response to various stressors, including localized injury, toxins, smoking and hypercholesterolaemia. These stimuli directly or indirectly cause changes in blood pressure and damage to the vessel wall, and eventually induce arterial stiffness and obstruction. To maintain the homeostasis of the vessel wall, the vascular cells produce a high level of stress proteins, also known as heat shock proteins, which protect against damage during haemodynamic stress. However, an immune reaction to heat shock proteins might contribute to the development of atherosclerosis. We hypothesize that the induction of heat shock proteins is beneficial in the arterial wall's response to stress but is harmful in certain other circumstances.

  16. Financial protection under the new rural cooperative medical schemes in China.

    PubMed

    Wang, Juan; Zhou, Hong-Wei; Lei, Yi-Xiong; Wang, Xin-Wang

    2012-08-01

    This study was the first of its kind to analyze the finance protection in New Rural Cooperative Medical Scheme in China using a claim database analysis. A claim database analysis of all hospitalizations reimbursed from the New Rural Cooperative Medical Scheme between January 2005 and December 2008 in Panyu district of Guangzhou covering 108,414 discharges was conducted to identify the difference in real reimbursement rate among 5 hospitalization cost categories by sex, age, and hospital type and to investigate the distributions of hospital-type choices among age and hospitalization cost categories. The share of total cost reimbursed was only 34% on average, and increased with age but decreased with higher hospitalization cost, undermining catastrophic coverage. Older people were more likely to be hospitalized at lower level hospitals with higher reimbursement rate. The mean cost per hospitalization and average length of stay increased whereas the real reimbursement rate decreased with hospital level among the top 4 diseases with the same ICD-10 diagnostic code (3-digit level) for each age group. Providing better protection against costly medical needs will require shifting the balance of objectives somewhat away from cost control toward more generous reimbursement, expanding the list of treatments that the insurance will cover, or some other policy to provide adequate care at lower cost facilities where more of the cost is now covered.

  17. Patient information, consents and privacy protection scheme for an information system dedicated to pervasive developmental disorders.

    PubMed

    Ben Said, Mohamed; Robel, Laurence; Messiaen, Claude; Craus, Yann; Jais, Jean Philippe; Golse, Bernard; Landais, Paul

    2014-01-01

    Patients explicit and unambiguous information, patients consents and privacy protection are reviewed in this article, in the frame of the deployment of the information system TEDIS dedicated to autism spectrum disorders. The role of the Delegate to the Protection of Data is essential at this stage. We developed a privacy protection scheme based on storing encrypted patients personal data on the server database and decrypting it on the Web browser. It tries to respond to the end-users request to manage nominative data in a human readable form and to meet with privacy protection framework.

  18. Computational study of the interaction between a shock and a near-wall vortex using a weighted compact nonlinear scheme

    NASA Astrophysics Data System (ADS)

    Zuo, Zhifeng; Maekawa, Hiroshi

    2014-02-01

    The interaction between a moderate-strength shock wave and a near-wall vortex is studied numerically by solving the two-dimensional, unsteady compressible Navier-Stokes equations using a weighted compact nonlinear scheme with a simple low-dissipation advection upstream splitting method for flux splitting. Our main purpose is to clarify the development of the flow field and the generation of sound waves resulting from the interaction. The effects of the vortex-wall distance on the sound generation associated with variations in the flow structures are also examined. The computational results show that three sound sources are involved in this problem: (i) a quadrupolar sound source due to the shock-vortex interaction; (ii) a dipolar sound source due to the vortex-wall interaction; and (iii) a dipolar sound source due to unsteady wall shear stress. The sound field is the combination of the sound waves produced by all three sound sources. In addition to the interaction of the incident shock with the vortex, a secondary shock-vortex interaction is caused by the reflection of the reflected shock (MR2) from the wall. The flow field is dominated by the primary and secondary shock-vortex interactions. The generation mechanism of the third sound, which is newly discovered, due to the MR2-vortex interaction is presented. The pressure variations generated by (ii) become significant with decreasing vortex-wall distance. The sound waves caused by (iii) are extremely weak compared with those caused by (i) and (ii) and are negligible in the computed sound field.

  19. The near infrared imaging system for the real-time protection of the JET ITER-like wall

    NASA Astrophysics Data System (ADS)

    Huber, A.; Kinna, D.; Huber, V.; Arnoux, G.; Balboa, I.; Balorin, C.; Carman, P.; Carvalho, P.; Collins, S.; Conway, N.; McCullen, P.; Jachmich, S.; Jouve, M.; Linsmeier, Ch; Lomanowski, B.; Lomas, P. J.; Lowry, C. G.; Maggi, C. F.; Matthews, G. F.; May-Smith, T.; Meigs, A.; Mertens, Ph; Nunes, I.; Price, M.; Puglia, P.; Riccardo, V.; Rimini, F. G.; Sergienko, G.; Tsalas, M.; Zastrow, K.-D.; contributors, JET

    2017-12-01

    This paper describes the design, implementation and operation of the near infrared (NIR) imaging diagnostic system of the JET ITER-like wall (JET-ILW) plasma experiment and its integration into the existing JET protection architecture. The imaging system comprises four wide-angle views, four tangential divertor views, and two top views of the divertor covering 66% of the first wall and up to 43% of the divertor. The operation temperature ranges which must be observed by the NIR protection cameras are, for the materials used on JET: Be 700 °C-1400 °C W coating 700 °C-1370 °C W bulk 700 °C-1400 °C. The Real-Time Protection system operates routinely since 2011 and successfully demonstrated its capability to avoid the overheating of the main chamber beryllium wall as well as of the divertor W and W-coated carbon fibre composite (CFC) tiles. During this period, less than 0.5% of the terminated discharges were aborted by a malfunction of the system. About 2%-3% of the discharges were terminated due to the detection of actual hot spots.

  20. Design of Provider-Provisioned Website Protection Scheme against Malware Distribution

    NASA Astrophysics Data System (ADS)

    Yagi, Takeshi; Tanimoto, Naoto; Hariu, Takeo; Itoh, Mitsutaka

    Vulnerabilities in web applications expose computer networks to security threats, and many websites are used by attackers as hopping sites to attack other websites and user terminals. These incidents prevent service providers from constructing secure networking environments. To protect websites from attacks exploiting vulnerabilities in web applications, service providers use web application firewalls (WAFs). WAFs filter accesses from attackers by using signatures, which are generated based on the exploit codes of previous attacks. However, WAFs cannot filter unknown attacks because the signatures cannot reflect new types of attacks. In service provider environments, the number of exploit codes has recently increased rapidly because of the spread of vulnerable web applications that have been developed through cloud computing. Thus, generating signatures for all exploit codes is difficult. To solve these problems, our proposed scheme detects and filters malware downloads that are sent from websites which have already received exploit codes. In addition, to collect information for detecting malware downloads, web honeypots, which automatically extract the communication records of exploit codes, are used. According to the results of experiments using a prototype, our scheme can filter attacks automatically so that service providers can provide secure and cost-effective network environments.

  1. Impact of Publicly Financed Health Insurance Schemes on Healthcare Utilization and Financial Risk Protection in India: A Systematic Review.

    PubMed

    Prinja, Shankar; Chauhan, Akashdeep Singh; Karan, Anup; Kaur, Gunjeet; Kumar, Rajesh

    2017-01-01

    Several publicly financed health insurance schemes have been launched in India with the aim of providing universalizing health coverage (UHC). In this paper, we report the impact of publicly financed health insurance schemes on health service utilization, out-of-pocket (OOP) expenditure, financial risk protection and health status. Empirical research studies focussing on the impact or evaluation of publicly financed health insurance schemes in India were searched on PubMed, Google scholar, Ovid, Scopus, Embase and relevant websites. The studies were selected based on two stage screening PRISMA guidelines in which two researchers independently assessed the suitability and quality of the studies. The studies included in the review were divided into two groups i.e., with and without a comparison group. To assess the impact on utilization, OOP expenditure and health indicators, only the studies with a comparison group were reviewed. Out of 1265 articles screened after initial search, 43 studies were found eligible and reviewed in full text, finally yielding 14 studies which had a comparator group in their evaluation design. All the studies (n-7) focussing on utilization showed a positive effect in terms of increase in the consumption of health services with introduction of health insurance. About 70% studies (n-5) studies with a strong design and assessing financial risk protection showed no impact in reduction of OOP expenditures, while remaining 30% of evaluations (n-2), which particularly evaluated state sponsored health insurance schemes, reported a decline in OOP expenditure among the enrolled households. One study which evaluated impact on health outcome showed reduction in mortality among enrolled as compared to non-enrolled households, from conditions covered by the insurance scheme. While utilization of healthcare did improve among those enrolled in the scheme, there is no clear evidence yet to suggest that these have resulted in reduced OOP expenditures or

  2. Impact of Publicly Financed Health Insurance Schemes on Healthcare Utilization and Financial Risk Protection in India: A Systematic Review

    PubMed Central

    Chauhan, Akashdeep Singh; Karan, Anup; Kaur, Gunjeet; Kumar, Rajesh

    2017-01-01

    Several publicly financed health insurance schemes have been launched in India with the aim of providing universalizing health coverage (UHC). In this paper, we report the impact of publicly financed health insurance schemes on health service utilization, out-of-pocket (OOP) expenditure, financial risk protection and health status. Empirical research studies focussing on the impact or evaluation of publicly financed health insurance schemes in India were searched on PubMed, Google scholar, Ovid, Scopus, Embase and relevant websites. The studies were selected based on two stage screening PRISMA guidelines in which two researchers independently assessed the suitability and quality of the studies. The studies included in the review were divided into two groups i.e., with and without a comparison group. To assess the impact on utilization, OOP expenditure and health indicators, only the studies with a comparison group were reviewed. Out of 1265 articles screened after initial search, 43 studies were found eligible and reviewed in full text, finally yielding 14 studies which had a comparator group in their evaluation design. All the studies (n-7) focussing on utilization showed a positive effect in terms of increase in the consumption of health services with introduction of health insurance. About 70% studies (n-5) studies with a strong design and assessing financial risk protection showed no impact in reduction of OOP expenditures, while remaining 30% of evaluations (n-2), which particularly evaluated state sponsored health insurance schemes, reported a decline in OOP expenditure among the enrolled households. One study which evaluated impact on health outcome showed reduction in mortality among enrolled as compared to non-enrolled households, from conditions covered by the insurance scheme. While utilization of healthcare did improve among those enrolled in the scheme, there is no clear evidence yet to suggest that these have resulted in reduced OOP expenditures or

  3. Estimation of bladder wall location in ultrasound images.

    PubMed

    Topper, A K; Jernigan, M E

    1991-05-01

    A method of automatically estimating the location of the bladder wall in ultrasound images is proposed. Obtaining this estimate is intended to be the first stage in the development of an automatic bladder volume calculation system. The first step in the bladder wall estimation scheme involves globally processing the images using standard image processing techniques to highlight the bladder wall. Separate processing sequences are required to highlight the anterior bladder wall and the posterior bladder wall. The sequence to highlight the anterior bladder wall involves Gaussian smoothing and second differencing followed by zero-crossing detection. Median filtering followed by thresholding and gradient detection is used to highlight as much of the rest of the bladder wall as was visible in the original images. Then a 'bladder wall follower'--a line follower with rules based on the characteristics of ultrasound imaging and the anatomy involved--is applied to the processed images to estimate the bladder wall location by following the portions of the bladder wall which are highlighted and filling in the missing segments. The results achieved using this scheme are presented.

  4. The shaded side of the UHC cube: a systematic review of human resources for health management and administration in social health protection schemes.

    PubMed

    Obermann, Konrad; Chanturidze, Tata; Glazinski, Bernd; Dobberschuetz, Karin; Steinhauer, Heiko; Schmidt, Jean-Olivier

    2018-02-20

    Managers and administrators in charge of social protection and health financing, service purchasing and provision play a crucial role in harnessing the potential advantage of prudent organization, management and purchasing of health services, thereby supporting the attainment of Universal Health Coverage. However, very little is known about the needed quantity and quality of such staff, in particular when it comes to those institutions managing mandatory health insurance schemes and purchasing services. As many health care systems in low- and middle-income countries move towards independent institutions (both purchasers and providers) there is a clear need to have good data on staff and administrative cost in different social health protection schemes as a basis for investing in the development of a cadre of health managers and administrators for such schemes. We report on a systematic literature review of human resources in health management and administration in social protection schemes and suggest some aspects in moving research, practical applications and the policy debate forward.

  5. Protective interior wall and attach8ing means for a fusion reactor vacuum vessel

    DOEpatents

    Phelps, Richard D.; Upham, Gerald A.; Anderson, Paul M.

    1988-01-01

    An array of connected plates mounted on the inside wall of the vacuum vessel of a magnetic confinement reactor in order to provide a protective surface for energy deposition inside the vessel. All fasteners are concealed and protected beneath the plates, while the plates themselves share common mounting points. The entire array is installed with torqued nuts on threaded studs; provision also exists for thermal expansion by mounting each plate with two of its four mounts captured in an oversize grooved spool. A spool-washer mounting hardware allows one edge of a protective plate to be torqued while the other side remains loose, by simply inverting the spool-washer hardware.

  6. Numerical investigations of cooling holes system role in the protection of the walls of a gas turbine combustion chamber

    NASA Astrophysics Data System (ADS)

    Ben Sik Ali, Ahlem; Kriaa, Wassim; Mhiri, Hatem; Bournot, Philippe

    2012-05-01

    Numerical simulations in a gas turbine Swirl stabilized combustor were conducted to investigate the effectiveness of a cooling system in the protection of combustor walls. The studied combustion chamber has a high degree of geometrical complexity related to the injection system as well as the cooling system based on a big distribution of small holes (about 3,390 holes) bored on the flame tube walls. Two cases were considered respectively the flame tube without and with its cooling system. The calculations were carried out using the industrial CFD code FLUENT 6.2. The various simulations made it possible to highlight the role of cooling holes in the protection of the flame tube walls against the high temperatures of the combustion products. In fact, the comparison between the results of the two studied cases demonstrated that the walls temperature can be reduced by about 800°C by the mean of cooling holes technique.

  7. Extraordinary Corrosion Protection from Polymer-Clay Nanobrick Wall Thin Films.

    PubMed

    Schindelholz, Eric J; Spoerke, Erik D; Nguyen, Hai-Duy; Grunlan, Jaime C; Qin, Shuang; Bufford, Daniel C

    2018-06-20

    Metals across all industries demand anticorrosion surface treatments and drive a continual need for high-performing and low-cost coatings. Here we demonstrate polymer-clay nanocomposite thin films as a new class of transparent conformal barrier coatings for protection in corrosive atmospheres. Films assembled via layer-by-layer deposition, as thin as 90 nm, are shown to reduce copper corrosion rates by >1000× in an aggressive H 2 S atmosphere. These multilayer nanobrick wall coatings hold promise as high-performing anticorrosion treatment alternatives to costlier, more toxic, and less scalable thin films, such as graphene, hexavalent chromium, or atomic-layer-deposited metal oxides.

  8. Alternative irradiation schemes for NIF and LMJ hohlraums

    NASA Astrophysics Data System (ADS)

    Bourgade, Jean-Luc; Bowen, Christopher; Gauthier, Pascal; Landen, Otto

    2018-02-01

    We explore two alternative irradiation schemes for the large (‘outer’) and small (‘inner’) angle beams that currently illuminate National Ignition Facility (NIF) and Laser Mégajoule cavities. In the first, while the outer laser beams enter through the usual end laser entrance holes (LEH), the inner beams enter through slots along the cavity axis wall, illuminating the back wall of the cavity. This avoids the current interaction of the inner laser beams with the gold wall bubbles generated by the outer beams, which leads to large time-dependent changes in drive symmetry. Another scheme potentially useful for NIF uses only the outer beams. The radiative losses through the slots or from the use of outer beams only are compensated by using a smaller cavity and LEH.

  9. Alternative irradiation schemes for NIF and LMJ hohlraums

    DOE PAGES

    Bourgade, Jean-Luc; Bowen, Christopher; Gauthier, Pascal; ...

    2017-12-13

    Here, we explore two alternative irradiation schemes for the large ('outer') and small ('inner') angle beams that currently illuminate National Ignition Facility (NIF) and Laser Mégajoule cavities. In the first, while the outer laser beams enter through the usual end laser entrance holes (LEH), the inner beams enter through slots along the cavity axis wall, illuminating the back wall of the cavity. This avoids the current interaction of the inner laser beams with the gold wall bubbles generated by the outer beams, which leads to large time-dependent changes in drive symmetry. Another scheme potentially useful for NIF uses only themore » outer beams. The radiative losses through the slots or from the use of outer beams only are compensated by using a smaller cavity and LEH.« less

  10. Alternative irradiation schemes for NIF and LMJ hohlraums

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bourgade, Jean-Luc; Bowen, Christopher; Gauthier, Pascal

    Here, we explore two alternative irradiation schemes for the large ('outer') and small ('inner') angle beams that currently illuminate National Ignition Facility (NIF) and Laser Mégajoule cavities. In the first, while the outer laser beams enter through the usual end laser entrance holes (LEH), the inner beams enter through slots along the cavity axis wall, illuminating the back wall of the cavity. This avoids the current interaction of the inner laser beams with the gold wall bubbles generated by the outer beams, which leads to large time-dependent changes in drive symmetry. Another scheme potentially useful for NIF uses only themore » outer beams. The radiative losses through the slots or from the use of outer beams only are compensated by using a smaller cavity and LEH.« less

  11. Protective roles of single-wall carbon nanotubes in ultrasonication-induced DNA base damage.

    PubMed

    Petersen, Elijah J; Tu, Xiaomin; Dizdaroglu, Miral; Zheng, Ming; Nelson, Bryant C

    2013-01-28

    The overall level of ultrasonication-induced DNA damage is reduced in the presence of single-wall carbon nanotubes (SWCNTs), particularly for DNA lesions formed by one-electron reduction of intermediate radicals. The protective role of SWCNTs observed in this work suggests a contrary view to the general idea that carbon nanotubes have damaging effects on biomolecules. Copyright © 2013 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  12. On optimal designs of transparent WDM networks with 1 + 1 protection leveraged by all-optical XOR network coding schemes

    NASA Astrophysics Data System (ADS)

    Dao, Thanh Hai

    2018-01-01

    Network coding techniques are seen as the new dimension to improve the network performances thanks to the capability of utilizing network resources more efficiently. Indeed, the application of network coding to the realm of failure recovery in optical networks has been marking a major departure from traditional protection schemes as it could potentially achieve both rapid recovery and capacity improvement, challenging the prevailing wisdom of trading capacity efficiency for speed recovery and vice versa. In this context, the maturing of all-optical XOR technologies appears as a good match to the necessity of a more efficient protection in transparent optical networks. In addressing this opportunity, we propose to use a practical all-optical XOR network coding to leverage the conventional 1 + 1 optical path protection in transparent WDM optical networks. The network coding-assisted protection solution combines protection flows of two demands sharing the same destination node in supportive conditions, paving the way for reducing the backup capacity. A novel mathematical model taking into account the operation of new protection scheme for optimal network designs is formulated as the integer linear programming. Numerical results based on extensive simulations on realistic topologies, COST239 and NSFNET networks, are presented to highlight the benefits of our proposal compared to the conventional approach in terms of wavelength resources efficiency and network throughput.

  13. Re-design and fabrication of titanium multi-wall Thermal Protection System (TPS) test panels

    NASA Technical Reports Server (NTRS)

    Blair, W.; Meaney, J. E., Jr.; Rosenthal, H. A.

    1984-01-01

    The Titanium Multi-wall Thermal Protection System (TIPS) panel was re-designed to incorporate Ti-6-2-4-2 outer sheets for the hot surface, ninety degree side closures for ease of construction and through panel fastness for ease of panel removal. Thermal and structural tests were performed to verify the design. Twenty-five panels were fabricated and delivered to NASA for evaluation at Langley Research Center and Johnson Space Center.

  14. Promoting universal financial protection: how the Thai universal coverage scheme was designed to ensure equity.

    PubMed

    Tangcharoensathien, Viroj; Pitayarangsarit, Siriwan; Patcharanarumol, Walaiporn; Prakongsai, Phusit; Sumalee, Hathaichanok; Tosanguan, Jiraboon; Mills, Anne

    2013-08-06

    Empirical evidence demonstrates that the Thai Universal Coverage Scheme (UCS) has improved equity of health financing and provided a relatively high level of financial risk protection. Several UCS design features contribute to these outcomes: a tax-financed scheme, a comprehensive benefit package and gradual extension of coverage to illnesses that can lead to catastrophic household costs, and capacity of the National Health Security Office (NHSO) to mobilise adequate resources. This study assesses the policy processes related to making decisions on these features. The study employs qualitative methods including reviews of relevant documents, in-depth interviews of 25 key informants, and triangulation amongst information sources. Continued political and financial commitments to the UCS, despite political rivalry, played a key role. The Thai Rak Thai (TRT)-led coalition government introduced UCS; staying in power 8 of the 11 years between 2001 and 2011 was long enough to nurture and strengthen the UCS and overcome resistance from various opponents. Prime Minister Surayud's government, replacing the ousted TRT government, introduced universal renal replacement therapy, which deepened financial risk protection.Commitment to their manifesto and fiscal capacity pushed the TRT to adopt a general tax-financed universal scheme; collecting premiums from people engaged in the informal sector was neither politically palatable nor technically feasible. The relatively stable tenure of NHSO Secretary Generals and the chairs of the Financing and the Benefit Package subcommittees provided a platform for continued deepening of financial risk protection. NHSO exerted monopsonistic purchasing power to control prices, resulting in greater patient access and better systems efficiency than might have been the case with a different design.The approach of proposing an annual per capita budget changed the conventional line-item programme budgeting system by basing negotiations between the

  15. Symmetric weak ternary quantum homomorphic encryption schemes

    NASA Astrophysics Data System (ADS)

    Wang, Yuqi; She, Kun; Luo, Qingbin; Yang, Fan; Zhao, Chao

    2016-03-01

    Based on a ternary quantum logic circuit, four symmetric weak ternary quantum homomorphic encryption (QHE) schemes were proposed. First, for a one-qutrit rotation gate, a QHE scheme was constructed. Second, in view of the synthesis of a general 3 × 3 unitary transformation, another one-qutrit QHE scheme was proposed. Third, according to the one-qutrit scheme, the two-qutrit QHE scheme about generalized controlled X (GCX(m,n)) gate was constructed and further generalized to the n-qutrit unitary matrix case. Finally, the security of these schemes was analyzed in two respects. It can be concluded that the attacker can correctly guess the encryption key with a maximum probability pk = 1/33n, thus it can better protect the privacy of users’ data. Moreover, these schemes can be well integrated into the future quantum remote server architecture, and thus the computational security of the users’ private quantum information can be well protected in a distributed computing environment.

  16. Palmprint Based Multidimensional Fuzzy Vault Scheme

    PubMed Central

    Liu, Hailun; Sun, Dongmei; Xiong, Ke; Qiu, Zhengding

    2014-01-01

    Fuzzy vault scheme (FVS) is one of the most popular biometric cryptosystems for biometric template protection. However, error correcting code (ECC) proposed in FVS is not appropriate to deal with real-valued biometric intraclass variances. In this paper, we propose a multidimensional fuzzy vault scheme (MDFVS) in which a general subspace error-tolerant mechanism is designed and embedded into FVS to handle intraclass variances. Palmprint is one of the most important biometrics; to protect palmprint templates; a palmprint based MDFVS implementation is also presented. Experimental results show that the proposed scheme not only can deal with intraclass variances effectively but also could maintain the accuracy and meanwhile enhance security. PMID:24892094

  17. A bee in the corridor: centering and wall-following

    NASA Astrophysics Data System (ADS)

    Serres, Julien R.; Masson, Guillaume P.; Ruffier, Franck; Franceschini, Nicolas

    2008-12-01

    In an attempt to better understand the mechanism underlying lateral collision avoidance in flying insects, we trained honeybees ( Apis mellifera) to fly through a large (95-cm wide) flight tunnel. We found that, depending on the entrance and feeder positions, honeybees would either center along the corridor midline or fly along one wall. Bees kept following one wall even when a major (150-cm long) part of the opposite wall was removed. These findings cannot be accounted for by the “optic flow balance” hypothesis that has been put forward to explain the typical bees’ “centering response” observed in narrower corridors. Both centering and wall-following behaviors are well accounted for, however, by a control scheme called the lateral optic flow regulator, i.e., a feedback system that strives to maintain the unilateral optic flow constant. The power of this control scheme is that it would allow the bee to guide itself visually in a corridor without having to measure its speed or distance from the walls.

  18. 7 CFR 400.458 - Scheme or device.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 6 2014-01-01 2014-01-01 false Scheme or device. 400.458 Section 400.458 Agriculture... AGRICULTURE GENERAL ADMINISTRATIVE REGULATIONS Administrative Remedies for Non-Compliance § 400.458 Scheme or... material scheme or device to obtain catastrophic risk protection, other plans of insurance coverage, or...

  19. 7 CFR 400.458 - Scheme or device.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 6 2010-01-01 2010-01-01 false Scheme or device. 400.458 Section 400.458 Agriculture... AGRICULTURE GENERAL ADMINISTRATIVE REGULATIONS Administrative Remedies for Non-Compliance § 400.458 Scheme or... material scheme or device to obtain catastrophic risk protection, other plans of insurance coverage, or...

  20. 7 CFR 400.458 - Scheme or device.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 6 2013-01-01 2013-01-01 false Scheme or device. 400.458 Section 400.458 Agriculture... AGRICULTURE GENERAL ADMINISTRATIVE REGULATIONS Administrative Remedies for Non-Compliance § 400.458 Scheme or... material scheme or device to obtain catastrophic risk protection, other plans of insurance coverage, or...

  1. 7 CFR 400.458 - Scheme or device.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 6 2011-01-01 2011-01-01 false Scheme or device. 400.458 Section 400.458 Agriculture... AGRICULTURE GENERAL ADMINISTRATIVE REGULATIONS Administrative Remedies for Non-Compliance § 400.458 Scheme or... material scheme or device to obtain catastrophic risk protection, other plans of insurance coverage, or...

  2. 7 CFR 400.458 - Scheme or device.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 6 2012-01-01 2012-01-01 false Scheme or device. 400.458 Section 400.458 Agriculture... AGRICULTURE GENERAL ADMINISTRATIVE REGULATIONS Administrative Remedies for Non-Compliance § 400.458 Scheme or... material scheme or device to obtain catastrophic risk protection, other plans of insurance coverage, or...

  3. Cell Wall Remodeling Enzymes Modulate Fungal Cell Wall Elasticity and Osmotic Stress Resistance

    PubMed Central

    Ene, Iuliana V.; Walker, Louise A.; Schiavone, Marion; Lee, Keunsook K.; Martin-Yken, Hélène; Dague, Etienne; Gow, Neil A. R.; Munro, Carol A.

    2015-01-01

    ABSTRACT The fungal cell wall confers cell morphology and protection against environmental insults. For fungal pathogens, the cell wall is a key immunological modulator and an ideal therapeutic target. Yeast cell walls possess an inner matrix of interlinked β-glucan and chitin that is thought to provide tensile strength and rigidity. Yeast cells remodel their walls over time in response to environmental change, a process controlled by evolutionarily conserved stress (Hog1) and cell integrity (Mkc1, Cek1) signaling pathways. These mitogen-activated protein kinase (MAPK) pathways modulate cell wall gene expression, leading to the construction of a new, modified cell wall. We show that the cell wall is not rigid but elastic, displaying rapid structural realignments that impact survival following osmotic shock. Lactate-grown Candida albicans cells are more resistant to hyperosmotic shock than glucose-grown cells. We show that this elevated resistance is not dependent on Hog1 or Mkc1 signaling and that most cell death occurs within 10 min of osmotic shock. Sudden decreases in cell volume drive rapid increases in cell wall thickness. The elevated stress resistance of lactate-grown cells correlates with reduced cell wall elasticity, reflected in slower changes in cell volume following hyperosmotic shock. The cell wall elasticity of lactate-grown cells is increased by a triple mutation that inactivates the Crh family of cell wall cross-linking enzymes, leading to increased sensitivity to hyperosmotic shock. Overexpressing Crh family members in glucose-grown cells reduces cell wall elasticity, providing partial protection against hyperosmotic shock. These changes correlate with structural realignment of the cell wall and with the ability of cells to withstand osmotic shock. PMID:26220968

  4. Temperature dependence of the domain wall magneto-Seebeck effect: avoiding artifacts of lead contributions

    NASA Astrophysics Data System (ADS)

    Fernández Scarioni, Alexander; Krzysteczko, Patryk; Sievers, Sibylle; Hu, Xiukun; Schumacher, Hans W.

    2018-06-01

    We study the resistive and thermopower signatures of a single domain wall in a magnetic nanowire in the temperature range from 4 K to 204 K. The results are compared to the anisotropic magnetoresistance (AMR) and anisotropic magneto-Seebeck (AMS) data of the whole permalloy nanowire. The AMS ratio of the nanowire reveals a sign change at a temperature of 98 K, while the AMR ratio is positive over the complete temperature range. This behavior is also observed for the domain wall, allowing an attribution of the measured signatures to the domain wall magneto-Seebeck and domain wall magnetoresistive contributions. However, the observed zero crossing of the AMS ratio, in both types of measurements is not expected for permalloy, since the Mott formula predicts a temperature dependency of the AMS identical to the AMR. We discuss the origin of this behavior and can attribute it to the contributions of the lead and the protective platinum layer used in our devices. A correction scheme is presented and applied. Such contributions could also play a role in the analysis of magneto-Seebeck effects in other nanoscale devices, such as the tunnel magneto-Seebeck effect of magnetic tunnel junctions.

  5. Fuzzy-Wavelet Based Double Line Transmission System Protection Scheme in the Presence of SVC

    NASA Astrophysics Data System (ADS)

    Goli, Ravikumar; Shaik, Abdul Gafoor; Tulasi Ram, Sankara S.

    2015-06-01

    Increasing the power transfer capability and efficient utilization of available transmission lines, improving the power system controllability and stability, power oscillation damping and voltage compensation have made strides and created Flexible AC Transmission (FACTS) devices in recent decades. Shunt FACTS devices can have adverse effects on distance protection both in steady state and transient periods. Severe under reaching is the most important problem of relay which is caused by current injection at the point of connection to the system. Current absorption of compensator leads to overreach of relay. This work presents an efficient method based on wavelet transforms, fault detection, classification and location using Fuzzy logic technique which is almost independent of fault impedance, fault distance and fault inception angle. The proposed protection scheme is found to be fast, reliable and accurate for various types of faults on transmission lines with and without Static Var compensator at different locations and with various incidence angles.

  6. Finite Difference Schemes as Algebraic Correspondences between Layers

    NASA Astrophysics Data System (ADS)

    Malykh, Mikhail; Sevastianov, Leonid

    2018-02-01

    For some differential equations, especially for Riccati equation, new finite difference schemes are suggested. These schemes define protective correspondences between the layers. Calculation using these schemes can be extended to the area beyond movable singularities of exact solution without any error accumulation.

  7. Research on multi-user encrypted search scheme in cloud environment

    NASA Astrophysics Data System (ADS)

    Yu, Zonghua; Lin, Sui

    2017-05-01

    Aiming at the existing problems of multi-user encrypted search scheme in cloud computing environment, a basic multi-user encrypted scheme is proposed firstly, and then the basic scheme is extended to an anonymous hierarchical management authority. Compared with most of the existing schemes, the scheme not only to achieve the protection of keyword information, but also to achieve the protection of user identity privacy; the same time, data owners can directly control the user query permissions, rather than the cloud server. In addition, through the use of a special query key generation rules, to achieve the hierarchical management of the user's query permissions. The safety analysis shows that the scheme is safe and that the performance analysis and experimental data show that the scheme is practicable.

  8. 7 CFR 1491.32 - Scheme or device.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 10 2012-01-01 2012-01-01 false Scheme or device. 1491.32 Section 1491.32 Agriculture... AGRICULTURE EXPORT PROGRAMS FARM AND RANCH LANDS PROTECTION PROGRAM General Administration § 1491.32 Scheme or device. (a) If it is determined by NRCS that a eligible entity has employed a scheme or device to defeat...

  9. 7 CFR 1491.32 - Scheme or device.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 10 2014-01-01 2014-01-01 false Scheme or device. 1491.32 Section 1491.32 Agriculture... AGRICULTURE EXPORT PROGRAMS FARM AND RANCH LANDS PROTECTION PROGRAM General Administration § 1491.32 Scheme or device. (a) If it is determined by NRCS that a eligible entity has employed a scheme or device to defeat...

  10. 7 CFR 1491.32 - Scheme or device.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 10 2013-01-01 2013-01-01 false Scheme or device. 1491.32 Section 1491.32 Agriculture... AGRICULTURE EXPORT PROGRAMS FARM AND RANCH LANDS PROTECTION PROGRAM General Administration § 1491.32 Scheme or device. (a) If it is determined by NRCS that a eligible entity has employed a scheme or device to defeat...

  11. Study on construction technology of metro tunnel under a glass curtain wall

    NASA Astrophysics Data System (ADS)

    Zhang, Jian; Yu, Deqiang

    2018-03-01

    To ensure the safety of the glass curtain wall building above loess tunnel and get an optimal scheme, an elastic-plastic FEM model is established to simulate three reinforcement schemes based on a tunnel section in Xi’an Metro Line 3. The results show that the settlement value of the optimal scheme is reduced by 69.89% compared with the drainage measures, and the uneven settlement value is reduced by 57.5%. The construction points, technical processes and technical indexes of the optimal scheme are introduced. According to the actual project, the cumulative settlement of the building under construction is 16mm, which meets the control standards. According to the actual project, the cumulative settlement of the glass curtain wall building is 16mm, which meets the control standards. The reinforcement scheme can provide some reference for the design and construction of the metro in loess area.

  12. Robust anonymous authentication scheme for telecare medical information systems.

    PubMed

    Xie, Qi; Zhang, Jun; Dong, Na

    2013-04-01

    Patient can obtain sorts of health-care delivery services via Telecare Medical Information Systems (TMIS). Authentication, security, patient's privacy protection and data confidentiality are important for patient or doctor accessing to Electronic Medical Records (EMR). In 2012, Chen et al. showed that Khan et al.'s dynamic ID-based authentication scheme has some weaknesses and proposed an improved scheme, and they claimed that their scheme is more suitable for TMIS. However, we show that Chen et al.'s scheme also has some weaknesses. In particular, Chen et al.'s scheme does not provide user's privacy protection and perfect forward secrecy, is vulnerable to off-line password guessing attack and impersonation attack once user's smart card is compromised. Further, we propose a secure anonymity authentication scheme to overcome their weaknesses even an adversary can know all information stored in smart card.

  13. National health insurance scheme: how protected are households in Oyo State, Nigeria from catastrophic health expenditure?

    PubMed Central

    Ilesanmi, Olayinka Stephen; Adebiyi, Akindele Olupelumi; Fatiregun, Akinola Ayoola

    2014-01-01

    Background: The major objective of the National Health Insurance Scheme (NHIS) in Nigeria is to protect families from the financial hardship of large medical bills. Catastrophic Health Expenditure (CHE) is rampart in Nigeria despite the take-off of the NHIS. This study aimed to determine if households enrolled in the NHIS were protected from having CHE. Methods: The study took place among 714 households in urban communities of Oyo State. CHE was measured using a threshold of 40% of monthly non-food expenditure. Descriptive statistics were done, Principal Component Analysis was used to divide households into wealth quintiles. Chi-square test and binary logistic regression were done. Results: The mean age of household respondent was 33.5 years. The median household income was 43,500 naira (290 US dollars) and the range was 7,000–680,000 naira (46.7–4,533 US dollars) in 2012. The overall median household healthcare cost was 890 naira (5.9 US dollars) and the range was 10-17,700 naira (0.1–118 US dollars) in 2012. In all, 67 (9.4%) households were enrolled in NHIS scheme. Healthcare services was utilized by 637 (82.9%) and CHE occurred in 42 (6.6%) households. CHE occurred in 14 (10.9%) of the households in the lowest quintile compared to 3 (2.5%) in the highest wealth quintile (P= 0.004). The odds of CHE among households in lowest wealth quintile is about 5 times. They had Crude OR (CI): 4.7 (1.3–16.8), P= 0.022. Non enrolled households were two times likely to have CHE, though not significant Conclusion: Households in the lowest wealth quintiles were at higher risk of CHE. Universal coverage of health insurance in Nigeria should be fast-tracked to give the expected financial risk protection and decreased incidence of CHE. PMID:24847483

  14. National health insurance scheme: how protected are households in Oyo State, Nigeria from catastrophic health expenditure?

    PubMed

    Ilesanmi, Olayinka Stephen; Adebiyi, Akindele Olupelumi; Fatiregun, Akinola Ayoola

    2014-05-01

    The major objective of the National Health Insurance Scheme (NHIS) in Nigeria is to protect families from the financial hardship of large medical bills. Catastrophic Health Expenditure (CHE) is rampart in Nigeria despite the take-off of the NHIS. This study aimed to determine if households enrolled in the NHIS were protected from having CHE. The study took place among 714 households in urban communities of Oyo State. CHE was measured using a threshold of 40% of monthly non-food expenditure. Descriptive statistics were done, Principal Component Analysis was used to divide households into wealth quintiles. Chi-square test and binary logistic regression were done. The mean age of household respondent was 33.5 years. The median household income was 43,500 naira (290 US dollars) and the range was 7,000-680,000 naira (46.7-4,533 US dollars) in 2012. The overall median household healthcare cost was 890 naira (5.9 US dollars) and the range was 10-17,700 naira (0.1-118 US dollars) in 2012. In all, 67 (9.4%) households were enrolled in NHIS scheme. Healthcare services was utilized by 637 (82.9%) and CHE occurred in 42 (6.6%) households. CHE occurred in 14 (10.9%) of the households in the lowest quintile compared to 3 (2.5%) in the highest wealth quintile (P= 0.004). The odds of CHE among households in lowest wealth quintile is about 5 times. They had Crude OR (CI): 4.7 (1.3-16.8), P= 0.022. Non enrolled households were two times likely to have CHE, though not significant Conclusion: Households in the lowest wealth quintiles were at higher risk of CHE. Universal coverage of health insurance in Nigeria should be fast-tracked to give the expected financial risk protection and decreased incidence of CHE.

  15. In-vessel calibration of the imaging diagnostics for the real-time protection of the JET ITER-like wall.

    PubMed

    Huber, V; Huber, A; Kinna, D; Balboa, I; Collins, S; Conway, N; Drewelow, P; Maggi, C F; Matthews, G F; Meigs, A G; Mertens, Ph; Price, M; Sergienko, G; Silburn, S; Wynn, A; Zastrow, K-D

    2016-11-01

    The in situ absolute calibration of the JET real-time protection imaging system has been performed for the first time by means of radiometric light source placed inside the JET vessel and operated by remote handling. High accuracy of the calibration is confirmed by cross-validation of the near infrared (NIR) cameras against each other, with thermal IR cameras, and with the beryllium evaporator, which lead to successful protection of the JET first wall during the last campaign. The operation temperature ranges of NIR protection cameras for the materials used on JET are Be 650-1600 °C, W coating 600-1320 °C, and W 650-1500 °C.

  16. In-vessel calibration of the imaging diagnostics for the real-time protection of the JET ITER-like wall

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Huber, V., E-mail: V.Huber@fz-juelich.de; Huber, A.; Mertens, Ph.

    The in situ absolute calibration of the JET real-time protection imaging system has been performed for the first time by means of radiometric light source placed inside the JET vessel and operated by remote handling. High accuracy of the calibration is confirmed by cross-validation of the near infrared (NIR) cameras against each other, with thermal IR cameras, and with the beryllium evaporator, which lead to successful protection of the JET first wall during the last campaign. The operation temperature ranges of NIR protection cameras for the materials used on JET are Be 650-1600 °C, W coating 600-1320 °C, and W 650-1500 °C.

  17. A Novel Multi-Receiver Signcryption Scheme with Complete Anonymity.

    PubMed

    Pang, Liaojun; Yan, Xuxia; Zhao, Huiyang; Hu, Yufei; Li, Huixian

    2016-01-01

    Anonymity, which is more and more important to multi-receiver schemes, has been taken into consideration by many researchers recently. To protect the receiver anonymity, in 2010, the first multi-receiver scheme based on the Lagrange interpolating polynomial was proposed. To ensure the sender's anonymity, the concept of the ring signature was proposed in 2005, but afterwards, this scheme was proven to has some weakness and at the same time, a completely anonymous multi-receiver signcryption scheme is proposed. In this completely anonymous scheme, the sender anonymity is achieved by improving the ring signature, and the receiver anonymity is achieved by also using the Lagrange interpolating polynomial. Unfortunately, the Lagrange interpolation method was proven a failure to protect the anonymity of receivers, because each authorized receiver could judge whether anyone else is authorized or not. Therefore, the completely anonymous multi-receiver signcryption mentioned above can only protect the sender anonymity. In this paper, we propose a new completely anonymous multi-receiver signcryption scheme with a new polynomial technology used to replace the Lagrange interpolating polynomial, which can mix the identity information of receivers to save it as a ciphertext element and prevent the authorized receivers from verifying others. With the receiver anonymity, the proposed scheme also owns the anonymity of the sender at the same time. Meanwhile, the decryption fairness and public verification are also provided.

  18. An improved biometrics-based authentication scheme for telecare medical information systems.

    PubMed

    Guo, Dianli; Wen, Qiaoyan; Li, Wenmin; Zhang, Hua; Jin, Zhengping

    2015-03-01

    Telecare medical information system (TMIS) offers healthcare delivery services and patients can acquire their desired medical services conveniently through public networks. The protection of patients' privacy and data confidentiality are significant. Very recently, Mishra et al. proposed a biometrics-based authentication scheme for telecare medical information system. Their scheme can protect user privacy and is believed to resist a range of network attacks. In this paper, we analyze Mishra et al.'s scheme and identify that their scheme is insecure to against known session key attack and impersonation attack. Thereby, we present a modified biometrics-based authentication scheme for TMIS to eliminate the aforementioned faults. Besides, we demonstrate the completeness of the proposed scheme through BAN-logic. Compared to the related schemes, our protocol can provide stronger security and it is more practical.

  19. Energy Conservation in Optical Fibers With Distributed Brick-Walls Filters

    NASA Astrophysics Data System (ADS)

    Garcia, Javier; Ghozlan, Hassan; Kramer, Gerhard

    2018-05-01

    A band-pass filtering scheme is proposed to mitigate spectral broadening and channel coupling in the Nonlinear Schr\\"odinger (NLS) fiber optic channel. The scheme is modeled by modifying the NLS Equation to include an attenuation profile with multiple brick-wall filters centered at different frequencies. It is shown that this brick-walls profile conserves the total in-band energy of the launch signal. Furthermore, energy fluctuations between the filtered channels are characterized, and conditions on the channel spacings are derived that ensure energy conservation in each channel. The maximum spectral efficiency of such a system is derived, and a constructive rule for achieving it using Sidon sequences is provided.

  20. Evaluation of Euler fluxes by a high-order CFD scheme: shock instability

    NASA Astrophysics Data System (ADS)

    Tu, Guohua; Zhao, Xiaohui; Mao, Meiliang; Chen, Jianqiang; Deng, Xiaogang; Liu, Huayong

    2014-05-01

    The construction of Euler fluxes is an important step in shock-capturing/upwind schemes. It is well known that unsuitable fluxes are responsible for many shock anomalies, such as the carbuncle phenomenon. Three kinds of flux vector splittings (FVSs) as well as three kinds of flux difference splittings (FDSs) are evaluated for the shock instability by a fifth-order weighted compact nonlinear scheme. The three FVSs are Steger-Warming splitting, van Leer splitting and kinetic flux vector splitting (KFVS). The three FDSs are Roe's splitting, advection upstream splitting method (AUSM) type splitting and Harten-Lax-van Leer (HLL) type splitting. Numerical results indicate that FVSs and high dissipative FDSs undergo a relative lower risk on the shock instability than that of low dissipative FDSs. However, none of the fluxes evaluated in the present study can entirely avoid the shock instability. Generally, the shock instability may be caused by any of the following factors: low dissipation, high Mach number, unsuitable grid distribution, large grid aspect ratio, and the relative shock-internal flow state (or position) between upstream and downstream shock waves. It comes out that the most important factor is the relative shock-internal state. If the shock-internal state is closer to the downstream state, the computation is at higher susceptibility to the shock instability. Wall-normal grid distribution has a greater influence on the shock instability than wall-azimuthal grid distribution because wall-normal grids directly impact on the shock-internal position. High shock intensity poses a high risk on the shock instability, but its influence is not as much as the shock-internal state. Large grid aspect ratio is also a source of the shock instability. Some results of a second-order scheme and a first-order scheme are also given. The comparison between the high-order scheme and the two low-order schemes indicates that high-order schemes are at a higher risk of the shock

  1. 40 CFR 721.10277 - Single-walled and multi-walled carbon nanotubes (generic) (P-10-40).

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... PROTECTION AGENCY (CONTINUED) TOXIC SUBSTANCES CONTROL ACT SIGNIFICANT NEW USES OF CHEMICAL SUBSTANCES Significant New Uses for Specific Chemical Substances § 721.10277 Single-walled and multi-walled carbon nanotubes (generic) (P-10-40). (a) Chemical substance and significant new uses subject to reporting. (1) The...

  2. 40 CFR 721.10277 - Single-walled and multi-walled carbon nanotubes (generic) (P-10-40).

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... PROTECTION AGENCY (CONTINUED) TOXIC SUBSTANCES CONTROL ACT SIGNIFICANT NEW USES OF CHEMICAL SUBSTANCES Significant New Uses for Specific Chemical Substances § 721.10277 Single-walled and multi-walled carbon nanotubes (generic) (P-10-40). (a) Chemical substance and significant new uses subject to reporting. (1) The...

  3. Cell Wall Remodeling Enzymes Modulate Fungal Cell Wall Elasticity and Osmotic Stress Resistance.

    PubMed

    Ene, Iuliana V; Walker, Louise A; Schiavone, Marion; Lee, Keunsook K; Martin-Yken, Hélène; Dague, Etienne; Gow, Neil A R; Munro, Carol A; Brown, Alistair J P

    2015-07-28

    The fungal cell wall confers cell morphology and protection against environmental insults. For fungal pathogens, the cell wall is a key immunological modulator and an ideal therapeutic target. Yeast cell walls possess an inner matrix of interlinked β-glucan and chitin that is thought to provide tensile strength and rigidity. Yeast cells remodel their walls over time in response to environmental change, a process controlled by evolutionarily conserved stress (Hog1) and cell integrity (Mkc1, Cek1) signaling pathways. These mitogen-activated protein kinase (MAPK) pathways modulate cell wall gene expression, leading to the construction of a new, modified cell wall. We show that the cell wall is not rigid but elastic, displaying rapid structural realignments that impact survival following osmotic shock. Lactate-grown Candida albicans cells are more resistant to hyperosmotic shock than glucose-grown cells. We show that this elevated resistance is not dependent on Hog1 or Mkc1 signaling and that most cell death occurs within 10 min of osmotic shock. Sudden decreases in cell volume drive rapid increases in cell wall thickness. The elevated stress resistance of lactate-grown cells correlates with reduced cell wall elasticity, reflected in slower changes in cell volume following hyperosmotic shock. The cell wall elasticity of lactate-grown cells is increased by a triple mutation that inactivates the Crh family of cell wall cross-linking enzymes, leading to increased sensitivity to hyperosmotic shock. Overexpressing Crh family members in glucose-grown cells reduces cell wall elasticity, providing partial protection against hyperosmotic shock. These changes correlate with structural realignment of the cell wall and with the ability of cells to withstand osmotic shock. The C. albicans cell wall is the first line of defense against external insults, the site of immune recognition by the host, and an attractive target for antifungal therapy. Its tensile strength is conferred by

  4. Can health insurance protect against out-of-pocket and catastrophic expenditures and also support poverty reduction? Evidence from Ghana's National Health Insurance Scheme.

    PubMed

    Aryeetey, Genevieve Cecilia; Westeneng, Judith; Spaan, Ernst; Jehu-Appiah, Caroline; Agyepong, Irene Akua; Baltussen, Rob

    2016-07-22

    Ghana since 2004, begun implementation of a National Health Insurance Scheme (NHIS) to minimize financial barriers to health care at point of use of service. Usually health insurance is expected to offer financial protection to households. This study aims to analyze the effect health insurance on household out-of-pocket expenditure (OOPE), catastrophic expenditure (CE) and poverty. We conducted two repeated household surveys in two regions of Ghana in 2009 and 2011. We first analyzed the effect of OOPE on poverty by estimating poverty headcount before and after OOPE were incurred. We also employed probit models and use of instrumental variables to analyze the effect of health insurance on OOPE, CE and poverty. Our findings showed that between 7-18 % of insured households incurred CE as a result of OOPE whereas this was between 29-36 % for uninsured households. In addition, between 3-5 % of both insured and uninsured households fell into poverty due to OOPE. Our regression analyses revealed that health insurance enrolment reduced OOPE by 86 % and protected households against CE and poverty by 3.0 % and 7.5 % respectively. This study provides evidence that high OOPE leads to CE and poverty in Ghana but enrolment into the NHIS reduces OOPE, provides financial protection against CE and reduces poverty. These findings support the pro-poor policy objective of Ghana's National Health Insurance Scheme and holds relevance to other low and middle income countries implementing or aiming to implement insurance schemes.

  5. Does the National Health Insurance Scheme provide financial protection to households in Ghana?

    PubMed

    Kusi, Anthony; Hansen, Kristian Schultz; Asante, Felix A; Enemark, Ulrika

    2015-08-15

    Excessive healthcare payments can impede access to health services and also disrupt the welfare of households with no financial protection. Health insurance is expected to offer financial protection against health shocks. Ghana began the implementation of its National Health Insurance Scheme (NHIS) in 2004. The NHIS is aimed at removing the financial barrier to healthcare by limiting direct out-of-pocket health expenditures (OOPHE). The study examines the effect of the NHIS on OOPHE and how it protects households against catastrophic health expenditures. Data was obtained from a cross-sectional representative household survey involving 2,430 households from three districts across Ghana. All OOPHE associated with treatment seeking for reported illness in the household in the last 4 weeks preceding the survey were analysed and compared between insured and uninsured persons. The incidence and intensity of catastrophic health expenditures (CHE) among households were measured by the catastrophic health payment method. The relative effect of NHIS on the incidence of CHE in the household was estimated by multiple logistic regression analysis. About 36% of households reported at least one illness during the 4 weeks period. Insured patients had significantly lower direct OOPHE for out-patient and in-patient care compared to the uninsured. On financial protection, the incidence of CHE was lower among insured households (2.9%) compared to the partially insured (3.7%) and the uninsured (4.0%) at the 40% threshold. The incidence of CHE was however significantly lower among fully insured households (6.0%) which sought healthcare from NHIS accredited health facilities compared to the partially insured (10.1%) and the uninsured households (23.2%). The likelihood of a household incurring CHE was 4.2 times less likely for fully insured and 2.9 times less likely for partially insured households relative to being uninsured. The NHIS has however not completely eliminated OOPHE for the

  6. Physics-Based Simulation and Experiment on Blast Protection of Infill Walls and Sandwich Composites Using New Generation of Nano Particle Reinforced Materials

    NASA Astrophysics Data System (ADS)

    Irshidat, Mohammad

    A critical issue for the development of nanotechnology is our ability to understand, model, and simulate the behavior of small structures and to make the connection between nano structure properties and their macroscopic functions. Material modeling and simulation helps to understand the process, to set the objectives that could guide laboratory efforts, and to control material structures, properties, and processes at physical implementation. These capabilities are vital to engineering design at the component and systems level. In this research, experimental-computational-analytical program was employed to investigate the performance of the new generation of polymeric nano-composite materials, like nano-particle reinforced elastomeric materials (NPREM), for the protection of masonry structures against blast loads. New design tools for using these kinds of materials to protect Infill Walls (e.g. masonry walls) against blast loading were established. These tools were also extended to cover other type of panels like sandwich composites. This investigation revealed that polymeric nano composite materials are strain rate sensitive and have large amount of voids distributed randomly inside the materials. Results from blast experiments showed increase in ultimate flexural resistance achieved by both unreinforced and nano reinforced polyurea retrofit systems applied to infill masonry walls. It was also observed that a thin elastomeric coating on the interior face of the walls could be effective at minimizing the fragmentation resulting from blast. More conclusions are provided with recommended future research.

  7. Who uses outpatient healthcare services under Ghana's health protection scheme and why?

    PubMed

    Fenny, Ama P; Asante, Felix A; Arhinful, Daniel K; Kusi, Anthony; Parmar, Divya; Williams, Gemma

    2016-05-10

    The National Health Insurance Scheme (NHIS) was launched in Ghana in 2003 with the main objective of increasing utilisation to healthcare by making healthcare more affordable. Previous studies on the NHIS have repeatedly highlighted that cost of premiums is one of the major barriers for enrollment. However, despite introducing premium exemptions for pregnant women, older people, children and indigents, many Ghanaians are still not active members of the NHIS. In this paper we investigate why there is limited success of the NHIS in improving access to healthcare in Ghana and whether social exclusion could be one of the limiting barriers. The study explores this by looking at the Social, Political, Economic and Cultural (SPEC) dimensions of social exclusion. Using logistic regression, the study investigates the determinants of health service utilisation using SPEC variables including other variables. Data was collected from 4050 representative households in five districts in Ghana covering the 3 ecological zones (coastal, forest and savannah) in Ghana. Among 16,200 individuals who responded to the survey, 54 % were insured. Out of the 1349 who sought health care, 64 % were insured and 65 % of them had basic education and 60 % were women. The results from the logistic regressions show health insurance status, education and gender to be the three main determinants of health care utilisation. Overall, a large proportion of the insured who reported ill, sought care from formal health care providers compared to those who had never insured in the scheme. The paper demonstrates that the NHIS presents a workable policy tool for increasing access to healthcare through an emphasis on social health protection. However, affordability is not the only barrier for access to health services. Geographical, social, cultural, informational, political, and other barriers also come into play.

  8. 40 CFR 761.316 - Interpreting PCB concentration measurements resulting from this sampling scheme.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 32 2013-07-01 2013-07-01 false Interpreting PCB concentration measurements resulting from this sampling scheme. 761.316 Section 761.316 Protection of Environment... scheme. (a) For an individual sample taken from an approximately 1 meter square portion of the entire...

  9. Mechanics of the Toxoplasma gondii oocyst wall

    USDA-ARS?s Scientific Manuscript database

    The ability of microorganisms to survive under extreme conditions is closely related to the physicochemical properties of their wall. In the ubiquitous protozoan parasite Toxoplasma gondii, the oocyst stage possesses a bilayered wall that protects the dormant but potentially infective parasites from...

  10. A robust uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care.

    PubMed

    Wen, Fengtong

    2013-12-01

    User authentication plays an important role to protect resources or services from being accessed by unauthorized users. In a recent paper, Das et al. proposed a secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. This scheme uses three factors, e.g. biometrics, password, and smart card, to protect the security. It protects user privacy and is believed to have many abilities to resist a range of network attacks, even if the secret information stored in the smart card is compromised. In this paper, we analyze the security of Das et al.'s scheme, and show that the scheme is in fact insecure against the replay attack, user impersonation attacks and off-line guessing attacks. Then, we also propose a robust uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. Compared with the existing schemes, our protocol uses a different user authentication mechanism to resist replay attack. We show that our proposed scheme can provide stronger security than previous protocols. Furthermore, we demonstrate the validity of the proposed scheme through the BAN (Burrows, Abadi, and Needham) logic.

  11. Methods of Investigation of Equations that Describe Waves in Tubes with Elastic Walls and Application of the Theory of Reversible and Weak Dissipative Shocks

    NASA Astrophysics Data System (ADS)

    Bakholdin, Igor

    2018-02-01

    Various models of a tube with elastic walls are investigated: with controlled pressure, filled with incompressible fluid, filled with compressible gas. The non-linear theory of hyperelasticity is applied. The walls of a tube are described with complete membrane model. It is proposed to use linear model of plate in order to take the bending resistance of walls into account. The walls of the tube were treated previously as inviscid and incompressible. Compressibility of material of walls and viscosity of material, either gas or liquid are considered. Equations are solved numerically. Three-layer time and space centered reversible numerical scheme and similar two-layer space reversible numerical scheme with approximation of time derivatives by Runge-Kutta method are used. A method of correction of numerical schemes by inclusion of terms with highorder derivatives is developed. Simplified hyperbolic equations are derived.

  12. Vertical regolith shield wall construction for lunar base applications

    NASA Technical Reports Server (NTRS)

    Kaplicky, Jan; Nixon, David; Wernick, Jane

    1992-01-01

    Lunar bases located on the lunar surface will require permanent protection from radiation and launch ejecta. This paper outlines a method of providing physical protection using lunar regolith that is constructed in situ as a modular vertical wall using specially devised methods of containment and construction. Deployable compartments, reinforced with corner struts, are elevated and filled by a moving gantry. The compartments interlock to form a stable wall. Different wall heights, thicknesses, and plan configurations are achieved by varying the geometry of the individual compartments, which are made from woven carbon fibers. Conventional terrestrial structural engineering techniques can be modified and used to establish the structural integrity and performance of the wall assembly.

  13. Advanced Protection & Service Restoration for FREEDM Systems

    NASA Astrophysics Data System (ADS)

    Singh, Urvir

    A smart electric power distribution system (FREEDM system) that incorporates DERs (Distributed Energy Resources), SSTs (Solid State Transformers - that can limit the fault current to two times of the rated current) & RSC (Reliable & Secure Communication) capabilities has been studied in this work in order to develop its appropriate protection & service restoration techniques. First, a solution is proposed that can make conventional protective devices be able to provide effective protection for FREEDM systems. Results show that although this scheme can provide required protection but it can be quite slow. Using the FREEDM system's communication capabilities, a communication assisted Overcurrent (O/C) protection scheme is proposed & results show that by using communication (blocking signals) very fast operating times are achieved thereby, mitigating the problem of conventional O/C scheme. Using the FREEDM System's DGI (Distributed Grid Intelligence) capability, an automated FLISR (Fault Location, Isolation & Service Restoration) scheme is proposed that is based on the concept of 'software agents' & uses lesser data (than conventional centralized approaches). Test results illustrated that this scheme is able to provide a global optimal system reconfiguration for service restoration.

  14. Secure privacy-preserving biometric authentication scheme for telecare medicine information systems.

    PubMed

    Li, Xuelei; Wen, Qiaoyan; Li, Wenmin; Zhang, Hua; Jin, Zhengping

    2014-11-01

    Healthcare delivery services via telecare medicine information systems (TMIS) can help patients to obtain their desired telemedicine services conveniently. However, information security and privacy protection are important issues and crucial challenges in healthcare information systems, where only authorized patients and doctors can employ telecare medicine facilities and access electronic medical records. Therefore, a secure authentication scheme is urgently required to achieve the goals of entity authentication, data confidentiality and privacy protection. This paper investigates a new biometric authentication with key agreement scheme, which focuses on patient privacy and medical data confidentiality in TMIS. The new scheme employs hash function, fuzzy extractor, nonce and authenticated Diffie-Hellman key agreement as primitives. It provides patient privacy protection, e.g., hiding identity from being theft and tracked by unauthorized participant, and preserving password and biometric template from being compromised by trustless servers. Moreover, key agreement supports secure transmission by symmetric encryption to protect patient's medical data from being leaked. Finally, the analysis shows that our proposal provides more security and privacy protection for TMIS.

  15. Drag reduction at a plane wall

    NASA Technical Reports Server (NTRS)

    Hill, D. C.

    1993-01-01

    The objective is to determine by analytical means how drag on a plane wall may be modified favorably using a minimal amount of flow information - preferably only information at the wall. What quantities should be measured? How should that information be assimilated in order to arrive at effective control? As a prototypical problem, incompressible, viscous flow, governed by the Navier-Stokes equations, past a plane wall at which the no-slip condition was modified was considered. The streamwise and spanwise velocity components are required to be zero, but the normal component is to be specified according to some control law. The challenge is to choose the wall-normal velocity component based on flow conditions at the wall so that the mean drag is as small as possible. There can be no net mass flux through the wall, and the total available control energy is constrained. A turbulent flow is highly unsteady and has detailed spatial structure. The mean drag on the wall is the integral over the wall of the local shear forces exerted by the fluid, which is then averaged in time; it is a 'macroscopic' property of the flow. It is not obvious how unsteady boundary control is to be applied in order to modify the mean flow most effectively, especially in view of the non- self-adjoint nature of the governing equations. An approximate analytical solution to the suboptimal scheme is pursued.

  16. Could the heat sink effect of blood flow inside large vessels protect the vessel wall from thermal damage during RF-assisted surgical resection?

    PubMed

    González-Suárez, Ana; Trujillo, Macarena; Burdío, Fernando; Andaluz, Anna; Berjano, Enrique

    2014-08-01

    To assess by means of computer simulations whether the heat sink effect inside a large vessel (portal vein) could protect the vessel wall from thermal damage close to an internally cooled electrode during radiofrequency (RF)-assisted resection. First,in vivo experiments were conducted to validate the computational model by comparing the experimental and computational thermal lesion shapes created around the vessels. Computer simulations were then carried out to study the effect of different factors such as device-tissue contact, vessel position, and vessel-device distance on temperature distributions and thermal lesion shapes near a large vessel, specifically the portal vein. The geometries of thermal lesions around the vessels in the in vivo experiments were in agreement with the computer results. The thermal lesion shape created around the portal vein was significantly modified by the heat sink effect in all the cases considered. Thermal damage to the portal vein wall was inversely related to the vessel-device distance. It was also more pronounced when the device-tissue contact surface was reduced or when the vessel was parallel to the device or perpendicular to its distal end (blade zone), the vessel wall being damaged at distances less than 4.25 mm. The computational findings suggest that the heat sink effect could protect the portal vein wall for distances equal to or greater than 5 mm, regardless of its position and distance with respect to the RF-based device.

  17. 40 CFR 721.10156 - Single-walled carbon nanotubes (generic).

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 32 2013-07-01 2013-07-01 false Single-walled carbon nanotubes... Specific Chemical Substances § 721.10156 Single-walled carbon nanotubes (generic). (a) Chemical substance... single-walled carbon nanotubes (PMN P-08-328) is subject to reporting under this section for the...

  18. 40 CFR 721.10156 - Single-walled carbon nanotubes (generic).

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 31 2011-07-01 2011-07-01 false Single-walled carbon nanotubes... Specific Chemical Substances § 721.10156 Single-walled carbon nanotubes (generic). (a) Chemical substance... single-walled carbon nanotubes (PMN P-08-328) is subject to reporting under this section for the...

  19. 40 CFR 721.10156 - Single-walled carbon nanotubes (generic).

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 32 2012-07-01 2012-07-01 false Single-walled carbon nanotubes... Specific Chemical Substances § 721.10156 Single-walled carbon nanotubes (generic). (a) Chemical substance... single-walled carbon nanotubes (PMN P-08-328) is subject to reporting under this section for the...

  20. 40 CFR 721.10156 - Single-walled carbon nanotubes (generic).

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 31 2014-07-01 2014-07-01 false Single-walled carbon nanotubes... Specific Chemical Substances § 721.10156 Single-walled carbon nanotubes (generic). (a) Chemical substance... single-walled carbon nanotubes (PMN P-08-328) is subject to reporting under this section for the...

  1. 40 CFR 721.10183 - Multi-walled carbon nanotubes (generic).

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 31 2014-07-01 2014-07-01 false Multi-walled carbon nanotubes (generic... Specific Chemical Substances § 721.10183 Multi-walled carbon nanotubes (generic). (a) Chemical substance... multi-walled carbon nanotubes (PMN P-08-199) is subject to reporting under this section for the...

  2. 40 CFR 721.10155 - Multi-walled carbon nanotubes (generic).

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 32 2012-07-01 2012-07-01 false Multi-walled carbon nanotubes (generic... Specific Chemical Substances § 721.10155 Multi-walled carbon nanotubes (generic). (a) Chemical substance... multi-walled carbon nanotubes (PMN P-08-177) is subject to reporting under this section for the...

  3. 40 CFR 721.10183 - Multi-walled carbon nanotubes (generic).

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 32 2012-07-01 2012-07-01 false Multi-walled carbon nanotubes (generic... Specific Chemical Substances § 721.10183 Multi-walled carbon nanotubes (generic). (a) Chemical substance... multi-walled carbon nanotubes (PMN P-08-199) is subject to reporting under this section for the...

  4. 40 CFR 721.10155 - Multi-walled carbon nanotubes (generic).

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 31 2014-07-01 2014-07-01 false Multi-walled carbon nanotubes (generic... Specific Chemical Substances § 721.10155 Multi-walled carbon nanotubes (generic). (a) Chemical substance... multi-walled carbon nanotubes (PMN P-08-177) is subject to reporting under this section for the...

  5. 40 CFR 721.10183 - Multi-walled carbon nanotubes (generic).

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 31 2011-07-01 2011-07-01 false Multi-walled carbon nanotubes (generic... Specific Chemical Substances § 721.10183 Multi-walled carbon nanotubes (generic). (a) Chemical substance... multi-walled carbon nanotubes (PMN P-08-199) is subject to reporting under this section for the...

  6. 40 CFR 721.10155 - Multi-walled carbon nanotubes (generic).

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 31 2011-07-01 2011-07-01 false Multi-walled carbon nanotubes (generic... Specific Chemical Substances § 721.10155 Multi-walled carbon nanotubes (generic). (a) Chemical substance... multi-walled carbon nanotubes (PMN P-08-177) is subject to reporting under this section for the...

  7. 40 CFR 721.10183 - Multi-walled carbon nanotubes (generic).

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 32 2013-07-01 2013-07-01 false Multi-walled carbon nanotubes (generic... Specific Chemical Substances § 721.10183 Multi-walled carbon nanotubes (generic). (a) Chemical substance... multi-walled carbon nanotubes (PMN P-08-199) is subject to reporting under this section for the...

  8. 40 CFR 721.10155 - Multi-walled carbon nanotubes (generic).

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 32 2013-07-01 2013-07-01 false Multi-walled carbon nanotubes (generic... Specific Chemical Substances § 721.10155 Multi-walled carbon nanotubes (generic). (a) Chemical substance... multi-walled carbon nanotubes (PMN P-08-177) is subject to reporting under this section for the...

  9. Protection of Renewable-dominated Microgrids: Challenges and Potential Solutions

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Elkhatib, Mohamed; Ellis, Abraham; Biswal, Milan

    In this report we address the challenge of designing efficient protection system for inverter- dominated microgrids. These microgrids are characterised with limited fault current capacity as a result of current-limiting protection functions of inverters. Typically, inverters limit their fault contribution in sub-cycle time frame to as low as 1.1 per unit. As a result, overcurrent protection could fail completely to detect faults in inverter-dominated microgrids. As part of this project a detailed literature survey of existing and proposed microgrid protection schemes were conducted. The survey concluded that there is a gap in the available microgrid protection methods. The only crediblemore » protection solution available in literature for low- fault inverter-dominated microgrids is the differential protection scheme which represents a robust transmission-grade protection solution but at a very high cost. Two non-overcurrent protection schemes were investigated as part of this project; impedance-based protection and transient-based protection. Impedance-based protection depends on monitoring impedance trajectories at feeder relays to detect faults. Two communication-based impedance-based protection schemes were developed. the first scheme utilizes directional elements and pilot signals to locate the fault. The second scheme depends on a Central Protection Unit that communicates with all feeder relays to locate the fault based on directional flags received from feeder relays. The later approach could potentially be adapted to protect networked microgrids and dynamic topology microgrids. Transient-based protection relies on analyzing high frequency transients to detect and locate faults. This approach is very promising but its implementation in the filed faces several challenges. For example, high frequency transients due to faults can be confused with transients due to other events such as capacitor switching. Additionally, while detecting faults by analyzing

  10. Robust Audio Watermarking Scheme Based on Deterministic Plus Stochastic Model

    NASA Astrophysics Data System (ADS)

    Dhar, Pranab Kumar; Kim, Cheol Hong; Kim, Jong-Myon

    Digital watermarking has been widely used for protecting digital contents from unauthorized duplication. This paper proposes a new watermarking scheme based on spectral modeling synthesis (SMS) for copyright protection of digital contents. SMS defines a sound as a combination of deterministic events plus a stochastic component that makes it possible for a synthesized sound to attain all of the perceptual characteristics of the original sound. In our proposed scheme, watermarks are embedded into the highest prominent peak of the magnitude spectrum of each non-overlapping frame in peak trajectories. Simulation results indicate that the proposed watermarking scheme is highly robust against various kinds of attacks such as noise addition, cropping, re-sampling, re-quantization, and MP3 compression and achieves similarity values ranging from 17 to 22. In addition, our proposed scheme achieves signal-to-noise ratio (SNR) values ranging from 29 dB to 30 dB.

  11. Analysis of multi drug resistant tuberculosis (MDR-TB) financial protection policy: MDR-TB health insurance schemes, in Chhattisgarh state, India.

    PubMed

    Kundu, Debashish; Sharma, Nandini; Chadha, Sarabjit; Laokri, Samia; Awungafac, George; Jiang, Lai; Asaria, Miqdad

    2018-01-27

    There are significant financial barriers to access treatment for multi drug resistant tuberculosis (MDR-TB) in India. To address these challenges, Chhattisgarh state in India has established a MDR-TB financial protection policy by creating MDR-TB benefit packages as part of the universal health insurance scheme that the state has rolled out in their effort towards attaining Universal Health Coverage for all its residents. In these schemes the state purchases health insurance against set packages of services from third party health insurance agencies on behalf of all its residents. Provider payment reform by strategic purchasing through output based payments (lump sum fee is reimbursed as per the MDR-TB benefit package rates) to the providers - both public and private health facilities empanelled under the insurance scheme was the key intervention. To understand the implementation gap between policy and practice of the benefit packages with respect to equity in utilization of package claims by the poor patients in public and private sector. Data from primary health insurance claims from January 2013 to December 2015, were analysed using an extension of 'Kingdon's multiple streams for policy implementation framework' to explain the implementation gap between policy and practice of the MDR-TB benefit packages. The total number of claims for MDR-TB benefit packages increased over the study period mainly from poor patients treated in public facilities, particularly for the pre-treatment evaluation and hospital stay packages. Variations and inequities in utilizing the packages were observed between poor and non-poor beneficiaries in public and private sector. Private providers participation in the new MDR-TB financial protection mechanism through the universal health insurance scheme was observed to be much lower than might be expected given their share of healthcare provision overall in India. Our findings suggest that there may be an implementation gap due to weak

  12. At the border: the plasma membrane-cell wall continuum.

    PubMed

    Liu, Zengyu; Persson, Staffan; Sánchez-Rodríguez, Clara

    2015-03-01

    Plant cells rely on their cell walls for directed growth and environmental adaptation. Synthesis and remodelling of the cell walls are membrane-related processes. During cell growth and exposure to external stimuli, there is a constant exchange of lipids, proteins, and other cell wall components between the cytosol and the plasma membrane/apoplast. This exchange of material and the localization of cell wall proteins at certain spots in the plasma membrane seem to rely on a particular membrane composition. In addition, sensors at the plasma membrane detect changes in the cell wall architecture, and activate cytoplasmic signalling schemes and ultimately cell wall remodelling. The apoplastic polysaccharide matrix is, on the other hand, crucial for preventing proteins diffusing uncontrollably in the membrane. Therefore, the cell wall-plasma membrane link is essential for plant development and responses to external stimuli. This review focuses on the relationship between the cell wall and plasma membrane, and its importance for plant tissue organization. © The Author 2015. Published by Oxford University Press on behalf of the Society for Experimental Biology. All rights reserved. For permissions, please email: journals.permissions@oup.com.

  13. An efficient quantum scheme for Private Set Intersection

    NASA Astrophysics Data System (ADS)

    Shi, Run-hua; Mu, Yi; Zhong, Hong; Cui, Jie; Zhang, Shun

    2016-01-01

    Private Set Intersection allows a client to privately compute set intersection with the collaboration of the server, which is one of the most fundamental and key problems within the multiparty collaborative computation of protecting the privacy of the parties. In this paper, we first present a cheat-sensitive quantum scheme for Private Set Intersection. Compared with classical schemes, our scheme has lower communication complexity, which is independent of the size of the server's set. Therefore, it is very suitable for big data services in Cloud or large-scale client-server networks.

  14. Security enhanced multi-factor biometric authentication scheme using bio-hash function

    PubMed Central

    Lee, Youngsook; Moon, Jongho

    2017-01-01

    With the rapid development of personal information and wireless communication technology, user authentication schemes have been crucial to ensure that wireless communications are secure. As such, various authentication schemes with multi-factor authentication have been proposed to improve the security of electronic communications. Multi-factor authentication involves the use of passwords, smart cards, and various biometrics to provide users with the utmost privacy and data protection. Cao and Ge analyzed various authentication schemes and found that Younghwa An’s scheme was susceptible to a replay attack where an adversary masquerades as a legal server and a user masquerading attack where user anonymity is not provided, allowing an adversary to execute a password change process by intercepting the user’s ID during login. Cao and Ge improved upon Younghwa An’s scheme, but various security problems remained. This study demonstrates that Cao and Ge’s scheme is susceptible to a biometric recognition error, slow wrong password detection, off-line password attack, user impersonation attack, ID guessing attack, a DoS attack, and that their scheme cannot provide session key agreement. Then, to address all weaknesses identified in Cao and Ge’s scheme, this study proposes a security enhanced multi-factor biometric authentication scheme and provides a security analysis and formal analysis using Burrows-Abadi-Needham logic. Finally, the efficiency analysis reveals that the proposed scheme can protect against several possible types of attacks with only a slightly high computational cost. PMID:28459867

  15. Security enhanced multi-factor biometric authentication scheme using bio-hash function.

    PubMed

    Choi, Younsung; Lee, Youngsook; Moon, Jongho; Won, Dongho

    2017-01-01

    With the rapid development of personal information and wireless communication technology, user authentication schemes have been crucial to ensure that wireless communications are secure. As such, various authentication schemes with multi-factor authentication have been proposed to improve the security of electronic communications. Multi-factor authentication involves the use of passwords, smart cards, and various biometrics to provide users with the utmost privacy and data protection. Cao and Ge analyzed various authentication schemes and found that Younghwa An's scheme was susceptible to a replay attack where an adversary masquerades as a legal server and a user masquerading attack where user anonymity is not provided, allowing an adversary to execute a password change process by intercepting the user's ID during login. Cao and Ge improved upon Younghwa An's scheme, but various security problems remained. This study demonstrates that Cao and Ge's scheme is susceptible to a biometric recognition error, slow wrong password detection, off-line password attack, user impersonation attack, ID guessing attack, a DoS attack, and that their scheme cannot provide session key agreement. Then, to address all weaknesses identified in Cao and Ge's scheme, this study proposes a security enhanced multi-factor biometric authentication scheme and provides a security analysis and formal analysis using Burrows-Abadi-Needham logic. Finally, the efficiency analysis reveals that the proposed scheme can protect against several possible types of attacks with only a slightly high computational cost.

  16. Through-wall image enhancement using fuzzy and QR decomposition.

    PubMed

    Riaz, Muhammad Mohsin; Ghafoor, Abdul

    2014-01-01

    QR decomposition and fuzzy logic based scheme is proposed for through-wall image enhancement. QR decomposition is less complex compared to singular value decomposition. Fuzzy inference engine assigns weights to different overlapping subspaces. Quantitative measures and visual inspection are used to analyze existing and proposed techniques.

  17. Protection of Renewable-dominated Microgrids: Challenges and Potential Solutions.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Elkhatib, Mohamed; Ellis, Abraham; Milan Biswal

    keywords : Microgrid Protection, Impedance Relay, Signal Processing-based Fault Detec- tion, Networked Microgrids, Communication-Assisted Protection In this report we address the challenge of designing efficient protection system for inverter- dominated microgrids. These microgrids are characterised with limited fault current capacity as a result of current-limiting protection functions of inverters. Typically, inverters limit their fault contribution in sub-cycle time frame to as low as 1.1 per unit. As a result, overcurrent protection could fail completely to detect faults in inverter-dominated microgrids. As part of this project a detailed literature survey of existing and proposed microgrid protection schemes were conducted. The surveymore » concluded that there is a gap in the available microgrid protection methods. The only credible protection solution available in literature for low- fault inverter-dominated microgrids is the differential protection scheme which represents a robust transmission-grade protection solution but at a very high cost. Two non-overcurrent protection schemes were investigated as part of this project; impedance-based protection and transient-based protection. Impedance-based protection depends on monitoring impedance trajectories at feeder relays to detect faults. Two communication-based impedance-based protection schemes were developed. the first scheme utilizes directional elements and pilot signals to locate the fault. The second scheme depends on a Central Protection Unit that communicates with all feeder relays to locate the fault based on directional flags received from feeder relays. The later approach could potentially be adapted to protect networked microgrids and dynamic topology microgrids. Transient-based protection relies on analyzing high frequency transients to detect and locate faults. This approach is very promising but its implementation in the filed faces several challenges. For example, high frequency transients

  18. Trajectory data privacy protection based on differential privacy mechanism

    NASA Astrophysics Data System (ADS)

    Gu, Ke; Yang, Lihao; Liu, Yongzhi; Liao, Niandong

    2018-05-01

    In this paper, we propose a trajectory data privacy protection scheme based on differential privacy mechanism. In the proposed scheme, the algorithm first selects the protected points from the user’s trajectory data; secondly, the algorithm forms the polygon according to the protected points and the adjacent and high frequent accessed points that are selected from the accessing point database, then the algorithm calculates the polygon centroids; finally, the noises are added to the polygon centroids by the differential privacy method, and the polygon centroids replace the protected points, and then the algorithm constructs and issues the new trajectory data. The experiments show that the running time of the proposed algorithms is fast, the privacy protection of the scheme is effective and the data usability of the scheme is higher.

  19. 40 CFR 721.10663 - Functionalized multi-walled carbon nanotubes (generic).

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Specific Chemical Substances § 721.10663 Functionalized multi-walled carbon nanotubes (generic). (a... generically as functionalized multi-walled carbon nanotubes (PMN P-12-44) is subject to reporting under this... 40 Protection of Environment 32 2013-07-01 2013-07-01 false Functionalized multi-walled carbon...

  20. 40 CFR 721.10663 - Functionalized multi-walled carbon nanotubes (generic).

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Specific Chemical Substances § 721.10663 Functionalized multi-walled carbon nanotubes (generic). (a... generically as functionalized multi-walled carbon nanotubes (PMN P-12-44) is subject to reporting under this... 40 Protection of Environment 31 2014-07-01 2014-07-01 false Functionalized multi-walled carbon...

  1. QCD axion dark matter from long-lived domain walls during matter domination

    NASA Astrophysics Data System (ADS)

    Harigaya, Keisuke; Kawasaki, Masahiro

    2018-07-01

    The domain wall problem of the Peccei-Quinn mechanism can be solved if the Peccei-Quinn symmetry is explicitly broken by a small amount. Domain walls decay into axions, which may account for dark matter of the universe. This scheme is however strongly constrained by overproduction of axions unless the phase of the explicit breaking term is tuned. We investigate the case where the universe is matter-dominated around the temperature of the MeV scale and domain walls decay during this matter dominated epoch. We show how the viable parameter space is expanded.

  2. Functional duality of the cell wall.

    PubMed

    Latgé, Jean-Paul; Beauvais, Anne

    2014-08-01

    The polysaccharide cell wall is the extracellular armour of the fungal cell. Although essential in the protection of the fungal cell against aggressive external stresses, the biosynthesis of the polysaccharide core is poorly understood. For a long time it was considered that this cell wall skeleton was a fixed structure whose role was only to be sensed as non-self by the host and consequently trigger the defence response. It is now known that the cell wall polysaccharide composition and localization continuously change to adapt to their environment and that these modifications help the fungus to escape from the immune system. Moreover, cell wall polysaccharides could function as true virulence factors. Copyright © 2014 Elsevier Ltd. All rights reserved.

  3. Modelling cell wall growth using a fibre-reinforced hyperelastic-viscoplastic constitutive law

    NASA Astrophysics Data System (ADS)

    Huang, R.; Becker, A. A.; Jones, I. A.

    2012-04-01

    A fibre-reinforced hyperelastic-viscoplastic model using a finite strain Finite Element (FE) analysis is presented to study the expansive growth of cell walls. Based on the connections between biological concepts and plasticity theory, e.g. wall-loosening and plastic yield, wall-stiffening and plastic hardening, the modelling of cell wall growth is established within a framework of anisotropic viscoplasticity aiming to represent the corresponding biology-controlled behaviour of a cell wall. In order to model in vivo growth, special attention is paid to the differences between a living cell and an isolated wall. The proposed hyperelastic-viscoplastic theory provides a unique framework to clarify the interplay between cellulose microfibrils and cell wall matrix and how this interplay regulates sustainable growth in a particular direction while maintaining the mechanical strength of the cell walls by new material deposition. Moreover, the effect of temperature is taken into account. A numerical scheme is suggested and FE case studies are presented and compared with experimental data.

  4. a Thtee-Dimensional Variational Assimilation Scheme for Satellite Aod

    NASA Astrophysics Data System (ADS)

    Liang, Y.; Zang, Z.; You, W.

    2018-04-01

    A three-dimensional variational data assimilation scheme is designed for satellite AOD based on the IMPROVE (Interagency Monitoring of Protected Visual Environments) equation. The observation operator that simulates AOD from the control variables is established by the IMPROVE equation. All of the 16 control variables in the assimilation scheme are the mass concentrations of aerosol species from the Model for Simulation Aerosol Interactions and Chemistry scheme, so as to take advantage of this scheme in providing comprehensive analyses of species concentrations and size distributions as well as be calculating efficiently. The assimilation scheme can save computational resources as the IMPROVE equation is a quadratic equation. A single-point observation experiment shows that the information from the single-point AOD is effectively spread horizontally and vertically.

  5. Parametric analysis: SOC meteoroid and debris protection

    NASA Technical Reports Server (NTRS)

    Kowalski, R.

    1985-01-01

    The meteoroid and man made space debris environments of an Earth orbital manned space operations center are discussed. Protective shielding thickness and design configurations for providing given levels of no penetration probability were also calculated. Meteoroid/debris protection consists of a radiator/shield thickness, which is actually an outer skin, separated from the pressure wall, thickness by a distance. An ideal shield thickness, will, upon impact with a particle, cause both the particle and shield to vaporize, allowing a minimum amount of debris to impact the pressure wall itself. A shield which is too thick will crater on the outside, and release small particles of shield from the inside causing damage to the pressure wall. Inversely, if the shield is too thin, it will afford no protection, and the backup must provide all necessary protection. It was concluded that a double wall concept is most effective.

  6. The Role of Auxin in Cell Wall Expansion.

    PubMed

    Majda, Mateusz; Robert, Stéphanie

    2018-03-22

    Plant cells are surrounded by cell walls, which are dynamic structures displaying a strictly regulated balance between rigidity and flexibility. Walls are fairly rigid to provide support and protection, but also extensible, to allow cell growth, which is triggered by a high intracellular turgor pressure. Wall properties regulate the differential growth of the cell, resulting in a diversity of cell sizes and shapes. The plant hormone auxin is well known to stimulate cell elongation via increasing wall extensibility. Auxin participates in the regulation of cell wall properties by inducing wall loosening. Here, we review what is known on cell wall property regulation by auxin. We focus particularly on the auxin role during cell expansion linked directly to cell wall modifications. We also analyze downstream targets of transcriptional auxin signaling, which are related to the cell wall and could be linked to acid growth and the action of wall-loosening proteins. All together, this update elucidates the connection between hormonal signaling and cell wall synthesis and deposition.

  7. Geometrical Dependence of Domain-Wall Propagation and Nucleation Fields in Magnetic-Domain-Wall Sensors

    NASA Astrophysics Data System (ADS)

    Borie, B.; Kehlberger, A.; Wahrhusen, J.; Grimm, H.; Kläui, M.

    2017-08-01

    We study the key domain-wall properties in segmented nanowire loop-based structures used in domain-wall-based sensors. The two reasons for device failure, namely, distribution of the domain-wall propagation field (depinning) and the nucleation field are determined with magneto-optical Kerr effect and giant-magnetoresistance (GMR) measurements for thousands of elements to obtain significant statistics. Single layers of Ni81 Fe19 , a complete GMR stack with Co90 Fe10 /Ni81Fe19 as a free layer, and a single layer of Co90 Fe10 are deposited and industrially patterned to determine the influence of the shape anisotropy, the magnetocrystalline anisotropy, and the fabrication processes. We show that the propagation field is influenced only slightly by the geometry but significantly by material parameters. Simulations for a realistic wire shape yield a curling-mode type of magnetization configuration close to the nucleation field. Nonetheless, we find that the domain-wall nucleation fields can be described by a typical Stoner-Wohlfarth model related to the measured geometrical parameters of the wires and fitted by considering the process parameters. The GMR effect is subsequently measured in a substantial number of devices (3000) in order to accurately gauge the variation between devices. This measurement scheme reveals a corrected upper limit to the nucleation fields of the sensors that can be exploited for fast characterization of the working elements.

  8. Control of Tollmien-Schlichting instabilities by finite distributed wall actuation

    NASA Astrophysics Data System (ADS)

    Losse, Nikolas R.; King, Rudibert; Zengl, Marcus; Rist, Ulrich; Noack, Bernd R.

    2011-06-01

    Tollmien-Schlichting waves are one of the key mechanisms triggering the laminar-turbulent transition in a flat-plate boundary-layer flow. By damping these waves and thus delaying transition, skin friction drag can be significantly decreased. In this simulation study, a wall segment is actuated according to a control scheme based on a POD-Galerkin model driven extended Kalman filter for state estimation and a model predictive controller to dampen TS waves by negative superposition based on this information. The setup of the simulation is chosen to resemble actuation with a driven compliant wall, such as a membrane actuator. Most importantly, a method is proposed to integrate such a localized wall actuation into a Galerkin model.

  9. 76 FR 26186 - Multi-Walled Carbon Nanotubes; Significant New Use Rule

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-06

    ... 2070-AB27 Multi-Walled Carbon Nanotubes; Significant New Use Rule AGENCY: Environmental Protection... as multi-walled carbon nanotubes (MWCNT) which was the subject of premanufacture notice (PMN) P-08... (due to confidentiality claims) as multi-walled carbon nanotubes (PMN P-08-199). This action requires...

  10. Improved Readout Scheme for SQUID-Based Thermometry

    NASA Technical Reports Server (NTRS)

    Penanen, Konstantin

    2007-01-01

    An improved readout scheme has been proposed for high-resolution thermometers, (HRTs) based on the use of superconducting quantum interference devices (SQUIDs) to measure temperature- dependent magnetic susceptibilities. The proposed scheme would eliminate counting ambiguities that arise in the conventional scheme, while maintaining the superior magnetic-flux sensitivity of the conventional scheme. The proposed scheme is expected to be especially beneficial for HRT-based temperature control of multiplexed SQUIDbased bolometer sensor arrays. SQUID-based HRTs have become standard for measuring and controlling temperatures in the sub-nano-Kelvin temperature range in a broad range of low-temperature scientific and engineering applications. A typical SQUIDbased HRT that utilizes the conventional scheme includes a coil wound on a core made of a material that has temperature- dependent magnetic susceptibility in the temperature range of interest. The core and the coil are placed in a DC magnetic field provided either by a permanent magnet or as magnetic flux inside a superconducting outer wall. The aforementioned coil is connected to an input coil of a SQUID. Changes in temperature lead to changes in the susceptibility of the core and to changes in the magnetic flux detected by the SQUID. The SQUID readout instrumentation is capable of measuring magnetic-flux changes that correspond to temperature changes down to a noise limit .0.1 nK/Hz1/2. When the flux exceeds a few fundamental flux units, which typically corresponds to a temperature of .100 nK, the SQUID is reset. The temperature range can be greatly expanded if the reset events are carefully tracked and counted, either by a computer running appropriate software or by a dedicated piece of hardware.

  11. Protecting quantum Fisher information in curved space-time

    NASA Astrophysics Data System (ADS)

    Huang, Zhiming

    2018-03-01

    In this work, we investigate the quantum Fisher information (QFI) dynamics of a two-level atom interacting with quantized conformally coupled massless scalar fields in de Sitter-invariant vacuum. We first derive the master equation that governs its evolution. It is found that the QFI decays with evolution time. Furthermore, we propose two schemes to protect QFI by employing prior weak measurement (WM) and post measurement reversal (MR). We find that the first scheme can not always protect QFI and the second scheme has prominent advantage over the first scheme.

  12. Parallel computation of fluid-structural interactions using high resolution upwind schemes

    NASA Astrophysics Data System (ADS)

    Hu, Zongjun

    An efficient and accurate solver is developed to simulate the non-linear fluid-structural interactions in turbomachinery flutter flows. A new low diffusion E-CUSP scheme, Zha CUSP scheme, is developed to improve the efficiency and accuracy of the inviscid flux computation. The 3D unsteady Navier-Stokes equations with the Baldwin-Lomax turbulence model are solved using the finite volume method with the dual-time stepping scheme. The linearized equations are solved with Gauss-Seidel line iterations. The parallel computation is implemented using MPI protocol. The solver is validated with 2D cases for its turbulence modeling, parallel computation and unsteady calculation. The Zha CUSP scheme is validated with 2D cases, including a supersonic flat plate boundary layer, a transonic converging-diverging nozzle and a transonic inlet diffuser. The Zha CUSP2 scheme is tested with 3D cases, including a circular-to-rectangular nozzle, a subsonic compressor cascade and a transonic channel. The Zha CUSP schemes are proved to be accurate, robust and efficient in these tests. The steady and unsteady separation flows in a 3D stationary cascade under high incidence and three inlet Mach numbers are calculated to study the steady state separation flow patterns and their unsteady oscillation characteristics. The leading edge vortex shedding is the mechanism behind the unsteady characteristics of the high incidence separated flows. The separation flow characteristics is affected by the inlet Mach number. The blade aeroelasticity of a linear cascade with forced oscillating blades is studied using parallel computation. A simplified two-passage cascade with periodic boundary condition is first calculated under a medium frequency and a low incidence. The full scale cascade with 9 blades and two end walls is then studied more extensively under three oscillation frequencies and two incidence angles. The end wall influence and the blade stability are studied and compared under different

  13. PBF Cubicle 13. Shield wall details illustrate shielding technique of ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    PBF Cubicle 13. Shield wall details illustrate shielding technique of stepped penetrations and brick layout scheme for valve stem extension sleeve. Aerojet Nuclear Company. Date: May 1976. INEEL index no. 761-0620-00-400-195280 - Idaho National Engineering Laboratory, SPERT-I & Power Burst Facility Area, Scoville, Butte County, ID

  14. Quantum Information Processing in the Wall of Cytoskeletal Microtubules

    PubMed Central

    Qiu, Xijun; Wu, Tongcheng; Li, Ruxin

    2006-01-01

    Microtubules (MT) are composed of 13 protofilaments, each of which is a series of two-state tubulin dimers. In the MT wall, these dimers can be pictured as “lattice” sites similar to crystal lattices. Based on the pseudo-spin model, two different location states of the mobile electron in each dimer are proposed. Accordingly, the MT wall is described as an anisotropic two-dimensional (2D) pseudo-spin system considering a periodic triangular “lattice”. Because three different “spin-spin” interactions in each cell exist periodically in the whole MT wall, the system may be shown to be an array of three types of two-pseudo-spin-state dimers. For the above-mentioned condition, the processing of quantum information is presented by using the scheme developed by Lloyd. PMID:19669447

  15. The Role of Auxin in Cell Wall Expansion

    PubMed Central

    2018-01-01

    Plant cells are surrounded by cell walls, which are dynamic structures displaying a strictly regulated balance between rigidity and flexibility. Walls are fairly rigid to provide support and protection, but also extensible, to allow cell growth, which is triggered by a high intracellular turgor pressure. Wall properties regulate the differential growth of the cell, resulting in a diversity of cell sizes and shapes. The plant hormone auxin is well known to stimulate cell elongation via increasing wall extensibility. Auxin participates in the regulation of cell wall properties by inducing wall loosening. Here, we review what is known on cell wall property regulation by auxin. We focus particularly on the auxin role during cell expansion linked directly to cell wall modifications. We also analyze downstream targets of transcriptional auxin signaling, which are related to the cell wall and could be linked to acid growth and the action of wall-loosening proteins. All together, this update elucidates the connection between hormonal signaling and cell wall synthesis and deposition. PMID:29565829

  16. Plant-based foods containing cell wall polysaccharides rich in specific active monosaccharides protect against myocardial injury in rat myocardial infarction models.

    PubMed

    Lim, Sun Ha; Kim, Yaesil; Yun, Ki Na; Kim, Jin Young; Jang, Jung-Hee; Han, Mee-Jung; Lee, Jongwon

    2016-12-08

    Many cohort studies have shown that consumption of diets containing a higher composition of foods derived from plants reduces mortality from coronary heart disease (CHD). Here, we examined the active components of a plant-based diet and the underlying mechanisms that reduce the risk of CHD using three rat models and a quantitative proteomics approach. In a short-term myocardial infarction (MI) model, intake of wheat extract (WE), the representative cardioprotectant identified by screening approximately 4,000 samples, reduced myocardial injury by inhibiting apoptosis, enhancing ATP production, and maintaining protein homeostasis. In long-term post-MI models, this myocardial protection resulted in ameliorating adverse left-ventricular remodelling, which is a predictor of heart failure. Among the wheat components, arabinose and xylose were identified as active components responsible for the observed efficacy of WE, which was administered via ingestion and tail-vein injections. Finally, the food components of plant-based diets that contained cell wall polysaccharides rich in arabinose, xylose, and possibly fucose were found to confer protection against myocardial injury. These results show for the first time that specific monosaccharides found in the cell wall polysaccharides in plant-based diets can act as active ingredients that reduce CHD by inhibiting postocclusion steps, including MI and heart failure.

  17. 75 FR 67301 - Antidisruptive Practices Authority Contained in the Dodd-Frank Wall Street Reform and Consumer...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-02

    ... Practices Authority Contained in the Dodd-Frank Wall Street Reform and Consumer Protection Act AGENCY.... SUMMARY: The Dodd-Frank Wall Street Reform and Consumer Protection Act (the ``Dodd-Frank Act'') amends... Reform and Consumer Protection Act (``Dodd-Frank Act'').\\2\\ Title VII of the Dodd-Frank Act \\3\\ amended...

  18. Thermal protection apparatus

    DOEpatents

    Bennett, Gloria A.; Moore, Troy K.

    1988-01-01

    An apparatus for thermally protecting heat sensitive components of tools. The apparatus comprises a Dewar for holding the heat sensitive components. The Dewar has spaced-apart inside and outside walls, an open top end and a bottom end. An insulating plug is located in the top end. The inside wall has portions defining an inside wall aperture located at the bottom of the Dewar and the outside wall has portions defining an outside wall aperture located at the bottom of the Dewar. A bottom connector has inside and outside components. The inside component sealably engages the inside wall aperture and the outside component sealably engages the outside wall aperture. The inside component is operatively connected to the heat sensitive components and to the outside component. The connections can be made with optical fibers or with electrically conducting wires.

  19. DETAIL VIEW, WEST WALL OF THE WESTERN STOREROOM. THE MASONRY ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    DETAIL VIEW, WEST WALL OF THE WESTERN STOREROOM. THE MASONRY HEARTH SUPPORT AND RELIEVING ARCH FOR A CHIMNEY MASS PROBABLY NEVER FUNCTIONED AS ENVISIONED, RATHER THEY ARE LIKELY A REMNANT OF A BUILDING SCHEME ABANDONED DURING THE HOUSE’S INITIAL CONSTRUCTION - The Woodlands, 4000 Woodlands Avenue, Philadelphia, Philadelphia County, PA

  20. Domain wall in a quantum anomalous Hall insulator as a magnetoelectric piston

    NASA Astrophysics Data System (ADS)

    Upadhyaya, Pramey; Tserkovnyak, Yaroslav

    2016-07-01

    We theoretically study the magnetoelectric coupling in a quantum anomalous Hall insulator state induced by interfacing a dynamic magnetization texture to a topological insulator. In particular, we propose that the quantum anomalous Hall insulator with a magnetic configuration of a domain wall, when contacted by electrical reservoirs, acts as a magnetoelectric piston. A moving domain wall pumps charge current between electrical leads in a closed circuit, while applying an electrical bias induces reciprocal domain-wall motion. This pistonlike action is enabled by a finite reflection of charge carriers via chiral modes imprinted by the domain wall. Moreover, we find that, when compared with the recently discovered spin-orbit torque-induced domain-wall motion in heavy metals, the reflection coefficient plays the role of an effective spin-Hall angle governing the efficiency of the proposed electrical control of domain walls. Quantitatively, this effective spin-Hall angle is found to approach a universal value of 2, providing an efficient scheme to reconfigure the domain-wall chiral interconnects for possible memory and logic applications.

  1. RI/MOM and RI/SMOM renormalization of overlap quark bilinears on domain wall fermion configurations

    NASA Astrophysics Data System (ADS)

    Bi, Yujiang; Cai, Hao; Chen, Ying; Gong, Ming; Liu, Keh-Fei; Liu, Zhaofeng; Yang, Yi-Bo; χ QCD Collaboration

    2018-05-01

    Renormalization constants (RCs) of overlap quark bilinear operators on 2 +1 -flavor domain wall fermion configurations are calculated by using the RI/MOM and RI/SMOM schemes. The scale independent RC for the axial vector current is computed by using a Ward identity. Then the RCs for the quark field and the vector, tensor, scalar, and pseudoscalar operators are calculated in both the RI/MOM and RI/SMOM schemes. The RCs are converted to the MS ¯ scheme and we compare the numerical results from using the two intermediate schemes. The lattice size is 4 83×96 and the inverse spacing 1 /a =1.730 (4 ) GeV .

  2. Improved Short-Circuit Protection for Power Cells in Series

    NASA Technical Reports Server (NTRS)

    Davies, Francis

    2008-01-01

    A scheme for protection against short circuits has been devised for series strings of lithium electrochemical cells that contain built-in short-circuit protection devices, which go into a high-resistance, current-limiting state when heated by excessive current. If cells are simply connected in a long series string to obtain a high voltage and a short circuit occurs, whichever short-circuit protection device trips first is exposed to nearly the full string voltage, which, typically, is large enough to damage the device. Depending on the specific cell design, the damage can defeat the protective function, cause a dangerous internal short circuit in the affected cell, and/or cascade to other cells. In the present scheme, reverse diodes rated at a suitably high current are connected across short series sub-strings, the lengths of which are chosen so that when a short-circuit protection device is tripped, the voltage across it does not exceed its rated voltage. This scheme preserves the resetting properties of the protective devices. It provides for bypassing of cells that fail open and limits cell reversal, though not as well as does the more-expensive scheme of connecting a diode across every cell.

  3. Magnetoelectric domain wall dynamics and its implications for magnetoelectric memory

    DOE PAGES

    Belashchenko, K. D.; Tchernyshyov, O.; Kovalev, Alexey A.; ...

    2016-03-30

    Domain wall dynamics in a magnetoelectric antiferromagnet is analyzed, and its implications for magnetoelectric memory applications are discussed. Cr 2O 3 is used in the estimates of the materials parameters. It is found that the domain wall mobility has a maximum as a function of the electric field due to the gyrotropic coupling induced by it. In Cr 2O 3, the maximal mobility of 0.1 m/(s Oe) is reached at E≈0.06 V/nm. Fields of this order may be too weak to overcome the intrinsic depinning field, which is estimated for B-doped Cr 2O 3. These major drawbacks for device implementationmore » can be overcome by applying a small in-plane shear strain, which blocks the domain wall precession. Domain wall mobility of about 0.7 m/(s Oe) can then be achieved at E = 0.2 V/nm. Furthermore, a split-gate scheme is proposed for the domain-wall controlled bit element; its extension to multiple-gate linear arrays can offer advantages in memory density, programmability, and logic functionality.« less

  4. The plant cell wall integrity maintenance mechanism--a case study of a cell wall plasma membrane signaling network.

    PubMed

    Hamann, Thorsten

    2015-04-01

    Some of the most important functions of plant cell walls are protection against biotic/abiotic stress and structural support during growth and development. A prerequisite for plant cell walls to perform these functions is the ability to perceive different types of stimuli in both qualitative and quantitative manners and initiate appropriate responses. The responses in turn involve adaptive changes in cellular and cell wall metabolism leading to modifications in the structures originally required for perception. While our knowledge about the underlying plant mechanisms is limited, results from Saccharomyces cerevisiae suggest the cell wall integrity maintenance mechanism represents an excellent example to illustrate how the molecular mechanisms responsible for stimulus perception, signal transduction and integration can function. Here I will review the available knowledge about the yeast cell wall integrity maintenance system for illustration purposes, summarize the limited knowledge available about the corresponding plant mechanism and discuss the relevance of the plant cell wall integrity maintenance mechanism in biotic stress responses. Copyright © 2014 Elsevier Ltd. All rights reserved.

  5. Great Wall of China

    NASA Image and Video Library

    2001-07-21

    This ASTER sub-image covers a 12 x 12 km area in northern Shanxi Province, China, and was acquired January 9, 2001. The low sun angle, and light snow cover highlight a section of the Great Wall, visible as a black line running diagonally through the image from lower left to upper right. The Great Wall is over 2000 years old and was built over a period of 1000 years. Stretching 4500 miles from Korea to the Gobi Desert it was first built to protect China from marauders from the north. This image is located at 40.2 degrees north latitude and 112.8 degrees east longitude. http://photojournal.jpl.nasa.gov/catalog/PIA02669

  6. Quantum Watermarking Scheme Based on INEQR

    NASA Astrophysics Data System (ADS)

    Zhou, Ri-Gui; Zhou, Yang; Zhu, Changming; Wei, Lai; Zhang, Xiafen; Ian, Hou

    2018-04-01

    Quantum watermarking technology protects copyright by embedding invisible quantum signal in quantum multimedia data. In this paper, a watermarking scheme based on INEQR was presented. Firstly, the watermark image is extended to achieve the requirement of embedding carrier image. Secondly, the swap and XOR operation is used on the processed pixels. Since there is only one bit per pixel, XOR operation can achieve the effect of simple encryption. Thirdly, both the watermark image extraction and embedding operations are described, where the key image, swap operation and LSB algorithm are used. When the embedding is made, the binary image key is changed. It means that the watermark has been embedded. Of course, if the watermark image is extracted, the key's state need detected. When key's state is |1>, this extraction operation is carried out. Finally, for validation of the proposed scheme, both the Signal-to-noise ratio (PSNR) and the security of the scheme are analyzed.

  7. A robust trust establishment scheme for wireless sensor networks.

    PubMed

    Ishmanov, Farruh; Kim, Sung Won; Nam, Seung Yeob

    2015-03-23

    Security techniques like cryptography and authentication can fail to protect a network once a node is compromised. Hence, trust establishment continuously monitors and evaluates node behavior to detect malicious and compromised nodes. However, just like other security schemes, trust establishment is also vulnerable to attack. Moreover, malicious nodes might misbehave intelligently to trick trust establishment schemes. Unfortunately, attack-resistance and robustness issues with trust establishment schemes have not received much attention from the research community. Considering the vulnerability of trust establishment to different attacks and the unique features of sensor nodes in wireless sensor networks, we propose a lightweight and robust trust establishment scheme. The proposed trust scheme is lightweight thanks to a simple trust estimation method. The comprehensiveness and flexibility of the proposed trust estimation scheme make it robust against different types of attack and misbehavior. Performance evaluation under different types of misbehavior and on-off attacks shows that the detection rate of the proposed trust mechanism is higher and more stable compared to other trust mechanisms.

  8. Direct measurements of wall shear stress by buried wire gages in a shock-wave boundary-layer interaction region

    NASA Technical Reports Server (NTRS)

    Murthy, V. S.; Rose, W. C.

    1977-01-01

    Detailed measurements of wall shear stress (skin friction) were made with specially developed buried wire gages in the interaction regions of a Mach 2.9 turbulent boundary layer with externally generated shocks. Separation and reattachment points inferred by these measurements support the findings of earlier experiments which used a surface oil flow technique and pitot profile measurements. The measurements further indicate that the boundary layer tends to attain significantly higher skin-friction values downstream of the interaction region as compared to upstream. Comparisons between measured wall shear stress and published results of some theoretical calculation schemes show that the general, but not detailed, behavior is predicted well by such schemes.

  9. An Efficient Remote Authentication Scheme for Wireless Body Area Network.

    PubMed

    Omala, Anyembe Andrew; Kibiwott, Kittur P; Li, Fagen

    2017-02-01

    Wireless body area network (WBAN) provide a mechanism of transmitting a persons physiological data to application providers e.g. hospital. Given the limited range of connectivity associated with WBAN, an intermediate portable device e.g. smartphone, placed within WBAN's connectivity, forwards the data to a remote server. This data, if not protected from an unauthorized access and modification may be lead to poor diagnosis. In order to ensure security and privacy between WBAN and a server at the application provider, several authentication schemes have been proposed. Recently, Wang and Zhang proposed an authentication scheme for WBAN using bilinear pairing. However, in their scheme, an application provider could easily impersonate a client. In order to overcome this weakness, we propose an efficient remote authentication scheme for WBAN. In terms of performance, our scheme can not only provide a malicious insider security, but also reduce running time of WBAN (client) by 51 % as compared to Wang and Zhang scheme.

  10. Importance biasing scheme implemented in the PRIZMA code

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kandiev, I.Z.; Malyshkin, G.N.

    1997-12-31

    PRIZMA code is intended for Monte Carlo calculations of linear radiation transport problems. The code has wide capabilities to describe geometry, sources, material composition, and to obtain parameters specified by user. There is a capability to calculate path of particle cascade (including neutrons, photons, electrons, positrons and heavy charged particles) taking into account possible transmutations. Importance biasing scheme was implemented to solve the problems which require calculation of functionals related to small probabilities (for example, problems of protection against radiation, problems of detection, etc.). The scheme enables to adapt trajectory building algorithm to problem peculiarities.

  11. Protecting nonlocality of multipartite states by feed-forward control

    NASA Astrophysics Data System (ADS)

    Li, Xiao-Gang; Zou, Jian; Shao, Bin

    2018-06-01

    Nonlocality is a useful resource in quantum communication and quantum information processing. In practical quantum communication, multipartite entangled states must be distributed between different users in different places through a channel. However, the channel is usually inevitably disturbed by the environment in quantum state distribution processing and then the nonlocality of states will be weakened and even lost. In this paper, we use a feed-forward control scheme to protect the nonlocality of the Bell and GHZ states against dissipation. We find that this protection scheme is very effective, specifically, for the Bell state, we can increase the noise threshold from 0.5 to 0.98, and for GHZ state from 0.29 to 0.96. And we also find that entanglement is relatively easier to be protected than nonlocality. For our scheme, protecting entanglement is equivalent to protecting the state in the case of Bell state, while protecting nonlocality is not.

  12. Maternal healthcare financing: Gujarat's Chiranjeevi Scheme and its beneficiaries.

    PubMed

    Bhat, Ramesh; Mavalankar, Dileep V; Singh, Prabal V; Singh, Neelu

    2009-04-01

    Maternal mortality is an important public-health issue in India, specifically in Gujarat. Contributing factors are the Government's inability to operationalize the First Referral Units and to provide an adequate level of skilled birth attendants, especially to the poor. In response, the Gujarat state has developed a unique public-private partnership called the Chiranjeevi Scheme. This scheme focuses on institutional delivery, specifically emergency obstetric care for the poor. The objective of the study was to explore the targeting of the scheme, its coverage, and socioeconomic profile of the beneficiaries and to assess financial protection offered by the scheme, if any, in Dahod, one of the initial pilot districts of Gujarat. A household-level survey of beneficiaries (n=262) and non-users (n=394) indicated that the scheme is well-targeted to the poor but many poor people do not use the services. The beneficiaries saved more than Rs 3000 (US$ 75) in delivery-related expenses and were generally satisfied with the scheme. The study provided insights on how to improve the scheme further. Such a financing scheme could be replicated in other states and countries to address the cost barrier, especially in areas where high numbers of private specialists are available.

  13. Nonlinear analysis of composite thin-walled helicopter blades

    NASA Astrophysics Data System (ADS)

    Kalfon, J. P.; Rand, O.

    Nonlinear theoretical modeling of laminated thin-walled composite helicopter rotor blades is presented. The derivation is based on nonlinear geometry with a detailed treatment of the body loads in the axial direction which are induced by the rotation. While the in-plane warping is neglected, a three-dimensional generic out-of-plane warping distribution is included. The formulation may also handle varying thicknesses and mass distribution along the cross-sectional walls. The problem is solved by successive iterations in which a system of equations is constructed and solved for each cross-section. In this method, the differential equations in the spanwise directions are formulated and solved using a finite-differences scheme which allows simple adaptation of the spanwise discretization mesh during iterations.

  14. On Performance Analysis of Protective Jamming Schemes in Wireless Sensor Networks.

    PubMed

    Li, Xuran; Dai, Hong-Ning; Wang, Hao; Xiao, Hong

    2016-11-24

    Wireless sensor networks (WSNs) play an important role in Cyber Physical Social Sensing (CPSS) systems. An eavesdropping attack is one of the most serious threats to WSNs since it is a prerequisite for other malicious attacks. In this paper, we propose a novel anti-eavesdropping mechanism by introducing friendly jammers to wireless sensor networks (WSNs). In particular, we establish a theoretical framework to evaluate the eavesdropping risk of WSNs with friendly jammers and that of WSNs without jammers. Our theoretical model takes into account various channel conditions such as the path loss and Rayleigh fading, the placement schemes of jammers and the power controlling schemes of jammers. Extensive results show that using jammers in WSNs can effectively reduce the eavesdropping risk. Besides, our results also show that the appropriate placement of jammers and the proper assignment of emitting power of jammers can not only mitigate the eavesdropping risk but also may have no significant impairment to the legitimate communications.

  15. On Performance Analysis of Protective Jamming Schemes in Wireless Sensor Networks

    PubMed Central

    Li, Xuran; Dai, Hong-Ning; Wang, Hao; Xiao, Hong

    2016-01-01

    Wireless sensor networks (WSNs) play an important role in Cyber Physical Social Sensing (CPSS) systems. An eavesdropping attack is one of the most serious threats to WSNs since it is a prerequisite for other malicious attacks. In this paper, we propose a novel anti-eavesdropping mechanism by introducing friendly jammers to wireless sensor networks (WSNs). In particular, we establish a theoretical framework to evaluate the eavesdropping risk of WSNs with friendly jammers and that of WSNs without jammers. Our theoretical model takes into account various channel conditions such as the path loss and Rayleigh fading, the placement schemes of jammers and the power controlling schemes of jammers. Extensive results show that using jammers in WSNs can effectively reduce the eavesdropping risk. Besides, our results also show that the appropriate placement of jammers and the proper assignment of emitting power of jammers can not only mitigate the eavesdropping risk but also may have no significant impairment to the legitimate communications. PMID:27886154

  16. A New Method for the Adaptive Control of Vortex-Wall Interactions

    NASA Technical Reports Server (NTRS)

    Koumoutsakos, P.

    1996-01-01

    The control of vortical flows is gaining significance in the design of aeronautical and marine structures. While passive devices have been used effectively in the past, active control strategies have the potential of allowing a leap in the performance of future configurations. The efficiency of control schemes is strongly dependent on the development of accurate flow models that can be devised using information that is available not only from numerical solutions of the governing Navier-Stokes equations but also can be measured experimentally. In that context it is desirable to construct adaptive control schemes using information that can be measured at the wall.

  17. Use of Precast Concrete Walls for Blast Protection of Steel Stud Construction Preprint

    DTIC Science & Technology

    2007-11-01

    Side Elevation Front Elevation Front Elevation Side Elevation a) Sandwich Wall b) Solid Wall I I---6’-10" " 11.. Exterior Face - Form finish 2------C...damage to the interior drywall was visible. The instnunentation consisted of three external reflected pressure gages at the front face of the test

  18. Impact Interaction of Projectile with Conducting Wall at the Presence of Electric Current

    NASA Astrophysics Data System (ADS)

    Chemerys, Volodymyr T.; Raychenko, Aleksandr I.; Karpinos, Boris S.

    2002-07-01

    The paper introduces with schemes of possible electromagnetic armor augmentation. The interaction of projectile with a main wall of target after penetration across the pre-defense layer is of interest here. The same problem is of interest for the current-carrying elements of electric guns. The theoretical analysis is done in the paper for the impact when the kinetic energy of projectile is enough to create the liquid layer in the crater of the wall's metal. Spherical head of projectile and right angle of inclination have been taken for consideration. The solution of problem for the liquid layer of metal around the projectile head has resulted a reduction of the resistant properties of wall material under current influence, in view of electromagnetic pressure appearance, what is directed towards the wall likely the projectile velocity vector.

  19. DETAIL OF TYPICAL WALL CONSTRUCTION IN COOLING ROOMS; TWO LAYERS ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    DETAIL OF TYPICAL WALL CONSTRUCTION IN COOLING ROOMS; TWO LAYERS OF CORK INSULATION ARE ATTACHED TO REINFORCED CONCRETE WALL WITH WOOD SLEEPERS AND ASPHALT MASTIC; THIN, GLAZED TERRA-COTTA TILES PROTECT THE INSULATION INSIDE THE COOLER - Rath Packing Company, Hog Cutting Building, Sycamore Street between Elm & Eighteenth Streets, Waterloo, Black Hawk County, IA

  20. Nonequilibrium thermo-chemical calculations using a diagonal implicit scheme

    NASA Technical Reports Server (NTRS)

    Imlay, Scott T.; Roberts, Donald W.; Soetrisno, Moeljo; Eberhardt, Scott

    1991-01-01

    A recently developed computer program for hypersonic vehicle flow analysis is described. The program uses a diagonal implicit algorithm to solve the equations of viscous flow for a gas in thermochemical nonequilibrium. The diagonal scheme eliminates the expense of inverting large block matrices that arise when species conservation equations are introduced. The program uses multiple zones of grids patched together and includes radiation wall and rarefied gas boundary conditions. Solutions are presented for hypersonic flows of air and hydrogen air mixtures.

  1. Mixing enhancement of low-Reynolds electro-osmotic flows in microchannels with temperature-patterned walls.

    PubMed

    Alizadeh, A; Zhang, L; Wang, M

    2014-10-01

    Mixing becomes challenging in microchannels because of the low Reynolds number. This study aims to present a mixing enhancement method for electro-osmotic flows in microchannels using vortices caused by temperature-patterned walls. Since the fluid is non-isothermal, the conventional form of Nernst-Planck equation is modified by adding a new migration term which is dependent on both temperature and internal electric potential gradient. This term results in the so-called thermo-electrochemical migration phenomenon. The coupled Navier-Stokes, Poisson, modified Nernst-Planck, energy and advection-diffusion equations are iteratively solved by multiple lattice Boltzmann methods to obtain the velocity, internal electric potential, ion distribution, temperature and species concentration fields, respectively. To enhance the mixing, three schemes of temperature-patterned walls have been considered with symmetrical or asymmetrical arrangements of blocks with surface charge and temperature. Modeling results show that the asymmetric arrangement scheme is the most efficient scheme and enhances the mixing of species by 39% when the Reynolds number is on the order of 10(-3). Current results may help improve the design of micro-mixers at low Reynolds number. Copyright © 2014 Elsevier Inc. All rights reserved.

  2. Seismic Performance of Composite Shear Walls Constructed Using Recycled Aggregate Concrete and Different Expandable Polystyrene Configurations.

    PubMed

    Liu, Wenchao; Cao, Wanlin; Zhang, Jianwei; Qiao, Qiyun; Ma, Heng

    2016-03-02

    The seismic performance of recycled aggregate concrete (RAC) composite shear walls with different expandable polystyrene (EPS) configurations was investigated. Six concrete shear walls were designed and tested under cyclic loading to evaluate the effect of fine RAC in designing earthquake-resistant structures. Three of the six specimens were used to construct mid-rise walls with a shear-span ratio of 1.5, and the other three specimens were used to construct low-rise walls with a shear-span ratio of 0.8. The mid-rise and low-rise shear walls consisted of an ordinary recycled concrete shear wall, a composite wall with fine aggregate concrete (FAC) protective layer (EPS modules as the external insulation layer), and a composite wall with sandwiched EPS modules as the insulation layer. Several parameters obtained from the experimental results were compared and analyzed, including the load-bearing capacity, stiffness, ductility, energy dissipation, and failure characteristics of the specimens. The calculation formula of load-bearing capacity was obtained by considering the effect of FAC on composite shear walls as the protective layer. The damage process of the specimen was simulated using the ABAQUS Software, and the results agreed quite well with those obtained from the experiments. The results show that the seismic resistance behavior of the EPS module composite for shear walls performed better than ordinary recycled concrete for shear walls. Shear walls with sandwiched EPS modules had a better seismic performance than those with EPS modules lying outside. Although the FAC protective layer slightly improved the seismic performance of the structure, it undoubtedly slowed down the speed of crack formation and the stiffness degradation of the walls.

  3. Seismic Performance of Composite Shear Walls Constructed Using Recycled Aggregate Concrete and Different Expandable Polystyrene Configurations

    PubMed Central

    Liu, Wenchao; Cao, Wanlin; Zhang, Jianwei; Qiao, Qiyun; Ma, Heng

    2016-01-01

    The seismic performance of recycled aggregate concrete (RAC) composite shear walls with different expandable polystyrene (EPS) configurations was investigated. Six concrete shear walls were designed and tested under cyclic loading to evaluate the effect of fine RAC in designing earthquake-resistant structures. Three of the six specimens were used to construct mid-rise walls with a shear-span ratio of 1.5, and the other three specimens were used to construct low-rise walls with a shear-span ratio of 0.8. The mid-rise and low-rise shear walls consisted of an ordinary recycled concrete shear wall, a composite wall with fine aggregate concrete (FAC) protective layer (EPS modules as the external insulation layer), and a composite wall with sandwiched EPS modules as the insulation layer. Several parameters obtained from the experimental results were compared and analyzed, including the load-bearing capacity, stiffness, ductility, energy dissipation, and failure characteristics of the specimens. The calculation formula of load-bearing capacity was obtained by considering the effect of FAC on composite shear walls as the protective layer. The damage process of the specimen was simulated using the ABAQUS Software, and the results agreed quite well with those obtained from the experiments. The results show that the seismic resistance behavior of the EPS module composite for shear walls performed better than ordinary recycled concrete for shear walls. Shear walls with sandwiched EPS modules had a better seismic performance than those with EPS modules lying outside. Although the FAC protective layer slightly improved the seismic performance of the structure, it undoubtedly slowed down the speed of crack formation and the stiffness degradation of the walls. PMID:28773274

  4. A blind reversible robust watermarking scheme for relational databases.

    PubMed

    Chang, Chin-Chen; Nguyen, Thai-Son; Lin, Chia-Chen

    2013-01-01

    Protecting the ownership and controlling the copies of digital data have become very important issues in Internet-based applications. Reversible watermark technology allows the distortion-free recovery of relational databases after the embedded watermark data are detected or verified. In this paper, we propose a new, blind, reversible, robust watermarking scheme that can be used to provide proof of ownership for the owner of a relational database. In the proposed scheme, a reversible data-embedding algorithm, which is referred to as "histogram shifting of adjacent pixel difference" (APD), is used to obtain reversibility. The proposed scheme can detect successfully 100% of the embedded watermark data, even if as much as 80% of the watermarked relational database is altered. Our extensive analysis and experimental results show that the proposed scheme is robust against a variety of data attacks, for example, alteration attacks, deletion attacks, mix-match attacks, and sorting attacks.

  5. Differential protection by cell wall components of Lactobacillus amylovorus DSM 16698Tagainst alterations of membrane barrier and NF-kB activation induced by enterotoxigenic F4+ Escherichia coli on intestinal cells.

    PubMed

    Roselli, Marianna; Finamore, Alberto; Hynönen, Ulla; Palva, Airi; Mengheri, Elena

    2016-09-29

    The role of Lactobacillus cell wall components in the protection against pathogen infection in the gut is still largely unexplored. We have previously shown that L. amylovorus DSM 16698 T is able to reduce the enterotoxigenic F4 + Escherichia coli (ETEC) adhesion and prevent the pathogen-induced membrane barrier disruption through the regulation of IL-10 and IL-8 expression in intestinal cells. We have also demonstrated that L. amylovorus DSM 16698 T protects host cells through the inhibition of NF-kB signaling. In the present study, we investigated the role of L. amylovorus DSM 16698 T cell wall components in the protection against F4 + ETEC infection using the intestinal Caco-2 cell line. Purified cell wall fragments (CWF) from L. amylovorus DSM 16698 T were used either as such (uncoated, U-CWF) or coated with S-layer proteins (S-CWF). Differentiated Caco-2/TC7 cells on Transwell filters were infected with F4 + ETEC, treated with S-CWF or U-CWF, co-treated with S-CWF or U-CWF and F4 + ETEC for 2.5 h, or pre-treated with S-CWF or U-CWF for 1 h before F4 + ETEC addition. Tight junction (TJ) and adherens junction (AJ) proteins were analyzed by immunofluorescence and Western blot. Membrane permeability was determined by phenol red passage. Phosphorylated p65-NF-kB was measured by Western blot. We showed that both the pre-treatment with S-CWF and the co- treatment of S-CWF with the pathogen protected the cells from F4 + ETEC induced TJ and AJ injury, increased membrane permeability and activation of NF-kB expression. Moreover, the U-CWF pre-treatment, but not the co-treatment with F4 + ETEC, inhibited membrane damage and prevented NF-kB activation. The results indicate that the various components of L. amylovorus DSM 16698 T cell wall may counteract the damage caused by F4 + ETEC through different mechanisms. S-layer proteins are essential for maintaining membrane barrier function and for mounting an anti-inflammatory response against F4 + ETEC infection. U-CWF are

  6. Stepped chute training wall height requirements

    USDA-ARS?s Scientific Manuscript database

    Stepped chutes are commonly used for overtopping protection for embankment dams. Aerated flow is commonly associated with stepped chutes if the chute has sufficient length. The aeration and turbulence of the flow can create a significant amount of splash over the training wall if not appropriately...

  7. A Secure and Robust User Authenticated Key Agreement Scheme for Hierarchical Multi-medical Server Environment in TMIS.

    PubMed

    Das, Ashok Kumar; Odelu, Vanga; Goswami, Adrijit

    2015-09-01

    The telecare medicine information system (TMIS) helps the patients to gain the health monitoring facility at home and access medical services over the Internet of mobile networks. Recently, Amin and Biswas presented a smart card based user authentication and key agreement security protocol usable for TMIS system using the cryptographic one-way hash function and biohashing function, and claimed that their scheme is secure against all possible attacks. Though their scheme is efficient due to usage of one-way hash function, we show that their scheme has several security pitfalls and design flaws, such as (1) it fails to protect privileged-insider attack, (2) it fails to protect strong replay attack, (3) it fails to protect strong man-in-the-middle attack, (4) it has design flaw in user registration phase, (5) it has design flaw in login phase, (6) it has design flaw in password change phase, (7) it lacks of supporting biometric update phase, and (8) it has flaws in formal security analysis. In order to withstand these security pitfalls and design flaws, we aim to propose a secure and robust user authenticated key agreement scheme for the hierarchical multi-server environment suitable in TMIS using the cryptographic one-way hash function and fuzzy extractor. Through the rigorous security analysis including the formal security analysis using the widely-accepted Burrows-Abadi-Needham (BAN) logic, the formal security analysis under the random oracle model and the informal security analysis, we show that our scheme is secure against possible known attacks. Furthermore, we simulate our scheme using the most-widely accepted and used Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. The simulation results show that our scheme is also secure. Our scheme is more efficient in computation and communication as compared to Amin-Biswas's scheme and other related schemes. In addition, our scheme supports extra functionality features as compared to

  8. A new hybrid-Lagrangian numerical scheme for gyrokinetic simulation of tokamak edge plasma

    DOE PAGES

    Ku, S.; Hager, R.; Chang, C. S.; ...

    2016-04-01

    In order to enable kinetic simulation of non-thermal edge plasmas at a reduced computational cost, a new hybrid-Lagrangian δf scheme has been developed that utilizes the phase space grid in addition to the usual marker particles, taking advantage of the computational strengths from both sides. The new scheme splits the particle distribution function of a kinetic equation into two parts. Marker particles contain the fast space-time varying, δf, part of the distribution function and the coarse-grained phase-space grid contains the slow space-time varying part. The coarse-grained phase-space grid reduces the memory-requirement and the computing cost, while the marker particles providemore » scalable computing ability for the fine-grained physics. Weights of the marker particles are determined by a direct weight evolution equation instead of the differential form weight evolution equations that the conventional delta-f schemes use. The particle weight can be slowly transferred to the phase space grid, thereby reducing the growth of the particle weights. The non-Lagrangian part of the kinetic equation – e.g., collision operation, ionization, charge exchange, heat-source, radiative cooling, and others – can be operated directly on the phase space grid. Deviation of the particle distribution function on the velocity grid from a Maxwellian distribution function – driven by ionization, charge exchange and wall loss – is allowed to be arbitrarily large. In conclusion, the numerical scheme is implemented in the gyrokinetic particle code XGC1, which specializes in simulating the tokamak edge plasma that crosses the magnetic separatrix and is in contact with the material wall.« less

  9. A new hybrid-Lagrangian numerical scheme for gyrokinetic simulation of tokamak edge plasma

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ku, S.; Hager, R.; Chang, C. S.

    In order to enable kinetic simulation of non-thermal edge plasmas at a reduced computational cost, a new hybrid-Lagrangian δf scheme has been developed that utilizes the phase space grid in addition to the usual marker particles, taking advantage of the computational strengths from both sides. The new scheme splits the particle distribution function of a kinetic equation into two parts. Marker particles contain the fast space-time varying, δf, part of the distribution function and the coarse-grained phase-space grid contains the slow space-time varying part. The coarse-grained phase-space grid reduces the memory-requirement and the computing cost, while the marker particles providemore » scalable computing ability for the fine-grained physics. Weights of the marker particles are determined by a direct weight evolution equation instead of the differential form weight evolution equations that the conventional delta-f schemes use. The particle weight can be slowly transferred to the phase space grid, thereby reducing the growth of the particle weights. The non-Lagrangian part of the kinetic equation – e.g., collision operation, ionization, charge exchange, heat-source, radiative cooling, and others – can be operated directly on the phase space grid. Deviation of the particle distribution function on the velocity grid from a Maxwellian distribution function – driven by ionization, charge exchange and wall loss – is allowed to be arbitrarily large. In conclusion, the numerical scheme is implemented in the gyrokinetic particle code XGC1, which specializes in simulating the tokamak edge plasma that crosses the magnetic separatrix and is in contact with the material wall.« less

  10. A new hybrid-Lagrangian numerical scheme for gyrokinetic simulation of tokamak edge plasma

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ku, S., E-mail: sku@pppl.gov; Hager, R.; Chang, C.S.

    In order to enable kinetic simulation of non-thermal edge plasmas at a reduced computational cost, a new hybrid-Lagrangian δf scheme has been developed that utilizes the phase space grid in addition to the usual marker particles, taking advantage of the computational strengths from both sides. The new scheme splits the particle distribution function of a kinetic equation into two parts. Marker particles contain the fast space-time varying, δf, part of the distribution function and the coarse-grained phase-space grid contains the slow space-time varying part. The coarse-grained phase-space grid reduces the memory-requirement and the computing cost, while the marker particles providemore » scalable computing ability for the fine-grained physics. Weights of the marker particles are determined by a direct weight evolution equation instead of the differential form weight evolution equations that the conventional delta-f schemes use. The particle weight can be slowly transferred to the phase space grid, thereby reducing the growth of the particle weights. The non-Lagrangian part of the kinetic equation – e.g., collision operation, ionization, charge exchange, heat-source, radiative cooling, and others – can be operated directly on the phase space grid. Deviation of the particle distribution function on the velocity grid from a Maxwellian distribution function – driven by ionization, charge exchange and wall loss – is allowed to be arbitrarily large. The numerical scheme is implemented in the gyrokinetic particle code XGC1, which specializes in simulating the tokamak edge plasma that crosses the magnetic separatrix and is in contact with the material wall.« less

  11. Cryptanalysis and Improvement of a Biometric-Based Multi-Server Authentication and Key Agreement Scheme

    PubMed Central

    Wang, Chengqi; Zhang, Xiao; Zheng, Zhiming

    2016-01-01

    With the security requirements of networks, biometrics authenticated schemes which are applied in the multi-server environment come to be more crucial and widely deployed. In this paper, we propose a novel biometric-based multi-server authentication and key agreement scheme which is based on the cryptanalysis of Mishra et al.’s scheme. The informal and formal security analysis of our scheme are given, which demonstrate that our scheme satisfies the desirable security requirements. The presented scheme provides a variety of significant functionalities, in which some features are not considered in the most of existing authentication schemes, such as, user revocation or re-registration and biometric information protection. Compared with several related schemes, our scheme has more secure properties and lower computation cost. It is obviously more appropriate for practical applications in the remote distributed networks. PMID:26866606

  12. Cryptanalysis and Improvement of a Biometric-Based Multi-Server Authentication and Key Agreement Scheme.

    PubMed

    Wang, Chengqi; Zhang, Xiao; Zheng, Zhiming

    2016-01-01

    With the security requirements of networks, biometrics authenticated schemes which are applied in the multi-server environment come to be more crucial and widely deployed. In this paper, we propose a novel biometric-based multi-server authentication and key agreement scheme which is based on the cryptanalysis of Mishra et al.'s scheme. The informal and formal security analysis of our scheme are given, which demonstrate that our scheme satisfies the desirable security requirements. The presented scheme provides a variety of significant functionalities, in which some features are not considered in the most of existing authentication schemes, such as, user revocation or re-registration and biometric information protection. Compared with several related schemes, our scheme has more secure properties and lower computation cost. It is obviously more appropriate for practical applications in the remote distributed networks.

  13. A novel extracellular matrix protein from tomato associated with lignified secondary cell walls.

    PubMed Central

    Domingo, C; Gómez, M D; Cañas, L; Hernández-Yago, J; Conejero, V; Vera, P

    1994-01-01

    A cDNA clone representing a novel cell wall protein was isolated from a tomato cDNA library. The deduced amino acid sequence shows that the encoded protein is very small (88 amino acids), contains an N-terminal hydrophobic signal peptide, and is enriched in lysine and tyrosine. We have designated this protein TLRP for tyrosine- and lysine-rich protein. RNA gel blot hybridization identified TLRP transcripts constitutively present in roots, stems, and leaves from tomato plants. The encoded protein seems to be highly insolubilized in the cell wall, and we present evidence that this protein is specifically localized in the modified secondary cell walls of the xylem and in cells of the sclerenchyma. In addition, the protein is localized in the protective periderm layer of the growing root. The highly localized deposition in cells destined to give support and protection to the plant indicates that this cell wall protein alone and/or in collaboration with other cell wall structural proteins may have a specialized structural function by mechanically strengthening the walls. PMID:7919979

  14. Low-Dispersion Scheme for Nonlinear Acoustic Waves in Nonuniform Flow

    NASA Technical Reports Server (NTRS)

    Baysal, Oktay; Kaushik, Dinesh K.; Idres, Moumen

    1997-01-01

    The linear dispersion-relation-preserving scheme and its boundary conditions have been extended to the nonlinear Euler equations. This allowed computing, a nonuniform flowfield and a nonlinear acoustic wave propagation in such a medium, by the same scheme. By casting all the equations, boundary conditions, and the solution scheme in generalized curvilinear coordinates, the solutions were made possible for non-Cartesian domains and, for the better deployment of the grid points, nonuniform grid step sizes could be used. It has been tested for a number of simple initial-value and periodic-source problems. A simple demonstration of the difference between a linear and nonlinear propagation was conducted. The wall boundary condition, derived from the momentum equations and implemented through a pressure at a ghost point, and the radiation boundary condition, derived from the asymptotic solution to the Euler equations, have proven to be effective for the nonlinear equations and nonuniform flows. The nonreflective characteristic boundary conditions also have shown success but limited to the nonlinear waves in no mean flow, and failed for nonlinear waves in nonuniform flow.

  15. Morphogenetic Pathway of Spore Wall Assembly in Saccharomyces cerevisiae

    PubMed Central

    Coluccio, Alison; Bogengruber, Edith; Conrad, Michael N.; Dresser, Michael E.; Briza, Peter; Neiman, Aaron M.

    2004-01-01

    The Saccharomyces cerevisiae spore is protected from environmental damage by a multilaminar extracellular matrix, the spore wall, which is assembled de novo during spore formation. A set of mutants defective in spore wall assembly were identified in a screen for mutations causing sensitivity of spores to ether vapor. The spore wall defects in 10 of these mutants have been characterized in a variety of cytological and biochemical assays. Many of the individual mutants are defective in the assembly of specific layers within the spore wall, leading to arrests at discrete stages of assembly. The localization of several of these gene products has been determined and distinguishes between proteins that likely are involved directly in spore wall assembly and probable regulatory proteins. The results demonstrate that spore wall construction involves a series of dependent steps and provide the outline of a morphogenetic pathway for assembly of a complex extracellular structure. PMID:15590821

  16. HVI Ballistic Performance Characterization of Non-Parallel Walls

    NASA Technical Reports Server (NTRS)

    Bohl, William; Miller, Joshua; Christiansen, Eric

    2012-01-01

    The Double-Wall, "Whipple" Shield [1] has been the subject of many hypervelocity impact studies and has proven to be an effective shield system for Micro-Meteoroid and Orbital Debris (MMOD) impacts for spacecraft. The US modules of the International Space Station (ISS), with their "bumper shields" offset from their pressure holding rear walls provide good examples of effective on-orbit use of the double wall shield. The concentric cylinder shield configuration with its large radius of curvature relative to separation distance is easily and effectively represented for testing and analysis as a system of two parallel plates. The parallel plate double wall configuration has been heavily tested and characterized for shield performance for normal and oblique impacts for the ISS and other programs. The double wall shield and principally similar Stuffed Whipple Shield are very common shield types for MMOD protection. However, in some locations with many spacecraft designs, the rear wall cannot be modeled as being parallel or concentric with the outer bumper wall. As represented in Figure 1, there is an included angle between the two walls. And, with a cylindrical outer wall, the effective included angle constantly changes. This complicates assessment of critical spacecraft components located within outer spacecraft walls when using software tools such as NASA's BumperII. In addition, the validity of the risk assessment comes into question when using the standard double wall shield equations, especially since verification testing of every set of double wall included angles is impossible.

  17. Conceptual design of divertor and first wall for DEMO-FNS

    NASA Astrophysics Data System (ADS)

    Sergeev, V. Yu.; Kuteev, B. V.; Bykov, A. S.; Gervash, A. A.; Glazunov, D. A.; Goncharov, P. R.; Dnestrovskij, A. Yu.; Khayrutdinov, R. R.; Klishchenko, A. V.; Lukash, V. E.; Mazul, I. V.; Molchanov, P. A.; Petrov, V. S.; Rozhansky, V. A.; Shpanskiy, Yu. S.; Sivak, A. B.; Skokov, V. G.; Spitsyn, A. V.

    2015-11-01

    Key issues of design of the divertor and the first wall of DEMO-FNS are presented. A double null closed magnetic configuration was chosen with long external legs and V-shaped corners. The divertor employs a cassette design similar to that of ITER. Water-cooled first wall of the tokamak is made of Be tiles and CuCrZr-stainless steel shells. Lithium injection and circulation technologies are foreseen for protection of plasma facing components. Simulations of thermal loads onto the first wall and divertor plates suggest a possibility to distribute heat loads making them less than 10 MW m-2. Evaluations of sputtering and evaporation of plasma-facing materials suggest that lithium may protect the first wall. To prevent Be erosion at the outer divertor plates either the full detached divertor operation or arrangement of the renewal lithium flow on targets should be implemented. Test bed experiments on the Tsefey-M facility with the first wall mockup coated by Ве tiles and cooled by water are presented. The temperature of the surface of tiles reached 280-300 °С at 5 MW m-2 and 600-650 °С at 10.5 MW m-2. The mockup successfully withstood 1000 cycles with the lower thermal loading and 100 cycles with higher thermal loading.

  18. Simulation of the ultrasound-induced growth and collapse of a near-wall bubble

    NASA Astrophysics Data System (ADS)

    Boyd, Bradley; Becker, Sid

    2017-11-01

    In this study, we consider the acoustically driven growth and collapse of a cavitation bubble in a fluid medium exposed to an ultrasound field. The bubble dynamics are modelled using a compressible, inviscid, multiphase model. The numerical scheme consists of a conservative interface capturing scheme which uses the fifth-order WENO reconstruction with a maximum-principle-satisfying and positivity-preserving limiter, and the HLLC approximate Riemann flux. To model the ultrasound input, a moving boundary oscillates through a fixed grid of finite-volume cells. The growth phase of the simulation shows the rapid non-spherical growth of the near-wall bubble. Once the bubble reaches its maximum size and the collapse phase begins, the simulation shows the formation of a jet which penetrates the bubble towards the wall at the later stages of the collapse. For a bubble with an initial radius of 50 μ m and an ultrasound pressure amplitude of 200 kPa, the pressure experienced by the wall increased rapidly nearing the end of the collapse, reaching a peak pressure of 13 MPa. This model is an important development in the field as it represents the physics of acoustic cavitation in more detail than before. This work was supported by the Royal Society of New Zealand's Marsden Fund.

  19. A copyright protection scheme for digital images based on shuffled singular value decomposition and visual cryptography.

    PubMed

    Devi, B Pushpa; Singh, Kh Manglem; Roy, Sudipta

    2016-01-01

    This paper proposes a new watermarking algorithm based on the shuffled singular value decomposition and the visual cryptography for copyright protection of digital images. It generates the ownership and identification shares of the image based on visual cryptography. It decomposes the image into low and high frequency sub-bands. The low frequency sub-band is further divided into blocks of same size after shuffling it and then the singular value decomposition is applied to each randomly selected block. Shares are generated by comparing one of the elements in the first column of the left orthogonal matrix with its corresponding element in the right orthogonal matrix of the singular value decomposition of the block of the low frequency sub-band. The experimental results show that the proposed scheme clearly verifies the copyright of the digital images, and is robust to withstand several image processing attacks. Comparison with the other related visual cryptography-based algorithms reveals that the proposed method gives better performance. The proposed method is especially resilient against the rotation attack.

  20. Protection of autonomous microgrids using agent-based distributed communication

    DOE PAGES

    Cintuglu, Mehmet H.; Ma, Tan; Mohammed, Osama A.

    2016-04-06

    This study presents a real-time implementation of autonomous microgrid protection using agent-based distributed communication. Protection of an autonomous microgrid requires special considerations compared to large scale distribution net-works due to the presence of power converters and relatively low inertia. In this work, we introduce a practical overcurrent and a frequency selectivity method to overcome conventional limitations. The proposed overcurrent scheme defines a selectivity mechanism considering the remedial action scheme (RAS) of the microgrid after a fault instant based on feeder characteristics and the location of the intelligent electronic devices (IEDs). A synchrophasor-based online frequency selectivity approach is proposed to avoidmore » pulse loading effects in low inertia microgrids. Experimental results are presented for verification of the pro-posed schemes using a laboratory based microgrid. The setup was composed of actual generation units and IEDs using IEC 61850 protocol. The experimental results were in excellent agreement with the proposed protection scheme.« less

  1. Protection of autonomous microgrids using agent-based distributed communication

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Cintuglu, Mehmet H.; Ma, Tan; Mohammed, Osama A.

    This study presents a real-time implementation of autonomous microgrid protection using agent-based distributed communication. Protection of an autonomous microgrid requires special considerations compared to large scale distribution net-works due to the presence of power converters and relatively low inertia. In this work, we introduce a practical overcurrent and a frequency selectivity method to overcome conventional limitations. The proposed overcurrent scheme defines a selectivity mechanism considering the remedial action scheme (RAS) of the microgrid after a fault instant based on feeder characteristics and the location of the intelligent electronic devices (IEDs). A synchrophasor-based online frequency selectivity approach is proposed to avoidmore » pulse loading effects in low inertia microgrids. Experimental results are presented for verification of the pro-posed schemes using a laboratory based microgrid. The setup was composed of actual generation units and IEDs using IEC 61850 protocol. The experimental results were in excellent agreement with the proposed protection scheme.« less

  2. Effects of Wall Cooling on Hypersonic Boundary Layer Receptivity Over a Cone

    NASA Technical Reports Server (NTRS)

    Kara, K.; Balakumar, P.; Kandil, O. A.

    2008-01-01

    Effects of wall cooling on the receptivity process induced by the interaction of slow acoustic disturbances in the free-stream are numerically investigated for a boundary layer flow over a 5-degrees straight cone. The free-stream Mach number is 6.0 and the Reynolds number is 7.8x10(exp 6)/ft. Both the steady and unsteady solutions are obtained by solving the full Navier-Stokes equations using 5th-order accurate weighted essentially non-oscillatory (WENO) scheme for space discretization and using 3rd-order total variation diminishing (T VD) Runge-K utta scheme for time integration. Computations are performed for a cone with nose radius of 0.001 inch for adiabatic wall temperature (T(sub aw)), 0.75*T(sub aw), 0.5*T(sub aw), 0.40*T(sub aw), 0.30*T(sub aw), and 0.20*T(sub aw). Once the mean flow field is computed, disturbances are introduced at the upstream end of the computational domain. Generation of instability waves from leading edge region and receptivity of boundary layer to slow acoustic waves are investigated. Computations showed that wall cooling has strong stabilization effect on the first mode disturbances as was observed in the experiments. T ransition location moved to upstream when wall cooling was applied It is also found that the boundary layer is much more receptive to fast acoustic wave (by almost a factor of 50). When simulations performed using the same forcing frequency growth of the second mode disturbances are delayed with wall cooling and they attained values two times higher than that of adiabatic case. In 0.20*T(sub aw) case the transition Reynolds number is doubled compared to adiabatic conditions. The receptivity coefficient for adiabatic wall case (804 R) is 1.5225 and for highly cooled cones (241, and 161 R); they are in the order of 10(exp -3).

  3. Security analysis and improvement of an anonymous authentication scheme for roaming services.

    PubMed

    Lee, Youngsook; Paik, Juryon

    2014-01-01

    An anonymous authentication scheme for roaming services in global mobility networks allows a mobile user visiting a foreign network to achieve mutual authentication and session key establishment with the foreign-network operator in an anonymous manner. In this work, we revisit He et al.'s anonymous authentication scheme for roaming services and present previously unpublished security weaknesses in the scheme: (1) it fails to provide user anonymity against any third party as well as the foreign agent, (2) it cannot protect the passwords of mobile users due to its vulnerability to an offline dictionary attack, and (3) it does not achieve session-key security against a man-in-the-middle attack. We also show how the security weaknesses of He et al.'s scheme can be addressed without degrading the efficiency of the scheme.

  4. A Blind Reversible Robust Watermarking Scheme for Relational Databases

    PubMed Central

    Chang, Chin-Chen; Nguyen, Thai-Son; Lin, Chia-Chen

    2013-01-01

    Protecting the ownership and controlling the copies of digital data have become very important issues in Internet-based applications. Reversible watermark technology allows the distortion-free recovery of relational databases after the embedded watermark data are detected or verified. In this paper, we propose a new, blind, reversible, robust watermarking scheme that can be used to provide proof of ownership for the owner of a relational database. In the proposed scheme, a reversible data-embedding algorithm, which is referred to as “histogram shifting of adjacent pixel difference” (APD), is used to obtain reversibility. The proposed scheme can detect successfully 100% of the embedded watermark data, even if as much as 80% of the watermarked relational database is altered. Our extensive analysis and experimental results show that the proposed scheme is robust against a variety of data attacks, for example, alteration attacks, deletion attacks, mix-match attacks, and sorting attacks. PMID:24223033

  5. Small deformations of kinks and walls

    NASA Astrophysics Data System (ADS)

    Morris, J. R.

    2018-06-01

    A Rayleigh-Schrödinger type of perturbation scheme is employed to study weak self-interacting scalar potential perturbations occurring in scalar field models describing 1D domain kinks and 3D domain walls. The solutions for the unperturbed defects are modified by the perturbing potentials. An illustration is provided by adding a cubic potential to the familiar quartic kink potential and solving for the first order correction to the kink solution, using a "slab approximation". A result is the appearance of an asymmetric scalar potential with different, nondegenerate, vacuum values and the subsequent formation of vacuum bubbles.

  6. Turbulent boundary layer under the control of different schemes

    NASA Astrophysics Data System (ADS)

    Qiao, Z. X.; Zhou, Y.; Wu, Z.

    2017-06-01

    This work explores experimentally the control of a turbulent boundary layer over a flat plate based on wall perturbation generated by piezo-ceramic actuators. Different schemes are investigated, including the feed-forward, the feedback, and the combined feed-forward and feedback strategies, with a view to suppressing the near-wall high-speed events and hence reducing skin friction drag. While the strategies may achieve a local maximum drag reduction slightly less than their counterpart of the open-loop control, the corresponding duty cycles are substantially reduced when compared with that of the open-loop control. The results suggest a good potential to cut down the input energy under these control strategies. The fluctuating velocity, spectra, Taylor microscale and mean energy dissipation are measured across the boundary layer with and without control and, based on the measurements, the flow mechanism behind the control is proposed.

  7. Turbulent boundary layer under the control of different schemes.

    PubMed

    Qiao, Z X; Zhou, Y; Wu, Z

    2017-06-01

    This work explores experimentally the control of a turbulent boundary layer over a flat plate based on wall perturbation generated by piezo-ceramic actuators. Different schemes are investigated, including the feed-forward, the feedback, and the combined feed-forward and feedback strategies, with a view to suppressing the near-wall high-speed events and hence reducing skin friction drag. While the strategies may achieve a local maximum drag reduction slightly less than their counterpart of the open-loop control, the corresponding duty cycles are substantially reduced when compared with that of the open-loop control. The results suggest a good potential to cut down the input energy under these control strategies. The fluctuating velocity, spectra, Taylor microscale and mean energy dissipation are measured across the boundary layer with and without control and, based on the measurements, the flow mechanism behind the control is proposed.

  8. Turbulent boundary layer under the control of different schemes

    PubMed Central

    Zhou, Y.; Wu, Z.

    2017-01-01

    This work explores experimentally the control of a turbulent boundary layer over a flat plate based on wall perturbation generated by piezo-ceramic actuators. Different schemes are investigated, including the feed-forward, the feedback, and the combined feed-forward and feedback strategies, with a view to suppressing the near-wall high-speed events and hence reducing skin friction drag. While the strategies may achieve a local maximum drag reduction slightly less than their counterpart of the open-loop control, the corresponding duty cycles are substantially reduced when compared with that of the open-loop control. The results suggest a good potential to cut down the input energy under these control strategies. The fluctuating velocity, spectra, Taylor microscale and mean energy dissipation are measured across the boundary layer with and without control and, based on the measurements, the flow mechanism behind the control is proposed. PMID:28690409

  9. Simplified two-dimensional microwave imaging scheme using metamaterial-loaded Vivaldi antenna

    NASA Astrophysics Data System (ADS)

    Johari, Esha; Akhter, Zubair; Bhaskar, Manoj; Akhtar, M. Jaleel

    2017-03-01

    In this paper, a highly efficient, low-cost scheme for two-dimensional microwave imaging is proposed. To this end, the AZIM (anisotropic zero index metamaterial) cell-loaded Vivaldi antenna is designed and tested as effective electromagnetic radiation beam source required in the microwave imaging scheme. The designed antenna is first individually tested in the anechoic chamber, and its directivity along with the radiation pattern is obtained. The measurement setup for the imaging here involves a vector network analyzer, the AZIM cell-loaded ultra-wideband Vivaldi antenna, and other associated microwave components. The potential of the designed antenna for the microwave imaging is tested by first obtaining the two-dimensional reflectivity images of metallic samples of different shapes placed in front of the antenna, using the proposed scheme. In the next step, these sets of samples are hidden behind wooden blocks of different thicknesses and the reflectivity image of the test media is reconstructed by using the proposed scheme. Finally, the reflectivity images of various dielectric samples (Teflon, Plexiglas, permanent magnet moving coil) along with the copper sheet placed on a piece of cardboard are reconstructed by using the proposed setup. The images obtained for each case are plotted and compared with the actual objects, and a close match is observed which shows the applicability of the proposed scheme for through-wall imaging and the detection of concealed objects.

  10. Analysis and discussion on anti-thunder scheme of wind power generation system

    NASA Astrophysics Data System (ADS)

    Sun, Shuguang

    2017-01-01

    Anti-thunder scheme of wind power generation system is discussed in this paper. Through the research and analysis on the harm of the thunder, division of lightning protection zone and lightning protection measures are put forward, which has a certain practical significance on the design and application of wind power generation system.

  11. Topological Luttinger liquids from decorated domain walls

    NASA Astrophysics Data System (ADS)

    Parker, Daniel E.; Scaffidi, Thomas; Vasseur, Romain

    2018-04-01

    We introduce a systematic construction of a gapless symmetry-protected topological phase in one dimension by "decorating" the domain walls of Luttinger liquids. The resulting strongly interacting phases provide a concrete example of a gapless symmetry-protected topological (gSPT) phase with robust symmetry-protected edge modes. Using boundary conformal field theory arguments, we show that while the bulks of such gSPT phases are identical to conventional Luttinger liquids, their boundary critical behavior is controlled by a different, strongly coupled renormalization group fixed point. Our results are checked against extensive density matrix renormalization group calculations.

  12. A Simple Algebraic Grid Adaptation Scheme with Applications to Two- and Three-dimensional Flow Problems

    NASA Technical Reports Server (NTRS)

    Hsu, Andrew T.; Lytle, John K.

    1989-01-01

    An algebraic adaptive grid scheme based on the concept of arc equidistribution is presented. The scheme locally adjusts the grid density based on gradients of selected flow variables from either finite difference or finite volume calculations. A user-prescribed grid stretching can be specified such that control of the grid spacing can be maintained in areas of known flowfield behavior. For example, the grid can be clustered near a wall for boundary layer resolution and made coarse near the outer boundary of an external flow. A grid smoothing technique is incorporated into the adaptive grid routine, which is found to be more robust and efficient than the weight function filtering technique employed by other researchers. Since the present algebraic scheme requires no iteration or solution of differential equations, the computer time needed for grid adaptation is trivial, making the scheme useful for three-dimensional flow problems. Applications to two- and three-dimensional flow problems show that a considerable improvement in flowfield resolution can be achieved by using the proposed adaptive grid scheme. Although the scheme was developed with steady flow in mind, it is a good candidate for unsteady flow computations because of its efficiency.

  13. An Unequal Secure Encryption Scheme for H.264/AVC Video Compression Standard

    NASA Astrophysics Data System (ADS)

    Fan, Yibo; Wang, Jidong; Ikenaga, Takeshi; Tsunoo, Yukiyasu; Goto, Satoshi

    H.264/AVC is the newest video coding standard. There are many new features in it which can be easily used for video encryption. In this paper, we propose a new scheme to do video encryption for H.264/AVC video compression standard. We define Unequal Secure Encryption (USE) as an approach that applies different encryption schemes (with different security strength) to different parts of compressed video data. This USE scheme includes two parts: video data classification and unequal secure video data encryption. Firstly, we classify the video data into two partitions: Important data partition and unimportant data partition. Important data partition has small size with high secure protection, while unimportant data partition has large size with low secure protection. Secondly, we use AES as a block cipher to encrypt the important data partition and use LEX as a stream cipher to encrypt the unimportant data partition. AES is the most widely used symmetric cryptography which can ensure high security. LEX is a new stream cipher which is based on AES and its computational cost is much lower than AES. In this way, our scheme can achieve both high security and low computational cost. Besides the USE scheme, we propose a low cost design of hybrid AES/LEX encryption module. Our experimental results show that the computational cost of the USE scheme is low (about 25% of naive encryption at Level 0 with VEA used). The hardware cost for hybrid AES/LEX module is 4678 Gates and the AES encryption throughput is about 50Mbps.

  14. A more secure anonymous user authentication scheme for the integrated EPR information system.

    PubMed

    Wen, Fengtong

    2014-05-01

    Secure and efficient user mutual authentication is an essential task for integrated electronic patient record (EPR) information system. Recently, several authentication schemes have been proposed to meet this requirement. In a recent paper, Lee et al. proposed an efficient and secure password-based authentication scheme used smart cards for the integrated EPR information system. This scheme is believed to have many abilities to resist a range of network attacks. Especially, they claimed that their scheme could resist lost smart card attack. However, we reanalyze the security of Lee et al.'s scheme, and show that it fails to protect off-line password guessing attack if the secret information stored in the smart card is compromised. This also renders that their scheme is insecure against user impersonation attacks. Then, we propose a new user authentication scheme for integrated EPR information systems based on the quadratic residues. The new scheme not only resists a range of network attacks but also provides user anonymity. We show that our proposed scheme can provide stronger security.

  15. Nonperturbative renormalization of quark bilinear operators and B{sub K} using domain wall fermions

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Aoki, Y.; Dawson, C.; Brookhaven National Laboratory, Upton, New York 11973

    2008-09-01

    We present a calculation of the renormalization coefficients of the quark bilinear operators and the K-K mixing parameter B{sub K}. The coefficients relating the bare lattice operators to those in the RI/MOM scheme are computed nonperturbatively and then matched perturbatively to the MS scheme. The coefficients are calculated on the RBC/UKQCD 2+1 flavor dynamical lattice configurations. Specifically we use a 16{sup 3}x32 lattice volume, the Iwasaki gauge action at {beta}=2.13 and domain wall fermions with L{sub s}=16.

  16. Justification of the estimation technique for the technical condition of the tank with inadmissible imperfections in the wall shape

    NASA Astrophysics Data System (ADS)

    Chepur, Petr; Tarasenko, Alexander; Gruchenkova, Alesya

    2017-10-01

    The paper has its focus on the problem of estimating the stress-strain state of the vertical steel tanks with the inadmissible geometric imperfections in the wall shape. In the paper, the authors refer to an actual tank to demonstrate that the use of certain design schemes can lead to the raw errors and, accordingly, to the unreliable results. Obviously, these design schemes cannot be based on when choosing the real repair technologies. For that reason, authors performed the calculations of the tank removed out of service for the repair, basing on the developed finite-element model of the VST-5000 tank with a conical roof. The proposed approach was developed for the analysis of the SSS (stress-strain state) of a tank having geometric imperfections of the wall shape. Based on the work results, the following was proposed: to amend the Annex A methodology “Method for calculating the stress-strain state of the tank wall during repair by lifting the tank and replacing the wall metal structures” by inserting the requirement to compulsory consider the actual stiffness of the VST entire structure and its roof when calculating the structure stress-strain state.

  17. Identification and Characterization of Paramyosin from Cyst Wall of Metacercariae Implicated Protective Efficacy against Clonorchis sinensis Infection

    PubMed Central

    Lv, Xiaoli; Tian, Yanli; Men, Jingtao; Zhang, Xifeng; Lei, Huali; Zhou, Chenhui; Lu, Fangli; Liang, Chi; Hu, Xuchu; Xu, Jin; Wu, Zhongdao; Li, Xuerong; Yu, Xinbing

    2012-01-01

    Human clonorchiasis has been increasingly prevalent in recent years and results in a threat to the public health in epidemic regions, motivating current strategies of vaccines to combat Clonorchis sinensis (C. sinensis). In this study, we identified C. sinensis paramyosin (CsPmy) from the cyst wall proteins of metacercariae by proteomic approaches and characterized the expressed recombinant pET-26b-CsPmy protein (101 kDa). Bioinformatics analysis indicated that full-length sequences of paramyosin are conserved in helminthes and numerous B-cell/T-cell epitopes were predicted in amino acid sequence of CsPmy. Western blot analysis showed that CsPmy was expressed at four life stages of C. sinensis, both cyst wall proteins and soluble tegumental components could be probed by anti-CsPmy serum. Moreover, immunolocalization results revealed that CsPmy was specifically localized at cyst wall and excretory bladder of metacercaria, as well as the tegument, oral sucker and vitellarium of adult worm. Both immunoblot and immunolocalization results demonstrated that CsPmy was highly expressed at the stage of adult worm, metacercariae and cercaria, which could be supported by real-time PCR analysis. Both recombinant protein and nucleic acid of CsPmy showed strong immunogenicity in rats and induced combined Th1/Th2 immune responses, which were reflected by continuous high level of antibody titers and increased level of IgG1/IgG2a subtypes in serum. In vaccine trials, comparing with control groups, both CsPmy protein and DNA vaccine exhibited protective effect with significant worm reduction rate of 54.3% (p<0.05) and 36.1% (p<0.05), respectively. In consistence with immune responses in sera, elevated level of cytokines IFN-γ and IL-4 in splenocytes suggested that CsPmy could induce combined cellular immunity and humoral immunity in host. Taken together, CsPmy could be a promising vaccine candidate in the prevention of C. sinensis regarding its high immunogenicity and surface

  18. A digital memories based user authentication scheme with privacy preservation.

    PubMed

    Liu, JunLiang; Lyu, Qiuyun; Wang, Qiuhua; Yu, Xiangxiang

    2017-01-01

    The traditional username/password or PIN based authentication scheme, which still remains the most popular form of authentication, has been proved insecure, unmemorable and vulnerable to guessing, dictionary attack, key-logger, shoulder-surfing and social engineering. Based on this, a large number of new alternative methods have recently been proposed. However, most of them rely on users being able to accurately recall complex and unmemorable information or using extra hardware (such as a USB Key), which makes authentication more difficult and confusing. In this paper, we propose a Digital Memories based user authentication scheme adopting homomorphic encryption and a public key encryption design which can protect users' privacy effectively, prevent tracking and provide multi-level security in an Internet & IoT environment. Also, we prove the superior reliability and security of our scheme compared to other schemes and present a performance analysis and promising evaluation results.

  19. A digital memories based user authentication scheme with privacy preservation

    PubMed Central

    Liu, JunLiang; Lyu, Qiuyun; Wang, Qiuhua; Yu, Xiangxiang

    2017-01-01

    The traditional username/password or PIN based authentication scheme, which still remains the most popular form of authentication, has been proved insecure, unmemorable and vulnerable to guessing, dictionary attack, key-logger, shoulder-surfing and social engineering. Based on this, a large number of new alternative methods have recently been proposed. However, most of them rely on users being able to accurately recall complex and unmemorable information or using extra hardware (such as a USB Key), which makes authentication more difficult and confusing. In this paper, we propose a Digital Memories based user authentication scheme adopting homomorphic encryption and a public key encryption design which can protect users’ privacy effectively, prevent tracking and provide multi-level security in an Internet & IoT environment. Also, we prove the superior reliability and security of our scheme compared to other schemes and present a performance analysis and promising evaluation results. PMID:29190659

  20. Security Analysis and Improvement of an Anonymous Authentication Scheme for Roaming Services

    PubMed Central

    Lee, Youngsook; Paik, Juryon

    2014-01-01

    An anonymous authentication scheme for roaming services in global mobility networks allows a mobile user visiting a foreign network to achieve mutual authentication and session key establishment with the foreign-network operator in an anonymous manner. In this work, we revisit He et al.'s anonymous authentication scheme for roaming services and present previously unpublished security weaknesses in the scheme: (1) it fails to provide user anonymity against any third party as well as the foreign agent, (2) it cannot protect the passwords of mobile users due to its vulnerability to an offline dictionary attack, and (3) it does not achieve session-key security against a man-in-the-middle attack. We also show how the security weaknesses of He et al.'s scheme can be addressed without degrading the efficiency of the scheme. PMID:25302330

  1. A classification scheme for edge-localized modes based on their probability distributions

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Shabbir, A., E-mail: aqsa.shabbir@ugent.be; Max Planck Institute for Plasma Physics, D-85748 Garching; Hornung, G.

    We present here an automated classification scheme which is particularly well suited to scenarios where the parameters have significant uncertainties or are stochastic quantities. To this end, the parameters are modeled with probability distributions in a metric space and classification is conducted using the notion of nearest neighbors. The presented framework is then applied to the classification of type I and type III edge-localized modes (ELMs) from a set of carbon-wall plasmas at JET. This provides a fast, standardized classification of ELM types which is expected to significantly reduce the effort of ELM experts in identifying ELM types. Further, themore » classification scheme is general and can be applied to various other plasma phenomena as well.« less

  2. Protecting Quantum Correlation from Correlated Amplitude Damping Channel

    NASA Astrophysics Data System (ADS)

    Huang, Zhiming; Zhang, Cai

    2017-08-01

    In this work, we investigate the dynamics of quantum correlation measured by measurement-induced nonlocality (MIN) and local quantum uncertainty (LQU) in correlated amplitude damping (CAD) channel. We find that the memory parameter brings different influences on MIN and LQU. In addition, we propose a scheme to protect quantum correlation by executing prior weak measurement (WM) and post-measurement reversal (MR). However, better protection of quantum correlation by the scheme implies a lower success probability (SP).

  3. Vacuolar H+-ATPase Protects Saccharomyces cerevisiae Cells against Ethanol-Induced Oxidative and Cell Wall Stresses

    PubMed Central

    Charoenbhakdi, Sirikarn; Dokpikul, Thanittra; Burphan, Thanawat; Techo, Todsapol

    2016-01-01

    used in alcoholic fermentation. The results revealed that straight-chain alcohols induced cytosolic and vacuolar acidification through their membrane-permeabilizing effects. Contrary to expectations, a role for V-ATPase in the regulation of the cell wall stress response and the prevention of endogenous oxidative stress, but not in the maintenance of intracellular pH, seems to be important for protecting yeast cells against ethanol stress. These findings will expand our understanding of the mechanisms of ethanol tolerance and provide promising clues for the development of ethanol-tolerant yeast strains. PMID:26994074

  4. Vacuolar H+-ATPase Protects Saccharomyces cerevisiae Cells against Ethanol-Induced Oxidative and Cell Wall Stresses.

    PubMed

    Charoenbhakdi, Sirikarn; Dokpikul, Thanittra; Burphan, Thanawat; Techo, Todsapol; Auesukaree, Choowong

    2016-05-15

    fermentation. The results revealed that straight-chain alcohols induced cytosolic and vacuolar acidification through their membrane-permeabilizing effects. Contrary to expectations, a role for V-ATPase in the regulation of the cell wall stress response and the prevention of endogenous oxidative stress, but not in the maintenance of intracellular pH, seems to be important for protecting yeast cells against ethanol stress. These findings will expand our understanding of the mechanisms of ethanol tolerance and provide promising clues for the development of ethanol-tolerant yeast strains. Copyright © 2016, American Society for Microbiology. All Rights Reserved.

  5. Design and evaluation of sparse quantization index modulation watermarking schemes

    NASA Astrophysics Data System (ADS)

    Cornelis, Bruno; Barbarien, Joeri; Dooms, Ann; Munteanu, Adrian; Cornelis, Jan; Schelkens, Peter

    2008-08-01

    In the past decade the use of digital data has increased significantly. The advantages of digital data are, amongst others, easy editing, fast, cheap and cross-platform distribution and compact storage. The most crucial disadvantages are the unauthorized copying and copyright issues, by which authors and license holders can suffer considerable financial losses. Many inexpensive methods are readily available for editing digital data and, unlike analog information, the reproduction in the digital case is simple and robust. Hence, there is great interest in developing technology that helps to protect the integrity of a digital work and the copyrights of its owners. Watermarking, which is the embedding of a signal (known as the watermark) into the original digital data, is one method that has been proposed for the protection of digital media elements such as audio, video and images. In this article, we examine watermarking schemes for still images, based on selective quantization of the coefficients of a wavelet transformed image, i.e. sparse quantization-index modulation (QIM) watermarking. Different grouping schemes for the wavelet coefficients are evaluated and experimentally verified for robustness against several attacks. Wavelet tree-based grouping schemes yield a slightly improved performance over block-based grouping schemes. Additionally, the impact of the deployment of error correction codes on the most promising configurations is examined. The utilization of BCH-codes (Bose, Ray-Chaudhuri, Hocquenghem) results in an improved robustness as long as the capacity of the error codes is not exceeded (cliff-effect).

  6. Hypervelocity impact response of aluminum multi-wall structures

    NASA Technical Reports Server (NTRS)

    Schonberg, William P.; Bean, Alan J.

    1991-01-01

    The results of an investigation in which the perforation resistance of aluminum multiwall structures is analyzed under a variety of hypervelocity impact loading conditions are presented. A comparative analysis of the impact damage in structural systems with two or more bumpers and the damage in single-bumper systems of similar weight is performed to determine the advantages and disadvantages of employing more than one bumper in structural wall systems for long-duration spacecraft. A significant increase in protection against perforation by hypervelocity projectiles can be achieved if a single bumper is replaced by two bumpers of similar weight while the total wall spacing is kept constant. It is found that increasing the number of bumpers beyond two while keeping the total stand-off distance constant does not result in a substantial increase in protection over that offered by two bumpers of similar weight.

  7. Investigation on the electron flux to the wall in the VENUS ion source

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Thuillier, T.; Angot, J.; Benitez, J. Y.

    The long-term operation of high charge state electron cyclotron resonance ion sources fed with high microwave power has caused damage to the plasma chamber wall in several laboratories. Porosity, or a small hole, can be progressively created in the chamber wall which can destroy the plasma chamber over a few year time scale. Here, a burnout of the VENUS plasma chamber is investigated in which the hole formation in relation to the local hot electron power density is studied. First, the results of a simple model assuming that hot electrons are fully magnetized and strictly following magnetic field lines aremore » presented. The model qualitatively reproduces the experimental traces left by the plasma on the wall. However, it is too crude to reproduce the localized electron power density for creating a hole in the chamber wall. Second, the results of a Monte Carlo simulation, following a population of scattering hot electrons, indicate a localized high power deposited to the chamber wall consistent with the hole formation process. Finally, a hypervapotron cooling scheme is proposed to mitigate the hole formation in electron cyclotron resonance plasma chamber wall.« less

  8. Investigation on the electron flux to the wall in the VENUS ion source

    DOE PAGES

    Thuillier, T.; Angot, J.; Benitez, J. Y.; ...

    2015-12-01

    The long-term operation of high charge state electron cyclotron resonance ion sources fed with high microwave power has caused damage to the plasma chamber wall in several laboratories. Porosity, or a small hole, can be progressively created in the chamber wall which can destroy the plasma chamber over a few year time scale. Here, a burnout of the VENUS plasma chamber is investigated in which the hole formation in relation to the local hot electron power density is studied. First, the results of a simple model assuming that hot electrons are fully magnetized and strictly following magnetic field lines aremore » presented. The model qualitatively reproduces the experimental traces left by the plasma on the wall. However, it is too crude to reproduce the localized electron power density for creating a hole in the chamber wall. Second, the results of a Monte Carlo simulation, following a population of scattering hot electrons, indicate a localized high power deposited to the chamber wall consistent with the hole formation process. Finally, a hypervapotron cooling scheme is proposed to mitigate the hole formation in electron cyclotron resonance plasma chamber wall.« less

  9. Investigation on the electron flux to the wall in the VENUS ion source

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Thuillier, T., E-mail: thuillier@lpsc.in2p3.fr; Angot, J.; Benitez, J. Y.

    The long-term operation of high charge state electron cyclotron resonance ion sources fed with high microwave power has caused damage to the plasma chamber wall in several laboratories. Porosity, or a small hole, can be progressively created in the chamber wall which can destroy the plasma chamber over a few year time scale. A burnout of the VENUS plasma chamber is investigated in which the hole formation in relation to the local hot electron power density is studied. First, the results of a simple model assuming that hot electrons are fully magnetized and strictly following magnetic field lines are presented.more » The model qualitatively reproduces the experimental traces left by the plasma on the wall. However, it is too crude to reproduce the localized electron power density for creating a hole in the chamber wall. Second, the results of a Monte Carlo simulation, following a population of scattering hot electrons, indicate a localized high power deposited to the chamber wall consistent with the hole formation process. Finally, a hypervapotron cooling scheme is proposed to mitigate the hole formation in electron cyclotron resonance plasma chamber wall.« less

  10. Investigation on the electron flux to the wall in the VENUS ion source

    NASA Astrophysics Data System (ADS)

    Thuillier, T.; Angot, J.; Benitez, J. Y.; Hodgkinson, A.; Lyneis, C. M.; Todd, D. S.; Xie, D. Z.

    2016-02-01

    The long-term operation of high charge state electron cyclotron resonance ion sources fed with high microwave power has caused damage to the plasma chamber wall in several laboratories. Porosity, or a small hole, can be progressively created in the chamber wall which can destroy the plasma chamber over a few year time scale. A burnout of the VENUS plasma chamber is investigated in which the hole formation in relation to the local hot electron power density is studied. First, the results of a simple model assuming that hot electrons are fully magnetized and strictly following magnetic field lines are presented. The model qualitatively reproduces the experimental traces left by the plasma on the wall. However, it is too crude to reproduce the localized electron power density for creating a hole in the chamber wall. Second, the results of a Monte Carlo simulation, following a population of scattering hot electrons, indicate a localized high power deposited to the chamber wall consistent with the hole formation process. Finally, a hypervapotron cooling scheme is proposed to mitigate the hole formation in electron cyclotron resonance plasma chamber wall.

  11. 76 FR 39341 - Modification of Treasury Regulations Pursuant to Section 939A of the Dodd-Frank Wall Street...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-06

    ... Reform and Consumer Protection Act requires each Federal agency to take such actions regarding its...(a) of the Dodd-Frank Wall Street Reform and Consumer Protection Act, Public Law 111-203 (124 Stat... Modification of Treasury Regulations Pursuant to Section 939A of the Dodd-Frank Wall Street Reform and Consumer...

  12. A new fractional order derivative based active contour model for colon wall segmentation

    NASA Astrophysics Data System (ADS)

    Chen, Bo; Li, Lihong C.; Wang, Huafeng; Wei, Xinzhou; Huang, Shan; Chen, Wensheng; Liang, Zhengrong

    2018-02-01

    Segmentation of colon wall plays an important role in advancing computed tomographic colonography (CTC) toward a screening modality. Due to the low contrast of CT attenuation around colon wall, accurate segmentation of the boundary of both inner and outer wall is very challenging. In this paper, based on the geodesic active contour model, we develop a new model for colon wall segmentation. First, tagged materials in CTC images were automatically removed via a partial volume (PV) based electronic colon cleansing (ECC) strategy. We then present a new fractional order derivative based active contour model to segment the volumetric colon wall from the cleansed CTC images. In this model, the regionbased Chan-Vese model is incorporated as an energy term to the whole model so that not only edge/gradient information but also region/volume information is taken into account in the segmentation process. Furthermore, a fractional order differentiation derivative energy term is also developed in the new model to preserve the low frequency information and improve the noise immunity of the new segmentation model. The proposed colon wall segmentation approach was validated on 16 patient CTC scans. Experimental results indicate that the present scheme is very promising towards automatically segmenting colon wall, thus facilitating computer aided detection of initial colonic polyp candidates via CTC.

  13. An 802.11 n wireless local area network transmission scheme for wireless telemedicine applications.

    PubMed

    Lin, C F; Hung, S I; Chiang, I H

    2010-10-01

    In this paper, an 802.11 n transmission scheme is proposed for wireless telemedicine applications. IEEE 802.11n standards, a power assignment strategy, space-time block coding (STBC), and an object composition Petri net (OCPN) model are adopted. With the proposed wireless system, G.729 audio bit streams, Joint Photographic Experts Group 2000 (JPEG 2000) clinical images, and Moving Picture Experts Group 4 (MPEG-4) video bit streams achieve a transmission bit error rate (BER) of 10-7, 10-4, and 103 simultaneously. The proposed system meets the requirements prescribed for wireless telemedicine applications. An essential feature of this proposed transmission scheme is that clinical information that requires a high quality of service (QoS) is transmitted at a high power transmission rate with significant error protection. For maximizing resource utilization and minimizing the total transmission power, STBC and adaptive modulation techniques are used in the proposed 802.11 n wireless telemedicine system. Further, low power, direct mapping (DM), low-error protection scheme, and high-level modulation are adopted for messages that can tolerate a high BER. With the proposed transmission scheme, the required reliability of communication can be achieved. Our simulation results have shown that the proposed 802.11 n transmission scheme can be used for developing effective wireless telemedicine systems.

  14. A consistent and conservative scheme for MHD flows with complex boundaries on an unstructured Cartesian adaptive system

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Zhang, Jie; Ni, Ming-Jiu, E-mail: mjni@ucas.ac.cn

    2014-01-01

    The numerical simulation of Magnetohydrodynamics (MHD) flows with complex boundaries has been a topic of great interest in the development of a fusion reactor blanket for the difficulty to accurately simulate the Hartmann layers and side layers along arbitrary geometries. An adaptive version of a consistent and conservative scheme has been developed for simulating the MHD flows. Besides, the present study forms the first attempt to apply the cut-cell approach for irregular wall-bounded MHD flows, which is more flexible and conveniently implemented under adaptive mesh refinement (AMR) technique. It employs a Volume-of-Fluid (VOF) approach to represent the fluid–conducting wall interfacemore » that makes it possible to solve the fluid–solid coupling magnetic problems, emphasizing at how electric field solver is implemented when conductivity is discontinuous in cut-cell. For the irregular cut-cells, the conservative interpolation technique is applied to calculate the Lorentz force at cell-center. On the other hand, it will be shown how consistent and conservative scheme is implemented on fine/coarse mesh boundaries when using AMR technique. Then, the applied numerical schemes are validated by five test simulations and excellent agreement was obtained for all the cases considered, simultaneously showed good consistency and conservative properties.« less

  15. Quantification and Control of Wall Effects in Porous Media Experiments

    NASA Astrophysics Data System (ADS)

    Roth, E. J.; Mays, D. C.; Neupauer, R.; Crimaldi, J. P.

    2017-12-01

    Fluid flow dynamics in porous media are dominated by media heterogeneity. This heterogeneity can create preferential pathways in which local seepage velocities dwarf system seepage velocities, further complicating an already incomplete understanding of dispersive processes. In physical models of porous media flows, apparatus walls introduce preferential flow paths (i.e., wall effects) that may overwhelm other naturally occurring preferential pathways within the apparatus, leading to deceptive results. We used planar laser-induced fluorescence (PLIF) in conjunction with refractive index matched (RIM) porous media and pore fluid to observe fluid dynamics in the porous media, with particular attention to the region near the apparatus walls in a 17 cm x 8 cm x 7 cm uniform flow cell. Hexagonal close packed spheres were used to create an isotropic, homogenous porous media field in the interior of the apparatus. Visualization of the movement of a fluorescent dye revealed the influence of the wall in creating higher permeability preferential flow paths in an otherwise homogenous media packing. These preferential flow paths extended approximately one half of one sphere diameter from the wall for homogenously packed regions, with a quickly diminishing effect on flow dynamics for homogenous media adjacent to the preferential pathway, but with major influence on flow dynamics for adjoining heterogeneous regions. Multiple approaches to mitigate wall effects were investigated, and a modified wall was created such that the fluid dynamics near the wall mimics the fluid dynamics within the homogenous porous media. This research supports the design of a two-dimensional experimental apparatus that will simulate engineered pumping schemes for use in contaminant remediation. However, this research could benefit the design of fixed bed reactors or other engineering challenges in which vessel walls contribute to unwanted preferential flow.

  16. Financial protection effects of modification of China's New Cooperative Medical Scheme on rural households with chronic diseases.

    PubMed

    Wang, Jing; Chen, Lina; Ye, Ting; Zhang, Zhiguo; Ma, Jingdong

    2014-07-15

    Several years have passed since the rural New Cooperative Medical Scheme (NCMS) in China was established and policies kept continuous improvement. Its policies on chronic diseases vary by county but have certain shared characteristics. Following this modification of medical insurance policy, this study reassesses the provision of insurance against expenditure on chronic diseases in rural areas, and analyzes its effect on impoverishment. We conducted an empirical study using multi-stage stratified random sampling. We surveyed 1,661 rural households in three provinces and analyzed the responses from 1,525 households that participated in NCMS, using descriptive and logistic regression analysis. The NCMS has reduced the prevalence of poverty and catastrophic health expenditure (CHE), as measured by out-of-pocket (OOP) payments exceeding 40% of total household expenditure, by decreasing medical expenditure. It provides obvious protection to households which include someone with chronic diseases. However, these households continue to face a higher financial risk than those without anyone suffering from chronic diseases. Variables about health service utilization and OOP payment differed significantly between households with or without people suffering from chronic disease. And CHE risk is commonly associated with household income, the number of family members with chronic diseases, OOP payment of outpatient and inpatient service in all three provinces. To reduce CHE risk for these households, it is critical to decrease OOP payments for health services by enhancing the effective reimbursement level of NCMS and strictly regulating the providers' behaviors. We recommend that a combinatory changes should be made to the rural health insurance scheme in China to improve its effect. These include improving the NCMS benefit package by broadening the catalogue of drugs and treatments covered, decreasing or abolishing deductible and increasing the reimbursement ratio of outpatient

  17. A high-order vertex-based central ENO finite-volume scheme for three-dimensional compressible flows

    DOE PAGES

    Charest, Marc R.J.; Canfield, Thomas R.; Morgan, Nathaniel R.; ...

    2015-03-11

    High-order discretization methods offer the potential to reduce the computational cost associated with modeling compressible flows. However, it is difficult to obtain accurate high-order discretizations of conservation laws that do not produce spurious oscillations near discontinuities, especially on multi-dimensional unstructured meshes. A novel, high-order, central essentially non-oscillatory (CENO) finite-volume method that does not have these difficulties is proposed for tetrahedral meshes. The proposed unstructured method is vertex-based, which differs from existing cell-based CENO formulations, and uses a hybrid reconstruction procedure that switches between two different solution representations. It applies a high-order k-exact reconstruction in smooth regions and a limited linearmore » reconstruction when discontinuities are encountered. Both reconstructions use a single, central stencil for all variables, making the application of CENO to arbitrary unstructured meshes relatively straightforward. The new approach was applied to the conservation equations governing compressible flows and assessed in terms of accuracy and computational cost. For all problems considered, which included various function reconstructions and idealized flows, CENO demonstrated excellent reliability and robustness. Up to fifth-order accuracy was achieved in smooth regions and essentially non-oscillatory solutions were obtained near discontinuities. The high-order schemes were also more computationally efficient for high-accuracy solutions, i.e., they took less wall time than the lower-order schemes to achieve a desired level of error. In one particular case, it took a factor of 24 less wall-time to obtain a given level of error with the fourth-order CENO scheme than to obtain the same error with the second-order scheme.« less

  18. Construction of a 2- by 2-foot transonic adaptive-wall test section at the NASA Ames Research Center

    NASA Technical Reports Server (NTRS)

    Morgan, Daniel G.; Lee, George

    1986-01-01

    The development of a new production-size, two-dimensional, adaptive-wall test section with ventilated walls at the NASA Ames Research Center is described. The new facility incorporates rapid closed-loop operation, computer/sensor integration, and on-line interference assessment and wall corrections. Air flow through the test section is controlled by a series of plenum compartments and three-way slide vales. A fast-scan laser velocimeter was built to measure velocity boundary conditions for the interference assessment scheme. A 15.2-cm- (6.0-in.-) chord NACA 0012 airfoil model will be used in the first experiments during calibration of the facility.

  19. Unequal error control scheme for dimmable visible light communication systems

    NASA Astrophysics Data System (ADS)

    Deng, Keyan; Yuan, Lei; Wan, Yi; Li, Huaan

    2017-01-01

    Visible light communication (VLC), which has the advantages of a very large bandwidth, high security, and freedom from license-related restrictions and electromagnetic-interference, has attracted much interest. Because a VLC system simultaneously performs illumination and communication functions, dimming control, efficiency, and reliable transmission are significant and challenging issues of such systems. In this paper, we propose a novel unequal error control (UEC) scheme in which expanding window fountain (EWF) codes in an on-off keying (OOK)-based VLC system are used to support different dimming target values. To evaluate the performance of the scheme for various dimming target values, we apply it to H.264 scalable video coding bitstreams in a VLC system. The results of the simulations that are performed using additive white Gaussian noises (AWGNs) with different signal-to-noise ratios (SNRs) are used to compare the performance of the proposed scheme for various dimming target values. It is found that the proposed UEC scheme enables earlier base layer recovery compared to the use of the equal error control (EEC) scheme for different dimming target values and therefore afford robust transmission for scalable video multicast over optical wireless channels. This is because of the unequal error protection (UEP) and unequal recovery time (URT) of the EWF code in the proposed scheme.

  20. 1. Exterior, corner, wall, and barrel of cannon used to ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    1. Exterior, corner, wall, and barrel of cannon used to protect corner of building from cart wheels. 1960. - Jefferson Barracks, Brick & Stone Powder Magazine, Jefferson Barracks, St. Louis County, MO

  1. Nanoparticles for cultural heritage conservation: calcium and barium hydroxide nanoparticles for wall painting consolidation.

    PubMed

    Giorgi, Rodorico; Ambrosi, Moira; Toccafondi, Nicola; Baglioni, Piero

    2010-08-16

    Nanotechnology provides new concepts and materials for the consolidation and protection of wall paintings. In particular, humble calcium and barium hydroxide nanoparticles offer a versatile and highly efficient tool to combat the main degradation processes altering wall paintings. Clear example of the efficacy and potentiality of nanotechnology is represented by the conservation in situ of Maya wall paintings in the archaeological area in Calakmul (Mexico).

  2. Cryptanalysis and improvement of Yan et al.'s biometric-based authentication scheme for telecare medicine information systems.

    PubMed

    Mishra, Dheerendra; Mukhopadhyay, Sourav; Chaturvedi, Ankita; Kumari, Saru; Khan, Muhammad Khurram

    2014-06-01

    Remote user authentication is desirable for a Telecare Medicine Information System (TMIS) for the safety, security and integrity of transmitted data over the public channel. In 2013, Tan presented a biometric based remote user authentication scheme and claimed that his scheme is secure. Recently, Yan et al. demonstrated some drawbacks in Tan's scheme and proposed an improved scheme to erase the drawbacks of Tan's scheme. We analyze Yan et al.'s scheme and identify that their scheme is vulnerable to off-line password guessing attack, and does not protect anonymity. Moreover, in their scheme, login and password change phases are inefficient to identify the correctness of input where inefficiency in password change phase can cause denial of service attack. Further, we design an improved scheme for TMIS with the aim to eliminate the drawbacks of Yan et al.'s scheme.

  3. Secondary cell walls: biosynthesis, patterned deposition and transcriptional regulation.

    PubMed

    Zhong, Ruiqin; Ye, Zheng-Hua

    2015-02-01

    Secondary walls are mainly composed of cellulose, hemicelluloses (xylan and glucomannan) and lignin, and are deposited in some specialized cells, such as tracheary elements, fibers and other sclerenchymatous cells. Secondary walls provide strength to these cells, which lend mechanical support and protection to the plant body and, in the case of tracheary elements, enable them to function as conduits for transporting water. Formation of secondary walls is a complex process that requires the co-ordinated expression of secondary wall biosynthetic genes, biosynthesis and targeted secretion of secondary wall components, and patterned deposition and assembly of secondary walls. Here, we provide a comprehensive review of genes involved in secondary wall biosynthesis and deposition. Most of the genes involved in the biosynthesis of secondary wall components, including cellulose, xylan, glucomannan and lignin, have been identified and their co-ordinated activation has been shown to be mediated by a transcriptional network encompassing the secondary wall NAC and MYB master switches and their downstream transcription factors. It has been demonstrated that cortical microtubules and microtubule-associated proteins play important roles in the targeted secretion of cellulose synthase complexes, the oriented deposition of cellulose microfibrils and the patterned deposition of secondary walls. Further investigation of many secondary wall-associated genes with unknown functions will provide new insights into the mechanisms controlling the formation of secondary walls that constitute the bulk of plant biomass. © The Author 2014. Published by Oxford University Press on behalf of Japanese Society of Plant Physiologists. All rights reserved. For permissions, please email: journals.permissions@oup.com.

  4. On the Adaptive Protection of Microgrids: A Review on How to Mitigate Cyber Attacks and Communication Failures

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Habib, Hany F; Lashway, Christopher R; Mohammed, Osama A

    One main challenge in the practical implementation of a microgrid is the design of an adequate protection scheme in both grid connected and islanded modes. Conventional overcurrent protection schemes face selectivity and sensitivity issues during grid and microgrid faults since the fault current level is different in both cases for the same relay. Various approaches have been implemented in the past to deal with this problem, yet the most promising ones are the implementation of adaptive protection techniques abiding by the IEC 61850 communication standard. This paper presents a critical review of existing adaptive protection schemes, the technical challenges formore » the use of classical protection techniques and the need for an adaptive, smart protection system. However, the risk of communication link failures and cyber security threats still remain a challenge in implementing a reliable adaptive protection scheme. A contingency is needed where a communication issue prevents the relay from adjusting to a lower current level during islanded mode. An adaptive protection scheme is proposed that utilizes energy storage (ES) and hybrid ES (HESS) already available in the network as a mechanism to source the higher fault current. Four common grid ES and HESS are reviewed for their suitability in feeding the fault while some solutions are proposed.« less

  5. A cell wall protein-based vaccine candidate induce protective immune response against Sporothrix schenckii infection.

    PubMed

    Portuondo, Deivys Leandro; Batista-Duharte, Alexander; Ferreira, Lucas Souza; Martínez, Damiana Téllez; Polesi, Marisa Campos; Duarte, Roberta Aparecida; de Paula E Silva, Ana Carolina Alves; Marcos, Caroline Maria; Almeida, Ana Marisa Fusco de; Carlos, Iracilda Zeppone

    2016-02-01

    Sporotrichosis is a subcutaneous mycosis caused by several closely related thermo-dimorphic fungi of the Sporothrix schenckii species complex, affecting humans and other mammals. In the last few years, new strategies have been proposed for controlling sporotrichosis owning to concerns about its growing incidence in humans, cats, and dogs in Brazil, as well as the toxicity and limited efficacy of conventional antifungal drugs. In this study, we assessed the immunogenicity and protective properties of two aluminum hydroxide (AH)-adsorbed S. schenckii cell wall protein (ssCWP)-based vaccine formulations in a mouse model of systemic S. schenckii infection. Fractioning by SDS-PAGE revealed nine protein bands, two of which were functionally characterized: a 44kDa peptide hydrolase and a 47kDa enolase, which was predicted to be an adhesin. Sera from immunized mice recognized the 47kDa enolase and another unidentified 71kDa protein, whereas serum from S. schenckii-infected mice recognized both these proteins plus another unidentified 9.4kDa protein. Furthermore, opsonization with the anti-ssCWP sera led to markedly increased phagocytosis and was able to strongly inhibit the fungus' adhesion to fibroblasts. Immunization with the higher-dose AH-adjuvanted formulation led to increased ex vivo release of IL-12, IFN-γ, IL-4, and IL-17, whereas only IL-12 and IFN-γ were induced by the higher-dose non-adjuvanted formulation. Lastly, passive transference of the higher-dose AH-adjuvanted formulation's anti-ssCWP serum was able to afford in vivo protection in a subsequent challenge with S. schenckii, becoming a viable vaccine candidate for further testing. Copyright © 2015 Elsevier GmbH. All rights reserved.

  6. Analysis and comparison of wall cooling schemes for advanced gas turbine applications

    NASA Technical Reports Server (NTRS)

    Colladay, R. S.

    1972-01-01

    The relative performance of (1) counterflow film cooling, (2) parallel-flow film cooling, (3) convection cooling, (4) adiabatic film cooling, (5) transpiration cooling, and (6) full-coverage film cooling was investigated for heat loading conditions expected in future gas turbine engines. Assumed in the analysis were hot-gas conditions of 2200 K (3500 F) recovery temperature, 5 to 40 atmospheres total pressure, and 0.6 gas Mach number and a cooling air supply temperature of 811 K (1000 F). The first three cooling methods involve film cooling from slots. Counterflow and parallel flow describe the direction of convection cooling air along the inside surface of the wall relative to the main gas flow direction. The importance of utilizing the heat sink available in the coolant for convection cooling prior to film injection is illustrated.

  7. A privacy preserving secure and efficient authentication scheme for telecare medical information systems.

    PubMed

    Mishra, Raghavendra; Barnwal, Amit Kumar

    2015-05-01

    The Telecare medical information system (TMIS) presents effective healthcare delivery services by employing information and communication technologies. The emerging privacy and security are always a matter of great concern in TMIS. Recently, Chen at al. presented a password based authentication schemes to address the privacy and security. Later on, it is proved insecure against various active and passive attacks. To erase the drawbacks of Chen et al.'s anonymous authentication scheme, several password based authentication schemes have been proposed using public key cryptosystem. However, most of them do not present pre-smart card authentication which leads to inefficient login and password change phases. To present an authentication scheme with pre-smart card authentication, we present an improved anonymous smart card based authentication scheme for TMIS. The proposed scheme protects user anonymity and satisfies all the desirable security attributes. Moreover, the proposed scheme presents efficient login and password change phases where incorrect input can be quickly detected and a user can freely change his password without server assistance. Moreover, we demonstrate the validity of the proposed scheme by utilizing the widely-accepted BAN (Burrows, Abadi, and Needham) logic. The proposed scheme is also comparable in terms of computational overheads with relevant schemes.

  8. Secure and Efficient Two-Factor User Authentication Scheme with User Anonymity for Network Based E-Health Care Applications.

    PubMed

    Li, Xiong; Niu, Jianwei; Karuppiah, Marimuthu; Kumari, Saru; Wu, Fan

    2016-12-01

    Benefited from the development of network and communication technologies, E-health care systems and telemedicine have got the fast development. By using the E-health care systems, patient can enjoy the remote medical service provided by the medical server. Medical data are important privacy information for patient, so it is an important issue to ensure the secure of transmitted medical data through public network. Authentication scheme can thwart unauthorized users from accessing services via insecure network environments, so user authentication with privacy protection is an important mechanism for the security of E-health care systems. Recently, based on three factors (password, biometric and smart card), an user authentication scheme for E-health care systems was been proposed by Amin et al., and they claimed that their scheme can withstand most of common attacks. Unfortunate, we find that their scheme cannot achieve the untraceability feature of the patient. Besides, their scheme lacks a password check mechanism such that it is inefficient to find the unauthorized login by the mistake of input a wrong password. Due to the same reason, their scheme is vulnerable to Denial of Service (DoS) attack if the patient updates the password mistakenly by using a wrong password. In order improve the security level of authentication scheme for E-health care application, a robust user authentication scheme with privacy protection is proposed for E-health care systems. Then, security prove of our scheme are analysed. Security and performance analyses show that our scheme is more powerful and secure for E-health care systems when compared with other related schemes.

  9. Linear estimation of coherent structures in wall-bounded turbulence at Re τ = 2000

    NASA Astrophysics Data System (ADS)

    Oehler, S.; Garcia–Gutiérrez, A.; Illingworth, S.

    2018-04-01

    The estimation problem for a fully-developed turbulent channel flow at Re τ = 2000 is considered. Specifically, a Kalman filter is designed using a Navier–Stokes-based linear model. The estimator uses time-resolved velocity measurements at a single wall-normal location (provided by DNS) to estimate the time-resolved velocity field at other wall-normal locations. The estimator is able to reproduce the largest scales with reasonable accuracy for a range of wavenumber pairs, measurement locations and estimation locations. Importantly, the linear model is also able to predict with reasonable accuracy the performance that will be achieved by the estimator when applied to the DNS. A more practical estimation scheme using the shear stress at the wall as measurement is also considered. The estimator is still able to estimate the largest scales with reasonable accuracy, although the estimator’s performance is reduced.

  10. A Near-Wall Reynolds-Stress Closure Without Wall Normals

    NASA Technical Reports Server (NTRS)

    Yuan, S. P.; So, R. M. C.

    1997-01-01

    Turbulent wall-bounded complex flows are commonly encountered in engineering practice and are of considerable interest in a variety of industrial applications. The presence of a wall significantly affects turbulence characteristics. In addition to the wall effects, turbulent wall-bounded flows become more complicated by the presence of additional body forces (e.g. centrifugal force and Coriolis force) and complex geometry. Most near-wall Reynolds stress models are developed from a high-Reynolds-number model which assumes turbulence is homogenous (or quasi-homogenous). Near-wall modifications are proposed to include wall effects in near-wall regions. In this process, wall normals are introduced. Good predictions could be obtained by Reynolds stress models with wall normals. However, ambiguity arises when the models are applied in flows with multiple walls. Many models have been proposed to model turbulent flows. Among them, Reynolds stress models, in which turbulent stresses are obtained by solving the Reynolds stress transport equations, have been proved to be the most successful ones. To apply the Reynolds stress models to wall-bounded flows, near-wall corrections accounting for the wall effects are needed, and the resulting models are called near-wall Reynolds stress models. In most of the existing near-wall models, the near-wall corrections invoke wall normals. These wall-dependent near-wall models are difficult to implement for turbulent flows with complex geometry and may give inaccurate predictions due to the ambiguity of wall normals at corners connecting multiple walls. The objective of this study is to develop a more general and flexible near-wall Reynolds stress model without using any wall-dependent variable for wall-bounded turbulent flows. With the aid of near-wall asymptotic analysis and results of direct numerical simulation, a new near-wall Reynolds stress model (NNWRS) is formulated based on Speziale et al.'s high-Reynolds-stress model with wall

  11. A robust H.264/AVC video watermarking scheme with drift compensation.

    PubMed

    Jiang, Xinghao; Sun, Tanfeng; Zhou, Yue; Wang, Wan; Shi, Yun-Qing

    2014-01-01

    A robust H.264/AVC video watermarking scheme for copyright protection with self-adaptive drift compensation is proposed. In our scheme, motion vector residuals of macroblocks with the smallest partition size are selected to hide copyright information in order to hold visual impact and distortion drift to a minimum. Drift compensation is also implemented to reduce the influence of watermark to the most extent. Besides, discrete cosine transform (DCT) with energy compact property is applied to the motion vector residual group, which can ensure robustness against intentional attacks. According to the experimental results, this scheme gains excellent imperceptibility and low bit-rate increase. Malicious attacks with different quantization parameters (QPs) or motion estimation algorithms can be resisted efficiently, with 80% accuracy on average after lossy compression.

  12. A secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care.

    PubMed

    Das, Ashok Kumar; Goswami, Adrijit

    2013-06-01

    Connected health care has several applications including telecare medicine information system, personally controlled health records system, and patient monitoring. In such applications, user authentication can ensure the legality of patients. In user authentication for such applications, only the legal user/patient himself/herself is allowed to access the remote server, and no one can trace him/her according to transmitted data. Chang et al. proposed a uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care (Chang et al., J Med Syst 37:9902, 2013). Their scheme uses the user's personal biometrics along with his/her password with the help of the smart card. The user's biometrics is verified using BioHashing. Their scheme is efficient due to usage of one-way hash function and exclusive-or (XOR) operations. In this paper, we show that though their scheme is very efficient, their scheme has several security weaknesses such as (1) it has design flaws in login and authentication phases, (2) it has design flaws in password change phase, (3) it fails to protect privileged insider attack, (4) it fails to protect the man-in-the middle attack, and (5) it fails to provide proper authentication. In order to remedy these security weaknesses in Chang et al.'s scheme, we propose an improvement of their scheme while retaining the original merit of their scheme. We show that our scheme is efficient as compared to Chang et al.'s scheme. Through the security analysis, we show that our scheme is secure against possible attacks. Further, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to ensure that our scheme is secure against passive and active attacks. In addition, after successful authentication between the user and the server, they establish a secret session key shared between them for future secure communication.

  13. 49 CFR 178.337-10 - Accident damage protection.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... failure of the sacrificial device must leave the protected lading protection device and its attachment to the cargo tank wall intact and capable of retaining product. [Order 59-B, 30 FR 581, Jan. 16, 1965...

  14. Proposal for a Domain Wall Nano-Oscillator driven by Non-uniform Spin Currents

    PubMed Central

    Sharma, Sanchar; Muralidharan, Bhaskaran; Tulapurkar, Ashwin

    2015-01-01

    We propose a new mechanism and a related device concept for a robust, magnetic field tunable radio-frequency (rf) oscillator using the self oscillation of a magnetic domain wall subject to a uniform static magnetic field and a spatially non-uniform vertical dc spin current. The self oscillation of the domain wall is created as it translates periodically between two unstable positions, one being in the region where both the dc spin current and the magnetic field are present, and the other, being where only the magnetic field is present. The vertical dc spin current pushes it away from one unstable position while the magnetic field pushes it away from the other. We show that such oscillations are stable under noise and can exhibit a quality factor of over 1000. A domain wall under dynamic translation, not only being a source for rich physics, is also a promising candidate for advancements in nanoelectronics with the actively researched racetrack memory architecture, digital and analog switching paradigms as candidate examples. Devising a stable rf oscillator using a domain wall is hence another step towards the realization of an all domain wall logic scheme. PMID:26420544

  15. Local and global gravitational aspects of domain wall space-times

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Cvetic, M.; Griffies, S.; Soleng, H.H.

    1993-09-15

    Local and global gravitational effects induced by eternal vacuum domain walls are studied. We concentrate on thin walls between nonequal and nonpositive cosmological constants on each side of the wall. The assumption of homogeneity, isotropy, and geodesic completeness of the space-time intrinsic to the wall as described in the comoving coordinate system and the constraint that the same symmetries hold in hypersurfaces parallel to the wall yield a general [ital Ansatz] for the line element of space-time. We restrict the problem further by demanding that the wall's surface energy density, [sigma], is positive and by requiring that the infinitely thinmore » wall represents a thin-wall limit of kinklike scalar field configuration. These vacuum domain walls fall in three classes depending on the value of their [sigma]: (1) extreme walls with [sigma]=[sigma][sub ext] are planar, static walls corresponding to supersymmetric configurations, (2) nonextreme walls with [sigma]=[sigma][sub non][gt][sigma][sub ext] correspond to expanding bubbles with observers on either side of the wall being [ital inside] the bubble, and (3) ultraextreme walls with [sigma]=[sigma][sub ultra][lt][sigma][sub ext] represent the bubbles of false vacuum decay. On the sides with less negative cosmological constant, the extreme, nonextreme, and ultraextreme walls exhibit no, repulsive, and attractive effective gravitational forces,'' respectively. These gravitational forces'' are global effects not caused by local curvature. Since the nonextreme wall encloses observers on both sides, the supersymmetric system has the lowest gravitational mass accessible to outside observers. It is conjectured that similar positive mass protection occurs in all physical systems and that no finite negative mass object can exist inside the universe.« less

  16. An improved anonymous authentication scheme for roaming in ubiquitous networks.

    PubMed

    Lee, Hakjun; Lee, Donghoon; Moon, Jongho; Jung, Jaewook; Kang, Dongwoo; Kim, Hyoungshick; Won, Dongho

    2018-01-01

    With the evolution of communication technology and the exponential increase of mobile devices, the ubiquitous networking allows people to use our data and computing resources anytime and everywhere. However, numerous security concerns and complicated requirements arise as these ubiquitous networks are deployed throughout people's lives. To meet the challenge, the user authentication schemes in ubiquitous networks should ensure the essential security properties for the preservation of the privacy with low computational cost. In 2017, Chaudhry et al. proposed a password-based authentication scheme for the roaming in ubiquitous networks to enhance the security. Unfortunately, we found that their scheme remains insecure in its protection of the user privacy. In this paper, we prove that Chaudhry et al.'s scheme is vulnerable to the stolen-mobile device and user impersonation attacks, and its drawbacks comprise the absence of the incorrect login-input detection, the incorrectness of the password change phase, and the absence of the revocation provision. Moreover, we suggest a possible way to fix the security flaw in Chaudhry et al's scheme by using the biometric-based authentication for which the bio-hash is applied in the implementation of a three-factor authentication. We prove the security of the proposed scheme with the random oracle model and formally verify its security properties using a tool named ProVerif, and analyze it in terms of the computational and communication cost. The analysis result shows that the proposed scheme is suitable for resource-constrained ubiquitous environments.

  17. Exploiting fungal cell wall components in vaccines.

    PubMed

    Levitz, Stuart M; Huang, Haibin; Ostroff, Gary R; Specht, Charles A

    2015-03-01

    Innate recognition of fungi leads to strong adaptive immunity. Investigators are trying to exploit this observation in vaccine development by combining antigens with evolutionarily conserved fungal cell wall carbohydrates to induce protective responses. Best studied is β-1,3-glucan, a glycan that activates complement and is recognized by dectin-1. Administration of antigens in association with β-1,3-glucan, either by direct conjugation or complexed in glucan particles, results in robust humoral and cellular immune responses. While the host has a host of mannose receptors, responses to fungal mannoproteins generally are amplified if cells are cooperatively stimulated with an additional danger signal such as a toll-like receptor agonist. Chitosan, a polycationic homopolymer of glucosamine manufactured by the deacetylation of chitin, is being studied as an adjuvant in DNA and protein-based vaccines. It appears particularly promising in mucosal vaccines. Finally, universal and organism-specific fungal vaccines have been formulated by conjugating fungal cell wall glycans to carrier proteins. A major challenge will be to advance these experimental findings so that at risk patients can be protected.

  18. Exploiting fungal cell wall components in vaccines

    PubMed Central

    Levitz, Stuart M.; Huang, Haibin; Ostroff, Gary R.; Specht, Charles A.

    2014-01-01

    Innate recognition of fungi leads to strong adaptive immunity. Investigators are trying to exploit this observation in vaccine development by combining antigens with evolutionarily conserved fungal cell wall carbohydrates to induce protective responses. Best studied is β-1,3-glucan, a glycan that activates complement and is recognized by Dectin-1. Administration of antigens in association with β-1,3-glucan, either by direct conjugation or complexed in glucan particles, results in robust humoral and cellular immune responses. While the host has a host of mannose receptors, responses to fungal mannoproteins generally are amplified if cells are cooperatively stimulated with an additional danger signal such as a toll-like receptor agonist. Chitosan, a polycationic homopolymer of glucosamine manufactured by the deacetylation of chitin, is being studied as an adjuvant in DNA and protein-based vaccines. It appears particularly promising in mucosal vaccines. Finally, universal and organism-specific fungal vaccines have been formulated by conjugating fungal cell wall glycans to carrier proteins. A major challenge will be to advance these experimental findings so that at risk patients can be protected. PMID:25404118

  19. PBF Reactor Building (PER620). Camera faces south along west wall. ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    PBF Reactor Building (PER-620). Camera faces south along west wall. Gap between native lava rock and concrete basement walls is being backfilled and compacted. Wire mesh protects workers from falling rock. Note penetrations for piping that will carry secondary coolant water to Cooling Tower. Photographer: Holmes. Date: June 15, 1967. INEEL negative no. 67-3665 - Idaho National Engineering Laboratory, SPERT-I & Power Burst Facility Area, Scoville, Butte County, ID

  20. A privacy-strengthened scheme for E-Healthcare monitoring system.

    PubMed

    Huang, Chanying; Lee, Hwaseong; Lee, Dong Hoon

    2012-10-01

    Recent Advances in Wireless Body Area Networks (WBANs) offer unprecedented opportunities and challenges to the development of pervasive electronic healthcare (E-Healthcare) monitoring system. In E-Healthcare system, the processed data are patients' sensitive health data that are directly related to individuals' privacy. For this reason, privacy concern is of great importance for E-Healthcare system. Current existing systems for E-Healthcare services, however, have not yet provided sufficient privacy protection for patients. In order to offer adequate security and privacy, in this paper, we propose a privacy-enhanced scheme for patients' physical condition monitoring, which achieves dual effects: (1) providing unlinkability of health records and individual identity, and (2) supporting anonymous authentication and authorized data access. We also conduct a simulation experiment to evaluate the performance of the proposed scheme. The experimental results demonstrate that the proposed scheme achieves better performance in terms of computational complexity, communication overheads and querying efficiency compared with previous results.

  1. Hollow wall to stabilize and enhance ignition hohlraums

    NASA Astrophysics Data System (ADS)

    Vandenboomgaerde, M.; Grisollet, A.; Bonnefille, M.; Clérouin, J.; Arnault, P.; Desbiens, N.; Videau, L.

    2018-01-01

    In the context of the indirect-drive scheme of the inertial-confinement fusion, performance of the gas-filled hohlraums at the National Ignition Facility appears to be reduced. Experiments ascertain a limited efficacy of the laser beam propagation and x-ray conversion. One identified issue is the growth of the gold plasma plume (or bubble) which is generated near the ends of the hohlraum by the impact of the laser beams. This bubble impedes the laser propagation towards the equator of the hohlraum. Furthermore, for high foot or low foot laser pulses, the gold-gas interface of the bubble can be unstable. If this instability should grow to mixing, the x-ray conversion could be degraded. A novel hollow-walled hohlraum is designed, which drastically reduces the growth of the gold bubble and stabilizes the gold-gas interface. The hollow walls are built from the combination of a thin gold foil and a gold domed-wall. We theoretically explain how the bubble expansion can be delayed and the gold-gas interface stabilized. This advanced design lets the laser beams reach the waist of the hohlraum. As a result, the x-ray drive on the capsule is enhanced, and more spherical implosions are obtained. Furthermore, this design only requires intermediate gas fill density to be efficient.

  2. 6. REMAINS OF PLANK WALL NAILED TO POSTS WITHIN CANAL ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    6. REMAINS OF PLANK WALL NAILED TO POSTS WITHIN CANAL CONSTRUCTED TO PROTECT OUTSIDE CANAL BANK. VIEW IS TO THE WEST. - Snake River Ditch, Headgate on north bank of Snake River, Dillon, Summit County, CO

  3. Fungal cell wall polymer based nanoparticles in protection of tomato plants from wilt disease caused by Fusarium oxysporum f.sp. lycopersici.

    PubMed

    Sathiyabama, M; Charles, R Einstein

    2015-11-20

    Cell wall polymer (chitosan) was isolated from Fusarium oxysporum f.sp. lycopersici. They were cross linked with sodium tripolyphosphate (TPP) to synthesize nanoparticles (CWP-NP). The nanoparticles were characterized by FTIR, DLS, SEM, XRD and NMR analyses. The isolated CWP-NP exhibit antifungal activity under in vitro condition. The foliar application of the CWP-NP to tomato plants challenged with F. oxysporum f. sp. lycopersici showed delay in wilt disease symptom expression and reduce the wilt disease severity. Treated plants also showed enhanced yield. These results suggested the role of the CWP-NP in protecting tomato plants from F. oxysporum f.sp. lycopersici infection. Copyright © 2015 Elsevier Ltd. All rights reserved.

  4. Sequential Feedback Scheme Outperforms the Parallel Scheme for Hamiltonian Parameter Estimation.

    PubMed

    Yuan, Haidong

    2016-10-14

    Measurement and estimation of parameters are essential for science and engineering, where the main quest is to find the highest achievable precision with the given resources and design schemes to attain it. Two schemes, the sequential feedback scheme and the parallel scheme, are usually studied in the quantum parameter estimation. While the sequential feedback scheme represents the most general scheme, it remains unknown whether it can outperform the parallel scheme for any quantum estimation tasks. In this Letter, we show that the sequential feedback scheme has a threefold improvement over the parallel scheme for Hamiltonian parameter estimations on two-dimensional systems, and an order of O(d+1) improvement for Hamiltonian parameter estimation on d-dimensional systems. We also show that, contrary to the conventional belief, it is possible to simultaneously achieve the highest precision for estimating all three components of a magnetic field, which sets a benchmark on the local precision limit for the estimation of a magnetic field.

  5. Moonlight-like proteins of the cell wall protect sessile cells of Candida from oxidative stress.

    PubMed

    Serrano-Fujarte, Isela; López-Romero, Everardo; Cuéllar-Cruz, Mayra

    2016-01-01

    Biofilms of Candida species are associated with high morbidity and hospital mortality. Candida forms biofilms by adhering to human host epithelium through cell wall proteins (CWP) and simultaneously neutralizing the reactive oxygen species (ROS) produced during the respiratory burst by phagocytic cells. The purpose of this paper is to identify the CWP of Candida albicans, Candida glabrata, Candida krusei and Candida parapsilosis expressed after exposure to different concentrations of H2O2 using a proteomic approach. CWP obtained from sessile cells, both treated and untreated with the oxidizing agent, were resolved by one and two-dimensional (2D-PAGE) gels and identified by liquid chromatography-tandem mass spectrometry (LC-MS/MS) analysis. Some of these proteins were identified and found to correspond to moonlighting CWP such as: (i) glycolytic enzymes, (ii) heat shock, (iii) OSR proteins, (iv) general metabolic enzymes and (v) highly conserved proteins, which are up- or down-regulated in the presence or absence of ROS. We also found that the expression of these CWP is different for each Candida species. Moreover, RT-PCR assays allowed us to demonstrate that transcription of the gene coding for Eno1, one of the moonlight-like CWP identified in response to the oxidant agent, is differentially regulated. To our knowledge this is the first demonstration that, in response to oxidative stress, each species of Candida, differentially regulates the expression of moonlighting CWP, which may protect the organism from the ROS generated during phagocytosis. Presumptively, these proteins allow the pathogen to adhere and form a biofilm, and eventually cause invasive candidiasis in the human host. We propose that, in addition to the antioxidant mechanisms present in Candida, the moonlighting CWP also confer protection to these pathogens from oxidative stress. Copyright © 2015 Elsevier Ltd. All rights reserved.

  6. Inverse heat conduction estimation of inner wall temperature fluctuations under turbulent penetration

    NASA Astrophysics Data System (ADS)

    Guo, Zhouchao; Lu, Tao; Liu, Bo

    2017-04-01

    Turbulent penetration can occur when hot and cold fluids mix in a horizontal T-junction pipe at nuclear plants. Caused by the unstable turbulent penetration, temperature fluctuations with large amplitude and high frequency can lead to time-varying wall thermal stress and even thermal fatigue on the inner wall. Numerous cases, however, exist where inner wall temperatures cannot be measured and only outer wall temperature measurements are feasible. Therefore, it is one of the popular research areas in nuclear science and engineering to estimate temperature fluctuations on the inner wall from measurements of outer wall temperatures without damaging the structure of the pipe. In this study, both the one-dimensional (1D) and the two-dimensional (2D) inverse heat conduction problem (IHCP) were solved to estimate the temperature fluctuations on the inner wall. First, numerical models of both the 1D and the 2D direct heat conduction problem (DHCP) were structured in MATLAB, based on the finite difference method with an implicit scheme. Second, both the 1D IHCP and the 2D IHCP were solved by the steepest descent method (SDM), and the DHCP results of temperatures on the outer wall were used to estimate the temperature fluctuations on the inner wall. Third, we compared the temperature fluctuations on the inner wall estimated by the 1D IHCP with those estimated by the 2D IHCP in four cases: (1) when the maximum disturbance of temperature of fluid inside the pipe was 3°C, (2) when the maximum disturbance of temperature of fluid inside the pipe was 30°C, (3) when the maximum disturbance of temperature of fluid inside the pipe was 160°C, and (4) when the fluid temperatures inside the pipe were random from 50°C to 210°C.

  7. Hybrid ququart-encoded quantum cryptography protected by Kochen-Specker contextuality

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Cabello, Adan; Department of Physics, Stockholm University, S-10691 Stockholm; D'Ambrosio, Vincenzo

    2011-09-15

    Quantum cryptographic protocols based on complementarity are not secure against attacks in which complementarity is imitated with classical resources. The Kochen-Specker (KS) theorem provides protection against these attacks, without requiring entanglement or spatially separated composite systems. We analyze the maximum tolerated noise to guarantee the security of a KS-protected cryptographic scheme against these attacks and describe a photonic realization of this scheme using hybrid ququarts defined by the polarization and orbital angular momentum of single photons.

  8. PERMEABLE TREATMENT WALL EFFECTIVENESS MONITORING PROJECT, NEVADA STEWART MINE

    EPA Science Inventory

    This report summarizes the results of Mine Waste Technology Program (MWTP) Activity III, Project 39, Permeable Treatment Wall Effectiveness Monitoring Project, implemented and funded by the U.S. Environmental Protection Agency (EPA) and jointly administered by EPA and the U.S. De...

  9. A Robust H.264/AVC Video Watermarking Scheme with Drift Compensation

    PubMed Central

    Sun, Tanfeng; Zhou, Yue; Shi, Yun-Qing

    2014-01-01

    A robust H.264/AVC video watermarking scheme for copyright protection with self-adaptive drift compensation is proposed. In our scheme, motion vector residuals of macroblocks with the smallest partition size are selected to hide copyright information in order to hold visual impact and distortion drift to a minimum. Drift compensation is also implemented to reduce the influence of watermark to the most extent. Besides, discrete cosine transform (DCT) with energy compact property is applied to the motion vector residual group, which can ensure robustness against intentional attacks. According to the experimental results, this scheme gains excellent imperceptibility and low bit-rate increase. Malicious attacks with different quantization parameters (QPs) or motion estimation algorithms can be resisted efficiently, with 80% accuracy on average after lossy compression. PMID:24672376

  10. Protecting Juno Electronics from Radiation

    NASA Image and Video Library

    2010-07-12

    Technicians installed the special radiation vault for NASA Juno spacecraft on the propulsion module. The radiation vault has titanium walls to protect the spacecraft electronic brain and heart from Jupiter harsh radiation environment.

  11. Improved passive optical network architectures to support local area network emulation and protection

    NASA Astrophysics Data System (ADS)

    Wong, Elaine; Nadarajah, Nishaanthan; Chae, Chang-Joon; Nirmalathas, Ampalavanapillai; Attygalle, Sanjeewa M.

    2006-01-01

    We describe two optical layer schemes which simultaneously facilitate local area network emulation and automatic protection switching against distribution fiber breaks in passive optical networks. One scheme employs a narrowband fiber Bragg grating placed close to the star coupler in the feeder fiber of the passive optical network, while the other uses an additional short length distribution fiber from the star coupler to each customer for the redirection of the customer traffic. Both schemes use RF subcarrier multiplexed transmission for intercommunication between customers in conjunction with upstream access to the central office at baseband. Failure detection and automatic protection switching are performed independently by each optical network unit that is located at the customer premises in a distributed manner. The restoration of traffic transported between the central office and an optical network unit in the event of the distribution fiber break is performed by interconnecting adjacent optical network units and carrying out signal transmissions via an independent but interconnected optical network unit. Such a protection mechanism enables multiple adjacent optical network units to be simultaneously protected by a single optical network unit utilizing its maximum available bandwidth. We experimentally verify the feasibility of both schemes with 1.25 Gb/s upstream baseband transmission to the central office and 155 Mb/s local area network data transmission on a RF subcarrier frequency. The experimental results obtained from both schemes are compared, and the power budgets are calculated to analyze the scalability of each scheme.

  12. Ultrastructure and Composition of the Nannochloropsis gaditana Cell Wall

    PubMed Central

    Scholz, Matthew J.; Weiss, Taylor L.; Jinkerson, Robert E.; Jing, Jia; Roth, Robyn; Goodenough, Ursula; Posewitz, Matthew C.

    2014-01-01

    Marine algae of the genus Nannochloropsis are promising producers of biofuel precursors and nutraceuticals and are also harvested commercially for aquaculture feed. We have used quick-freeze, deep-etch electron microscopy, Fourier transform infrared spectroscopy, and carbohydrate analyses to characterize the architecture of the Nannochloropsis gaditana (strain CCMP 526) cell wall, whose recalcitrance presents a significant barrier to biocommodity extraction. The data indicate a bilayer structure consisting of a cellulosic inner wall (∼75% of the mass balance) protected by an outer hydrophobic algaenan layer. Cellulase treatment of walls purified after cell lysis generates highly enriched algaenan preparations without using the harsh chemical treatments typically used in algaenan isolation and characterization. Nannochloropsis algaenan was determined to comprise long, straight-chain, saturated aliphatics with ether cross-links, which closely resembles the cutan of vascular plants. Chemical identification of >85% of the isolated cell wall mass is detailed, and genome analysis is used to identify candidate biosynthetic enzymes. PMID:25239976

  13. Improvement of a Privacy Authentication Scheme Based on Cloud for Medical Environment.

    PubMed

    Chiou, Shin-Yan; Ying, Zhaoqin; Liu, Junqiang

    2016-04-01

    Medical systems allow patients to receive care at different hospitals. However, this entails considerable inconvenience through the need to transport patients and their medical records between hospitals. The development of Telecare Medicine Information Systems (TMIS) makes it easier for patients to seek medical treatment and to store and access medical records. However, medical data stored in TMIS is not encrypted, leaving patients' private data vulnerable to external leaks. In 2014, scholars proposed a new cloud-based medical information model and authentication scheme which would not only allow patients to remotely access medical services but also protects patient privacy. However, this scheme still fails to provide patient anonymity and message authentication. Furthermore, this scheme only stores patient medical data, without allowing patients to directly access medical advice. Therefore, we propose a new authentication scheme, which provides anonymity, unlinkability, and message authentication, and allows patients to directly and remotely consult with doctors. In addition, our proposed scheme is more efficient in terms of computation cost. The proposed system was implemented in Android system to demonstrate its workability.

  14. Unit 5, nonfederal wall, 536538 Vine Street Building, & St. ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    Unit 5, non-federal wall, 536-538 Vine Street Building, & St. Vincent-Depaul store building-context - Johnstown Local Flood Protection Project, Beginning on Conemaugh River approx 3.8 miles downstream from confluence of Little Conemaugh & Stony Creek Rivers at Johnstown, Johnstown, Cambria County, PA

  15. An improved anonymous authentication scheme for roaming in ubiquitous networks

    PubMed Central

    Lee, Hakjun; Lee, Donghoon; Moon, Jongho; Jung, Jaewook; Kang, Dongwoo; Kim, Hyoungshick

    2018-01-01

    With the evolution of communication technology and the exponential increase of mobile devices, the ubiquitous networking allows people to use our data and computing resources anytime and everywhere. However, numerous security concerns and complicated requirements arise as these ubiquitous networks are deployed throughout people’s lives. To meet the challenge, the user authentication schemes in ubiquitous networks should ensure the essential security properties for the preservation of the privacy with low computational cost. In 2017, Chaudhry et al. proposed a password-based authentication scheme for the roaming in ubiquitous networks to enhance the security. Unfortunately, we found that their scheme remains insecure in its protection of the user privacy. In this paper, we prove that Chaudhry et al.’s scheme is vulnerable to the stolen-mobile device and user impersonation attacks, and its drawbacks comprise the absence of the incorrect login-input detection, the incorrectness of the password change phase, and the absence of the revocation provision. Moreover, we suggest a possible way to fix the security flaw in Chaudhry et al’s scheme by using the biometric-based authentication for which the bio-hash is applied in the implementation of a three-factor authentication. We prove the security of the proposed scheme with the random oracle model and formally verify its security properties using a tool named ProVerif, and analyze it in terms of the computational and communication cost. The analysis result shows that the proposed scheme is suitable for resource-constrained ubiquitous environments. PMID:29505575

  16. Protection circuits for very high frequency ultrasound systems.

    PubMed

    Choi, Hojong; Shung, K Kirk

    2014-04-01

    The purpose of protection circuits in ultrasound applications is to block noise signals from the transmitter from reaching the transducer and also to prevent unwanted high voltage signals from reaching the receiver. The protection circuit using a resistor and diode pair is widely used due to its simple architecture, however, it may not be suitable for very high frequency (VHF) ultrasound transducer applications (>100 MHz) because of its limited bandwidth. Therefore, a protection circuit using MOSFET devices with unique structure is proposed in this paper. The performance of the designed protection circuit was compared with that of other traditional protection schemes. The performance characteristics measured were the insertion loss (IL), total harmonic distortion (THD) and transient response time (TRT). The new protection scheme offers the lowest IL (-1.0 dB), THD (-69.8 dB) and TRT (78 ns) at 120 MHz. The pulse-echo response using a 120 MHz LiNbO3 transducer with each protection circuit was measured to validate the feasibility of the protection circuits in VHF ultrasound applications. The sensitivity and bandwidth of the transducer using the new protection circuit improved by 252.1 and 50.9 %, respectively with respect to the protection circuit using a resistor and diode pair. These results demonstrated that the new protection circuit design minimizes the IL, THD and TRT for VHF ultrasound transducer applications.

  17. Protection Circuits for Very High Frequency Ultrasound Systems

    PubMed Central

    Shung, K. Kirk

    2014-01-01

    The purpose of protection circuits in ultrasound applications is to block noise signals from the transmitter from reaching the transducer and also to prevent unwanted high voltage signals from reaching the receiver. The protection circuit using a resistor and diode pair is widely used due to its simple architecture, however, it may not be suitable for very high frequency (VHF) ultrasound transducer applications (>100 MHz) because of its limited bandwidth. Therefore, a protection circuit using MOSFET devices with unique structure is proposed in this paper. The performance of the designed protection circuit was compared with that of other traditional protection schemes. The performance characteristics measured were the insertion loss (IL), total harmonic distortion (THD) and transient response time (TRT). The new protection scheme offers the lowest IL (−1.0 dB), THD (−69.8 dB) and TRT (78 ns) at 120 MHz. The pulse-echo response using a 120 MHz LiNbO3 transducer with each protection circuit was measured to validate the feasibility of the protection circuits in VHF ultrasound applications. The sensitivity and bandwidth of the transducer using the new protection circuit improved by 252.1 and 50.9 %, respectively with respect to the protection circuit using a resistor and diode pair. These results demonstrated that the new protection circuit design minimizes the IL, THD and TRT for VHF ultrasound transducer applications. PMID:24682684

  18. Investigation of the effect of a countywide protected learning time scheme on prescribing rates of ramipril: interrupted time series study.

    PubMed

    Siriwardena, A N; Fairchild, P; Gibson, S; Sach, T; Dewey, M

    2007-02-01

    Protected learning time (PLT) schemes have been set up in primary care across the UK. There is little published evidence of their effectiveness. To investigate the effect of a PLT intervention for general practice to increase prescribing of ramipril for prevention of cardiovascular outcomes. Quasi-experimental, interrupted time series. Lincolnshire, UK. Prescribing data were analysed one year before and after the education for change in rate of increase of prescribing of ramipril, whether change in prescribing was related to postulated explanatory variables and to determine intervention costs. The primary outcome was the rate of change of ramipril (10 mg) prescription items 12 months after compared with before the educational intervention. Secondary outcomes included cost. Ramipril prescribing at therapeutic dosage increased significantly (odds ratio 1.50, 95% CI 1.07-1.93) following education by 52,345 items (31,132 items at 10 mg) at a cost of pound 292k to pound 460k depending on formulation. This occurred despite a background of secular change. Most practices were represented by GPs, nurses or both during the education. Single-handed GPs were less likely to attend. Practices showed considerable variation in response to the educational intervention. The only predictor of whether practices increased in prescribing rate after the education was whether a practice nurse had undertaken specific diabetes training. Total list size, dispensing, training or single-handed status and GP attendance did not predict a change in prescribing. PLT schemes can contribute to beneficial changes in prescribing across a large geographical area.

  19. 7. TRANSFORMER BANK. NOTE CONCRETE BARRIER WALL FROM WWII ON ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    7. TRANSFORMER BANK. NOTE CONCRETE BARRIER WALL FROM WWII ON LEFT TO PROTECT TRANSFORMERS FROM JAPANESE BOMBS. - Gene Pump Plant, South of Gene Wash Reservoir, 2 miles west of Whitsett Pump Plant, Parker Dam, San Bernardino County, CA

  20. Electroless-plating technique for fabricating thin-wall convective heat-transfer models

    NASA Technical Reports Server (NTRS)

    Avery, D. E.; Ballard, G. K.; Wilson, M. L.

    1984-01-01

    A technique for fabricating uniform thin-wall metallic heat-transfer models and which simulates a Shuttle thermal protection system tile is described. Two 6- by 6- by 2.5-in. tiles were fabricated to obtain local heat transfer rates. The fabrication process is not limited to any particular geometry and results in a seamless thin-wall heat-transfer model which uses a one-wire thermocouple to obtain local cold-wall heat-transfer rates. The tile is relatively fragile because of the brittle nature of the material and the structural weakness of the flat-sided configuration; however, a method was developed and used for repairing a cracked tile.

  1. Wall characterization for through-the-wall radar applications

    NASA Astrophysics Data System (ADS)

    Greneker, Gene; Rausch, E. O.

    2008-04-01

    There has been continuing interest in the penetration of multilayer building materials, such as wood walls with air gaps and concrete hollow core block, using through-the-wall (TTW) radar systems. TTW operational techniques and signal propagation paths vary depending on how the TTW system is intended to be operated. For example, the operator of a TTW radar may be required to place the radar against the intervening wall of interest while collecting data. Other operational doctrines allow the radar to be operated in a stand-off mode from the wall. The stand-off distances can vary from feet to hundreds of feet, depending on the type of radar being used. When a signal is propagated through a multilayer wall with air gaps between the material and the wall construction uses materials of radically different dielectric constants, attenuation may not be the only effect that the probing signal experiences passing through the wall. This paper presents measurements of a hollow core concrete block wall and the measurement of a standard wall constructed of siding and wallboard. Both types of walls are typically found in most U.S. homes. These limited measurements demonstrate that the type of wall being penetrated by a wideband signal can modify the probing signal.

  2. A Near-Wall Reynolds-Stress Closure without Wall Normals

    NASA Technical Reports Server (NTRS)

    Yuan, S. P.; So, R. M. C.

    1997-01-01

    With the aid of near-wall asymptotic analysis and results of direct numerical simulation, a new near-wall Reynolds stress model (NNWRS) is formulated based on the SSG high-Reynolds-stress model with wall-independent near-wall corrections. Only one damping function is used for flows with a wide range of Reynolds numbers to ensure that the near-wall modifications diminish away from the walls. The model is able to reproduce complicated flow phenomena induced by complex geometry, such as flow recirculation, reattachment and boundary-layer redevelopment in backward-facing step flow and secondary flow in three-dimensional square duct flow. In simple flows, including fully developed channel/pipe flow, Couette flow and boundary-layer flow, the wall effects are dominant, and the NNWRS model predicts less degree of turbulent anisotropy in the near-wall region compared with a wall-dependent near-wall Reynolds Stress model (NWRS) developed by So and colleagues. The comparison of the predictions given by the two models rectifies the misconception that the overshooting of skin friction coefficient in backward-facing step flow prevalent in those near-wall, models with wall normal is caused by he use of wall normal.

  3. Development and Testing of Protection Scheme for Renewable-Rich Distribution System

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Brahma, Sukumar; Ranade, Satish; Elkhatib, Mohamed E.

    As the penetration of renewables increases in the distribution systems, and microgrids are conceived with high penetration of such generation that connects through inverters, fault location and protection of microgrids needs consideration. This report proposes averaged models that help simulate fault scenarios in renewable-rich microgrids, models for locating faults in such microgrids, and comments on the protection models that may be considered for microgrids. Simulation studies are reported to justify the models.

  4. Solutions of the benchmark problems by the dispersion-relation-preserving scheme

    NASA Technical Reports Server (NTRS)

    Tam, Christopher K. W.; Shen, H.; Kurbatskii, K. A.; Auriault, L.

    1995-01-01

    The 7-point stencil Dispersion-Relation-Preserving scheme of Tam and Webb is used to solve all the six categories of the CAA benchmark problems. The purpose is to show that the scheme is capable of solving linear, as well as nonlinear aeroacoustics problems accurately. Nonlinearities, inevitably, lead to the generation of spurious short wave length numerical waves. Often, these spurious waves would overwhelm the entire numerical solution. In this work, the spurious waves are removed by the addition of artificial selective damping terms to the discretized equations. Category 3 problems are for testing radiation and outflow boundary conditions. In solving these problems, the radiation and outflow boundary conditions of Tam and Webb are used. These conditions are derived from the asymptotic solutions of the linearized Euler equations. Category 4 problems involved solid walls. Here, the wall boundary conditions for high-order schemes of Tam and Dong are employed. These conditions require the use of one ghost value per boundary point per physical boundary condition. In the second problem of this category, the governing equations, when written in cylindrical coordinates, are singular along the axis of the radial coordinate. The proper boundary conditions at the axis are derived by applying the limiting process of r approaches 0 to the governing equations. The Category 5 problem deals with the numerical noise issue. In the present approach, the time-independent mean flow solution is computed first. Once the residual drops to the machine noise level, the incident sound wave is turned on gradually. The solution is marched in time until a time-periodic state is reached. No exact solution is known for the Category 6 problem. Because of this, the problem is formulated in two totally different ways, first as a scattering problem then as a direct simulation problem. There is good agreement between the two numerical solutions. This offers confidence in the computed results. Both

  5. A Hash Based Remote User Authentication and Authenticated Key Agreement Scheme for the Integrated EPR Information System.

    PubMed

    Li, Chun-Ta; Weng, Chi-Yao; Lee, Cheng-Chi; Wang, Chun-Cheng

    2015-11-01

    To protect patient privacy and ensure authorized access to remote medical services, many remote user authentication schemes for the integrated electronic patient record (EPR) information system have been proposed in the literature. In a recent paper, Das proposed a hash based remote user authentication scheme using passwords and smart cards for the integrated EPR information system, and claimed that the proposed scheme could resist various passive and active attacks. However, in this paper, we found that Das's authentication scheme is still vulnerable to modification and user duplication attacks. Thereafter we propose a secure and efficient authentication scheme for the integrated EPR information system based on lightweight hash function and bitwise exclusive-or (XOR) operations. The security proof and performance analysis show our new scheme is well-suited to adoption in remote medical healthcare services.

  6. 77 FR 15379 - Protecting Tenants at Foreclosure Act: Additional Guidance on Notification Responsibilities Under...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-15

    ... provided by PTFA sunset on December 31, 2014. Section 1484 of the Dodd-Frank Wall Street Reform and... protections to December 31, 2014. Section 1484 of the Dodd-Frank Wall Street Reform and Consumer Protection... completion and in acquiring title to and possession of the property. (Failure to foreclose and evict acquire...

  7. Implicit LES of Turbulent, Separated Flow: Wall-Mounted Hump Configuration

    NASA Technical Reports Server (NTRS)

    Sekhar, Susheel; Mansour, Nagi N.; Caubilla, David Higuera

    2015-01-01

    Direct simulations (ILES) of turbulent, separated flow over the wall-mounted hump configuration is conducted to investigate the physics of separated flows. A chord-based Reynolds number of Re(sub c) = 47,500 is set up, with a turbulent in flow of Re(sub theta) = 1,400 (theta/c = 3%). FDL3DI, a code that solves the compressible Navier-Stokes equations using high- order compact-difference scheme and filter, with the standard recycling/rescaling method of turbulence generation, is used. Two different configurations of the upper-wall are analyzed, and results are compared with both a higher Re(sub c) (= 936,000, Re(sub theta) = 7,200, theta/c = 0.77%) experiment for major flow features, and RANS (k-omega SST) results. A lower Rec allows for DNS-like mesh resolution, and an adequately wide span. Both ILES and RANS show delayed reattachment compared to experiment, and significantly higher skin friction in the forebody of the hump, as expected. The upper-wall shape influences the C(sub p) distribution only. Results from this study are being used to setup higher Rec (lower theta/c) ILES.

  8. Consolidating the social health insurance schemes in China: towards an equitable and efficient health system.

    PubMed

    Meng, Qingyue; Fang, Hai; Liu, Xiaoyun; Yuan, Beibei; Xu, Jin

    2015-10-10

    Fragmentation in social health insurance schemes is an important factor for inequitable access to health care and financial protection for people covered by different health insurance schemes in China. To fulfil its commitment of universal health coverage by 2020, the Chinese Government needs to prioritise addressing this issue. After analysing the situation of fragmentation, this Review summarises efforts to consolidate health insurance schemes both in China and internationally. Rural migrants, elderly people, and those with non-communicable diseases in China will greatly benefit from consolidation of the existing health insurance schemes with extended funding pools, thereby narrowing the disparities among health insurance schemes in fund level and benefit package. Political commitments, institutional innovations, and a feasible implementation plan are the major elements needed for success in consolidation. Achievement of universal health coverage in China needs systemic strategies including consolidation of the social health insurance schemes. Copyright © 2015 Elsevier Ltd. All rights reserved.

  9. Cell wall of pathogenic yeasts and implications for antimycotic therapy.

    PubMed

    Cassone, A

    1986-01-01

    Yeast cell wall is a complex, multilayered structure where amorphous, granular and fibrillar components interact with each other to confer both the specific cell shape and osmotic protection against lysis. Thus it is widely recognized that as is the case with bacteria, yeast cell wall is a major potential target for selective chemotherapeutic drugs. Despite intensive research, very few such drugs have been discovered and none has found substantial application in human diseases to date. Among the different cell wall components, beta-glucan and chitin are the fibrillar materials playing a fundamental role in the overall rigidity and resistance of the wall. Inhibition of the metabolism of these polymers, therefore, should promptly lead to lysis. This indeed occurs and aculeacin, echinocandin and polyoxins are examples of agents producing such an action. Particular attention should be focused on chitin synthesis. Although quantitatively a minor cell wall component, chitin is important in the mechanism of dimorphic transition, especially in Candida albicans, a major human opportunistic pathogen. This transition is associated with increased invasiveness and general virulence of the fungus. Yeast cell wall may also limit the effect of antifungals which owe their action to disturbance of the cytoplasmic membrane or of cell metabolism. Indeed, the cell wall may hinder access to the cell interior both under growing conditions and, particularly, during cell ageing in the stationary phase, when important structural changes occur in the cell wall due to unbalanced wall growth (phenotypic drug resistance).

  10. A unified EM approach to bladder wall segmentation with coupled level-set constraints

    PubMed Central

    Han, Hao; Li, Lihong; Duan, Chaijie; Zhang, Hao; Zhao, Yang; Liang, Zhengrong

    2013-01-01

    Magnetic resonance (MR) imaging-based virtual cystoscopy (VCys), as a non-invasive, safe and cost-effective technique, has shown its promising virtue for early diagnosis and recurrence management of bladder carcinoma. One primary goal of VCys is to identify bladder lesions with abnormal bladder wall thickness, and consequently a precise segmentation of the inner and outer borders of the wall is required. In this paper, we propose a unified expectation-maximization (EM) approach to the maximum-a-posteriori (MAP) solution of bladder wall segmentation, by integrating a novel adaptive Markov random field (AMRF) model and the coupled level-set (CLS) information into the prior term. The proposed approach is applied to the segmentation of T1-weighted MR images, where the wall is enhanced while the urine and surrounding soft tissues are suppressed. By introducing scale-adaptive neighborhoods as well as adaptive weights into the conventional MRF model, the AMRF model takes into account the local information more accurately. In order to mitigate the influence of image artifacts adjacent to the bladder wall and to preserve the continuity of the wall surface, we apply geometrical constraints on the wall using our previously developed CLS method. This paper not only evaluates the robustness of the presented approach against the known ground truth of simulated digital phantoms, but further compares its performance with our previous CLS approach via both volunteer and patient studies. Statistical analysis on experts’ scores of the segmented borders from both approaches demonstrates that our new scheme is more effective in extracting the bladder wall. Based on the wall thickness calibrated from the segmented single-layer borders, a three-dimensional virtual bladder model can be constructed and the wall thickness can be mapped on to the model, where the bladder lesions will be eventually detected via experts’ visualization and/or computer-aided detection. PMID:24001932

  11. The stability of steady motion of magnetic domain wall: Role of higher-order spin-orbit torques

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    He, Peng-Bin, E-mail: hepengbin@hnu.edu.cn; Yan, Han; Cai, Meng-Qiu

    The steady motion of magnetic domain wall driven by spin-orbit torques is investigated analytically in the heavy/ferromagnetic metal nanowires for three cases with a current transverse to the in-plane and perpendicular easy axis, and along the in-plane easy axis. By the stability analysis of Walker wall profile, we find that if including the higher-order spin-orbit torques, the Walker breakdown can be avoided in some parameter regions of spin-orbit torques with a current transverse to or along the in-plane easy axis. However, in the case of perpendicular anisotropy, even considering the higher-order spin-orbit torques, the velocity of domain wall cannot bemore » efficiently enhanced by the current. Furthermore, the direction of wall motion is dependent on the configuration and chirality of domain wall with a current along the in-plane easy axis or transverse to the perpendicular one. Especially, the direction of motion can be controlled by the initial chirality of domain wall. So, if only involving the spin-orbit mechanism, it is preferable to adopt the scheme of a current along the in-plane easy axis for enhancing the velocity and controlling the direction of domain wall.« less

  12. Secure biometric image sensor and authentication scheme based on compressed sensing.

    PubMed

    Suzuki, Hiroyuki; Suzuki, Masamichi; Urabe, Takuya; Obi, Takashi; Yamaguchi, Masahiro; Ohyama, Nagaaki

    2013-11-20

    It is important to ensure the security of biometric authentication information, because its leakage causes serious risks, such as replay attacks using the stolen biometric data, and also because it is almost impossible to replace raw biometric information. In this paper, we propose a secure biometric authentication scheme that protects such information by employing an optical data ciphering technique based on compressed sensing. The proposed scheme is based on two-factor authentication, the biometric information being supplemented by secret information that is used as a random seed for a cipher key. In this scheme, a biometric image is optically encrypted at the time of image capture, and a pair of restored biometric images for enrollment and verification are verified in the authentication server. If any of the biometric information is exposed to risk, it can be reenrolled by changing the secret information. Through numerical experiments, we confirm that finger vein images can be restored from the compressed sensing measurement data. We also present results that verify the accuracy of the scheme.

  13. Content-independent embedding scheme for multi-modal medical image watermarking.

    PubMed

    Nyeem, Hussain; Boles, Wageeh; Boyd, Colin

    2015-02-04

    As the increasing adoption of information technology continues to offer better distant medical services, the distribution of, and remote access to digital medical images over public networks continues to grow significantly. Such use of medical images raises serious concerns for their continuous security protection, which digital watermarking has shown great potential to address. We present a content-independent embedding scheme for medical image watermarking. We observe that the perceptual content of medical images varies widely with their modalities. Recent medical image watermarking schemes are image-content dependent and thus they may suffer from inconsistent embedding capacity and visual artefacts. To attain the image content-independent embedding property, we generalise RONI (region of non-interest, to the medical professionals) selection process and use it for embedding by utilising RONI's least significant bit-planes. The proposed scheme thus avoids the need for RONI segmentation that incurs capacity and computational overheads. Our experimental results demonstrate that the proposed embedding scheme performs consistently over a dataset of 370 medical images including their 7 different modalities. Experimental results also verify how the state-of-the-art reversible schemes can have an inconsistent performance for different modalities of medical images. Our scheme has MSSIM (Mean Structural SIMilarity) larger than 0.999 with a deterministically adaptable embedding capacity. Our proposed image-content independent embedding scheme is modality-wise consistent, and maintains a good image quality of RONI while keeping all other pixels in the image untouched. Thus, with an appropriate watermarking framework (i.e., with the considerations of watermark generation, embedding and detection functions), our proposed scheme can be viable for the multi-modality medical image applications and distant medical services such as teleradiology and eHealth.

  14. Animating Wall-Bounded Turbulent Smoke via Filament-Mesh Particle-Particle Method.

    PubMed

    Liao, Xiangyun; Si, Weixin; Yuan, Zhiyong; Sun, Hanqiu; Qin, Jing; Wang, Qiong; Heng, Pheng-Ann; Xiangyun Liao; Weixin Si; Zhiyong Yuan; Hanqiu Sun; Jing Qin; Qiong Wang; Pheng-Ann Heng

    2018-03-01

    Turbulent vortices in smoke flows are crucial for a visually interesting appearance. Unfortunately, it is challenging to efficiently simulate these appealing effects in the framework of vortex filament methods. The vortex filaments in grids scheme allows to efficiently generate turbulent smoke with macroscopic vortical structures, but suffers from the projection-related dissipation, and thus the small-scale vortical structures under grid resolution are hard to capture. In addition, this scheme cannot be applied in wall-bounded turbulent smoke simulation, which requires efficiently handling smoke-obstacle interaction and creating vorticity at the obstacle boundary. To tackle above issues, we propose an effective filament-mesh particle-particle (FMPP) method for fast wall-bounded turbulent smoke simulation with ample details. The Filament-Mesh component approximates the smooth long-range interactions by splatting vortex filaments on grid, solving the Poisson problem with a fast solver, and then interpolating back to smoke particles. The Particle-Particle component introduces smoothed particle hydrodynamics (SPH) turbulence model for particles in the same grid, where interactions between particles cannot be properly captured under grid resolution. Then, we sample the surface of obstacles with boundary particles, allowing the interaction between smoke and obstacle being treated as pressure forces in SPH. Besides, the vortex formation region is defined at the back of obstacles, providing smoke particles flowing by the separation particles with a vorticity force to simulate the subsequent vortex shedding phenomenon. The proposed approach can synthesize the lost small-scale vortical structures and also achieve the smoke-obstacle interaction with vortex shedding at obstacle boundaries in a lightweight manner. The experimental results demonstrate that our FMPP method can achieve more appealing visual effects than vortex filaments in grids scheme by efficiently simulating

  15. An enhanced biometric authentication scheme for telecare medicine information systems with nonce using chaotic hash function.

    PubMed

    Das, Ashok Kumar; Goswami, Adrijit

    2014-06-01

    Recently, Awasthi and Srivastava proposed a novel biometric remote user authentication scheme for the telecare medicine information system (TMIS) with nonce. Their scheme is very efficient as it is based on efficient chaotic one-way hash function and bitwise XOR operations. In this paper, we first analyze Awasthi-Srivastava's scheme and then show that their scheme has several drawbacks: (1) incorrect password change phase, (2) fails to preserve user anonymity property, (3) fails to establish a secret session key beween a legal user and the server, (4) fails to protect strong replay attack, and (5) lacks rigorous formal security analysis. We then a propose a novel and secure biometric-based remote user authentication scheme in order to withstand the security flaw found in Awasthi-Srivastava's scheme and enhance the features required for an idle user authentication scheme. Through the rigorous informal and formal security analysis, we show that our scheme is secure against possible known attacks. In addition, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool and show that our scheme is secure against passive and active attacks, including the replay and man-in-the-middle attacks. Our scheme is also efficient as compared to Awasthi-Srivastava's scheme.

  16. Pricing schemes for new drugs: a welfare analysis.

    PubMed

    Levaggi, Rosella

    2014-02-01

    Drug price regulation is acquiring increasing significance in the investment choices of the pharmaceutical sector. The overall objective is to determine an optimal trade-off between the incentives for innovation, consumer protection, and value for money. However, price regulation is itself a source of distortion. In this study, we examine the welfare properties of listing through a bargaining process and value-based pricing schemes. The latter are superior instruments to uncertain listing processes for maximising total welfare, but the distribution of the benefits between consumers and the industry depends on rate of rebate chosen by the regulator. However, through an appropriate choice, it is always possible to define a value-based pricing scheme with risk sharing, which both consumers and the industry prefer to an uncertain bargaining process. Copyright © 2013 Elsevier Ltd. All rights reserved.

  17. An Enhanced Three-Factor User Authentication Scheme Using Elliptic Curve Cryptosystem for Wireless Sensor Networks.

    PubMed

    Wang, Chenyu; Xu, Guoai; Sun, Jing

    2017-12-19

    As an essential part of Internet of Things (IoT), wireless sensor networks (WSNs) have touched every aspect of our lives, such as health monitoring, environmental monitoring and traffic monitoring. However, due to its openness, wireless sensor networks are vulnerable to various security threats. User authentication, as the first fundamental step to protect systems from various attacks, has attracted much attention. Numerous user authentication protocols armed with formal proof are springing up. Recently, two biometric-based schemes were proposed with confidence to be resistant to the known attacks including offline dictionary attack, impersonation attack and so on. However, after a scrutinization of these two schemes, we found them not secure enough as claimed, and then demonstrated that these schemes suffer from various attacks, such as offline dictionary attack, impersonation attack, no user anonymity, no forward secrecy, etc. Furthermore, we proposed an enhanced scheme to overcome the identified weaknesses, and proved its security via Burrows-Abadi-Needham (BAN) logic and the heuristic analysis. Finally, we compared our scheme with other related schemes, and the results showed the superiority of our scheme.

  18. An Enhanced Three-Factor User Authentication Scheme Using Elliptic Curve Cryptosystem for Wireless Sensor Networks

    PubMed Central

    Xu, Guoai; Sun, Jing

    2017-01-01

    As an essential part of Internet of Things (IoT), wireless sensor networks (WSNs) have touched every aspect of our lives, such as health monitoring, environmental monitoring and traffic monitoring. However, due to its openness, wireless sensor networks are vulnerable to various security threats. User authentication, as the first fundamental step to protect systems from various attacks, has attracted much attention. Numerous user authentication protocols armed with formal proof are springing up. Recently, two biometric-based schemes were proposed with confidence to be resistant to the known attacks including offline dictionary attack, impersonation attack and so on. However, after a scrutinization of these two schemes, we found them not secure enough as claimed, and then demonstrated that these schemes suffer from various attacks, such as offline dictionary attack, impersonation attack, no user anonymity, no forward secrecy, etc. Furthermore, we proposed an enhanced scheme to overcome the identified weaknesses, and proved its security via Burrows–Abadi–Needham (BAN) logic and the heuristic analysis. Finally, we compared our scheme with other related schemes, and the results showed the superiority of our scheme. PMID:29257066

  19. Wall-layer model for LES with massive separation

    NASA Astrophysics Data System (ADS)

    Fakhari, Ahmad; Armenio, Vincenzo; Roman, Federico

    2016-11-01

    Currently, Wall Functions (WF) work well under specific conditions, mostly exhibit drawbacks specially in flows with separation beyond curvatures. In this work, we propose a more general WF which works well in attached and detached flows, in presence and absence of Immersed Boundaries (IB). First we modified an equilibrium stress WF for boundary-fitted geometry making dynamic the computation of the k (von Karman constant) of the log-law; the model was first applied to a periodic open channel flow, and then to the flow over a 2D single hill using uniform coarse grids; the model captured separation with reasonable accuracy. Thereafter IB Method by Roman et al. was improved to avoid momentum loss at the interface between the fluid-solid regions. This required calibration of interfacial eddy viscosity; also a random stochastic forcing was used in wall-normal direction to increase Reynolds stresses and improve mean velocity profile. Finally, to reproduce flow separation, a simplified boundary layer equation was applied to construct velocity at near wall computational nodes. The new scheme was tested on the 2D single hill and periodic hills applying Cartesian and curvilinear grids; good agreement with references was obtained with reduction in cost and complexity. Financial support from project COSMO "CFD open source per opera morta" PAR FSC 2007-2013, Friuli Venezia Giulia.

  20. Improving Nutrient Release of Wall-disruption Bee Pollen with a Combination of Ultrasonication and High Shear Technique.

    PubMed

    Wu, Wei; Wang, Kai; Qiao, Jiangtao; Dong, Jie; Li, Zhanping; Zhang, Hongcheng

    2018-06-22

    Bee pollen, collected by honey bees, contains a substantial amount of nutrients and has a high nutritive value. However, a high level of nutrients can be difficult to be digested and absorbed due to the complex wall of bee pollen. We observed that amino acids were mostly distributed inside cell wall of lotus bee pollen, rape bee pollen, apricot bee pollen, wuweizi bee pollen and camellia bee pollen, using time-of-flight secondary ion mass spectrometry (TOF-SIMS). Thus, five species of bee pollen were wall-disrupted with a combination of ultrasonication and high shear technique (US-HS). After the treatment, bee pollen walls were entirely broken into fragments, and a high number of nutrients were released. The contents of amino acids, fatty acids, protein, crude fat, reducing sugar, β-carotene, calcium, iron, zinc, selenium obviously increased after wall-disruption. Overall, our study demonstrates that US-HS can disrupt bee pollen wall to release nutrients. Therefore, further studies are being conducted to compare the digestibility and absorptivity of pollen nutrients before and after wall-disruption. Additionally, TOF-SIMS seems to be a reliable mapping technique for determining the distribution of food ingredients. This article is protected by copyright. All rights reserved. This article is protected by copyright. All rights reserved.

  1. An Improvement to a Multi-Client Searchable Encryption Scheme for Boolean Queries.

    PubMed

    Jiang, Han; Li, Xue; Xu, Qiuliang

    2016-12-01

    The migration of e-health systems to the cloud computing brings huge benefits, as same as some security risks. Searchable Encryption(SE) is a cryptography encryption scheme that can protect the confidentiality of data and utilize the encrypted data at the same time. The SE scheme proposed by Cash et al. in Crypto2013 and its follow-up work in CCS2013 are most practical SE Scheme that support Boolean queries at present. In their scheme, the data user has to generate the search tokens by the counter number one by one and interact with server repeatedly, until he meets the correct one, or goes through plenty of tokens to illustrate that there is no search result. In this paper, we make an improvement to their scheme. We allow server to send back some information and help the user to generate exact search token in the search phase. In our scheme, there are only two round interaction between server and user, and the search token has [Formula: see text] elements, where n is the keywords number in query expression, and [Formula: see text] is the minimum documents number that contains one of keyword in query expression, and the computation cost of server is [Formula: see text] modular exponentiation operation.

  2. Computer-controlled wall servicing robot

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lefkowitz, S.

    1995-03-01

    After four years of cooperative research, Pentek has unveiled a new robot with the capability to automatically deliver a variety of cleaning, painting, inspection, and surveillance devices to large vertical surfaces. The completely computer-controlled robot can position a working tool on a 50-foot tall by 50-foot wide vertical surface with a repeatability of 1/16 inch. The working end can literally {open_quotes}fly{close_quotes} across the face of a wall at speed of 60 per minute, and can handle working loads of 350 pounds. The robot was originally developed to decontaminate the walls of reactor fueling cavities at commercial nuclear power plants duringmore » fuel outages. If these cavities are left to dry after reactor refueling, contamination present in the residue could later become airborne and move throughout the containment building. Decontaminating the cavity during the refueling outage reduces the need for restrictive personal protective equipment during plant operations to limit the dose rates.« less

  3. An enhanced biometric-based authentication scheme for telecare medicine information systems using elliptic curve cryptosystem.

    PubMed

    Lu, Yanrong; Li, Lixiang; Peng, Haipeng; Yang, Yixian

    2015-03-01

    The telecare medical information systems (TMISs) enable patients to conveniently enjoy telecare services at home. The protection of patient's privacy is a key issue due to the openness of communication environment. Authentication as a typical approach is adopted to guarantee confidential and authorized interaction between the patient and remote server. In order to achieve the goals, numerous remote authentication schemes based on cryptography have been presented. Recently, Arshad et al. (J Med Syst 38(12): 2014) presented a secure and efficient three-factor authenticated key exchange scheme to remedy the weaknesses of Tan et al.'s scheme (J Med Syst 38(3): 2014). In this paper, we found that once a successful off-line password attack that results in an adversary could impersonate any user of the system in Arshad et al.'s scheme. In order to thwart these security attacks, an enhanced biometric and smart card based remote authentication scheme for TMISs is proposed. In addition, the BAN logic is applied to demonstrate the completeness of the enhanced scheme. Security and performance analyses show that our enhanced scheme satisfies more security properties and less computational cost compared with previously proposed schemes.

  4. 75 FR 66385 - Protecting Tenants at Foreclosure Act: Guidance on Notification Responsibilities Under the Act...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-28

    ... of the Dodd-Frank Wall Street Reform and Consumer Protection Act (Pub. L. 111-203, approved July 21...-Frank Wall Street Reform and Consumer Protection Act also defined when ``date of notice of foreclosure... possession of the property. (Failure to foreclose and evict in accordance with this reasonable diligence time...

  5. Optimal Design of Sheet Pile Wall Embedded in Clay

    NASA Astrophysics Data System (ADS)

    Das, Manas Ranjan; Das, Sarat Kumar

    2015-09-01

    Sheet pile wall is a type of flexible earth retaining structure used in waterfront offshore structures, river protection work and temporary supports in foundations and excavations. Economy is an essential part of a good engineering design and needs to be considered explicitly in obtaining an optimum section. By considering appropriate embedment depth and sheet pile section it may be possible to achieve better economy. This paper describes optimum design of both cantilever and anchored sheet pile wall penetrating clay using a simple optimization tool Microsoft Excel ® Solver. The detail methodology and its application with examples are presented for cantilever and anchored sheet piles. The effects of soil properties, depth of penetration and variation of ground water table on the optimum design are also discussed. Such a study will help professional while designing the sheet pile wall penetrating clay.

  6. Protective measurement of the wave function of a single squeezed harmonic-oscillator state

    NASA Astrophysics Data System (ADS)

    Alter, Orly; Yamamoto, Yoshihisa

    1996-05-01

    A scheme for the "protective measurement"

    [Phys. Rev. A 47, 4616 (1993)]
    of the wave function of a squeezed harmonic-oscillator state is described. This protective measurement is shown to be equivalent to a measurement of an ensemble of states. The protective measurement, therefore, allows for a definition of the quantum wave function on a single system. Yet, this equivalency also suggests that both measurement schemes account for the epistemological meaning of the wave function only. The protective measurement requires a full a priori knowledge of the measured state. The intermediate cases, in which only partial a priori information is given, are also discussed.

  7. Analytical Approaches for Identification and Representation of Critical Protection Systems in Transient Stability Studies

    NASA Astrophysics Data System (ADS)

    Hedman, Mojdeh Khorsand

    After a major disturbance, the power system response is highly dependent on protection schemes and system dynamics. Improving power systems situational awareness requires proper and simultaneous modeling of both protection schemes and dynamic characteristics in power systems analysis tools. Historical information and ex-post analysis of blackouts reaffirm the critical role of protective devices in cascading events, thereby confirming the necessity to represent protective functions in transient stability studies. This dissertation is aimed at studying the importance of representing protective relays in power system dynamic studies. Although modeling all of the protective relays within transient stability studies may result in a better estimation of system behavior, representing, updating, and maintaining the protection system data becomes an insurmountable task. Inappropriate or outdated representation of the relays may result in incorrect assessment of the system behavior. This dissertation presents a systematic method to determine essential relays to be modeled in transient stability studies. The desired approach should identify protective relays that are critical for various operating conditions and contingencies. The results of the transient stability studies confirm that modeling only the identified critical protective relays is sufficient to capture system behavior for various operating conditions and precludes the need to model all of the protective relays. Moreover, this dissertation proposes a method that can be implemented to determine the appropriate location of out-of-step blocking relays. During unstable power swings, a generator or group of generators may accelerate or decelerate leading to voltage depression at the electrical center along with generator tripping. This voltage depression may cause protective relay mis-operation and unintentional separation of the system. In order to avoid unintentional islanding, the potentially mis-operating relays

  8. Dynamically protected cat-qubits: a new paradigm for universal quantum computation

    NASA Astrophysics Data System (ADS)

    Mirrahimi, Mazyar; Leghtas, Zaki; Albert, Victor V.; Touzard, Steven; Schoelkopf, Robert J.; Jiang, Liang; Devoret, Michel H.

    2014-04-01

    We present a new hardware-efficient paradigm for universal quantum computation which is based on encoding, protecting and manipulating quantum information in a quantum harmonic oscillator. This proposal exploits multi-photon driven dissipative processes to encode quantum information in logical bases composed of Schrödinger cat states. More precisely, we consider two schemes. In a first scheme, a two-photon driven dissipative process is used to stabilize a logical qubit basis of two-component Schrödinger cat states. While such a scheme ensures a protection of the logical qubit against the photon dephasing errors, the prominent error channel of single-photon loss induces bit-flip type errors that cannot be corrected. Therefore, we consider a second scheme based on a four-photon driven dissipative process which leads to the choice of four-component Schrödinger cat states as the logical qubit. Such a logical qubit can be protected against single-photon loss by continuous photon number parity measurements. Next, applying some specific Hamiltonians, we provide a set of universal quantum gates on the encoded qubits of each of the two schemes. In particular, we illustrate how these operations can be rendered fault-tolerant with respect to various decoherence channels of participating quantum systems. Finally, we also propose experimental schemes based on quantum superconducting circuits and inspired by methods used in Josephson parametric amplification, which should allow one to achieve these driven dissipative processes along with the Hamiltonians ensuring the universal operations in an efficient manner.

  9. Modification of near-wall coherent structures in polymer drag reduced flow: simulation

    NASA Astrophysics Data System (ADS)

    Dubief, Yves; White, Christopher; Shaqfeh, Eric; Moin, Parviz; Lele, Sanjiva

    2002-11-01

    Polymer drag reduced flows are investigated through direct numerical simulations of viscoelastic flows. The solver for the viscoelastic model (FENE-P) is based on higher-order finite difference schemes and a novel implicit time integration method. Its robustness allows the simulation of all drag reduction (DR) regimes from the onset to the maximum drag reduction (MDR). It also permits the use of realistic polymer length and concentration. The maximum polymer extension in our simulation matches that of a polystyrene molecule of 10^6 molecular weight. Two distinct regimes of polymer drag reduced flows are observed: at low drag reduction (LDR, DR< 40-50%), the near-wall structure is essentially similar to Newtonian wall turbulence whereas the high drag reduction regime (HDR, DR from 40-50% to MDR) shows significant differences in the organization of the coherent structures. The 3D information provided by numerical simulations allows the determination of the interaction of polymers and near-wall coherent structures. To isolate the contribution of polymers in the viscous sublayer, the buffer and the outer region of the flow, numerical experiments are performed where the polymer concentration is varied in the wall-normal direction. Finally a mechanism of polymer drag reduction derived from our results and PIV measurements is discussed.

  10. The Impact of Microphysical Schemes on Intensity and Track of Hurricane

    NASA Technical Reports Server (NTRS)

    Tao, W. K.; Shi, J. J.; Chen, S. S.; Lang, S.; Lin, P.; Hong, S. Y.; Peters-Lidard, C.; Hou, A.

    2010-01-01

    During the past decade, both research and operational numerical weather prediction models [e.g. Weather Research and Forecasting Model (WRF)] have started using more complex microphysical schemes originally developed for high-resolution cloud resolving models (CRMs) with a 1-2 km or less horizontal resolutions. The WRF is a next-generation meso-scale forecast model and assimilation system that has incorporated a modern software framework, advanced dynamics, numeric and data assimilation techniques, a multiple moveable nesting capability, and improved physical packages. The WRF model can be used for a wide range of applications, from idealized research to operational forecasting, with an emphasis on horizontal grid sizes in the range of 1-10 km. The current WRF includes several different microphysics options. At Goddard, four different cloud microphysics schemes (warm rain only, two-class of ice, two three-class of ice with either graupel or hail) are implemented into the WRF. The performances of these schemes have been compared to those from other WRF microphysics scheme options for an Atlantic hurricane case. In addition, a brief review and comparison on the previous modeling studies on the impact of microphysics schemes and microphysical processes on intensity and track of hurricane will be presented. Generally, almost all modeling studies found that the microphysics schemes did not have major impacts on track forecast, but did have more effect on the intensity. All modeling studies found that the simulated hurricane has rapid deepening and/or intensification for the warm rain-only case. It is because all hydrometeors were very large raindrops, and they fell out quickly at and near the eye-wall region. This would hydrostatically produce the lowest pressure. In addition, these modeling studies suggested that the simulated hurricane becomes unrealistically strong by removing the evaporative cooling of cloud droplets and melting of ice particles. This is due to the

  11. 76 FR 4489 - Disclosure for Asset-Backed Securities Required by Section 943 of the Dodd-Frank Wall Street...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-26

    ... Dodd-Frank Wall Street Reform and Consumer Protection Act AGENCY: Securities and Exchange Commission... Reform and Consumer Protection Act (the ``Act'') related to asset-backed securities (``ABS'').\\11... securities. The Act broadened the mission of the MSRB to include the protection of state and local...

  12. Wing walls for enhancing the seismic performance of reinforced concrete frame structures

    NASA Astrophysics Data System (ADS)

    Yang, Weisong; Guo, Xun; Xu, Weixiao; Yuan, Xin

    2016-06-01

    A building retrofitted with wing walls in the bottom story, which was damaged during the 2008 M8.0 Wenchuan earthquake in China, is introduced and a corresponding 1/4 scale wing wall-frame model was subjected to shake table motions to study the seismic behavior of this retrofitted structural system. The results show that wing walls can effectively protect columns from damage by moving areas that bear reciprocating tension and compression to the sections of the wing walls, thus achieving an extra measure of seismic fortification. A `strong column-weak beam' mechanism was realized, the flexural rigidity of the vertical member was strengthened, and a more uniform distribution of deformation among all the stories was measured. In addition, the joint between the wing walls and the beams suffered severe damage during the tests, due to an area of local stress concentration. A longer area of intensive stirrup is suggested in the end of the beams.

  13. Unit 4, STA. 31+ 00+ lb, sideslope with concrete walls ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    Unit 4, STA. 31+ 00+ lb, sideslope with concrete walls (without parapets), Cambria Iron Company National Historic Landmark-detail - Johnstown Local Flood Protection Project, Beginning on Conemaugh River approx 3.8 miles downstream from confluence of Little Conemaugh & Stony Creek Rivers at Johnstown, Johnstown, Cambria County, PA

  14. Personal Radiation Protection System

    NASA Technical Reports Server (NTRS)

    McDonald, Mark; Vinci, Victoria

    2004-01-01

    A report describes the personal radiation protection system (PRPS), which has been invented for use on the International Space Station and other spacecraft. The PRPS comprises walls that can be erected inside spacecraft, where and when needed, to reduce the amount of radiation to which personnel are exposed. The basic structural modules of the PRPS are pairs of 1-in. (2.54-cm)-thick plates of high-density polyethylene equipped with fasteners. The plates of each module are assembled with a lap joint. The modules are denoted bricks because they are designed to be stacked with overlaps, in a manner reminiscent of bricks, to build 2-in. (5.08-cm)-thick walls of various lengths and widths. The bricks are of two varieties: one for flat wall areas and one for corners. The corner bricks are specialized adaptations of the flat-area bricks that make it possible to join walls perpendicular to each other. Bricks are attached to spacecraft structures and to each other by use of straps that can be tightened to increase the strengths and stiffnesses of joints.

  15. Protection of lithographic components from particle contamination

    DOEpatents

    Klebanoff, Leonard E.; Rader, Daniel J.

    2000-01-01

    A system that employs thermophoresis to protect lithographic surfaces from particle deposition and operates in an environment where the pressure is substantially constant and can be sub-atmospheric. The system (thermophoretic pellicle) comprises an enclosure that surrounds a lithographic component whose surface is being protected from particle deposition. The enclosure is provided with means for introducing a flow of gas into the chamber and at least one aperture that provides for access to the lithographic surface for the entry and exit of a beam of radiation, for example, and further controls gas flow into a surrounding low pressure environment such that a higher pressure is maintained within the enclosure and over the surface being protected. The lithographic component can be heated or, alternatively the walls of the enclosure can be cooled to establish a temperature gradient between the surface of the lithographic component and the walls of the enclosure, thereby enabling the thermophoretic force that resists particle deposition.

  16. Research Advances on Fabricated Shear Wall System

    NASA Astrophysics Data System (ADS)

    Liu, Xudong; Wang, Donghui; Wang, Sheng; Zhai, Yu

    2018-03-01

    With the rapid development of the construction industry, building energy consumption has been increasing, has become a problem that can not be ignored. It is imperative to develop energy-saving buildings. A new type of prefabricated shear wall is assembled and partially assembled by prefabricated parts, and some concrete is spliced together. The new structure has good integrity, seismic resistance and excellent energy saving and environmental protection performance. It reduces building energy consumption to a great extent. Therefore, the design method, manufacturing process, site assembly process and key technical problems of the system are discussed. For the construction industry gradually entered the energy conservation, environmental protection, safety and durability of sustainable development laid the foundation.

  17. Wide-area measurement system-based supervision of protection schemes with minimum number of phasor measurement units.

    PubMed

    Gajare, Swaroop; Rao, J Ganeswara; Naidu, O D; Pradhan, Ashok Kumar

    2017-08-13

    Cascade tripping of power lines triggered by maloperation of zone-3 relays during stressed system conditions, such as load encroachment, power swing and voltage instability, has led to many catastrophic power failures worldwide, including Indian blackouts in 2012. With the introduction of wide-area measurement systems (WAMS) into the grids, real-time monitoring of transmission network condition is possible. A phasor measurement unit (PMU) sends time-synchronized data to a phasor data concentrator, which can provide a control signal to substation devices. The latency associated with the communication system makes WAMS suitable for a slower form of protection. In this work, a method to identify the faulted line using synchronized data from strategic PMU locations is proposed. Subsequently, a supervisory signal is generated for specific relays in the system for any disturbance or stressed condition. For a given system, an approach to decide the strategic locations for PMU placement is developed, which can be used for determining the minimum number of PMUs required for application of the method. The accuracy of the scheme is tested for faults during normal and stressed conditions in a New England 39-bus system simulated using EMTDC/PSCAD software. With such a strategy, maloperation of relays can be averted in many situations and thereby blackouts/large-scale disturbances can be prevented.This article is part of the themed issue 'Energy management: flexibility, risk and optimization'. © 2017 The Author(s).

  18. The Impact of Microphysical Schemes on Hurricane Intensity and Track

    NASA Technical Reports Server (NTRS)

    Tao, Wei-Kuo; Shi, Jainn Jong; Chen, Shuyi S.; Lang, Stephen; Lin, Pay-Liam; Hong, Song-You; Peters-Lidard, Christa; Hou, Arthur

    2011-01-01

    During the past decade, both research and operational numerical weather prediction models [e.g. the Weather Research and Forecasting Model (WRF)] have started using more complex microphysical schemes originally developed for high-resolution cloud resolving models (CRMs) with 1-2 km or less horizontal resolutions. WRF is a next-generation meso-scale forecast model and assimilation system. It incorporates a modern software framework, advanced dynamics, numerics and data assimilation techniques, a multiple moveable nesting capability, and improved physical packages. WRF can be used for a wide range of applications, from idealized research to operational forecasting, with an emphasis on horizontal grid sizes in the range of 1-10 km. The current WRF includes several different microphysics options. At NASA Goddard, four different cloud microphysics options have been implemented into WRF. The performance of these schemes is compared to those of the other microphysics schemes available in WRF for an Atlantic hurricane case (Katrina). In addition, a brief review of previous modeling studies on the impact of microphysics schemes and processes on the intensity and track of hurricanes is presented and compared against the current Katrina study. In general, all of the studies show that microphysics schemes do not have a major impact on track forecasts but do have more of an effect on the simulated intensity. Also, nearly all of the previous studies found that simulated hurricanes had the strongest deepening or intensification when using only warm rain physics. This is because all of the simulated precipitating hydrometeors are large raindrops that quickly fall out near the eye-wall region, which would hydrostatically produce the lowest pressure. In addition, these studies suggested that intensities become unrealistically strong when evaporative cooling from cloud droplets and melting from ice particles are removed as this results in much weaker downdrafts in the simulated

  19. StegoWall: blind statistical detection of hidden data

    NASA Astrophysics Data System (ADS)

    Voloshynovskiy, Sviatoslav V.; Herrigel, Alexander; Rytsar, Yuri B.; Pun, Thierry

    2002-04-01

    Novel functional possibilities, provided by recent data hiding technologies, carry out the danger of uncontrolled (unauthorized) and unlimited information exchange that might be used by people with unfriendly interests. The multimedia industry as well as the research community recognize the urgent necessity for network security and copyright protection, or rather the lack of adequate law for digital multimedia protection. This paper advocates the need for detecting hidden data in digital and analog media as well as in electronic transmissions, and for attempting to identify the underlying hidden data. Solving this problem calls for the development of an architecture for blind stochastic hidden data detection in order to prevent unauthorized data exchange. The proposed architecture is called StegoWall; its key aspects are the solid investigation, the deep understanding, and the prediction of possible tendencies in the development of advanced data hiding technologies. The basic idea of our complex approach is to exploit all information about hidden data statistics to perform its detection based on a stochastic framework. The StegoWall system will be used for four main applications: robust watermarking, secret communications, integrity control and tamper proofing, and internet/network security.

  20. Reinforcement mechanism of multi-anchor wall with double wall facing

    NASA Astrophysics Data System (ADS)

    Suzuki, Kouta; Kobayashi, Makoto; Miura, Kinya; Konami, Takeharu; Hayashi, Taketo

    2017-10-01

    The reinforced soil wall has high seismic performance as generally known. However, the seismic behavior has not been clarified accurately yet, especially on multi-anchor wall with double wall facing. Indefinite behavior of reinforced soil wall during earthquake make us complicated in case with adopting to the abutment, because of arrangement of anchor plate as reinforcement often different according to the width of roads. In this study, a series of centrifuge model tests were carried out to investigate the reinforcement mechanism of multi anchor wall with double wall facing from the perspective of the vertical earth pressure. Several types of reinforce arrangement and rigid wall were applied in order to verify the arch function in the reinforced regions. The test results show unique behavior of vertical earth pressure, which was affected by arch action. All the vertical earth pressure placed behind facing panel, are larger than that of middle part between facing panel despite of friction between backfill and facing panel. Similar results were obtained in case using rigid wall. On the other hands, the vertical earth pressure, which were measured at the 3cm high from bottom of model container, shows larger than that of bottom. This results show the existence of arch action between double walls. In addition, it implies that the wall facing of such soil structure confined the backfill as pseudo wall, which is very reason that the multi anchor wall with double wall facing has high seismic performance.

  1. Electron injection and acceleration in the plasma bubble regime driven by an ultraintense laser pulse combined with using dense-plasma wall and block

    NASA Astrophysics Data System (ADS)

    Zhao, Xue-Yan; Xie, Bai-Song; Wu, Hai-Cheng; Zhang, Shan; Hong, Xue-Ren; Aimidula, Aimierding

    2012-03-01

    An optimizing and alternative scheme for electron injection and acceleration in the wake bubble driven by an ultraintense laser pulse is presented. In this scheme, the dense-plasma wall with an inner diameter matching the expected bubble size is placed along laser propagation direction. Meanwhile, a dense-plasma block dense-plasma is adhered inward transversely at some certain position of the wall. Particle-in-cell simulations are performed, which demonstrate that the block plays an important role in the first electron injection and acceleration. The result shows that a collimated electron bunch with a total number of about 4.04×108μm-1 can be generated and accelerated stably to 1.61 GeV peak energy with 2.6% energy spread. The block contributes about 50% to the accelerated electron injection bunch by tracing and sorting statistically the source.

  2. Minimizing transient influence in WHPA delineation: An optimization approach for optimal pumping rate schemes

    NASA Astrophysics Data System (ADS)

    Rodriguez-Pretelin, A.; Nowak, W.

    2017-12-01

    For most groundwater protection management programs, Wellhead Protection Areas (WHPAs) have served as primarily protection measure. In their delineation, the influence of time-varying groundwater flow conditions is often underestimated because steady-state assumptions are commonly made. However, it has been demonstrated that temporary variations lead to significant changes in the required size and shape of WHPAs. Apart from natural transient groundwater drivers (e.g., changes in the regional angle of flow direction and seasonal natural groundwater recharge), anthropogenic causes such as transient pumping rates are of the most influential factors that require larger WHPAs. We hypothesize that WHPA programs that integrate adaptive and optimized pumping-injection management schemes can counter transient effects and thus reduce the additional areal demand in well protection under transient conditions. The main goal of this study is to present a novel management framework that optimizes pumping schemes dynamically, in order to minimize the impact triggered by transient conditions in WHPA delineation. For optimizing pumping schemes, we consider three objectives: 1) to minimize the risk of pumping water from outside a given WHPA, 2) to maximize the groundwater supply and 3) to minimize the involved operating costs. We solve transient groundwater flow through an available transient groundwater and Lagrangian particle tracking model. The optimization problem is formulated as a dynamic programming problem. Two different optimization approaches are explored: I) the first approach aims for single-objective optimization under objective (1) only. The second approach performs multiobjective optimization under all three objectives where compromise pumping rates are selected from the current Pareto front. Finally, we look for WHPA outlines that are as small as possible, yet allow the optimization problem to find the most suitable solutions.

  3. Radiological Protection Studies for NGLS XTOD

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Xiao, Shanjie; Santana-Leitner, Mario; Rokni, Sayed

    The X-ray transport, optics and diagnostic system (XTOD) starts from the end of bending magnets sending electrons to the main dump and ends at the end wall separating the accelerator tunnel from the user experimental hall (hereafter referred as EH wall), as shown in Figure 1. Figure 1.a shows the general schematic and Figure 1.b shows the initial layout with possible shielding components. This document summarizes the extensive studies on the shielding and collimator system design necessary to meet the radiation protection requirements.

  4. Electromagnetic approaches to wall characterization, wall mitigation, and antenna design for through-the-wall radar systems

    NASA Astrophysics Data System (ADS)

    Thajudeen, Christopher

    Through-the-wall imaging (TWI) is a topic of current interest due to its wide range of public safety, law enforcement, and defense applications. Among the various available technologies such as, acoustic, thermal, and optical imaging, which can be employed to sense and image targets of interest, electromagnetic (EM) imaging, in the microwave frequency bands, is the most widely utilized technology and has been at the forefront of research in recent years. The primary objectives for any Through-the-Wall Radar Imaging (TWRI) system are to obtain a layout of the building and/or inner rooms, detect if there are targets of interest including humans or weapons, determine if there are countermeasures being employed to further obscure the contents of a building or room of interest, and finally to classify the detected targets. Unlike conventional radar scenarios, the presence of walls, made of common construction materials such as brick, drywall, plywood, cinder block, and solid concrete, adversely affects the ability of any conventional imaging technique to properly image targets enclosed within building structures as the propagation through the wall can induce shadowing effects on targets of interest which may result in image degradation, errors in target localization, and even complete target masking. For many applications of TWR systems, the wall ringing signals are strong enough to mask the returns from targets not located a sufficient distance behind the wall, beyond the distance of the wall ringing, and thus without proper wall mitigation, target detection becomes extremely difficult. The results presented in this thesis focus on the development of wall parameter estimation, and intra-wall and wall-type characterization techniques for use in both the time and frequency domains as well as analysis of these techniques under various real world scenarios such as reduced system bandwidth scenarios, various wall backing scenarios, the case of inhomogeneous walls, presence

  5. A novel VLES model accounting for near-wall turbulence: physical rationale and applications

    NASA Astrophysics Data System (ADS)

    Jakirlic, Suad; Chang, Chi-Yao; Kutej, Lukas; Tropea, Cameron

    2014-11-01

    A novel VLES (Very Large Eddy Simulation) model whose non-resolved residual turbulence is modelled by using an advanced near-wall eddy-viscosity model accounting for the near-wall Reynolds stress anisotropy influence on the turbulence viscosity by modelling appropriately the velocity scale in the relevant formulation (Hanjalic et al., 2004) is proposed. It represents a variable resolution Hybrid LES/RANS (Reynolds-Averaged Navier-Stokes) computational scheme enabling a seamless transition from RANS to LES depending on the ratio of the turbulent viscosities associated with the unresolved scales corresponding to the LES cut-off and the `unsteady' scales pertinent to the turbulent properties of the VLES residual motion, which varies within the flow domain. The VLES method is validated interactively in the process of the model derivation by computing fully-developed flow in a plane channel (important representative of wall-bounded flows, underlying the log-law for the velocity field, for studying near-wall Reynolds stress anisotropy) and a separating flow over a periodic arrangement of smoothly-contoured 2-D hills. The model performances are also assessed in capturing the natural decay of the homogeneous isotropic turbulence. The model is finally applied to swirling flow in a vortex tube, flow in an IC-engine configuration and flow past a realistic car model.

  6. Multiparameter spatio-thermochemical probing of flame–wall interactions advanced with coherent Raman imaging

    DOE PAGES

    Bohlin, Gustav Alexis; Jainski, Christopher; Patterson, Brian D.; ...

    2016-08-10

    Ultrabroadband coherent anti-Stokes Ra man spectroscopy (CARS) has been developed for one -dimensional imaging of temperature and major species distributions simultaneously in the near-wall region of a methane/air flame supported on a side-wall-quenching (SWQ) burner. Automatic temporal and spatial overlap of the ~7 femtosecond pump and Stokes pulses is achieved utilizing a two-beam CARS phase-matching scheme, and the crossed ~75 picosecond probe beam provide s excellent spatial sectioning of the probed location. Concurrent detection of N 2, O 2, H 2, CO, CO 2, and CH 4 is demonstrated while high-fidelity flame thermometry is assessed from the N 2 puremore » rotational S-branch in a one-dimensional -CARS imaging configuration. A methane/air premixed flame at lean, stoichiometric, and rich conditions ( Φ = 0.83, 1.0 , and 1.2) and Reynolds number = 5,000 is probed as it quenches against a cooled steel side- wall parallel to the flow providing a persistent flame-wall interaction. Here, an imaging resolution of better than 40 μm is achieved across the field -of-view, thus allowing thermochemical states (temperature and major species) of the thermal boundary layer to be resolved to within ~30 μm of the interface.« less

  7. Multiparameter spatio-thermochemical probing of flame–wall interactions advanced with coherent Raman imaging

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bohlin, Gustav Alexis; Jainski, Christopher; Patterson, Brian D.

    Ultrabroadband coherent anti-Stokes Ra man spectroscopy (CARS) has been developed for one -dimensional imaging of temperature and major species distributions simultaneously in the near-wall region of a methane/air flame supported on a side-wall-quenching (SWQ) burner. Automatic temporal and spatial overlap of the ~7 femtosecond pump and Stokes pulses is achieved utilizing a two-beam CARS phase-matching scheme, and the crossed ~75 picosecond probe beam provide s excellent spatial sectioning of the probed location. Concurrent detection of N 2, O 2, H 2, CO, CO 2, and CH 4 is demonstrated while high-fidelity flame thermometry is assessed from the N 2 puremore » rotational S-branch in a one-dimensional -CARS imaging configuration. A methane/air premixed flame at lean, stoichiometric, and rich conditions ( Φ = 0.83, 1.0 , and 1.2) and Reynolds number = 5,000 is probed as it quenches against a cooled steel side- wall parallel to the flow providing a persistent flame-wall interaction. Here, an imaging resolution of better than 40 μm is achieved across the field -of-view, thus allowing thermochemical states (temperature and major species) of the thermal boundary layer to be resolved to within ~30 μm of the interface.« less

  8. Scalable and fast heterogeneous molecular simulation with predictive parallelization schemes

    NASA Astrophysics Data System (ADS)

    Guzman, Horacio V.; Junghans, Christoph; Kremer, Kurt; Stuehn, Torsten

    2017-11-01

    Multiscale and inhomogeneous molecular systems are challenging topics in the field of molecular simulation. In particular, modeling biological systems in the context of multiscale simulations and exploring material properties are driving a permanent development of new simulation methods and optimization algorithms. In computational terms, those methods require parallelization schemes that make a productive use of computational resources for each simulation and from its genesis. Here, we introduce the heterogeneous domain decomposition approach, which is a combination of an heterogeneity-sensitive spatial domain decomposition with an a priori rearrangement of subdomain walls. Within this approach, the theoretical modeling and scaling laws for the force computation time are proposed and studied as a function of the number of particles and the spatial resolution ratio. We also show the new approach capabilities, by comparing it to both static domain decomposition algorithms and dynamic load-balancing schemes. Specifically, two representative molecular systems have been simulated and compared to the heterogeneous domain decomposition proposed in this work. These two systems comprise an adaptive resolution simulation of a biomolecule solvated in water and a phase-separated binary Lennard-Jones fluid.

  9. Scalable and fast heterogeneous molecular simulation with predictive parallelization schemes

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Guzman, Horacio V.; Junghans, Christoph; Kremer, Kurt

    Multiscale and inhomogeneous molecular systems are challenging topics in the field of molecular simulation. In particular, modeling biological systems in the context of multiscale simulations and exploring material properties are driving a permanent development of new simulation methods and optimization algorithms. In computational terms, those methods require parallelization schemes that make a productive use of computational resources for each simulation and from its genesis. Here, we introduce the heterogeneous domain decomposition approach, which is a combination of an heterogeneity-sensitive spatial domain decomposition with an a priori rearrangement of subdomain walls. Within this approach and paper, the theoretical modeling and scalingmore » laws for the force computation time are proposed and studied as a function of the number of particles and the spatial resolution ratio. We also show the new approach capabilities, by comparing it to both static domain decomposition algorithms and dynamic load-balancing schemes. Specifically, two representative molecular systems have been simulated and compared to the heterogeneous domain decomposition proposed in this work. Finally, these two systems comprise an adaptive resolution simulation of a biomolecule solvated in water and a phase-separated binary Lennard-Jones fluid.« less

  10. Scalable and fast heterogeneous molecular simulation with predictive parallelization schemes

    DOE PAGES

    Guzman, Horacio V.; Junghans, Christoph; Kremer, Kurt; ...

    2017-11-27

    Multiscale and inhomogeneous molecular systems are challenging topics in the field of molecular simulation. In particular, modeling biological systems in the context of multiscale simulations and exploring material properties are driving a permanent development of new simulation methods and optimization algorithms. In computational terms, those methods require parallelization schemes that make a productive use of computational resources for each simulation and from its genesis. Here, we introduce the heterogeneous domain decomposition approach, which is a combination of an heterogeneity-sensitive spatial domain decomposition with an a priori rearrangement of subdomain walls. Within this approach and paper, the theoretical modeling and scalingmore » laws for the force computation time are proposed and studied as a function of the number of particles and the spatial resolution ratio. We also show the new approach capabilities, by comparing it to both static domain decomposition algorithms and dynamic load-balancing schemes. Specifically, two representative molecular systems have been simulated and compared to the heterogeneous domain decomposition proposed in this work. Finally, these two systems comprise an adaptive resolution simulation of a biomolecule solvated in water and a phase-separated binary Lennard-Jones fluid.« less

  11. A privacy-preserving parallel and homomorphic encryption scheme

    NASA Astrophysics Data System (ADS)

    Min, Zhaoe; Yang, Geng; Shi, Jingqi

    2017-04-01

    In order to protect data privacy whilst allowing efficient access to data in multi-nodes cloud environments, a parallel homomorphic encryption (PHE) scheme is proposed based on the additive homomorphism of the Paillier encryption algorithm. In this paper we propose a PHE algorithm, in which plaintext is divided into several blocks and blocks are encrypted with a parallel mode. Experiment results demonstrate that the encryption algorithm can reach a speed-up ratio at about 7.1 in the MapReduce environment with 16 cores and 4 nodes.

  12. Unit 5, STA. 50+00+RB, retaining wall at Orner Building & ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    Unit 5, STA. 50+00+RB, retaining wall at Orner Building & First U.M. Church Rectory-detail - Johnstown Local Flood Protection Project, Beginning on Conemaugh River approx 3.8 miles downstream from confluence of Little Conemaugh & Stony Creek Rivers at Johnstown, Johnstown, Cambria County, PA

  13. Stabilization of the Chest Wall: Autologous and Alloplastic Reconstructions

    PubMed Central

    Mahabir, Raman Chaos; Butler, Charles E.

    2011-01-01

    The goals of chest wall stabilization include maintenance of a rigid airtight cavity, protection of the thoracic and abdominal contents, optimization of respiration, and, whenever possible, an aesthetic reconstruction. Evidence suggests that bony fixation results in reduced ventilator dependence, a shorter overall hospital stay, and improved upper extremity function. We prefer to accomplish this with autologous tissue alone (such as the pectoralis major, latissimus dorsi, or rectus abdominus muscle flaps) for small to moderate defects. En bloc resection of defects larger than 5 cm or containing four or more ribs will likely benefit from chest wall stabilization. For patients previously treated with radiation, even larger defects may be tolerated owing to fibrosis. For these larger defects, methyl methacrylate composite meshes are used and covered with vascularized tissue. Contaminated wounds are generally reconstructed with bioprosthetic mesh rather than synthetic mesh. Using these principles, the reconstructive plastic surgeon can devise a comprehensive and safe plan to repair tremendous defects of the chest wall. PMID:22294941

  14. A Theoretical Analysis: Physical Unclonable Functions and The Software Protection Problem

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Nithyanand, Rishab; Solis, John H.

    2011-09-01

    Physical Unclonable Functions (PUFs) or Physical One Way Functions (P-OWFs) are physical systems whose responses to input stimuli (i.e., challenges) are easy to measure (within reasonable error bounds) but hard to clone. This property of unclonability is due to the accepted hardness of replicating the multitude of uncontrollable manufacturing characteristics and makes PUFs useful in solving problems such as device authentication, software protection, licensing, and certified execution. In this paper, we focus on the effectiveness of PUFs for software protection and show that traditional non-computational (black-box) PUFs cannot solve the problem against real world adversaries in offline settings. Our contributionsmore » are the following: We provide two real world adversary models (weak and strong variants) and present definitions for security against the adversaries. We continue by proposing schemes secure against the weak adversary and show that no scheme is secure against a strong adversary without the use of trusted hardware. Finally, we present a protection scheme secure against strong adversaries based on trusted hardware.« less

  15. Comparative study of numerical schemes of TVD3, UNO3-ACM and optimized compact scheme

    NASA Technical Reports Server (NTRS)

    Lee, Duck-Joo; Hwang, Chang-Jeon; Ko, Duck-Kon; Kim, Jae-Wook

    1995-01-01

    Three different schemes are employed to solve the benchmark problem. The first one is a conventional TVD-MUSCL (Monotone Upwind Schemes for Conservation Laws) scheme. The second scheme is a UNO3-ACM (Uniformly Non-Oscillatory Artificial Compression Method) scheme. The third scheme is an optimized compact finite difference scheme modified by us: the 4th order Runge Kutta time stepping, the 4th order pentadiagonal compact spatial discretization with the maximum resolution characteristics. The problems of category 1 are solved by using the second (UNO3-ACM) and third (Optimized Compact) schemes. The problems of category 2 are solved by using the first (TVD3) and second (UNO3-ACM) schemes. The problem of category 5 is solved by using the first (TVD3) scheme. It can be concluded from the present calculations that the Optimized Compact scheme and the UN03-ACM show good resolutions for category 1 and category 2 respectively.

  16. Traceability of radiation protection instruments

    NASA Astrophysics Data System (ADS)

    Hino, Y.; Kurosawa, T.

    2007-08-01

    Radiation protection instruments are used in daily measurement of dose and activities in workplaces and environments for safety management. The requirements for calibration certificates with traceability are increasing for these instruments to ensure the consistency and reliabilities of the measurement results. The present traceability scheme of radiation protection instruments for dose and activity measurements is described with related IEC/ISO requirements. Some examples of desirable future calibration systems with recent new technologies are also discussed to establish the traceability with reasonable costs and reliabilities.

  17. Evolution of dispersion coefficient in the single rough-walled fracture before and after circulated flow near the wall

    NASA Astrophysics Data System (ADS)

    Lee, S.; Yeo, I.; Lee, K.

    2012-12-01

    Understanding detailed solute transport mechanism in a single fracture is required to expand it to the complex fractured medium. Dispersion in the variable-aperture fractures occurs by combined effects of molecular diffusion, macro dispersion and Taylor dispersion. It has been reported that Taylor dispersion which is proportional to the square of the velocity dominates for the high velocity, while macro dispersion is proportional to the velocity. Contributions of each scheme are different as the velocity changes. To investigate relationship between Reynolds number and dispersion coefficient, single acrylic rough-walled fracture which has 20 cm length and 1.03 mm average aperture was designed. In this experiment, dispersion coefficient was calculated at the middle of the fracture and at the edge of the fracture via moment analysis using breakthrough curve (BTC) of fluorescent solute under the Reynolds number 0.08, 0.28, 2.78, 8.2 and 16.4. In the results, distinct dispersion regime was observed at the highly rough-walled fracture, which is inconsistent with the model that was suggested by previous research. In the range of Re < 2.78, the dispersion coefficient was proportional to the power of n (1 2.78. The reason of this transition zone was related to the generation of circulated flow near the wall. It can flush the trapped contaminant out to the main flow channel, which makes tailing effect diminished. Also, these circulation zones were visualized using microscope, CCD camera and fluorescent particles.

  18. Wind tunnels with adapted walls for reducing wall interference

    NASA Technical Reports Server (NTRS)

    Ganzer, U.

    1979-01-01

    The basic principle of adaptable wind tunnel walls is explained. First results of an investigation carried out at the Aero-Space Institute of Berlin Technical University are presented for two dimensional flexible walls and a NACA 0012 airfoil. With five examples exhibiting very different flow conditions it is demonstrated that it is possible to reduce wall interference and to avoid blockage at transonic speeds by wall adaptation.

  19. Conservation of proteins involved in oocyst wall formation in Eimeria maxima, Eimeria tenella and Eimeria acervulina

    PubMed Central

    Belli, Sabina I.; Ferguson, David J.P.; Katrib, Marilyn; Slapetova, Iveta; Mai, Kelly; Slapeta, Jan; Flowers, Sarah A.; Miska, Kate B.; Tomley, Fiona M.; Shirley, Martin W.; Wallach, Michael G.; Smith, Nicholas C.

    2009-01-01

    Vaccination with proteins from gametocytes of Eimeria maxima protects chickens, via transfer of maternal antibodies, against infection with several species of Eimeria. Antibodies to E. maxima gametocyte proteins recognise proteins in the wall forming bodies of macrogametocytes and oocyst walls of E. maxima, Eimeria tenella and Eimeria acervulina. Homologous genes for two major gametocyte proteins – GAM56 and GAM82 – were found in E. maxima, E. tenella and E. acervulina. Alignment of the predicted protein sequences of these genes reveals that, as well as sharing regions of tyrosine richness, strong homology exists in their amino-terminal regions, where protective antibodies bind. This study confirms the conservation of the roles of GAM56 and GAM82 in oocyst wall formation and shows that antibodies to gametocyte antigens of E. maxima cross-react with homologous proteins in other species, helping to explain cross-species maternal immunity. PMID:19477178

  20. Emergency access to protected health records.

    PubMed

    Künzi, Julien; Koster, Paul; Petković, Milan

    2009-01-01

    Digital Rights Management (DRM) schemes are receiving increased attention in the healthcare domain for the protection of sensitive health records as they offer security against insider attacks and advance protection features such as usage control. However, to be accepted by health care providers, a DRM solution has to fulfill specific healthcare requirements including emergency access. In this paper, we propose such DRM solution that can be deployed in highly distributed environments of electronic or personal health record infrastructures.

  1. Inverse measurement of wall pressure field in flexible-wall wind tunnels using global wall deformation data

    NASA Astrophysics Data System (ADS)

    Brown, Kenneth; Brown, Julian; Patil, Mayuresh; Devenport, William

    2018-02-01

    The Kevlar-wall anechoic wind tunnel offers great value to the aeroacoustics research community, affording the capability to make simultaneous aeroacoustic and aerodynamic measurements. While the aeroacoustic potential of the Kevlar-wall test section is already being leveraged, the aerodynamic capability of these test sections is still to be fully realized. The flexibility of the Kevlar walls suggests the possibility that the internal test section flow may be characterized by precisely measuring small deflections of the flexible walls. Treating the Kevlar fabric walls as tensioned membranes with known pre-tension and material properties, an inverse stress problem arises where the pressure distribution over the wall is sought as a function of the measured wall deflection. Experimental wall deformations produced by the wind loading of an airfoil model are measured using digital image correlation and subsequently projected onto polynomial basis functions which have been formulated to mitigate the impact of measurement noise based on a finite-element study. Inserting analytic derivatives of the basis functions into the equilibrium relations for a membrane, full-field pressure distributions across the Kevlar walls are computed. These inversely calculated pressures, after being validated against an independent measurement technique, can then be integrated along the length of the test section to give the sectional lift of the airfoil. Notably, these first-time results are achieved with a non-contact technique and in an anechoic environment.

  2. Unit 4, STA. 59+00+ lb, sideslope with masonry walls (without ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    Unit 4, STA. 59+00+ lb, sideslope with masonry walls (without parapets), Cambria Iron Company National Historic Landmark-Context - Johnstown Local Flood Protection Project, Beginning on Conemaugh River approx 3.8 miles downstream from confluence of Little Conemaugh & Stony Creek Rivers at Johnstown, Johnstown, Cambria County, PA

  3. Progress on Implementing Additional Physics Schemes into ...

    EPA Pesticide Factsheets

    The U.S. Environmental Protection Agency (USEPA) has a team of scientists developing a next generation air quality modeling system employing the Model for Prediction Across Scales – Atmosphere (MPAS-A) as its meteorological foundation. Several preferred physics schemes and options available in the Weather Research and Forecasting (WRF) model are regularly used by the USEPA with the Community Multiscale Air Quality (CMAQ) model to conduct retrospective air quality simulations. These include the Pleim surface layer, the Pleim-Xiu (PX) land surface model with fractional land use for a 40-class National Land Cover Database (NLCD40), the Asymmetric Convective Model 2 (ACM2) planetary boundary layer scheme, the Kain-Fritsch (KF) convective parameterization with subgrid-scale cloud feedback to the radiation schemes and a scale-aware convective time scale, and analysis nudging four-dimensional data assimilation (FDDA). All of these physics modules and options have already been implemented by the USEPA into MPAS-A v4.0, tested, and evaluated (please see the presentations of R. Gilliam and R. Bullock at this workshop). Since the release of MPAS v5.1 in May 2017, work has been under way to implement these preferred physics options into the MPAS-A v5.1 code. Test simulations of a summer month are being conducted on a global variable resolution mesh with the higher resolution cells centered over the contiguous United States. Driving fields for the FDDA and soil nudging are

  4. A bilinear pairing based anonymous authentication scheme in wireless body area networks for mHealth.

    PubMed

    Jiang, Qi; Lian, Xinxin; Yang, Chao; Ma, Jianfeng; Tian, Youliang; Yang, Yuanyuan

    2016-11-01

    Wireless body area networks (WBANs) have become one of the key components of mobile health (mHealth) which provides 24/7 health monitoring service and greatly improves the quality and efficiency of healthcare. However, users' concern about the security and privacy of their health information has become one of the major obstacles that impede the wide adoption of WBANs. Anonymous and unlinkable authentication is critical to protect the security and privacy of sensitive physiological information in transit from the client to the application provider. We first show that the anonymous authentication scheme of Wang and Zhang based on bilinear pairing is prone to client impersonation attack. Then, we propose an enhanced anonymous authentication scheme to remedy the flaw in Wang and Zhang's scheme. We give the security analysis to demonstrate that the enhanced scheme achieves the desired security features and withstands various known attacks.

  5. Security analysis and improvement of a privacy authentication scheme for telecare medical information systems.

    PubMed

    Wu, Fan; Xu, Lili

    2013-08-01

    Nowadays, patients can gain many kinds of medical service on line via Telecare Medical Information Systems(TMIS) due to the fast development of computer technology. So security of communication through network between the users and the server is very significant. Authentication plays an important part to protect information from being attacked by malicious attackers. Recently, Jiang et al. proposed a privacy enhanced scheme for TMIS using smart cards and claimed their scheme was better than Chen et al.'s. However, we have showed that Jiang et al.'s scheme has the weakness of ID uselessness and is vulnerable to off-line password guessing attack and user impersonation attack if an attacker compromises the legal user's smart card. Also, it can't resist DoS attack in two cases: after a successful impersonation attack and wrong password input in Password change phase. Then we propose an improved mutual authentication scheme used for a telecare medical information system. Remote monitoring, checking patients' past medical history record and medical consultant can be applied in the system where information transmits via Internet. Finally, our analysis indicates that the suggested scheme overcomes the disadvantages of Jiang et al.'s scheme and is practical for TMIS.

  6. Quantification of esophageal wall thickness in CT using atlas-based segmentation technique

    NASA Astrophysics Data System (ADS)

    Wang, Jiahui; Kang, Min Kyu; Kligerman, Seth; Lu, Wei

    2015-03-01

    Esophageal wall thickness is an important predictor of esophageal cancer response to therapy. In this study, we developed a computerized pipeline for quantification of esophageal wall thickness using computerized tomography (CT). We first segmented the esophagus using a multi-atlas-based segmentation scheme. The esophagus in each atlas CT was manually segmented to create a label map. Using image registration, all of the atlases were aligned to the imaging space of the target CT. The deformation field from the registration was applied to the label maps to warp them to the target space. A weighted majority-voting label fusion was employed to create the segmentation of esophagus. Finally, we excluded the lumen from the esophagus using a threshold of -600 HU and measured the esophageal wall thickness. The developed method was tested on a dataset of 30 CT scans, including 15 esophageal cancer patients and 15 normal controls. The mean Dice similarity coefficient (DSC) and mean absolute distance (MAD) between the segmented esophagus and the reference standard were employed to evaluate the segmentation results. Our method achieved a mean Dice coefficient of 65.55 ± 10.48% and mean MAD of 1.40 ± 1.31 mm for all the cases. The mean esophageal wall thickness of cancer patients and normal controls was 6.35 ± 1.19 mm and 6.03 ± 0.51 mm, respectively. We conclude that the proposed method can perform quantitative analysis of esophageal wall thickness and would be useful for tumor detection and tumor response evaluation of esophageal cancer.

  7. Resilience from coastal protection.

    PubMed

    Ewing, Lesley C

    2015-10-28

    Coastal areas are important residential, commercial and industrial areas; but coastal hazards can pose significant threats to these areas. Shoreline/coastal protection elements, both built structures such as breakwaters, seawalls and revetments, as well as natural features such as beaches, reefs and wetlands, are regular features of a coastal community and are important for community safety and development. These protection structures provide a range of resilience to coastal communities. During and after disasters, they help to minimize damages and support recovery; during non-disaster times, the values from shoreline elements shift from the narrow focus on protection. Most coastal communities have limited land and resources and few can dedicate scarce resources solely for protection. Values from shore protection can and should expand to include environmental, economic and social/cultural values. This paper discusses the key aspects of shoreline protection that influence effective community resilience and protection from disasters. This paper also presents ways that the economic, environmental and social/cultural values of shore protection can be evaluated and quantified. It presents the Coastal Community Hazard Protection Resilience (CCHPR) Index for evaluating the resilience capacity to coastal communities from various protection schemes and demonstrates the use of this Index for an urban beach in San Francisco, CA, USA. © 2015 The Author(s).

  8. Shielding synchrotron light sources: Advantages of circular shield walls tunnels

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kramer, S. L.; Ghosh, V. J.; Breitfeller, M.

    Third generation high brightness light sources are designed to have low emittance and high current beams, which contribute to higher beam loss rates that will be compensated by Top-Off injection. Shielding for these higher loss rates will be critical to protect the projected higher occupancy factors for the users. Top-Off injection requires a full energy injector, which will demand greater consideration of the potential abnormal beam miss-steering and localized losses that could occur. The high energy electron injection beam produce significantly higher neutron component dose to the experimental floor than lower energy injection and ramped operations. High energy neutrons producedmore » in the forward direction from thin target beam losses are a major component of the dose rate outside the shield walls of the tunnel. The convention has been to provide thicker 90° ratchet walls to reduce this dose to the beam line users. We present an alternate circular shield wall design, which naturally and cost effectively increases the path length for this forward radiation in the shield wall and thereby substantially decreasing the dose rate for these beam losses. Here, this shield wall design will greatly reduce the dose rate to the users working near the front end optical components but will challenge the beam line designers to effectively utilize the longer length of beam line penetration in the shield wall. Additional advantages of the circular shield wall tunnel are that it's simpler to construct, allows greater access to the insertion devices and the upstream in tunnel beam line components, as well as reducing the volume of concrete and therefore the cost of the shield wall.« less

  9. Shielding synchrotron light sources: Advantages of circular shield walls tunnels

    DOE PAGES

    Kramer, S. L.; Ghosh, V. J.; Breitfeller, M.

    2016-04-26

    Third generation high brightness light sources are designed to have low emittance and high current beams, which contribute to higher beam loss rates that will be compensated by Top-Off injection. Shielding for these higher loss rates will be critical to protect the projected higher occupancy factors for the users. Top-Off injection requires a full energy injector, which will demand greater consideration of the potential abnormal beam miss-steering and localized losses that could occur. The high energy electron injection beam produce significantly higher neutron component dose to the experimental floor than lower energy injection and ramped operations. High energy neutrons producedmore » in the forward direction from thin target beam losses are a major component of the dose rate outside the shield walls of the tunnel. The convention has been to provide thicker 90° ratchet walls to reduce this dose to the beam line users. We present an alternate circular shield wall design, which naturally and cost effectively increases the path length for this forward radiation in the shield wall and thereby substantially decreasing the dose rate for these beam losses. Here, this shield wall design will greatly reduce the dose rate to the users working near the front end optical components but will challenge the beam line designers to effectively utilize the longer length of beam line penetration in the shield wall. Additional advantages of the circular shield wall tunnel are that it's simpler to construct, allows greater access to the insertion devices and the upstream in tunnel beam line components, as well as reducing the volume of concrete and therefore the cost of the shield wall.« less

  10. Comparison between spin-orbit torques measured by domain-wall motions and harmonic measurements

    NASA Astrophysics Data System (ADS)

    Kim, Joo-Sung; Nam, Yune-Seok; Kim, Dae-Yun; Park, Yong-Keun; Park, Min-Ho; Choe, Sug-Bong

    2018-05-01

    Here we report the comparison of the spin torque efficiencies measured by three different experimental schemes for Pt/Co/X stacks with material X (= Pt, Ta, Ti, Al, Au, Pd, and Ru. 7 materials). The first two spin torque efficiencies ɛDW (1 ) and ɛDW (2 ) are quantified by the measurement of spin-torque-induced effective field for domain-wall depinning and creeping motions, respectively. The last one—longitudinal spin torque efficiency ɛL—is measured by harmonic signal measurement of the magnetization rotation with uniform magnetization configuration. The results confirm that, for all measured Pt/Co/X stacks, ɛDW (1 ) and ɛDW (2 ) are exactly consistent to each other and these two efficiencies are roughly proportional to ɛL with proportionality constant π/2, which comes from the integration over the domain-wall configuration.

  11. Improved Secret Image Sharing Scheme in Embedding Capacity without Underflow and Overflow.

    PubMed

    Pang, Liaojun; Miao, Deyu; Li, Huixian; Wang, Qiong

    2015-01-01

    Computational secret image sharing (CSIS) is an effective way to protect a secret image during its transmission and storage, and thus it has attracted lots of attentions since its appearance. Nowadays, it has become a hot topic for researchers to improve the embedding capacity and eliminate the underflow and overflow situations, which is embarrassing and difficult to deal with. The scheme, which has the highest embedding capacity among the existing schemes, has the underflow and overflow problems. Although the underflow and overflow situations have been well dealt with by different methods, the embedding capacities of these methods are reduced more or less. Motivated by these concerns, we propose a novel scheme, in which we take the differential coding, Huffman coding, and data converting to compress the secret image before embedding it to further improve the embedding capacity, and the pixel mapping matrix embedding method with a newly designed matrix is used to embed secret image data into the cover image to avoid the underflow and overflow situations. Experiment results show that our scheme can improve the embedding capacity further and eliminate the underflow and overflow situations at the same time.

  12. Improved Secret Image Sharing Scheme in Embedding Capacity without Underflow and Overflow

    PubMed Central

    Pang, Liaojun; Miao, Deyu; Li, Huixian; Wang, Qiong

    2015-01-01

    Computational secret image sharing (CSIS) is an effective way to protect a secret image during its transmission and storage, and thus it has attracted lots of attentions since its appearance. Nowadays, it has become a hot topic for researchers to improve the embedding capacity and eliminate the underflow and overflow situations, which is embarrassing and difficult to deal with. The scheme, which has the highest embedding capacity among the existing schemes, has the underflow and overflow problems. Although the underflow and overflow situations have been well dealt with by different methods, the embedding capacities of these methods are reduced more or less. Motivated by these concerns, we propose a novel scheme, in which we take the differential coding, Huffman coding, and data converting to compress the secret image before embedding it to further improve the embedding capacity, and the pixel mapping matrix embedding method with a newly designed matrix is used to embed secret image data into the cover image to avoid the underflow and overflow situations. Experiment results show that our scheme can improve the embedding capacity further and eliminate the underflow and overflow situations at the same time. PMID:26351657

  13. Eavesdropping on spin waves inside the domain-wall nanochannel via three-magnon processes

    NASA Astrophysics Data System (ADS)

    Zhang, Beining; Wang, Zhenyu; Cao, Yunshan; Yan, Peng; Wang, X. R.

    2018-03-01

    One recent breakthrough in the field of magnonics is the experimental realization of reconfigurable spin-wave nanochannels formed by a magnetic domain wall with a width of 10-100 nm [Wagner et al., Nat. Nano. 11, 432 (2016), 10.1038/nnano.2015.339]. This remarkable progress enables an energy-efficient spin-wave propagation with a well-defined wave vector along its propagating path inside the wall. In the mentioned experiment, a microfocus Brillouin light scattering spectroscopy was taken in a line-scans manner to measure the frequency of the bounded spin wave. Due to their localization nature, the confined spin waves can hardly be detected from outside the wall channel, which guarantees the information security to some extent. In this work, we theoretically propose a scheme to detect/eavesdrop on the spin waves inside the domain-wall nanochannel via nonlinear three-magnon processes. We send a spin wave (ωi,ki) in one magnetic domain to interact with the bounded mode (ωb,kb) in the wall, where kb is parallel with the domain-wall channel defined as the z ̂ axis. Two kinds of three-magnon processes, i.e., confluence and splitting, are expected to occur. The confluence process is conventional: conservation of energy and momentum parallel with the wall indicates a transmitted wave in the opposite domain with ω (k ) =ωi+ωb and (ki+kb-k ) .z ̂=0 , while the momentum perpendicular to the domain wall is not necessary to be conserved due to the nonuniform internal field near the wall. We predict a stimulated three-magnon splitting (or "magnon laser") effect: the presence of a bound magnon propagating along the domain wall channel assists the splitting of the incident wave into two modes, one is ω1=ωb,k1=kb identical to the bound mode in the channel, and the other one is ω2=ωi-ωb with (ki-kb-k2) .z ̂=0 propagating in the opposite magnetic domain. Micromagnetic simulations confirm our theoretical analysis. These results demonstrate that one is able to uniquely

  14. An Inviscid Decoupled Method for the Roe FDS Scheme in the Reacting Gas Path of FUN3D

    NASA Technical Reports Server (NTRS)

    Thompson, Kyle B.; Gnoffo, Peter A.

    2016-01-01

    An approach is described to decouple the species continuity equations from the mixture continuity, momentum, and total energy equations for the Roe flux difference splitting scheme. This decoupling simplifies the implicit system, so that the flow solver can be made significantly more efficient, with very little penalty on overall scheme robustness. Most importantly, the computational cost of the point implicit relaxation is shown to scale linearly with the number of species for the decoupled system, whereas the fully coupled approach scales quadratically. Also, the decoupled method significantly reduces the cost in wall time and memory in comparison to the fully coupled approach. This work lays the foundation for development of an efficient adjoint solution procedure for high speed reacting flow.

  15. Spray shadowing for stress relief and mechanical locking in thick protective coatings

    DOEpatents

    Hollis, Kendall [Los Alamos, NM; Bartram, Brian [Los Alamos, NM

    2007-05-22

    A method for applying a protective coating on an article, comprising the following steps: selecting an article with a surface for applying a coating thickness; creating undercut grooves on the article, where the grooves depend beneath the surface to a bottom portion with the grooves having an upper width on the surface and a lower width on the bottom portion connected by side walls, where at least one of the side walls connects the upper width and the lower width to form an undercut angle with the surface less than 90.degree.; and, applying the protective coating onto the article to fill the undercut grooves and cover the surface, thereby forming weak paths within the protective coating.

  16. Spontaneous Behaviors and Wall-Curvature Lead to Apparent Wall Preference in Planarian.

    PubMed

    Akiyama, Yoshitaro; Agata, Kiyokazu; Inoue, Takeshi

    2015-01-01

    The planarian Dugesia japonica tends to stay near the walls of its breeding containers and experimental dishes in the laboratory, a phenomenon called "wall preference". This behavior is thought to be important for environmental adaptation, such as hiding by planarians in nature. However, the mechanisms regulating wall-preference behavior are not well understood, since this behavior occurs in the absence of any particular stimulation. Here we show the mechanisms of wall-preference behavior. Surprisingly, planarian wall-preference behavior was also shown even by the head alone and by headless planarians. These results indicate that planarian "wall-preference" behavior only appears to be a "preference" behavior, and is actually an outcome of spontaneous behaviors, rather than of brain function. We found that in the absence of environmental cues planarians moved basically straight ahead until they reached a wall, and that after reaching a wall, they changed their direction of movement to one tangential to the wall, suggesting that this spontaneous behavior may play a critical role in the wall preference. When we tested another spontaneous behavior, the wigwag movement of the planarian head, using computer simulation with various wigwag angles and wigwag intervals, large wigwag angle and short wigwag interval reduced wall-preference behavior. This indicated that wigwag movement may determine the probability of staying near the wall or leaving the wall. Furthermore, in accord with this simulation, when we tested planarian wall-preference behavior using several assay fields with different curvature of the wall, we found that concavity and sharp curvature of walls negatively impacted wall preference by affecting the permissible angle of the wigwag movement. Together, these results indicate that planarian wall preference may be involuntarily caused by the combination of two spontaneous planarian behaviors: moving straight ahead until reaching a wall and then moving along it

  17. Aeroacoustic simulation of a linear cascade by a prefactored compact scheme

    NASA Astrophysics Data System (ADS)

    Ghillani, Pietro

    This work documents the development of a three-dimensional high-order prefactored compact finite-difference solver for computational aeroacoustics (CAA) based on the inviscid Euler equations. This time explicit scheme is applied to representative problems of sound generation by flow interacting with solid boundaries. Four aeroacoustic problems are explored and the results validated against available reference analytical solution. Selected mesh convergence studies are conducted to determine the effective order of accuracy of the complete scheme. The first test case simulates the noise emitted by a still cylinder in an oscillating field. It provides a simple validation for the CAA-compatible solid wall condition used in the remainder of the work. The following test cases are increasingly complex versions of the turbomachinery rotor-stator interaction problem taken from NASA CAA workshops. In all the cases the results are compared against the available literature. The numerical method features some appreciable contributions to computational aeroacoustics. A reduced data exchange technique for parallel computations is implemented, which requires the exchange of just two values for each boundary node, independently of the size of the zone overlap. A modified version of the non-reflecting buffer layer by Chen is used to allow aerodynamic perturbations at the through flow boundaries. The Giles subsonic boundary conditions are extended to three-dimensional curvilinear coordinates. These advances have enabled to resolve the aerodynamic noise generation and near-field propagation on a representative cascade geometry with a time-marching scheme, with accuracy similar to spectral methods..

  18. Delivery of a national home safety equipment scheme in England: a survey of local scheme leaders.

    PubMed

    Mulvaney, C A; Watson, M C; Hamilton, T; Errington, G

    2013-11-01

    Unintentional home injuries sustained by preschool children are a major cause of morbidity in the UK. Home safety equipment schemes may reduce home injury rates. In 2009, the Royal Society for the Prevention of Accidents was appointed as central coordinator of a two-year, £18m national home safety equipment scheme in England. This paper reports the findings from a national survey of all scheme leaders responsible for local scheme delivery. A questionnaire mailed to all local scheme leaders sought details of how the schemes were operated locally; barriers and facilitators to scheme implementation; evaluation of the local scheme and its sustainability. A response rate of 73% was achieved. Health visitors and family support workers played a key role in both the identification of eligible families and performing home safety checks. The majority of local scheme leaders (94.6%) reported that they thought their local scheme had been successful in including those families considered 'harder to engage'. Many scheme leaders (72.4%) reported that they had evaluated the provision of safety equipment in their scheme and over half (56.6%) stated that they would not be able to continue the scheme once funding ceased. Local schemes need support to effectively evaluate their scheme and to seek sustainability funding to ensure the future of the scheme. There remains a lack of evidence of whether the provision of home safety equipment reduces injuries in preschool children.

  19. Three Pectin Methylesterase Inhibitors Protect Cell Wall Integrity for Arabidopsis Immunity to Botrytis1

    PubMed Central

    Fabri, Eleonora; Willats, William G.T.

    2017-01-01

    Infection by necrotrophs is a complex process that starts with the breakdown of the cell wall (CW) matrix initiated by CW-degrading enzymes and results in an extensive tissue maceration. Plants exploit induced defense mechanisms based on biochemical modification of the CW components to protect themselves from enzymatic degradation. The pectin matrix is the main CW target of Botrytis cinerea, and pectin methylesterification status is strongly altered in response to infection. The methylesterification of pectin is controlled mainly by pectin methylesterases (PMEs), whose activity is posttranscriptionally regulated by endogenous protein inhibitors (PMEIs). Here, AtPMEI10, AtPMEI11, and AtPMEI12 are identified as functional PMEIs induced in Arabidopsis (Arabidopsis thaliana) during B. cinerea infection. AtPMEI expression is strictly regulated by jasmonic acid and ethylene signaling, while only AtPMEI11 expression is controlled by PME-related damage-associated molecular patterns, such as oligogalacturonides and methanol. The decrease of pectin methylesterification during infection is higher and the immunity to B. cinerea is compromised in pmei10, pmei11, and pmei12 mutants with respect to the control plants. A higher stimulation of the fungal oxalic acid biosynthetic pathway also can contribute to the higher susceptibility of pmei mutants. The lack of PMEI expression does not affect hemicellulose strengthening, callose deposition, and the synthesis of structural defense proteins, proposed as CW-remodeling mechanisms exploited by Arabidopsis to resist CW degradation upon B. cinerea infection. We show that PME activity and pectin methylesterification are dynamically modulated by PMEIs during B. cinerea infection. Our findings point to AtPMEI10, AtPMEI11, and AtPMEI12 as mediators of CW integrity maintenance in plant immunity. PMID:28082716

  20. Use of the omentum in chest-wall reconstruction

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Fix, R.J.; Vasconez, L.O.

    1989-10-01

    Increased use of the omentum in chest-wall reconstruction has paralleled the refinement of anatomic knowledge and the development of safe mobilization techniques. Important anatomic points are the omental attachments to surrounding structures, the major blood supply from the left and right gastroepiploic vessels, and the collateral circulation via the gastroepiploic arch and Barkow's marginal artery. Mobilization of the omentum to the thorax involves division of its attachments to the transverse colon and separation from the greater curvature to fabricate a bipedicled flap. Most anterior chest wounds and virtually all mediastinal wounds can be covered with the omentum based on bothmore » sets of gastroepiploic vessels. The arc of transposition is increased when the omentum is based on a single pedicle, allowing coverage of virtually all chest-wall defects. The final method of increasing flap length involves division of the gastroepiploic arch and reliance on Barkow's marginal artery as collateral circulation to maintain flap viability. With regard to chest-wall reconstruction, we have included the omentum in the armamentarium of flaps used to cover mediastinal wounds. The omentum is our flap of choice for the reconstruction of most radiation injuries of the chest wall. The omentum may also be used to provide protection to visceral anastomoses, vascular conduits, and damaged structures in the chest, as well as to cover defects secondary to tumor excision or trauma. In brief, the omentum has proved to be a most dependable and versatile flap, particularly applicable to chest-wall reconstruction.« less

  1. Velocity and pressure fields associated with near-wall turbulence structures

    NASA Technical Reports Server (NTRS)

    Johansson, Arne V.; Alfredsson, P. Henrik; Kim, John

    1990-01-01

    Computer generated databases containing velocity and pressure fields in three-dimensional space at a sequence of time-steps, were used for the investigation of near-wall turbulence structures, their space-time evolution, and their associated pressure fields. The main body of the results were obtained from simulation data for turbulent channel flow at a Reynolds number of 180 (based on half-channel height and friction velocity) with a grid of 128 x 129 x and 128 points. The flow was followed over a total time of 141 viscous time units. Spanwise centering of the detected structures was found to be essential in order to obtain a correct magnitude of the associated Reynolds stress contribution. A positive wall-pressure peak is found immediately beneath the center of the structure. The maximum amplitude of the pressure pattern was, however, found in the buffer region at the center of the shear-layer. It was also found that these flow structures often reach a maximum strength in connection with an asymmetric spanwise motion, which motivated the construction of a conditional sampling scheme that preserved this asymmetry.

  2. Robust symmetry-protected metrology with the Haldane phase

    NASA Astrophysics Data System (ADS)

    Bartlett, Stephen D.; Brennen, Gavin K.; Miyake, Akimasa

    2018-01-01

    We propose a metrology scheme that is made robust to a wide range of noise processes by using the passive, error-preventing properties of symmetry-protected topological phases. The so-called fractionalized edge mode of an antiferromagnetic Heisenberg spin-1 chain in a rotationally- symmetric Haldane phase can be used to measure the direction of an unknown electric field, by exploiting the way in which the field direction reduces the symmetry of the chain. Specifically, the direction (and when supplementing with a known background field, also the strength) of the field is registered in the holonomy under an adiabatic sensing protocol, and the degenerate fractionalized edge mode is protected through this process by the remaining reduced symmetry. We illustrate the scheme with respect to a potential realization by Rydberg dressed atoms.

  3. Reduction of catastrophic health care expenditures by a community-based health insurance scheme in Gujarat, India: current experiences and challenges.

    PubMed Central

    Ranson, Michael Kent

    2002-01-01

    OBJECTIVE: To assess the Self Employed Women's Association's Medical Insurance Fund in Gujarat in terms of insurance coverage according to income groups, protection of claimants from costs of hospitalization, time between discharge and reimbursement, and frequency of use. METHODS: One thousand nine hundred and thirty claims submitted over six years were analysed. FINDINGS: Two hundred and fifteen (11%) of 1927 claims were rejected. The mean household income of claimants was significantly lower than that of the general population. The percentage of households below the poverty line was similar for claimants and the general population. One thousand seven hundred and twelve (1712) claims were reimbursed: 805 (47%) fully and 907 (53%) at a mean reimbursement rate of 55.6%. Reimbursement more than halved the percentage of catastrophic hospitalizations (>10% of annual household income) and hospitalizations resulting in impoverishment. The average time between discharge and reimbursement was four months. The frequency of submission of claims was low (18.0/1000 members per year: 22-37% of the estimated frequency of hospitalization). CONCLUSIONS: The findings have implications for community-based health insurance schemes in India and elsewhere. Such schemes can protect poor households against the uncertain risk of medical expenses. They can be implemented in areas where institutional capacity is too weak to organize nationwide risk-pooling. Such schemes can cover poor people, including people and households below the poverty line. A trade off exists between maintaining the scheme's financial viability and protecting members against catastrophic expenditures. To facilitate reimbursement, administration, particularly processing of claims, should happen near claimants. Fine-tuning the design of a scheme is an ongoing process - a system of monitoring and evaluation is vital. PMID:12219151

  4. Reduction of catastrophic health care expenditures by a community-based health insurance scheme in Gujarat, India: current experiences and challenges.

    PubMed

    Ranson, Michael Kent

    2002-01-01

    To assess the Self Employed Women's Association's Medical Insurance Fund in Gujarat in terms of insurance coverage according to income groups, protection of claimants from costs of hospitalization, time between discharge and reimbursement, and frequency of use. One thousand nine hundred and thirty claims submitted over six years were analysed. Two hundred and fifteen (11%) of 1927 claims were rejected. The mean household income of claimants was significantly lower than that of the general population. The percentage of households below the poverty line was similar for claimants and the general population. One thousand seven hundred and twelve (1712) claims were reimbursed: 805 (47%) fully and 907 (53%) at a mean reimbursement rate of 55.6%. Reimbursement more than halved the percentage of catastrophic hospitalizations (>10% of annual household income) and hospitalizations resulting in impoverishment. The average time between discharge and reimbursement was four months. The frequency of submission of claims was low (18.0/1000 members per year: 22-37% of the estimated frequency of hospitalization). The findings have implications for community-based health insurance schemes in India and elsewhere. Such schemes can protect poor households against the uncertain risk of medical expenses. They can be implemented in areas where institutional capacity is too weak to organize nationwide risk-pooling. Such schemes can cover poor people, including people and households below the poverty line. A trade off exists between maintaining the scheme's financial viability and protecting members against catastrophic expenditures. To facilitate reimbursement, administration, particularly processing of claims, should happen near claimants. Fine-tuning the design of a scheme is an ongoing process - a system of monitoring and evaluation is vital.

  5. Management initiatives in a community-based health insurance scheme.

    PubMed

    Sinha, Tara; Ranson, M Kent; Chatterjee, Mirai; Mills, Anne

    2007-01-01

    Community-based health insurance (CBHI) schemes have developed in response to inadequacies of alternate systems for protecting the poor against health care expenditures. Some of these schemes have arisen within community-based organizations (CBOs), which have strong links with poor communities, and are therefore well situated to offer CBHI. However, the managerial capacities of many such CBOs are limited. This paper describes management initiatives undertaken in a CBHI scheme in India, in the course of an action-research project. The existing structures and systems at the CBHI had several strengths, but fell short on some counts, which became apparent in the course of planning for two interventions under the research project. Management initiatives were introduced that addressed four features of the CBHI, viz. human resources, organizational structure, implementation systems, and data management. Trained personnel were hired and given clear roles and responsibilities. Lines of reporting and accountability were spelt out, and supportive supervision was provided to team members. The data resources of the organization were strengthened for greater utilization of this information. While the changes that were introduced took some time to be accepted by team members, the commitment of the CBHI's leadership to these initiatives was critical to their success. Copyright (c) 2007 John Wiley & Sons, Ltd.

  6. A data protection scheme for a remote vital signs monitoring healthcare service.

    PubMed

    Gritzalis, D; Lambrinoudakis, C

    2000-01-01

    Personal and medical data processed by Healthcare Information Systems must be protected against unauthorized access, modification and withholding. Security measures should be selected to provide the required level of protection in a cost-efficient manner. This is only feasible if specific characteristics of the information system are examined on a basis of a risk analysis methodology. This paper presents the results of a risk analysis, based on the CRAMM methodology, for a healthcare organization offering a patient home-monitoring service through the transmission of vital signs, focusing on the identified security needs and the proposed countermeasures. The architectural and functional models of this service were utilized for identifying and valuating the system assets, the associated threats and vulnerabilities, as well as for assessing the impact on the patients and on the service provider, should the security of any of these assets is affected. A set of adequate organizational, administrative and technical countermeasures is described for the remote vital signs monitoring service, thus providing the healthcare organization with a data protection framework that can be utilized for the development of its own security plan.

  7. Plant cell wall sugars: sweeteners for a bio-based economy.

    PubMed

    Van de Wouwer, Dorien; Boerjan, Wout; Vanholme, Bartel

    2018-02-12

    Global warming and the consequent climate change is one of the major environmental challenges we are facing today. The driving force behind the rise in temperature is our fossil-based economy, which releases massive amounts of the greenhouse gas carbon dioxide into the atmosphere. In order to reduce greenhouse gas emission, we need to scale down our dependency on fossil resources, implying that we need other sources for energy and chemicals to feed our economy. Here, plants have an important role to play; by means of photosynthesis, plants capture solar energy to split water and fix carbon derived from atmospheric carbon dioxide. A significant fraction of the fixed carbon ends up as polysaccharides in the plant cell wall. Fermentable sugars derived from cell wall polysaccharides form an ideal carbon source for the production of bio-platform molecules. However, a major limiting factor in the use of plant biomass as feedstock for the bio-based economy is the complexity of the plant cell wall and its recalcitrance towards deconstruction. To facilitate the release of fermentable sugars during downstream biomass processing, the composition and structure of the cell wall can be engineered. Different strategies to reduce cell wall recalcitrance will be described in this review. The ultimate goal is to obtain a tailor-made biomass, derived from plants with a cell wall optimized for particular industrial or agricultural applications, without affecting plant growth and development. This article is protected by copyright. All rights reserved.

  8. Switching by Domain-Wall Automotion in Asymmetric Ferromagnetic Rings

    NASA Astrophysics Data System (ADS)

    Mawass, Mohamad-Assaad; Richter, Kornel; Bisig, Andre; Reeve, Robert M.; Krüger, Benjamin; Weigand, Markus; Stoll, Hermann; Krone, Andrea; Kronast, Florian; Schütz, Gisela; Kläui, Mathias

    2017-04-01

    Spintronic applications based on magnetic domain-wall (DW) motion, such as magnetic data storage, sensors, and logic devices, require approaches to reliably manipulate the magnetization in nanowires. In this paper, we report the direct dynamic experimental visualization of reliable switching from the onion to the vortex state by DW automotion at zero field in asymmetric ferromagnetic rings using a uniaxial field pulse. Employing time-resolved x-ray microscopy, we demonstrate that depending on the detailed spin structure of the DWs and the size and geometry of the rings, the automotive propagation can be tailored during the DW relaxation from the higher-energy onion state to the energetically favored vortex state, where both DWs annihilate. Our measurements show DW automotion with an average velocity of about 60 m /s , which is a significant speed for spintronic devices. Such motion is mostly governed by local forces resulting from the geometry variations in the device. A closer study of the annihilation process via micromagnetic simulations reveals that a new vortex is nucleated in between the two initial walls. We demonstrate that the annihilation of DWs through automotion in our scheme always occurs with the detailed topological nature of the walls influencing only the DW dynamics on a local scale. The simulations show good quantitative agreement with our experimental results. These findings shed light on a robust and reliable switching process of the onion state in ferromagnetic rings, which paves the way for further optimization of these devices.

  9. Aluminum 2219-T87 and 5456-H116 - A comparative study of spacecraft wall materials in dual-wall structures under hypervelocity impact

    NASA Astrophysics Data System (ADS)

    Schonberg, William P.

    1992-11-01

    All earth-orbiting spacecraft are susceptible to high-speed impacts by pieces of orbital debris. To prevent mission failure and possibly loss of life, protection against perforation by high-speed orbital debris particles must be included in the spacecraft design. Although any number of materials can be used to manufacture perforation-resistant structures, aluminum is often used in such systems because of its relatively high strength-to-weight ratio. This paper presents the results of a study in which the high speed impact response characteristics of dual-wall structures made from two different aluminum alloys were analyzed to determine which alloy would be more suitable for use in a perforation-resistant dual-wall structural system that is to be exposed to the orbital debris environment. Impact response characteristics were obtained numerically and experimentally. At impact speeds below 7 km/s, it was found that the two aluminum alloys considered contributed similar levels of perforation resistance; at speeds in excess of 7 km/s, aluminum 2219-T87 was superior to aluminum 5546-H116 in preventing perforation of dual-wall structural systems.

  10. Aluminum 2219-T87 and 5456-H116 - A comparative study of spacecraft wall materials in dual-wall structures under hypervelocity impact

    NASA Technical Reports Server (NTRS)

    Schonberg, William P.

    1992-01-01

    All earth-orbiting spacecraft are susceptible to high-speed impacts by pieces of orbital debris. To prevent mission failure and possibly loss of life, protection against perforation by high-speed orbital debris particles must be included in the spacecraft design. Although any number of materials can be used to manufacture perforation-resistant structures, aluminum is often used in such systems because of its relatively high strength-to-weight ratio. This paper presents the results of a study in which the high speed impact response characteristics of dual-wall structures made from two different aluminum alloys were analyzed to determine which alloy would be more suitable for use in a perforation-resistant dual-wall structural system that is to be exposed to the orbital debris environment. Impact response characteristics were obtained numerically and experimentally. At impact speeds below 7 km/s, it was found that the two aluminum alloys considered contributed similar levels of perforation resistance; at speeds in excess of 7 km/s, aluminum 2219-T87 was superior to aluminum 5546-H116 in preventing perforation of dual-wall structural systems.

  11. Design of SC walls and slabs for impulsive loading

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Varma, Amit H.

    2015-11-11

    Reinforced concrete (RC) structures have historically been the preferred choice for blast resistant structures because of their mass and the ductility provided by steel reinforcement. Steel-plate composite (SC) walls are a viable alternative to RC for protecting the infrastructure against explosive threats. SC structures consist of two steel faceplates with a plain concrete core between them. The steel faceplates are anchored to the concrete using stud anchors and connected to each other using tie bars. SC structures provide mass from the concrete infill and ductility from the continuous external steel faceplates. This dissertation presents findings and recommendations from experimental andmore » analytical investigations of the performance of SC walls subjected to far-field blast loads.« less

  12. Wall shear stress measurement in blade end-wall corner region

    NASA Technical Reports Server (NTRS)

    Bhargava, R.; Raj, R.; Boldman, D. R.

    1987-01-01

    The magnitude and the direction of wall shear stress and surface pressure in the blade end-wall corner region were investigated. The measurements were obtained on a specially designed Preston tube, the tip of which could be concentrically rotated about its axis of rotation at the measurement location. The magnitude of wall shear stress in the vicinity of the corner was observed to increase significantly (170 percent) compared to its far-upstream value; the increase was consistently higher on the blade surface compared to the value on the plate surface of the blade end-wall corner. On both surfaces in the blade end-wall corner, the variation of the wall shear stress direction was found to be more predominant in the vicinity of the blade leading-edge location. The trend of the measured wall shear stress direction showed good agreement with the limiting streamline directions obtained from the flow visualization studies.

  13. A Survey of Authentication Schemes in Telecare Medicine Information Systems.

    PubMed

    Aslam, Muhammad Umair; Derhab, Abdelouahid; Saleem, Kashif; Abbas, Haider; Orgun, Mehmet; Iqbal, Waseem; Aslam, Baber

    2017-01-01

    E-Healthcare is an emerging field that provides mobility to its users. The protected health information of the users are stored at a remote server (Telecare Medical Information System) and can be accessed by the users at anytime. Many authentication protocols have been proposed to ensure the secure authenticated access to the Telecare Medical Information System. These protocols are designed to provide certain properties such as: anonymity, untraceability, unlinkability, privacy, confidentiality, availability and integrity. They also aim to build a key exchange mechanism, which provides security against some attacks such as: identity theft, password guessing, denial of service, impersonation and insider attacks. This paper reviews these proposed authentication protocols and discusses their strengths and weaknesses in terms of ensured security and privacy properties, and computation cost. The schemes are divided in three broad categories of one-factor, two-factor and three-factor authentication schemes. Inter-category and intra-category comparison has been performed for these schemes and based on the derived results we propose future directions and recommendations that can be very helpful to the researchers who work on the design and implementation of authentication protocols.

  14. A family of chaotic pure analog coding schemes based on baker's map function

    NASA Astrophysics Data System (ADS)

    Liu, Yang; Li, Jing; Lu, Xuanxuan; Yuen, Chau; Wu, Jun

    2015-12-01

    This paper considers a family of pure analog coding schemes constructed from dynamic systems which are governed by chaotic functions—baker's map function and its variants. Various decoding methods, including maximum likelihood (ML), minimum mean square error (MMSE), and mixed ML-MMSE decoding algorithms, have been developed for these novel encoding schemes. The proposed mirrored baker's and single-input baker's analog codes perform a balanced protection against the fold error (large distortion) and weak distortion and outperform the classical chaotic analog coding and analog joint source-channel coding schemes in literature. Compared to the conventional digital communication system, where quantization and digital error correction codes are used, the proposed analog coding system has graceful performance evolution, low decoding latency, and no quantization noise. Numerical results show that under the same bandwidth expansion, the proposed analog system outperforms the digital ones over a wide signal-to-noise (SNR) range.

  15. [Study on optimal model of hypothetical work injury insurance scheme].

    PubMed

    Ye, Chi-yu; Dong, Heng-jin; Wu, Yuan; Duan, Sheng-nan; Liu, Xiao-fang; You, Hua; Hu, Hui-mei; Wang, Lin-hao; Zhang, Xing; Wang, Jing

    2013-12-01

    scheme actually realizes cross-regional mobility of workers, minimizes regional differences, and embodies the fairness. The proposed model will, to some extent, protect the rights and interests of enterprises, as well as the healthy rights and interests of workers when they are unemployed.

  16. Wall-based identification of coherent structures in wall-bounded turbulence

    NASA Astrophysics Data System (ADS)

    Sanmiguel Vila, C.; Flores, O.

    2018-04-01

    During the last decades, a number of reduced order models based on coherent structures have been proposed to describe wall-bounded turbulence. Many of these models emphasize the importance of coherent wall-normal velocity eddies (ν-eddies), which drive the generation of the very long streamwise velocity structures observed in the logarithmic and outer region. In order to use these models to improve our ability to control wall-bounded turbulence in realistic applications, these ν-eddies need to be identified from the wall in a non-intrusive way. In this paper, the possibility of using the pressure signal at the wall to identify these ν-eddies is explored, analyzing the cross-correlation between the wall-normal velocity component and the pressure fluctuations at the wall in a DNS of a turbulent channel flow at Reτ = 939. The results show that the cross-correlation has a region of negative correlation upstream, and a region of positive correlation backwards. In the spanwise direction the correlation decays monotonously, except very close to the wall where a change of sign of the correlation coefficient is observed. Moreover, filtering the pressure fluctuations at the wall in space results in an increase of the region where the cross-correlation is strong, both for the positively and the negatively correlated regions. The use of a time filter for the pressure fluctuations at the wall yields different results, displacing the regions of strong correlation without changing much their sizes. The results suggest that space-filtering the pressure at the wall is a feasible way to identify ν-eddies of different sizes, which could be used to trigger turbulent control strategies.

  17. Spontaneous Behaviors and Wall-Curvature Lead to Apparent Wall Preference in Planarian

    PubMed Central

    Akiyama, Yoshitaro; Agata, Kiyokazu; Inoue, Takeshi

    2015-01-01

    The planarian Dugesia japonica tends to stay near the walls of its breeding containers and experimental dishes in the laboratory, a phenomenon called “wall preference”. This behavior is thought to be important for environmental adaptation, such as hiding by planarians in nature. However, the mechanisms regulating wall-preference behavior are not well understood, since this behavior occurs in the absence of any particular stimulation. Here we show the mechanisms of wall-preference behavior. Surprisingly, planarian wall-preference behavior was also shown even by the head alone and by headless planarians. These results indicate that planarian “wall-preference” behavior only appears to be a “preference” behavior, and is actually an outcome of spontaneous behaviors, rather than of brain function. We found that in the absence of environmental cues planarians moved basically straight ahead until they reached a wall, and that after reaching a wall, they changed their direction of movement to one tangential to the wall, suggesting that this spontaneous behavior may play a critical role in the wall preference. When we tested another spontaneous behavior, the wigwag movement of the planarian head, using computer simulation with various wigwag angles and wigwag intervals, large wigwag angle and short wigwag interval reduced wall-preference behavior. This indicated that wigwag movement may determine the probability of staying near the wall or leaving the wall. Furthermore, in accord with this simulation, when we tested planarian wall-preference behavior using several assay fields with different curvature of the wall, we found that concavity and sharp curvature of walls negatively impacted wall preference by affecting the permissible angle of the wigwag movement. Together, these results indicate that planarian wall preference may be involuntarily caused by the combination of two spontaneous planarian behaviors: moving straight ahead until reaching a wall and then

  18. Domain wall nanoelectronics

    NASA Astrophysics Data System (ADS)

    Catalan, G.; Seidel, J.; Ramesh, R.; Scott, J. F.

    2012-01-01

    Domains in ferroelectrics were considered to be well understood by the middle of the last century: They were generally rectilinear, and their walls were Ising-like. Their simplicity stood in stark contrast to the more complex Bloch walls or Néel walls in magnets. Only within the past decade and with the introduction of atomic-resolution studies via transmission electron microscopy, electron holography, and atomic force microscopy with polarization sensitivity has their real complexity been revealed. Additional phenomena appear in recent studies, especially of magnetoelectric materials, where functional properties inside domain walls are being directly measured. In this paper these studies are reviewed, focusing attention on ferroelectrics and multiferroics but making comparisons where possible with magnetic domains and domain walls. An important part of this review will concern device applications, with the spotlight on a new paradigm of ferroic devices where the domain walls, rather than the domains, are the active element. Here magnetic wall microelectronics is already in full swing, owing largely to the work of Cowburn and of Parkin and their colleagues. These devices exploit the high domain wall mobilities in magnets and their resulting high velocities, which can be supersonic, as shown by Kreines’ and co-workers 30 years ago. By comparison, nanoelectronic devices employing ferroelectric domain walls often have slower domain wall speeds, but may exploit their smaller size as well as their different functional properties. These include domain wall conductivity (metallic or even superconducting in bulk insulating or semiconducting oxides) and the fact that domain walls can be ferromagnetic while the surrounding domains are not.

  19. Pension reforms in Hong Kong: using residual and collaborative strategies to deal with the government's financial responsibility in providing retirement protection.

    PubMed

    Yu, Sam Wai-Kam

    2008-01-01

    In 2000, the Hong Kong government introduced the first compulsory retirement saving scheme intended to protect the entire workforce, the Mandatory Provident Fund (MPF). Prior to the introduction of this scheme, the government's main measure for giving financial protection to retirees was the Comprehensive Social Security Assistance (CSSA) scheme, which is a noncontributory, means-tested financial assistance scheme. This paper studies the government's attempt to introduce the MPF on top of the CSSA scheme as a means to illustrate how governments might address their financial responsibilities in providing pension schemes by adopting both the residual strategy-centered reform approach and the collaborative strategy-centered reform approach. The former approach is concerned with developing noncontributory schemes using residual strategies, and the latter is concerned with developing contributory schemes using collaborative strategies. The paper shows the difficulties involved in carrying out these two reform approaches simultaneously.

  20. Thermal Conductivity of Single-Walled Carbon Nanotube with Internal Heat Source Studied by Molecular Dynamics Simulation

    NASA Astrophysics Data System (ADS)

    Li, Yuan-Wei; Cao, Bing-Yang

    2013-12-01

    The thermal conductivity of (5, 5) single-walled carbon nanotubes (SWNTs) with an internal heat source is investigated by using nonequilibrium molecular dynamics (NEMD) simulation incorporating uniform heat source and heat source-and-sink schemes. Compared with SWNTs without an internal heat source, i.e., by a fixed-temperature difference scheme, the thermal conductivity of SWNTs with an internal heat source is much lower, by as much as half in some cases, though it still increases with an increase of the tube length. Based on the theory of phonon dynamics, a function called the phonon free path distribution is defined to develop a simple one-dimensional heat conduction model considering an internal heat source, which can explain diffusive-ballistic heat transport in carbon nanotubes well.

  1. Cell Wall and Secreted Proteins of Candida albicans: Identification, Function, and Expression

    PubMed Central

    Chaffin, W. Lajean; López-Ribot, José Luis; Casanova, Manuel; Gozalbo, Daniel; Martínez, José P.

    1998-01-01

    The cell wall is essential to nearly every aspect of the biology and pathogenicity of Candida albicans. Although it was intially considered an almost inert cellular structure that protected the protoplast against osmotic offense, more recent studies have demonstrated that it is a dynamic organelle. The major components of the cell wall are glucan and chitin, which are associated with structural rigidity, and mannoproteins. The protein component, including both mannoprotein and nonmannoproteins, comprises some 40 or more moieties. Wall proteins may differ in their expression, secretion, or topological location within the wall structure. Proteins may be modified by glycosylation (primarily addition of mannose residues), phosphorylation, and ubiquitination. Among the secreted enzymes are those that are postulated to have substrates within the cell wall and those that find substrates in the extracellular environment. Cell wall proteins have been implicated in adhesion to host tissues and ligands. Fibrinogen, complement fragments, and several extracellular matrix components are among the host proteins bound by cell wall proteins. Proteins related to the hsp70 and hsp90 families of conserved stress proteins and some glycolytic enzyme proteins are also found in the cell wall, apparently as bona fide components. In addition, the expression of some proteins is associated with the morphological growth form of the fungus and may play a role in morphogenesis. Finally, surface mannoproteins are strong immunogens that trigger and modulate the host immune response during candidiasis. PMID:9529890

  2. Simple scheme for encoding and decoding a qubit in unknown state for various topological codes

    PubMed Central

    Łodyga, Justyna; Mazurek, Paweł; Grudka, Andrzej; Horodecki, Michał

    2015-01-01

    We present a scheme for encoding and decoding an unknown state for CSS codes, based on syndrome measurements. We illustrate our method by means of Kitaev toric code, defected-lattice code, topological subsystem code and 3D Haah code. The protocol is local whenever in a given code the crossings between the logical operators consist of next neighbour pairs, which holds for the above codes. For subsystem code we also present scheme in a noisy case, where we allow for bit and phase-flip errors on qubits as well as state preparation and syndrome measurement errors. Similar scheme can be built for two other codes. We show that the fidelity of the protected qubit in the noisy scenario in a large code size limit is of , where p is a probability of error on a single qubit per time step. Regarding Haah code we provide noiseless scheme, leaving the noisy case as an open problem. PMID:25754905

  3. 19. INTERIOR OF UTILITY ROOM SHOWING STUCCO WALL/DRYWALL WALL TRANSITION, ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    19. INTERIOR OF UTILITY ROOM SHOWING STUCCO WALL/DRYWALL WALL TRANSITION, ELECTRICAL JUNCTION BOXES, BUILT-IN WALL CABINETRY, AND ELECTRICAL WALL HEATER. VIEW TO NORTHEAST. - Bishop Creek Hydroelectric System, Plant 4, Worker Cottage, Bishop Creek, Bishop, Inyo County, CA

  4. Outside-in control -Does plant cell wall integrity regulate cell cycle progression?

    PubMed

    Gigli-Bisceglia, Nora; Hamann, Thorsten

    2018-04-13

    During recent years it has become accepted that plant cell walls are not inert objects surrounding all plant cells but are instead highly dynamic, plastic structures. They are involved in a large number of cell biological processes and contribute actively to plant growth, development and interaction with environment. Therefore, it is not surprising that cellular processes can control plant cell wall integrity while, simultaneously, cell wall integrity can influence cellular processes. In yeast and animal cells such a bi-directional relationship also exists between the yeast/animal extra-cellular matrices and the cell cycle. In yeast, the cell wall integrity maintenance mechanism and a dedicated plasmamembrane integrity checkpoint are mediating this relationship. Recent research has yielded insights into the mechanism controlling plant cell wall metabolism during cytokinesis. However, knowledge regarding putative regulatory pathways controlling adaptive modifications in plant cell cycle activity in response to changes in the state of the plant cell wall are not yet identified. In this review, we summarize similarities and differences in regulatory mechanisms coordinating extra cellular matrices and cell cycle activity in animal and yeast cells, discuss the available evidence supporting the existence of such a mechanism in plants and suggest that the plant cell wall integrity maintenance mechanism might also control cell cycle activity in plant cells. This article is protected by copyright. All rights reserved.

  5. Error-Resilient Unequal Error Protection of Fine Granularity Scalable Video Bitstreams

    NASA Astrophysics Data System (ADS)

    Cai, Hua; Zeng, Bing; Shen, Guobin; Xiong, Zixiang; Li, Shipeng

    2006-12-01

    This paper deals with the optimal packet loss protection issue for streaming the fine granularity scalable (FGS) video bitstreams over IP networks. Unlike many other existing protection schemes, we develop an error-resilient unequal error protection (ER-UEP) method that adds redundant information optimally for loss protection and, at the same time, cancels completely the dependency among bitstream after loss recovery. In our ER-UEP method, the FGS enhancement-layer bitstream is first packetized into a group of independent and scalable data packets. Parity packets, which are also scalable, are then generated. Unequal protection is finally achieved by properly shaping the data packets and the parity packets. We present an algorithm that can optimally allocate the rate budget between data packets and parity packets, together with several simplified versions that have lower complexity. Compared with conventional UEP schemes that suffer from bit contamination (caused by the bit dependency within a bitstream), our method guarantees successful decoding of all received bits, thus leading to strong error-resilience (at any fixed channel bandwidth) and high robustness (under varying and/or unclean channel conditions).

  6. 22. SIDE WALL CONSTRUCTION, NORTH TRAINING WALL, LOOKING WEST FROM ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    22. SIDE WALL CONSTRUCTION, NORTH TRAINING WALL, LOOKING WEST FROM THE SAME POINT AS VIEW NO. 21. - Oakland Harbor Training Walls, Mouth of Federal Channel to Inner Harbor, Oakland, Alameda County, CA

  7. Effect of wall material on the antioxidant activity and physicochemical properties of Rubus fruticosus juice microcapsules.

    PubMed

    Díaz, Dafne I; Beristain, Cesar I; Azuara, Ebner; Luna, Guadalupe; Jimenez, Maribel

    2015-01-01

    Blackberry (Rubus fruticosus) juice possesses compounds with antioxidant activity, which can be protected by different biopolymers used in the microencapsulation. Therefore, the effects of cell wall material including maltodextrin (MD), Arabic gum (GA) and whey protein concentrate (WPC) were evaluated on the physicochemical and antioxidant properties of encapsulated blackberries using a spray-drying technique. Anthocyanin concentration, polymeric colour, total polyphenols, radical scavenging activity of the 1,1-diphenyl-2-picrilhydrazil radical, reducing power and the stability at different storage conditions were evaluated. GA and MD conferred a similar protection to the antioxidant compounds when the microcapsules were stored at low water activities (aw < 0.515) in contrast to at a high moisture content (aw > 0.902), whereas WPC presented a high protection. Therefore, the selection of the best wall material for blackberry juice encapsulation depends of the conditions of storage of the powder.

  8. An Efficient Semi-fragile Watermarking Scheme for Tamper Localization and Recovery

    NASA Astrophysics Data System (ADS)

    Hou, Xiang; Yang, Hui; Min, Lianquan

    2018-03-01

    To solve the problem that remote sensing images are vulnerable to be tampered, a semi-fragile watermarking scheme was proposed. Binary random matrix was used as the authentication watermark, which was embedded by quantizing the maximum absolute value of directional sub-bands coefficients. The average gray level of every non-overlapping 4×4 block was adopted as the recovery watermark, which was embedded in the least significant bit. Watermarking detection could be done directly without resorting to the original images. Experimental results showed our method was robust against rational distortions to a certain extent. At the same time, it was fragile to malicious manipulation, and realized accurate localization and approximate recovery of the tampered regions. Therefore, this scheme can protect the security of remote sensing image effectively.

  9. What are the emerging features of community health insurance schemes in East Africa?

    PubMed Central

    Basaza, Robert; Pariyo, George; Criel, Bart

    2009-01-01

    Background The three East African countries of Uganda, Tanzania, and Kenya are characterized by high poverty levels, population growth rates, prevalence of HIV/AIDS, under-funding of the health sector, poor access to quality health care, and small health insurance coverage. Tanzania and Kenya have user-fees whereas Uganda abolished user-fees in public-owned health units. Objective To provide comparative description of community health insurance (CHI) schemes in three East African countries of Uganda, Tanzania, and Kenya and thereafter provide a basis for future policy research for development of CHI schemes. Methods An analytical grid of 10 distinctive items pertaining to the nature of CHI schemes was developed so as to have a uniform lens of comparing country situations of CHI. Results and conclusions The majority of the schemes have been in existence for a relatively short time of less than 10 years and their number remains small. There is need for further research to identify what is the mix and weight of factors that cause people to refrain from joining schemes. Specific issues that could also be addressed in subsequent studies are whether the current schemes provide financial protection, increase access to quality of care and impact on the equity of health services financing and delivery. On the basis of this knowledge, rational policy decisions can be taken. The governments thereafter could consider an option of playing more roles in advocacy, paying for the poorest, and developing an enabling policy and legal framework. PMID:22312207

  10. Wall Shear Stress, Wall Pressure and Near Wall Velocity Field Relationships in a Whirling Annular Seal

    NASA Technical Reports Server (NTRS)

    Morrison, Gerald L.; Winslow, Robert B.; Thames, H. Davis, III

    1996-01-01

    The mean and phase averaged pressure and wall shear stress distributions were measured on the stator wall of a 50% eccentric annular seal which was whirling in a circular orbit at the same speed as the shaft rotation. The shear stresses were measured using flush mounted hot-film probes. Four different operating conditions were considered consisting of Reynolds numbers of 12,000 and 24,000 and Taylor numbers of 3,300 and 6,600. At each of the operating conditions the axial distribution (from Z/L = -0.2 to 1.2) of the mean pressure, shear stress magnitude, and shear stress direction on the stator wall were measured. Also measured were the phase averaged pressure and shear stress. These data were combined to calculate the force distributions along the seal length. Integration of the force distributions result in the net forces and moments generated by the pressure and shear stresses. The flow field inside the seal operating at a Reynolds number of 24,000 and a Taylor number of 6,600 has been measured using a 3-D laser Doppler anemometer system. Phase averaged wall pressure and wall shear stress are presented along with phase averaged mean velocity and turbulence kinetic energy distributions located 0.16c from the stator wall where c is the seal clearance. The relationships between the velocity, turbulence, wall pressure and wall shear stress are very complex and do not follow simple bulk flow predictions.

  11. Plant cell walls throughout evolution: towards a molecular understanding of their design principles.

    PubMed

    Sarkar, Purbasha; Bosneaga, Elena; Auer, Manfred

    2009-01-01

    Throughout their life, plants typically remain in one location utilizing sunlight for the synthesis of carbohydrates, which serve as their sole source of energy as well as building blocks of a protective extracellular matrix, called the cell wall. During the course of evolution, plants have repeatedly adapted to their respective niche, which is reflected in the changes of their body plan and the specific design of cell walls. Cell walls not only changed throughout evolution but also are constantly remodelled and reconstructed during the development of an individual plant, and in response to environmental stress or pathogen attacks. Carbohydrate-rich cell walls display complex designs, which together with the presence of phenolic polymers constitutes a barrier for microbes, fungi, and animals. Throughout evolution microbes have co-evolved strategies for efficient breakdown of cell walls. Our current understanding of cell walls and their evolutionary changes are limited as our knowledge is mainly derived from biochemical and genetic studies, complemented by a few targeted yet very informative imaging studies. Comprehensive plant cell wall models will aid in the re-design of plant cell walls for the purpose of commercially viable lignocellulosic biofuel production as well as for the timber, textile, and paper industries. Such knowledge will also be of great interest in the context of agriculture and to plant biologists in general. It is expected that detailed plant cell wall models will require integrated correlative multimodal, multiscale imaging and modelling approaches, which are currently underway.

  12. New Encryption Scheme of One-Time Pad Based on KDC

    NASA Astrophysics Data System (ADS)

    Xie, Xin; Chen, Honglei; Wu, Ying; Zhang, Heng; Wu, Peng

    As more and more leakage incidents come up, traditional encryption system has not adapted to the complex and volatile network environment, so, there should be a new encryption system that can protect information security very well, this is the starting point of this paper. Based on DES and RSA encryption system, this paper proposes a new scheme of one time pad, which really achieves "One-time pad" and provides information security a new and more reliable encryption method.

  13. 2D granular flows with the μ(I) rheology and side walls friction: A well-balanced multilayer discretization

    NASA Astrophysics Data System (ADS)

    Fernández-Nieto, E. D.; Garres-Díaz, J.; Mangeney, A.; Narbona-Reina, G.

    2018-03-01

    We present here numerical modelling of granular flows with the μ (I) rheology in confined channels. The contribution is twofold: (i) a model to approximate the Navier-Stokes equations with the μ (I) rheology through an asymptotic analysis; under the hypothesis of a one-dimensional flow, this model takes into account side walls friction; (ii) a multilayer discretization following Fernández-Nieto et al. (2016) [20]. In this new numerical scheme, we propose an appropriate treatment of the rheological terms through a hydrostatic reconstruction which allows this scheme to be well-balanced and therefore to deal with dry areas. Based on academic tests, we first evaluate the influence of the width of the channel on the normal profiles of the downslope velocity thanks to the multilayer approach that is intrinsically able to describe changes from Bagnold to S-shaped (and vice versa) velocity profiles. We also check the well-balanced property of the proposed numerical scheme. We show that approximating side walls friction using single-layer models may lead to strong errors. Secondly, we compare the numerical results with experimental data on granular collapses. We show that the proposed scheme allows us to qualitatively reproduce the deposit in the case of a rigid bed (i.e. dry area) and that the error made by replacing the dry area by a small layer of material may be large if this layer is not thin enough. The proposed model is also able to reproduce the time evolution of the free surface and of the flow/no-flow interface. In addition, it reproduces the effect of erosion for granular flows over initially static material lying on the bed. This is possible when using a variable friction coefficient μ (I) but not with a constant friction coefficient.

  14. Unit 4, STA. 59+00+lb sideslope with masonry walls (withouth parapets), ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    Unit 4, STA. 59+00+lb sideslope with masonry walls (withouth parapets), Cambria Iron Company National Historic Landmark-detail - Johnstown Local Flood Protection Project, Beginning on Conemaugh River approx 3.8 miles downstream from confluence of Little Conemaugh & Stony Creek Rivers at Johnstown, Johnstown, Cambria County, PA

  15. Unit 4, STA. 31+00+lb, sideslope with concrete walls (without parapets), ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    Unit 4, STA. 31+00+lb, sideslope with concrete walls (without parapets), Cambria Iron Company National Historic Landmark-Context - Johnstown Local Flood Protection Project, Beginning on Conemaugh River approx 3.8 miles downstream from confluence of Little Conemaugh & Stony Creek Rivers at Johnstown, Johnstown, Cambria County, PA

  16. Influence of Different PBL Schemes on Secondary Eyewall Formation and Eyewall Replacement Cycle in Simulated Typhoon Sinlaku (2008)

    NASA Astrophysics Data System (ADS)

    Zhang, Yutao

    2017-04-01

    The effects of the different planetary boundary layer (PBL) processes on the secondary eyewall formation (SEF) and eyewall replacement cycle (ERC) in Typhoon Sinlaku (2008) are investigated by using the Weather Research and Forecasting Model (WRF) with six different PBL schemes. The SEF and ERC have been successfully simulated with all the six PBL schemes and the mechanism of the SEF and ERC proposed in our previous study has been reconfirmed: It is demonstrated that both the intensification of the storm and the inward-moving outer spiral rainband contribute to the SEF. After the SEF, the associated diabatic heating enhances the secondary eyewall further and transfer of the moist air from outer region to the primary eyewall is cut off by the secondary eyewall. In such a way the primary eyewall dies and an ERC completes. It is found that some simulated features of the SEF and ERC, such as the time and location of the SEF and duration of the ERC, do vary from one simulation to another. In order to describe the feature of the SEF and ERC quantitatively, a concentric eyewall index (CEI) is defined and a threshold of the CEI is suggested to determine the onset of the secondary eyewall. The differences of the simulated SEF and ERC are discussed and some possible causes are suggested. In addition, based on the threshold of the CEI and the conservation law of the angular momentum a formula to predict the location of the SEF is also suggested and applied to all the six simulations. The success and failure of the formula are also discussed. Key words: eye-wall replacement cycle, secondary eye-wall formation, PBL scheme, CEI

  17. Priority setting for government investment in forestry conservation schemes-an example from New Zealand

    Treesearch

    Colin L. O' Loughlin

    1991-01-01

    In New Zealand responsibility for funding flood protection and erosion prevention and control projects rests largely with local regional authorities. However, in 1988 Central Government decided to provide direct funding for a major forestry conservation scheme in the erosion-susceptible East Coast region. Government's investment decision was influenced by a number...

  18. Microencapsulation of Lactobacillus acidophilus NCFM using polymerized whey proteins as wall material.

    PubMed

    Jiang, Yujun; Zheng, Zhe; Zhang, Tiehua; Hendricks, Gregory; Guo, Mingruo

    2016-09-01

    Survivability of probiotics in foods is essential for developing functional food containing probiotics. We investigated polymerized whey protein (PWP)-based microencapsulation process which is developed for protecting probiotics like Lactobacillus acidophilus NCFM and compared with the method using sodium alginate (SA). The entrapment rate was 89.3 ± 4.8% using PWP, while it was 73.2 ± 1.4% for SA. The microencapsulated NCFM by PWP and SA were separately subjected to digestion juices and post-fermentation storage of fermented cows' and goats' milk using the encapsulated culture. The log viable count of NCFM in PWP-based microencapsulation was 4.56, compared with that of 4.26 in SA-based ones and 3.13 for free culture. Compared with using SA as wall material, PWP was more effective in protecting probiotic. Microencapsulation of L. acidophilus NCFM using PWP as wall material can be exploited in the development of fermented dairy products with better survivability of probiotic organism.

  19. A secure and efficient authentication and key agreement scheme based on ECC for telecare medicine information systems.

    PubMed

    Xu, Xin; Zhu, Ping; Wen, Qiaoyan; Jin, Zhengping; Zhang, Hua; He, Lian

    2014-01-01

    In the field of the Telecare Medicine Information System, recent researches have focused on consummating more convenient and secure healthcare delivery services for patients. In order to protect the sensitive information, various attempts such as access control have been proposed to safeguard patients' privacy in this system. However, these schemes suffered from some certain security defects and had costly consumption, which were not suitable for the telecare medicine information system. In this paper, based on the elliptic curve cryptography, we propose a secure and efficient two-factor mutual authentication and key agreement scheme to reduce the computational cost. Such a scheme enables to provide the patient anonymity by employing the dynamic identity. Compared with other related protocols, the security analysis and performance evaluation show that our scheme overcomes some well-known attacks and has a better performance in the telecare medicine information system.

  20. An Efficient and Practical Smart Card Based Anonymity Preserving User Authentication Scheme for TMIS using Elliptic Curve Cryptography.

    PubMed

    Amin, Ruhul; Islam, S K Hafizul; Biswas, G P; Khan, Muhammad Khurram; Kumar, Neeraj

    2015-11-01

    In the last few years, numerous remote user authentication and session key agreement schemes have been put forwarded for Telecare Medical Information System, where the patient and medical server exchange medical information using Internet. We have found that most of the schemes are not usable for practical applications due to known security weaknesses. It is also worth to note that unrestricted number of patients login to the single medical server across the globe. Therefore, the computation and maintenance overhead would be high and the server may fail to provide services. In this article, we have designed a medical system architecture and a standard mutual authentication scheme for single medical server, where the patient can securely exchange medical data with the doctor(s) via trusted central medical server over any insecure network. We then explored the security of the scheme with its resilience to attacks. Moreover, we formally validated the proposed scheme through the simulation using Automated Validation of Internet Security Schemes and Applications software whose outcomes confirm that the scheme is protected against active and passive attacks. The performance comparison demonstrated that the proposed scheme has lower communication cost than the existing schemes in literature. In addition, the computation cost of the proposed scheme is nearly equal to the exiting schemes. The proposed scheme not only efficient in terms of different security attacks, but it also provides an efficient login, mutual authentication, session key agreement and verification and password update phases along with password recovery.

  1. Utilization of Supercapacitors in Adaptive Protection Applications for Resiliency against Communication Failures: A Size and Cost Optimization Case Study

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Habib, Hany F; El Hariri, Mohamad; Elsayed, Ahmed

    Microgrids’ adaptive protection techniques rely on communication signals from the point of common coupling to ad- just the corresponding relays’ settings for either grid-connected or islanded modes of operation. However, during communication out- ages or in the event of a cyberattack, relays settings are not changed. Thus adaptive protection schemes are rendered unsuc- cessful. Due to their fast response, supercapacitors, which are pre- sent in the microgrid to feed pulse loads, could also be utilized to enhance the resiliency of adaptive protection schemes to communi- cation outages. Proper sizing of the supercapacitors is therefore im- portant in order to maintainmore » a stable system operation and also reg- ulate the protection scheme’s cost. This paper presents a two-level optimization scheme for minimizing the supercapacitor size along with optimizing its controllers’ parameters. The latter will lead to a reduction of the supercapacitor fault current contribution and an increase in that of other AC resources in the microgrid in the ex- treme case of having a fault occurring simultaneously with a pulse load. It was also shown that the size of the supercapacitor can be reduced if the pulse load is temporary disconnected during the transient fault period. Simulations showed that the resulting super- capacitor size and the optimized controller parameters from the proposed two-level optimization scheme were feeding enough fault currents for different types of faults and minimizing the cost of the protection scheme.« less

  2. A two‐point scheme for optimal breast IMRT treatment planning

    PubMed Central

    2013-01-01

    We propose an approach to determining optimal beam weights in breast/chest wall IMRT treatment plans. The goal is to decrease breathing effect and to maximize skin dose if the skin is included in the target or, otherwise, to minimize the skin dose. Two points in the target are utilized to calculate the optimal weights. The optimal plan (i.e., the plan with optimal beam weights) consists of high energy unblocked beams, low energy unblocked beams, and IMRT beams. Six breast and five chest wall cases were retrospectively planned with this scheme in Eclipse, including one breast case where CTV was contoured by the physician. Compared with 3D CRT plans composed of unblocked and field‐in‐field beams, the optimal plans demonstrated comparable or better dose uniformity, homogeneity, and conformity to the target, especially at beam junction when supraclavicular nodes are involved. Compared with nonoptimal plans (i.e., plans with nonoptimized weights), the optimal plans had better dose distributions at shallow depths close to the skin, especially in cases where breathing effect was taken into account. This was verified with experiments using a MapCHECK device attached to a motion simulation table (to mimic motion caused by breathing). PACS number: 87.55 de PMID:24257291

  3. Method for protection of lithographic components from particle contamination

    DOEpatents

    Klebanoff, Leonard E.; Rader, Daniel J.

    2001-07-03

    A system that employs thermophoresis to protect lithographic surfaces from particle deposition and operates in an environment where the pressure is substantially constant and can be sub-atmospheric. The system (thermophoretic pellicle) comprises an enclosure that surrounds a lithographic component whose surface is being protected from particle deposition. The enclosure is provided with means for introducing a flow of gas into the chamber and at least one aperture that provides for access to the lithographic surface for the entry and exit of a beam of radiation, for example, and further controls gas flow into a surrounding low pressure environment such that a higher pressure is maintained within the enclosure and over the surface being protected. The lithographic component can be heated or, alternatively the walls of the enclosure can be cooled to establish a temperature gradient between the surface of the lithographic component and the walls of the enclosure, thereby enabling the thermophoretic force that resists particle deposition.

  4. Development of an Urban Multilayer Radiation Scheme and Its Application to the Urban Surface Warming Potential

    NASA Astrophysics Data System (ADS)

    Aoyagi, Toshinori; Takahashi, Shunji

    2012-02-01

    To investigate how a three-dimensional structure such as an urban canyon can affect urban surface warming, we developed an urban multilayer radiation scheme. The complete consideration of multiple scattering of shortwave and longwave radiation using the radiosity method is an important feature of the present scheme. A brief description of this scheme is presented, followed by evaluations that compare its results with observations of the effective albedo and radiative temperature for urban blocks. Next, we calculate the urban surface warming potential (USWP), defined as the difference between the daily mean radiative temperature of urban surfaces (which are assumed to be black bodies), including their canyon effects and the daily mean temperature of a flat surface with the same material properties, under a radiative equilibrium state. Assuming standard material properties (albedo and emissivity of 0.4 and 0.9, respectively), we studied the sensitivity of the USWP to various aspect ratios of building heights to road widths. The results show that the temporally-averaged surface temperature of an urban area can be higher than that of a flat surface. In addition, we determined the overestimation of the effective temperature of urban surfaces induced by the overestimation of the radiation distribution to the walls when one uses a single-layer scheme for urban block arrays that have a low sky-view factor less than around 0.5.

  5. 5. Detail of bin wall, showing the thinner exterior wall ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    5. Detail of bin wall, showing the thinner exterior wall next to the inner wall with its alternating courses of channel tile and hollow tile. - Saint Anthony Elevator No. 3, 620 Malcom Avenue, Southeast, Minneapolis, Hennepin County, MN

  6. The Cerato-Platanin protein Epl-1 from Trichoderma harzianum is involved in mycoparasitism, plant resistance induction and self cell wall protection

    PubMed Central

    Gomes, Eriston Vieira; Costa, Mariana do Nascimento; de Paula, Renato Graciano; Ricci de Azevedo, Rafael; da Silva, Francilene Lopes; Noronha, Eliane F.; José Ulhoa, Cirano; Neves Monteiro, Valdirene; Elena Cardoza, Rosa; Gutiérrez, Santiago; Nascimento Silva, Roberto

    2015-01-01

    Trichoderma harzianum species are well known as biocontrol agents against important fungal phytopathogens. Mycoparasitism is one of the strategies used by this fungus in the biocontrol process. In this work, we analyzed the effect of Epl-1 protein, previously described as plant resistance elicitor, in expression modulation of T. harzianum genes involved in mycoparasitism process against phytopathogenic fungi; self cell wall protection and recognition; host hyphae coiling and triggering expression of defense-related genes in beans plants. The results indicated that the absence of Epl-1 protein affects the expression of all mycoparasitism genes analyzed in direct confrontation assays against phytopathogen Sclerotinia sclerotiorum as well as T. harzianum itself; the host mycoparasitic coiling process and expression modulation of plant defense genes showing different pattern compared with wild type strain. These data indicated the involvement T. harzianum Epl-1 in self and host interaction and also recognition of T. harzianum as a symbiotic fungus by the bean plants. PMID:26647876

  7. The Cerato-Platanin protein Epl-1 from Trichoderma harzianum is involved in mycoparasitism, plant resistance induction and self cell wall protection.

    PubMed

    Gomes, Eriston Vieira; Costa, Mariana do Nascimento; de Paula, Renato Graciano; de Azevedo, Rafael Ricci; da Silva, Francilene Lopes; Noronha, Eliane F; Ulhoa, Cirano José; Monteiro, Valdirene Neves; Cardoza, Rosa Elena; Gutiérrez, Santiago; Silva, Roberto Nascimento

    2015-12-09

    Trichoderma harzianum species are well known as biocontrol agents against important fungal phytopathogens. Mycoparasitism is one of the strategies used by this fungus in the biocontrol process. In this work, we analyzed the effect of Epl-1 protein, previously described as plant resistance elicitor, in expression modulation of T. harzianum genes involved in mycoparasitism process against phytopathogenic fungi; self cell wall protection and recognition; host hyphae coiling and triggering expression of defense-related genes in beans plants. The results indicated that the absence of Epl-1 protein affects the expression of all mycoparasitism genes analyzed in direct confrontation assays against phytopathogen Sclerotinia sclerotiorum as well as T. harzianum itself; the host mycoparasitic coiling process and expression modulation of plant defense genes showing different pattern compared with wild type strain. These data indicated the involvement T. harzianum Epl-1 in self and host interaction and also recognition of T. harzianum as a symbiotic fungus by the bean plants.

  8. A uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care.

    PubMed

    Chang, Ya-Fen; Yu, Shih-Hui; Shiao, Ding-Rui

    2013-04-01

    Connected health care provides new opportunities for improving financial and clinical performance. Many connected health care applications such as telecare medicine information system, personally controlled health records system, and patient monitoring have been proposed. Correct and quality care is the goal of connected heath care, and user authentication can ensure the legality of patients. After reviewing authentication schemes for connected health care applications, we find that many of them cannot protect patient privacy such that others can trace users/patients by the transmitted data. And the verification tokens used by these authentication schemes to authenticate users or servers are only password, smart card and RFID tag. Actually, these verification tokens are not unique and easy to copy. On the other hand, biometric characteristics, such as iris, face, voiceprint, fingerprint and so on, are unique, easy to be verified, and hard to be copied. In this paper, a biometrics-based user authentication scheme will be proposed to ensure uniqueness and anonymity at the same time. With the proposed scheme, only the legal user/patient himself/herself can access the remote server, and no one can trace him/her according to transmitted data.

  9. Unit 5, STA. 50+00+RB, retaining wall at First U.M. Churchdetail ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    Unit 5, STA. 50+00+RB, retaining wall at First U.M. Church-detail - Johnstown Local Flood Protection Project, Beginning on Conemaugh River approx 3.8 miles downstream from confluence of Little Conemaugh & Stony Creek Rivers at Johnstown, Johnstown, Cambria County, PA

  10. Relevance, structure and analysis of ferulic acid in maize cell walls.

    PubMed

    Bento-Silva, Andreia; Vaz Patto, Maria Carlota; do Rosário Bronze, Maria

    2018-04-25

    Phenolic compounds in foods have been widely studied due to their health benefits. In cereals, phenolic compounds are extensively linked to cell wall polysaccharides, mainly arabinoxylans, which cross-link with each other and with other cell wall components. In maize, ferulic acid is the phenolic acid present in the highest concentration, forming ferulic acid dehydrodimers, trimers and tetramers. The cross-linking of polysaccharides is important for the cell wall structure and growth, and may protect against pathogen invasion. In addition to the importance for maize physiology, ferulic acid has been recognized as an important chemical structure with a wide range of health benefits when consumed in a diet rich in fibre. This review paper presents the different ways ferulic acid can be present in maize, the importance of ferulic acid derivatives and the methodologies that can be used for their analysis. Copyright © 2017 Elsevier Ltd. All rights reserved.

  11. LevelScheme: A level scheme drawing and scientific figure preparation system for Mathematica

    NASA Astrophysics Data System (ADS)

    Caprio, M. A.

    2005-09-01

    LevelScheme is a scientific figure preparation system for Mathematica. The main emphasis is upon the construction of level schemes, or level energy diagrams, as used in nuclear, atomic, molecular, and hadronic physics. LevelScheme also provides a general infrastructure for the preparation of publication-quality figures, including support for multipanel and inset plotting, customizable tick mark generation, and various drawing and labeling tasks. Coupled with Mathematica's plotting functions and powerful programming language, LevelScheme provides a flexible system for the creation of figures combining diagrams, mathematical plots, and data plots. Program summaryTitle of program:LevelScheme Catalogue identifier:ADVZ Program obtainable from: CPC Program Library, Queen's University of Belfast, N. Ireland Program summary URL:http://cpc.cs.qub.ac.uk/summaries/ADVZ Operating systems:Any which supports Mathematica; tested under Microsoft Windows XP, Macintosh OS X, and Linux Programming language used:Mathematica 4 Number of bytes in distributed program, including test and documentation:3 051 807 Distribution format:tar.gz Nature of problem:Creation of level scheme diagrams. Creation of publication-quality multipart figures incorporating diagrams and plots. Method of solution:A set of Mathematica packages has been developed, providing a library of level scheme drawing objects, tools for figure construction and labeling, and control code for producing the graphics.

  12. A Layered Searchable Encryption Scheme with Functional Components Independent of Encryption Methods

    PubMed Central

    Luo, Guangchun; Qin, Ke

    2014-01-01

    Searchable encryption technique enables the users to securely store and search their documents over the remote semitrusted server, which is especially suitable for protecting sensitive data in the cloud. However, various settings (based on symmetric or asymmetric encryption) and functionalities (ranked keyword query, range query, phrase query, etc.) are often realized by different methods with different searchable structures that are generally not compatible with each other, which limits the scope of application and hinders the functional extensions. We prove that asymmetric searchable structure could be converted to symmetric structure, and functions could be modeled separately apart from the core searchable structure. Based on this observation, we propose a layered searchable encryption (LSE) scheme, which provides compatibility, flexibility, and security for various settings and functionalities. In this scheme, the outputs of the core searchable component based on either symmetric or asymmetric setting are converted to some uniform mappings, which are then transmitted to loosely coupled functional components to further filter the results. In such a way, all functional components could directly support both symmetric and asymmetric settings. Based on LSE, we propose two representative and novel constructions for ranked keyword query (previously only available in symmetric scheme) and range query (previously only available in asymmetric scheme). PMID:24719565

  13. Differential histone modification and protein expression associated with cell wall removal and regeneration in rice (Oryza sativa).

    PubMed

    Tan, Feng; Zhang, Kangling; Mujahid, Hana; Verma, Desh Pal S; Peng, Zhaohua

    2011-02-04

    The cell wall is a critical extracellular structure that provides protection and structural support in plant cells. To study the biological function of the cell wall and the regulation of cell wall resynthesis, we examined cellular responses to enzymatic removal of the cell wall in rice (Oryza sativa) suspension cells using proteomic approaches. We find that removal of cell wall stimulates cell wall synthesis from multiple sites in protoplasts instead of from a single site as in cytokinesis. Nucleus DAPI stain and MNase digestion further show that removal of the cell wall is concomitant with substantial chromatin reorganization. Histone post-translational modification studies using both Western blots and isotope labeling assisted quantitative mass spectrometry analyses reveal that substantial histone modification changes, particularly H3K18(AC) and H3K23(AC), are associated with the removal and regeneration of the cell wall. Label-free quantitative proteome analyses further reveal that chromatin associated proteins undergo dramatic changes upon removal of the cell wall, along with cytoskeleton, cell wall metabolism, and stress-response proteins. This study demonstrates that cell wall removal is associated with substantial chromatin change and may lead to stimulation of cell wall synthesis using a novel mechanism.

  14. An authentication scheme to healthcare security under wireless sensor networks.

    PubMed

    Hsiao, Tsung-Chih; Liao, Yu-Ting; Huang, Jen-Yan; Chen, Tzer-Shyong; Horng, Gwo-Boa

    2012-12-01

    In recent years, Taiwan has been seeing an extension of the average life expectancy and a drop in overall fertility rate, initiating our country into an aged society. Due to this phenomenon, how to provide the elderly and patients with chronic diseases a suitable healthcare environment has become a critical issue presently. Therefore, we propose a new scheme that integrates healthcare services with wireless sensor technology in which sensor nodes are employed to measure patients' vital signs. Data collected from these sensor nodes are then transmitted to mobile devices of the medical staff and system administrator, promptly enabling them to understand the patients' condition in real time, which will significantly improve patients' healthcare quality. As per the personal data protection act, patients' vital signs can only be accessed by authorized medical staff. In order to protect patients', the system administrator will verify the medical staff's identity through the mobile device using a smart card and password mechanism. Accordingly, only the verified medical staff can obtain patients' vital signs data such as their blood pressure, pulsation, and body temperature, etc.. Besides, the scheme includes a time-bounded characteristic that allows the verified staff access to data without having to have to re-authenticate and re-login into the system within a set period of time. Consequently, the time-bounded property also increases the work efficiency of the system administrator and user.

  15. A Study on Architecture of Malicious Code Blocking Scheme with White List in Smartphone Environment

    NASA Astrophysics Data System (ADS)

    Lee, Kijeong; Tolentino, Randy S.; Park, Gil-Cheol; Kim, Yong-Tae

    Recently, the interest and demands for mobile communications are growing so fast because of the increasing prevalence of smartphones around the world. In addition, the existing feature phones were replaced by smartphones and it has widely improved while using the explosive growth of Internet users using smartphones, e-commerce enabled Internet banking transactions and the importance of protecting personal information. Therefore, the development of smartphones antivirus products was developed and launched in order to prevent malicious code or virus infection. In this paper, we proposed a new scheme to protect the smartphone from malicious codes and malicious applications that are element of security threats in mobile environment and to prevent information leakage from malicious code infection. The proposed scheme is based on the white list smartphone application which only allows installing authorized applications and to prevent the installation of malicious and untrusted mobile applications which can possibly infect the applications and programs of smartphones.

  16. Navier-Stokes calculations for DFVLR F5-wing in wind tunnel using Runge-Kutta time-stepping scheme

    NASA Technical Reports Server (NTRS)

    Vatsa, V. N.; Wedan, B. W.

    1988-01-01

    A three-dimensional Navier-Stokes code using an explicit multistage Runge-Kutta type of time-stepping scheme is used for solving the transonic flow past a finite wing mounted inside a wind tunnel. Flow past the same wing in free air was also computed to assess the effect of wind-tunnel walls on such flows. Numerical efficiency is enhanced through vectorization of the computer code. A Cyber 205 computer with 32 million words of internal memory was used for these computations.

  17. 25 years of European Union (EU) quality schemes for agricultural products and foodstuffs across EU Member States.

    PubMed

    Albuquerque, Tânia G; Oliveira, M Beatriz Pp; Costa, Helena S

    2018-05-01

    Consumers are increasingly turning their attention to the quality and origin of products that they consume. European Union (EU) quality schemes are associated with a label, which was introduced to allow consumers to perform an informed choice and to protect producers from unfair practices. This present study provides an overview of the last 25 years of EU quality schemes [Protected Designations of Origin (PDO), Protected Geographical Indications (PGI) and Traditional Specialities Guaranteed (TSG)] on agricultural products and foodstuffs across the 28 EU Member States. According to the results, it was possible to conclude that Southern European countries have the highest number of registered products. The most used EU quality scheme is PGI, followed by PDO. Concerning the analysis of the evolution in the last 25 years, the number of registered products among EU Member States has increased significantly. The fruit, vegetables and cereals (fresh or processed) category is the one that accounts for the highest percentage (26.8%) of registered products, followed by cheeses and meat products (cooked, salted, smoked) categories, with 17.2% and 13.5%, respectively. Further investigations should address consumer preferences, knowledge and attitudes, especially Northern European countries with a lower number of registered products. Moreover, the investigation and registration of products should be encouraged among all EU Member States to allow the maintenance of important elements of the history, culture and heritage of the local areas, regions and countries. © 2017 Society of Chemical Industry. © 2017 Society of Chemical Industry.

  18. Design and Implementation of Green Construction Scheme for a High-rise Residential Building Project

    NASA Astrophysics Data System (ADS)

    Zhou, Yong; Huang, You Zhen

    2018-06-01

    This paper mainly studies the green construction scheme of a high-rise residential building project. From "four sections one environmental protection", saving material, water saving, energy saving, economical use of land and environmental protection conduct analysis and research. Adopting scientific, advanced, reasonable and economical construction technology measures, implementing green construction method. Promoting energy-saving technologies in buildings, ensuring the sustainable use of resources, Maximum savings of resources and energy, increase energy efficiency, to reduce pollution, reducing the adverse environmental impact of construction activities, ensure construction safety, build sustainable buildings.

  19. 25. NORTH TRAINING WALL, EAST SECTION, SIDE WALL CONSTRUCTION, LOOKING ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    25. NORTH TRAINING WALL, EAST SECTION, SIDE WALL CONSTRUCTION, LOOKING WEST FROM A POINT ABOUT 500 FEET FROM THE MIDDLE HARBOR PARK FISHING PIER. (Panoramic view 1 of 2). - Oakland Harbor Training Walls, Mouth of Federal Channel to Inner Harbor, Oakland, Alameda County, CA

  20. High temperature induced disruption of the cell wall integrity and structure in Pleurotus ostreatus mycelia.

    PubMed

    Qiu, Zhiheng; Wu, Xiangli; Gao, Wei; Zhang, Jinxia; Huang, Chenyang

    2018-05-30

    Fungal cells are surrounded by a tight cell wall to protect them from harmful environmental conditions and to resist lysis. The synthesis and assembly determine the shape, structure, and integrity of the cell wall during the process of mycelial growth and development. High temperature is an important abiotic stress, which affects the synthesis and assembly of cell walls. In the present study, the chitin and β-1,3-glucan concentrations in the cell wall of Pleurotus ostreatus mycelia were changed after high-temperature treatment. Significantly higher chitin and β-1,3-glucan concentrations were detected at 36 °C than those incubated at 28 °C. With the increased temperature, many aberrant chitin deposition patches occurred, and the distribution of chitin in the cell wall was uneven. Moreover, high temperature disrupts the cell wall integrity, and P. ostreatus mycelia became hypersensitive to cell wall-perturbing agents at 36 °C. The cell wall structure tended to shrink or distorted after high temperature. The cell walls were observed to be thicker and looser by using transmission electron microscopy. High temperature can decrease the mannose content in the cell wall and increase the relative cell wall porosity. According to infrared absorption spectrum, high temperature broke or decreased the glycosidic linkages. Finally, P. ostreatus mycelial cell wall was easily degraded by lysing enzymes after high-temperature treatment. In other words, the cell wall destruction caused by high temperature may be a breakthrough for P. ostreatus to be easily infected by Trichoderma.

  1. Kinetic Analysis of Weakly ionized Plasmas in presence of collecting walls

    NASA Astrophysics Data System (ADS)

    Gonzalez, J.; Donoso, J. M.

    2018-02-01

    Description of plasmas in contact with a wall able to collecting or emitting charged particles is a research topic of great importance. This situation arises in a great variety of phenomena such as the characterization of plasmas by means of electric probes, in the surface treatment of materials and in the service-life of coatings in electric thrusters. In particular, in this work we devote attention to the dynamics of an argon weakly ionized plasma in the presence of a collecting wall. It is proposed a kinetic model in a 1D1V planar phase-space geometry. The model accounts for the electric field coupled to the system by solving the associated Poisson’s equation. To solve numerically the resulting non-linear system of equations, the Propagator Integral Method is used in conjunction with a slabbing method. On each interrelating plasma slab the integral advancing scheme operates in velocity space, in such a way that the all the species dynamics dominating the system evolution are kinetically described.

  2. A secure user anonymity-preserving three-factor remote user authentication scheme for the telecare medicine information systems.

    PubMed

    Das, Ashok Kumar

    2015-03-01

    Recent advanced technology enables the telecare medicine information system (TMIS) for the patients to gain the health monitoring facility at home and also to access medical services over the Internet of mobile networks. Several remote user authentication schemes have been proposed in the literature for TMIS. However, most of them are either insecure against various known attacks or they are inefficient. Recently, Tan proposed an efficient user anonymity preserving three-factor authentication scheme for TMIS. In this paper, we show that though Tan's scheme is efficient, it has several security drawbacks such as (1) it fails to provide proper authentication during the login phase, (2) it fails to provide correct updation of password and biometric of a user during the password and biometric update phase, and (3) it fails to protect against replay attack. In addition, Tan's scheme lacks the formal security analysis and verification. Later, Arshad and Nikooghadam also pointed out some security flaws in Tan's scheme and then presented an improvement on Tan's s scheme. However, we show that Arshad and Nikooghadam's scheme is still insecure against the privileged-insider attack through the stolen smart-card attack, and it also lacks the formal security analysis and verification. In order to withstand those security loopholes found in both Tan's scheme, and Arshad and Nikooghadam's scheme, we aim to propose an effective and more secure three-factor remote user authentication scheme for TMIS. Our scheme provides the user anonymity property. Through the rigorous informal and formal security analysis using random oracle models and the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool, we show that our scheme is secure against various known attacks, including the replay and man-in-the-middle attacks. Furthermore, our scheme is also efficient as compared to other related schemes.

  3. Modelling the thermomechanical behaviour of the tungsten first wall in HiPER laser fusion scenarios

    NASA Astrophysics Data System (ADS)

    Garoz, D.; Páramo, A. R.; Rivera, A.; Perlado, J. M.; González-Arrabal, R.

    2016-12-01

    The behaviour of a tungsten first wall is studied under the irradiation conditions predicted for the different operational scenarios of the European laser fusion project HiPER, which is based on direct drive targets and an evacuated dry wall chamber. The scenarios correspond to different stages in the development of a nuclear fusion reactor, from proof of principle (bunch mode facility) to economic feasibility (pre-commercial power plant). This work constitutes a quantitative study to evaluate first wall performance under realistic irradiation conditions in the different scenarios. We calculated the radiation fluxes assuming the geometrical configurations reported so far for HiPER. Then, we calculated the irradiation-induced evolution of first wall temperature and the thermomechanical response of the material. The results indicate that the first wall will plastically deform up to a few microns underneath the surface. Continuous operation in a power plant leads to fatigue failure with crack generation and growth. Finally, crack propagation and the minimum tungsten thickness required to fulfil the first wall protection role is studied. The response of tungsten as a first wall material as well as its main limitations will be discussed for the HiPER scenarios.

  4. Cell wall staining with Trypan blue enables quantitative analysis of morphological changes in yeast cells.

    PubMed

    Liesche, Johannes; Marek, Magdalena; Günther-Pomorski, Thomas

    2015-01-01

    Yeast cells are protected by a cell wall that plays an important role in the exchange of substances with the environment. The cell wall structure is dynamic and can adapt to different physiological states or environmental conditions. For the investigation of morphological changes, selective staining with fluorescent dyes is a valuable tool. Furthermore, cell wall staining is used to facilitate sub-cellular localization experiments with fluorescently-labeled proteins and the detection of yeast cells in non-fungal host tissues. Here, we report staining of Saccharomyces cerevisiae cell wall with Trypan Blue, which emits strong red fluorescence upon binding to chitin and yeast glucan; thereby, it facilitates cell wall analysis by confocal and super-resolution microscopy. The staining pattern of Trypan Blue was similar to that of the widely used UV-excitable, blue fluorescent cell wall stain Calcofluor White. Trypan Blue staining facilitated quantification of cell size and cell wall volume when utilizing the optical sectioning capacity of a confocal microscope. This enabled the quantification of morphological changes during growth under anaerobic conditions and in the presence of chemicals, demonstrating the potential of this approach for morphological investigations or screening assays.

  5. Wind tunnel wall interference

    NASA Technical Reports Server (NTRS)

    Newman, Perry A.; Mineck, Raymond E.; Barnwell, Richard W.; Kemp, William B., Jr.

    1986-01-01

    About a decade ago, interest in alleviating wind tunnel wall interference was renewed by advances in computational aerodynamics, concepts of adaptive test section walls, and plans for high Reynolds number transonic test facilities. Selection of NASA Langley cryogenic concept for the National Transonic Facility (NTF) tended to focus the renewed wall interference efforts. A brief overview and current status of some Langley sponsored transonic wind tunnel wall interference research are presented. Included are continuing efforts in basic wall flow studies, wall interference assessment/correction procedures, and adaptive wall technology.

  6. Lunar Return Reentry Thermal Analysis of a Generic Crew Exploration Vehicle Wall Structures

    NASA Technical Reports Server (NTRS)

    Ko, William L.; Tran, Van T.; Bowles, Jeff

    2007-01-01

    Thermostructural analysis was performed on generic crew exploration vehicle (GCEV) heat shielded wall structures subjected to reentry heating rates based on five potential lunar return reentry trajectories. The GCEV windward outer wall is fabricated with a graphite/epoxy composite honeycomb sandwich panel and the inner wall with an aluminum honeycomb sandwich panel. The outer wall is protected with an ablative Avcoat-5026-39H/CG thermal protection system (TPS). A virtual ablation method (a graphical approximation) developed earlier was further extended, and was used to estimate the ablation periods, ablation heat loads, and the TPS recession layer depths. It was found that up to 83 95 percent of the total reentry heat load was dissipated in the TPS ablation process, leaving a small amount (3-15 percent) of the remaining total reentry heat load to heat the virgin TPS and maintain the TPS surface at the ablation temperature, 1,200 F. The GCEV stagnation point TPS recession layer depths were estimated to be in the range of 0.280-0.910 in, and the allowable minimum stagnation point TPS thicknesses that could maintain the substructural composite sandwich wall at the limit temperature of 300 F were found to be in the range of 0.767-1.538 in. Based on results from the present analyses, the lunar return abort ballistic reentry was found to be quite attractive because it required less TPS weight than the lunar return direct, the lunar return skipping, or the low Earth orbit guided reentry, and only 11.6 percent more TPS weight than the low Earth orbit ballistic reentry that will encounter a considerable weight penalty to obtain the Earth orbit. The analysis also showed that the TPS weight required for the lunar return skipping reentry was much more than the TPS weight necessary for any of the other reentry trajectories considered.

  7. Skyrmion domain wall collision and domain wall-gated skyrmion logic

    NASA Astrophysics Data System (ADS)

    Xing, Xiangjun; Pong, Philip W. T.; Zhou, Yan

    2016-08-01

    Skyrmions and domain walls are significant spin textures of great technological relevance to magnetic memory and logic applications, where they can be used as carriers of information. The unique topology of skyrmions makes them display emergent dynamical properties as compared with domain walls. Some studies have demonstrated that the two topologically inequivalent magnetic objects could be interconverted by using cleverly designed geometric structures. Here, we numerically address the skyrmion domain wall collision in a magnetic racetrack by introducing relative motion between the two objects based on a specially designed junction. An electric current serves as the driving force that moves a skyrmion toward a trapped domain wall pair. We see different types of collision dynamics depending on the driving parameters. Most importantly, the modulation of skyrmion transport using domain walls is realized in this system, allowing a set of domain wall-gated logical NOT, NAND, and NOR gates to be constructed. This work provides a skyrmion-based spin-logic architecture that is fully compatible with racetrack memories.

  8. A New Scrambling Evaluation Scheme Based on Spatial Distribution Entropy and Centroid Difference of Bit-Plane

    NASA Astrophysics Data System (ADS)

    Zhao, Liang; Adhikari, Avishek; Sakurai, Kouichi

    Watermarking is one of the most effective techniques for copyright protection and information hiding. It can be applied in many fields of our society. Nowadays, some image scrambling schemes are used as one part of the watermarking algorithm to enhance the security. Therefore, how to select an image scrambling scheme and what kind of the image scrambling scheme may be used for watermarking are the key problems. Evaluation method of the image scrambling schemes can be seen as a useful test tool for showing the property or flaw of the image scrambling method. In this paper, a new scrambling evaluation system based on spatial distribution entropy and centroid difference of bit-plane is presented to obtain the scrambling degree of image scrambling schemes. Our scheme is illustrated and justified through computer simulations. The experimental results show (in Figs. 6 and 7) that for the general gray-scale image, the evaluation degree of the corresponding cipher image for the first 4 significant bit-planes selection is nearly the same as that for the 8 bit-planes selection. That is why, instead of taking 8 bit-planes of a gray-scale image, it is sufficient to take only the first 4 significant bit-planes for the experiment to find the scrambling degree. This 50% reduction in the computational cost makes our scheme efficient.

  9. Encapsulants for protecting MEMS devices during post-packaging release etch

    DOEpatents

    Peterson, Kenneth A.

    2005-10-18

    The present invention relates to methods to protect a MEMS or microsensor device through one or more release or activation steps in a "package first, release later" manufacturing scheme: This method of fabrication permits wirebonds, other interconnects, packaging materials, lines, bond pads, and other structures on the die to be protected from physical, chemical, or electrical damage during the release etch(es) or other packaging steps. Metallic structures (e.g., gold, aluminum, copper) on the device are also protected from galvanic attack because they are protected from contact with HF or HCL-bearing solutions.

  10. Ethernet ring protection with managed FDB using APS payload

    NASA Astrophysics Data System (ADS)

    Im, Jinsung; Ryoo, Jeong-dong; Joo, Bheom Soon; Rhee, J.-K. Kevin

    2007-11-01

    Ethernet ring protection (ERP) is a new technology based on OAM (operations, administration, and maintenance) being standardized by the ITU-T G.8032 working group. In this paper, we present the recent development of Ethernet ring protection which is called FDB (filtering database) flush scheme and propose a new Ethernet ring protection technique introducing a managed FDB using APS to deliver information how to fix FDB selectively. We discuss the current development of the ERP technology at ITU-T and performance comparisons between different proposals.

  11. Cardiac-induced localized thoracic motion detected by a fiber optic sensing scheme

    NASA Astrophysics Data System (ADS)

    Allsop, Thomas; Lloyd, Glynn; Bhamber, Ranjeet S.; Hadzievski, Ljupco; Halliday, Michael; Webb, David J.; Bennion, Ian

    2014-11-01

    The cardiovascular health of the human population is a major concern for medical clinicians, with cardiovascular diseases responsible for 48% of all deaths worldwide, according to the World Health Organization. The development of new diagnostic tools that are practicable and economical to scrutinize the cardiovascular health of humans is a major driver for clinicians. We offer a new technique to obtain seismocardiographic signals up to 54 Hz covering both ballistocardiography (below 20 Hz) and audible heart sounds (20 Hz upward), using a system based on curvature sensors formed from fiber optic long period gratings. This system can visualize the real-time three-dimensional (3-D) mechanical motion of the heart by using the data from the sensing array in conjunction with a bespoke 3-D shape reconstruction algorithm. Visualization is demonstrated by adhering three to four sensors on the outside of the thorax and in close proximity to the apex of the heart; the sensing scheme revealed a complex motion of the heart wall next to the apex region of the heart. The detection scheme is low-cost, portable, easily operated and has the potential for ambulatory applications.

  12. Convergence of generalized MUSCL schemes

    NASA Technical Reports Server (NTRS)

    Osher, S.

    1984-01-01

    Semi-discrete generalizations of the second order extension of Godunov's scheme, known as the MUSCL scheme, are constructed, starting with any three point E scheme. They are used to approximate scalar conservation laws in one space dimension. For convex conservation laws, each member of a wide class is proven to be a convergent approximation to the correct physical solution. Comparison with another class of high resolution convergent schemes is made.

  13. Watermarking protocols for authentication and ownership protection based on timestamps and holograms

    NASA Astrophysics Data System (ADS)

    Dittmann, Jana; Steinebach, Martin; Croce Ferri, Lucilla

    2002-04-01

    Digital watermarking has become an accepted technology for enabling multimedia protection schemes. One problem here is the security of these schemes. Without a suitable framework, watermarks can be replaced and manipulated. We discuss different protocols providing security against rightful ownership attacks and other fraud attempts. We compare the characteristics of existing protocols for different media like direct embedding or seed based and required attributes of the watermarking technology like robustness or payload. We introduce two new media independent protocol schemes for rightful ownership authentication. With the first scheme we ensure security of digital watermarks used for ownership protection with a combination of two watermarks: first watermark of the copyright holder and a second watermark from a Trusted Third Party (TTP). It is based on hologram embedding and the watermark consists of e.g. a company logo. As an example we use digital images and specify the properties of the embedded additional security information. We identify components necessary for the security protocol like timestamp, PKI and cryptographic algorithms. The second scheme is used for authentication. It is designed for invertible watermarking applications which require high data integrity. We combine digital signature schemes and digital watermarking to provide a public verifiable integrity. The original data can only be reproduced with a secret key. Both approaches provide solutions for copyright and authentication watermarking and are introduced for image data but can be easily adopted for video and audio data as well.

  14. Long-term cadmium exposure influences the abundance of proteins that impact the cell wall structure in medicago sativa stems.

    PubMed

    Gutsch, Annelie; Keunen, Els; Guerriero, Gea; Renaut, Jenny; Cuypers, Ann; Hausman, Jean-François; Sergeant, Kjell

    2018-06-15

    Cadmium (Cd) is a non-essential, toxic heavy metal that poses serious threats to both the ecosystem and the health of humans. Plants employ various cellular and molecular mechanisms to minimize the impact of Cd toxicity and the cell walls function as defensive barrier during Cd exposure. In this study, we adopted a quantitative gel-based proteomic approach (two-dimensional difference gel electrophoresis) to investigate changes in the abundance of cell wall- and soluble proteins in stems of Medicago sativa L. upon long-term exposure to Cd (at 10 mg Cd per kg soil as CdSO 4 ). Obtained protein data were complemented with targeted gene expression analyses. Plants were affected by Cd exposure at an early growth stage but seemed to recover at a more mature plant stage as no difference in biomass was observed. The accumulation of Cd was highest in the roots followed by stems and leaves. Quantitative proteomics revealed a changed abundance for 179 cell wall proteins and 30 proteins in the soluble fraction upon long-term Cd exposure. These proteins are involved in cell wall remodeling, defense response, carbohydrate metabolism and promotion of the lignification process. The data indicate that Cd exposure alters the cell wall proteome and underline the role of cell wall proteins in defense against Cd stress. The identified proteins are linked to alterations in the cell wall structure and lignification process in stems of M. sativa, underpinning the function of the cell wall as an effective barrier against Cd stress. This article is protected by copyright. All rights reserved. This article is protected by copyright. All rights reserved.

  15. Finite spaces and schemes

    NASA Astrophysics Data System (ADS)

    Sancho de Salas, Fernando

    2017-12-01

    A ringed finite space is a ringed space whose underlying topological space is finite. The category of ringed finite spaces contains, fully faithfully, the category of finite topological spaces and the category of affine schemes. Any ringed space, endowed with a finite open covering, produces a ringed finite space. We introduce the notions of schematic finite space and schematic morphism, showing that they behave, with respect to quasi-coherence, like schemes and morphisms of schemes do. Finally, we construct a fully faithful and essentially surjective functor from a localization of a full subcategory of the category of schematic finite spaces and schematic morphisms to the category of quasi-compact and quasi-separated schemes.

  16. Adaptive wall technology for minimization of wall interferences in transonic wind tunnels

    NASA Technical Reports Server (NTRS)

    Wolf, Stephen W. D.

    1988-01-01

    Modern experimental techniques to improve free air simulations in transonic wind tunnels by use of adaptive wall technology are reviewed. Considered are the significant advantages of adaptive wall testing techniques with respect to wall interferences, Reynolds number, tunnel drive power, and flow quality. The application of these testing techniques relies on making the test section boundaries adjustable and using a rapid wall adjustment procedure. A historical overview shows how the disjointed development of these testing techniques, since 1938, is closely linked to available computer support. An overview of Adaptive Wall Test Section (AWTS) designs shows a preference for use of relatively simple designs with solid adaptive walls in 2- and 3-D testing. Operational aspects of AWTS's are discussed with regard to production type operation where adaptive wall adjustments need to be quick. Both 2- and 3-D data are presented to illustrate the quality of AWTS data over the transonic speed range. Adaptive wall technology is available for general use in 2-D testing, even in cryogenic wind tunnels. In 3-D testing, more refinement of the adaptive wall testing techniques is required before more widespread use can be planned.

  17. Predicting multi-wall structural response to hypervelocity impact using the hull code

    NASA Technical Reports Server (NTRS)

    Schonberg, William P.

    1993-01-01

    Previously, multi-wall structures have been analyzed extensively, primarily through experiment, as a means of increasing the meteoroid/space debris impact protection of spacecraft. As structural configurations become more varied, the number of tests required to characterize their response increases dramatically. As an alternative to experimental testing, numerical modeling of high-speed impact phenomena is often being used to predict the response of a variety of structural systems under different impact loading conditions. The results of comparing experimental tests to Hull Hydrodynamic Computer Code predictions are reported. Also, the results of a numerical parametric study of multi-wall structural response to hypervelocity cylindrical projectile impact are presented.

  18. Matroids and quantum-secret-sharing schemes

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sarvepalli, Pradeep; Raussendorf, Robert

    A secret-sharing scheme is a cryptographic protocol to distribute a secret state in an encoded form among a group of players such that only authorized subsets of the players can reconstruct the secret. Classically, efficient secret-sharing schemes have been shown to be induced by matroids. Furthermore, access structures of such schemes can be characterized by an excluded minor relation. No such relations are known for quantum secret-sharing schemes. In this paper we take the first steps toward a matroidal characterization of quantum-secret-sharing schemes. In addition to providing a new perspective on quantum-secret-sharing schemes, this characterization has important benefits. While previousmore » work has shown how to construct quantum-secret-sharing schemes for general access structures, these schemes are not claimed to be efficient. In this context the present results prove to be useful; they enable us to construct efficient quantum-secret-sharing schemes for many general access structures. More precisely, we show that an identically self-dual matroid that is representable over a finite field induces a pure-state quantum-secret-sharing scheme with information rate 1.« less

  19. A Memory Efficient Network Encryption Scheme

    NASA Astrophysics Data System (ADS)

    El-Fotouh, Mohamed Abo; Diepold, Klaus

    In this paper, we studied the two widely used encryption schemes in network applications. Shortcomings have been found in both schemes, as these schemes consume either more memory to gain high throughput or low memory with low throughput. The need has aroused for a scheme that has low memory requirements and in the same time possesses high speed, as the number of the internet users increases each day. We used the SSM model [1], to construct an encryption scheme based on the AES. The proposed scheme possesses high throughput together with low memory requirements.

  20. An Improved and Secure Anonymous Biometric-Based User Authentication with Key Agreement Scheme for the Integrated EPR Information System.

    PubMed

    Jung, Jaewook; Kang, Dongwoo; Lee, Donghoon; Won, Dongho

    2017-01-01

    Nowadays, many hospitals and medical institutes employ an authentication protocol within electronic patient records (EPR) services in order to provide protected electronic transactions in e-medicine systems. In order to establish efficient and robust health care services, numerous studies have been carried out on authentication protocols. Recently, Li et al. proposed a user authenticated key agreement scheme according to EPR information systems, arguing that their scheme is able to resist various types of attacks and preserve diverse security properties. However, this scheme possesses critical vulnerabilities. First, the scheme cannot prevent off-line password guessing attacks and server spoofing attack, and cannot preserve user identity. Second, there is no password verification process with the failure to identify the correct password at the beginning of the login phase. Third, the mechanism of password change is incompetent, in that it induces inefficient communication in communicating with the server to change a user password. Therefore, we suggest an upgraded version of the user authenticated key agreement scheme that provides enhanced security. Our security and performance analysis shows that compared to other related schemes, our scheme not only improves the security level, but also ensures efficiency.

  1. An Improved and Secure Anonymous Biometric-Based User Authentication with Key Agreement Scheme for the Integrated EPR Information System

    PubMed Central

    Kang, Dongwoo; Lee, Donghoon; Won, Dongho

    2017-01-01

    Nowadays, many hospitals and medical institutes employ an authentication protocol within electronic patient records (EPR) services in order to provide protected electronic transactions in e-medicine systems. In order to establish efficient and robust health care services, numerous studies have been carried out on authentication protocols. Recently, Li et al. proposed a user authenticated key agreement scheme according to EPR information systems, arguing that their scheme is able to resist various types of attacks and preserve diverse security properties. However, this scheme possesses critical vulnerabilities. First, the scheme cannot prevent off-line password guessing attacks and server spoofing attack, and cannot preserve user identity. Second, there is no password verification process with the failure to identify the correct password at the beginning of the login phase. Third, the mechanism of password change is incompetent, in that it induces inefficient communication in communicating with the server to change a user password. Therefore, we suggest an upgraded version of the user authenticated key agreement scheme that provides enhanced security. Our security and performance analysis shows that compared to other related schemes, our scheme not only improves the security level, but also ensures efficiency. PMID:28046075

  2. The configuration of 2,6-diamino-3-hydroxypimelic acid in microbial cell walls

    PubMed Central

    Perkins, H. R.

    1969-01-01

    β-Hydroxydiaminopimelic acid, together with some diaminopimelic acid, occurs in the cell-wall mucopeptide of certain Actinomycetales. These components were converted into their di-DNP derivatives and separated by chromatography. Hence the relative proportions present in the cell walls of a number of species were measured. The problem of acid-induced inversion of configuration was studied. Of the diaminohydroxypimelic acids isomer B (see Scheme 2; amino groups meso, hydroxy group threo to its neighbouring amino group) always predominated but a small proportion of isomer D (amino groups l, hydroxy group erythro) also occurred. The configuration of the diaminohydroxypimelic acids was determined by periodate oxidation to glutamic γ-semialdehyde, which underwent spontaneous ring-closure. Reduction with sodium borohydride produced optically active proline, the configuration of which was determined by direct measurement of the optical rotation of DNP-proline. Un-cross-linked diaminohydroxypimelic acid in the cell wall was oxidized with periodate in the presence of ammonia. Since the remaining amino group was bound in peptide linkage, ring-closure was prevented and borohydride reduction of the aldehyde–ammonia presumed to be present resulted in the formation of ornithine. The quantity of ornithine was used as a measure of the degree of cross-linking. PMID:4311441

  3. Research on wall shear stress considering wall roughness when shear swirling flow vibration cementing

    NASA Astrophysics Data System (ADS)

    Cui, Zhihua; Ai, Chi; Feng, Fuping

    2017-01-01

    When shear swirling flow vibration cementing, the casing is revolving periodically and eccentrically, which leads to the annulus fluid in turbulent swirling flow state. The wall shear stress is more than that in laminar flow field when conventional cementing. The paper mainly studied the wall shear stress distribution on the borehole wall when shear swirling flow vibration cementing based on the finite volume method. At the same time, the wall roughness affected and changed the turbulent flow near the borehole wall and the wall shear stress. Based on the wall function method, the paper established boundary conditions considering the wall roughness and derived the formula of the wall shear stress. The results showed that the wall roughness significantly increases the wall shear stress. However, the larger the wall roughness, the greater the thickness of mud cake, which weakening the cementing strength. Considering the effects in a comprehensive way, it is discovered that the particle size of solid phase in drilling fluid is about 0.1 mm to get better cementing quality.

  4. Dual watermarking scheme for secure buyer-seller watermarking protocol

    NASA Astrophysics Data System (ADS)

    Mehra, Neelesh; Shandilya, Madhu

    2012-04-01

    A buyer-seller watermarking protocol utilize watermarking along with cryptography for copyright and copy protection for the seller and meanwhile it also preserve buyers rights for privacy. It enables a seller to successfully identify a malicious seller from a pirated copy, while preventing the seller from framing an innocent buyer and provide anonymity to buyer. Up to now many buyer-seller watermarking protocols have been proposed which utilize more and more cryptographic scheme to solve many common problems such as customer's rights, unbinding problem, buyer's anonymity problem and buyer's participation in the dispute resolution. But most of them are infeasible since the buyer may not have knowledge of cryptography. Another issue is the number of steps to complete the protocols are large, a buyer needs to interact with different parties many times in these protocols, which is very inconvenient for buyer. To overcome these drawbacks, in this paper we proposed dual watermarking scheme in encrypted domain. Since neither of watermark has been generated by buyer so a general layman buyer can use the protocol.

  5. An adjoint view on flux consistency and strong wall boundary conditions to the Navier–Stokes equations

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Stück, Arthur, E-mail: arthur.stueck@dlr.de

    2015-11-15

    Inconsistent discrete expressions in the boundary treatment of Navier–Stokes solvers and in the definition of force objective functionals can lead to discrete-adjoint boundary treatments that are not a valid representation of the boundary conditions to the corresponding adjoint partial differential equations. The underlying problem is studied for an elementary 1D advection–diffusion problem first using a node-centred finite-volume discretisation. The defect of the boundary operators in the inconsistently defined discrete-adjoint problem leads to oscillations and becomes evident with the additional insight of the continuous-adjoint approach. A homogenisation of the discretisations for the primal boundary treatment and the force objective functional yieldsmore » second-order functional accuracy and eliminates the defect in the discrete-adjoint boundary treatment. Subsequently, the issue is studied for aerodynamic Reynolds-averaged Navier–Stokes problems in conjunction with a standard finite-volume discretisation on median-dual grids and a strong implementation of noslip walls, found in many unstructured general-purpose flow solvers. Going out from a base-line discretisation of force objective functionals which is independent of the boundary treatment in the flow solver, two improved flux-consistent schemes are presented; based on either body wall-defined or farfield-defined control-volumes they resolve the dual inconsistency. The behaviour of the schemes is investigated on a sequence of grids in 2D and 3D.« less

  6. On investigating wall shear stress in two-dimensional plane turbulent wall jets

    NASA Astrophysics Data System (ADS)

    Mehdi, Faraz; Johansson, Gunnar; White, Christopher; Naughton, Jonathan

    2012-11-01

    Mehdi & White [Exp Fluids 50:43-51(2011)] presented a full momentum integral based method for determining wall shear stress in zero pressure gradient turbulent boundary layers. They utilized the boundary conditions at the wall and at the outer edge of the boundary layer. A more generalized expression is presented here that uses just one boundary condition at the wall. The method is mathematically exact and has an advantage of having no explicit streamwise gradient terms. It is successfully applied to two different experimental plane turbulent wall jet datasets for which independent estimates of wall shear stress were known. Complications owing to experimental inaccuracies in determining wall shear stress from the proposed method are also discussed.

  7. Active control of multiple resistive wall modes

    NASA Astrophysics Data System (ADS)

    Brunsell, P. R.; Yadikin, D.; Gregoratto, D.; Paccagnella, R.; Liu, Y. Q.; Bolzonella, T.; Cecconello, M.; Drake, J. R.; Kuldkepp, M.; Manduchi, G.; Marchiori, G.; Marrelli, L.; Martin, P.; Menmuir, S.; Ortolani, S.; Rachlew, E.; Spizzo, G.; Zanca, P.

    2005-12-01

    A two-dimensional array of saddle coils at Mc poloidal and Nc toroidal positions is used on the EXTRAP T2R reversed-field pinch (Brunsell P R et al 2001 Plasma Phys. Control. Fusion 43 1457) to study active control of resistive wall modes (RWMs). Spontaneous growth of several RWMs with poloidal mode number m = 1 and different toroidal mode number n is observed experimentally, in agreement with linear MHD modelling. The measured plasma response to a controlled coil field and the plasma response computed using the linear circular cylinder MHD model are in quantitive agreement. Feedback control introduces a linear coupling of modes with toroidal mode numbers n, n' that fulfil the condition |n - n'| = Nc. Pairs of coupled unstable RWMs are present in feedback experiments with an array of Mc × Nc = 4 × 16 coils. Using intelligent shell feedback, the coupled modes are generally not controlled even though the field is suppressed at the active coils. A better suppression of coupled modes may be achieved in the case of rotating modes by using the mode control feedback scheme with individually set complex gains. In feedback with a larger array of Mc × Nc = 4 × 32 coils, the coupling effect largely disappears, and with this array, the main internal RWMs n = -11, -10, +5, +6 are all simultaneously suppressed throughout the discharge (7 8 wall times). With feedback there is a two-fold extension of the pulse length, compared to discharges without feedback.

  8. The European Federation of Organisations for Medical Physics Policy Statement No. 6.1: Recommended Guidelines on National Registration Schemes for Medical Physicists.

    PubMed

    Christofides, Stelios; Isidoro, Jorge; Pesznyak, Csilla; Bumbure, Lada; Cremers, Florian; Schmidt, Werner F O

    2016-01-01

    This EFOMP Policy Statement is an update of Policy Statement No. 6 first published in 1994. The present version takes into account the European Union Parliament and Council Directive 2013/55/EU that amends Directive 2005/36/EU on the recognition of professional qualifications and the European Union Council Directive 2013/59/EURATOM laying down the basic safety standards for protection against the dangers arising from exposure to ionising radiation. The European Commission Radiation Protection Report No. 174, Guidelines on Medical Physics Expert and the EFOMP Policy Statement No. 12.1, Recommendations on Medical Physics Education and Training in Europe 2014, are also taken into consideration. The EFOMP National Member Organisations are encouraged to update their Medical Physics registration schemes where these exist or to develop registration schemes taking into account the present version of this EFOMP Policy Statement (Policy Statement No. 6.1"Recommended Guidelines on National Registration Schemes for Medical Physicists"). Copyright © 2016. Published by Elsevier Ltd.

  9. Plant cell walls throughout evolution: towards a molecular understanding of their design principles

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sarkar, Purbasha; Bosneaga, Elena; Auer, Manfred

    Throughout their life, plants typically remain in one location utilizing sunlight for the synthesis of carbohydrates, which serve as their sole source of energy as well as building blocks of a protective extracellular matrix, called the cell wall. During the course of evolution, plants have repeatedly adapted to their respective niche,which is reflected in the changes of their body plan and the specific design of cell walls. Cell walls not only changed throughout evolution but also are constantly remodelled and reconstructed during the development of an individual plant, and in response to environmental stress or pathogen attacks. Carbohydrate-rich cell wallsmore » display complex designs, which together with the presence of phenolic polymers constitutes a barrier for microbes, fungi, and animals. Throughout evolution microbes have co-evolved strategies for efficient breakdown of cell walls. Our current understanding of cell walls and their evolutionary changes are limited as our knowledge is mainly derived from biochemical and genetic studies, complemented by a few targeted yet very informative imaging studies. Comprehensive plant cell wall models will aid in the re-design of plant cell walls for the purpose of commercially viable lignocellulosic biofuel production as well as for the timber, textile, and paper industries. Such knowledge will also be of great interest in the context of agriculture and to plant biologists in general. It is expected that detailed plant cell wall models will require integrated correlative multimodal, multiscale imaging and modelling approaches, which are currently underway.« less

  10. Using Steffe's Advanced Fraction Schemes

    ERIC Educational Resources Information Center

    McCloskey, Andrea V.; Norton, Anderson H.

    2009-01-01

    Recognizing schemes, which are different from strategies, can help teachers understand their students' thinking about fractions. Using Steffe's advanced fraction schemes, the authors describe a progression of development that upper elementary and middle school students might follow in understanding fractions. Each scheme can be viewed as a…

  11. A secure and robust password-based remote user authentication scheme using smart cards for the integrated EPR information system.

    PubMed

    Das, Ashok Kumar

    2015-03-01

    An integrated EPR (Electronic Patient Record) information system of all the patients provides the medical institutions and the academia with most of the patients' information in details for them to make corrective decisions and clinical decisions in order to maintain and analyze patients' health. In such system, the illegal access must be restricted and the information from theft during transmission over the insecure Internet must be prevented. Lee et al. proposed an efficient password-based remote user authentication scheme using smart card for the integrated EPR information system. Their scheme is very efficient due to usage of one-way hash function and bitwise exclusive-or (XOR) operations. However, in this paper, we show that though their scheme is very efficient, their scheme has three security weaknesses such as (1) it has design flaws in password change phase, (2) it fails to protect privileged insider attack and (3) it lacks the formal security verification. We also find that another recently proposed Wen's scheme has the same security drawbacks as in Lee at al.'s scheme. In order to remedy these security weaknesses found in Lee et al.'s scheme and Wen's scheme, we propose a secure and efficient password-based remote user authentication scheme using smart cards for the integrated EPR information system. We show that our scheme is also efficient as compared to Lee et al.'s scheme and Wen's scheme as our scheme only uses one-way hash function and bitwise exclusive-or (XOR) operations. Through the security analysis, we show that our scheme is secure against possible known attacks. Furthermore, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool and show that our scheme is secure against passive and active attacks.

  12. A collision scheme for hybrid fluid-particle simulation of plasmas

    NASA Astrophysics Data System (ADS)

    Nguyen, Christine; Lim, Chul-Hyun; Verboncoeur, John

    2006-10-01

    Desorption phenomena at the wall of a tokamak can lead to the introduction of impurities at the edge of a thermonuclear plasma. In particular, the use of carbon as a constituent of the tokamak wall, as planned for ITER, requires the study of carbon and hydrocarbon transport in the plasma, including understanding of collisional interaction with the plasma. These collisions can result in new hydrocarbons, hydrogen, secondary electrons and so on. Computational modeling is a primary tool for studying these phenomena. XOOPIC [1] and OOPD1 are widely used computer modeling tools for the simulation of plasmas. Both are particle type codes. Particle simulation gives more kinetic information than fluid simulation, but more computation time is required. In order to reduce this disadvantage, hybrid simulation has been developed, and applied to the modeling of collisions. Present particle simulation tools such as XOOPIC and OODP1 employ a Monte Carlo model for the collisions between particle species and a neutral background gas defined by its temperature and pressure. In fluid-particle hybrid plasma models, collisions include combinations of particle and fluid interactions categorized by projectile-target pairing: particle-particle, particle-fluid, and fluid-fluid. For verification of this hybrid collision scheme, we compare simulation results to analytic solutions for classical plasma models. [1] Verboncoeur et al. Comput. Phys. Comm. 87, 199 (1995).

  13. The effect of fig wall thickness in Ficus erecta var. beecheyana on parasitism

    NASA Astrophysics Data System (ADS)

    Tzeng, Hsy-Yu; Ou, Chern-Hsiung; Lu, Fu-Yuan; Bain, Anthony; Chou, Lien-Siang; Kjellberg, Finn

    2014-05-01

    Fig wasp communities constitute a model system to analyse determinants of community complexity and to investigate how biological interaction networks are maintained. It has been suggested for monoecious figs, that fig pollinating wasps avoid ovipositing in flowers located close to the fig wall because of strong parasitic pressure by wasps ovipositing through the fig wall. This behaviour could help explain why mainly seeds are produced in flowers located close to the fig wall, thus stabilizing the fig-pollinating wasp mutualism. In this contribution we explore, for dioecious figs, whether ovipositor length of parasitic species may really be limiting. In dioecious figs, functionally male figs produce pollinating wasps and pollen while female figs produce only seeds, facilitating selection of traits favouring pollinator reproduction in male figs. We show in Ficus erecta that fig walls are thicker in male figs than in female figs. Male figs presenting thick walls, thicker than the length of the parasites' ovipositors, went unparasitized while male figs presenting thinner walls were systematically parasitized. Hence, in F. erecta, ovipositor length of the parasites is limiting access to some figs. However, we also show that in another dioecious species, Ficus formosana, presenting thin walled male figs, no fig is protected against oviposition by its two parasites. Hence in dioecious as well as in monoecious figs, in some Ficus species, ovipositors of the parasites are limiting access to ovules, while in other Ficus species all ovules are exposed to parasitism.

  14. Combining image-processing and image compression schemes

    NASA Technical Reports Server (NTRS)

    Greenspan, H.; Lee, M.-C.

    1995-01-01

    An investigation into the combining of image-processing schemes, specifically an image enhancement scheme, with existing compression schemes is discussed. Results are presented on the pyramid coding scheme, the subband coding scheme, and progressive transmission. Encouraging results are demonstrated for the combination of image enhancement and pyramid image coding schemes, especially at low bit rates. Adding the enhancement scheme to progressive image transmission allows enhanced visual perception at low resolutions. In addition, further progressing of the transmitted images, such as edge detection schemes, can gain from the added image resolution via the enhancement.

  15. Global Anomaly Detection in Two-Dimensional Symmetry-Protected Topological Phases

    NASA Astrophysics Data System (ADS)

    Bultinck, Nick; Vanhove, Robijn; Haegeman, Jutho; Verstraete, Frank

    2018-04-01

    Edge theories of symmetry-protected topological phases are well known to possess global symmetry anomalies. In this Letter we focus on two-dimensional bosonic phases protected by an on-site symmetry and analyze the corresponding edge anomalies in more detail. Physical interpretations of the anomaly in terms of an obstruction to orbifolding and constructing symmetry-preserving boundaries are connected to the cohomology classification of symmetry-protected phases in two dimensions. Using the tensor network and matrix product state formalism we numerically illustrate our arguments and discuss computational detection schemes to identify symmetry-protected order in a ground state wave function.

  16. Organic materials in the wall paintings in Pompei: a case study of Insula del Centenario

    PubMed Central

    2012-01-01

    Background The present research concerns the Roman wall paintings preserved at Insula del Centenario (IX, 8), the important Pompeian block situated in the Regio IX, along Via di Nola. Results The aims of this research are two: to verify the presence of lipidic and proteinaceous material to spread the pigments, and to identify organic matter in painting materials owing to previous restoration works. The samples collected from the wall paintings of different rooms have been investigated by Fourier Transform Infrared Spectroscopy (FT-IR), and Gas Chromatography/ Mass Spectrometry (GC/MS). Conclusions The analytical results show that these Roman wall paintings were realized without the use of lipidic and proteinaceous materials, supposedly in fresco technique. Moreover, it was detected that wax, egg, and animal glue were used in previous restoration works for protective purpose and to restore the wall paintings to their original brilliant colours. PMID:23006771

  17. Direct calculation of wall interferences and wall adaptation for two-dimensional flow in wind tunnels with closed walls

    NASA Technical Reports Server (NTRS)

    Amecke, Juergen

    1986-01-01

    A method for the direct calculation of the wall induced interference velocity in two dimensional flow based on Cauchy's integral formula was derived. This one-step method allows the calculation of the residual corrections and the required wall adaptation for interference-free flow starting from the wall pressure distribution without any model representation. Demonstrated applications are given.

  18. Progress on Implementing Additional Physics Schemes into MPAS-A v5.1 for Next Generation Air Quality Modeling

    EPA Science Inventory

    The U.S. Environmental Protection Agency (USEPA) has a team of scientists developing a next generation air quality modeling system employing the Model for Prediction Across Scales – Atmosphere (MPAS-A) as its meteorological foundation. Several preferred physics schemes and ...

  19. Experimental investigation of wall shock cancellation and reduction of wall interference in transonic testing

    NASA Technical Reports Server (NTRS)

    Ferri, A.; Roffe, G.

    1975-01-01

    A series of experiments were performed to evaluate the effectiveness of a three-dimensional land and groove wall geometry and a variable permeability distribution to reduce the interference produced by the porous walls of a supercritical transonic test section. The three-dimensional wall geometry was found to diffuse the pressure perturbations caused by small local mismatches in wall porosity permitting the use of a relatively coarse wall porosity control to reduce or eliminate wall interference effects. The wall porosity distribution required was found to be a sensitive function of Mach number requiring that the Mach number repeatability characteristics of the test apparatus be quite good. The effectiveness of a variable porosity wall is greatest in the upstream region of the test section where the pressure differences across the wall are largest. An effective variable porosity wall in the down stream region of the test section requires the use of a slightly convergent test section geometry.

  20. A Hybrid Approach to Protect Palmprint Templates

    PubMed Central

    Sun, Dongmei; Xiong, Ke; Qiu, Zhengding

    2014-01-01

    Biometric template protection is indispensable to protect personal privacy in large-scale deployment of biometric systems. Accuracy, changeability, and security are three critical requirements for template protection algorithms. However, existing template protection algorithms cannot satisfy all these requirements well. In this paper, we propose a hybrid approach that combines random projection and fuzzy vault to improve the performances at these three points. Heterogeneous space is designed for combining random projection and fuzzy vault properly in the hybrid scheme. New chaff point generation method is also proposed to enhance the security of the heterogeneous vault. Theoretical analyses of proposed hybrid approach in terms of accuracy, changeability, and security are given in this paper. Palmprint database based experimental results well support the theoretical analyses and demonstrate the effectiveness of proposed hybrid approach. PMID:24982977

  1. A hybrid approach to protect palmprint templates.

    PubMed

    Liu, Hailun; Sun, Dongmei; Xiong, Ke; Qiu, Zhengding

    2014-01-01

    Biometric template protection is indispensable to protect personal privacy in large-scale deployment of biometric systems. Accuracy, changeability, and security are three critical requirements for template protection algorithms. However, existing template protection algorithms cannot satisfy all these requirements well. In this paper, we propose a hybrid approach that combines random projection and fuzzy vault to improve the performances at these three points. Heterogeneous space is designed for combining random projection and fuzzy vault properly in the hybrid scheme. New chaff point generation method is also proposed to enhance the security of the heterogeneous vault. Theoretical analyses of proposed hybrid approach in terms of accuracy, changeability, and security are given in this paper. Palmprint database based experimental results well support the theoretical analyses and demonstrate the effectiveness of proposed hybrid approach.

  2. Targeted social protection in a pastoralist economy: case study from Kenya.

    PubMed

    Janzen, S A; Jensen, N D; Mude, A G

    2016-11-01

    Social protection programmes are designed to help vulnerable populations - including pastoralists - maintain a basic level of well-being, manage risk, and cope with negative shocks. Theory suggests that differential targeting according to poverty status can increase the reach and effectiveness of budgeted social protection programmes. Chronically poor households benefit most from social protection designed to help them meet their basic needs and make vital investments necessary to graduate from poverty. Vulnerable non-destitute households benefit from protection against costly temporary shocks, but do not necessarily need regular assistance. Welfare gains occur when a comprehensive social protection programme considers the needs of both types of households. The authors use evidence-based understanding of poverty dynamics in the pastoralist-based economy of northern Kenya's arid and semi-arid lands as a case study to discuss and compare the observed impacts of two different social protection schemes on heterogeneous pastoralist households: a targeted, unconditional, cash-transfer programme designed to support the poorest, and an index-based livestock insurance programme, which acts as a productive 'safety net' to help stem a descent into poverty and increase resilience. Both types of social protection scheme have been shown to decrease poverty, improve food security and protect child health. However, the behavioural response for asset accumulation varies with the type of protection and the household's unique situation. Poor households that receive cash transfers retain and accumulate assets quickly. Insured households, who are typically vulnerable yet not destitute, protect existing herds and invest more in the livestock they already own. The authors argue that differential targeting increases programme efficiency, and discuss Kenya's current approach to implementing differentially targeted social protection.

  3. Motives of Log Schemes

    NASA Astrophysics Data System (ADS)

    Howell, Nicholas L.

    This thesis introduces two notions of motive associated to a log scheme. We introduce a category of log motives a la Voevodsky, and prove that the embedding of Voevodsky motives is an equivalence, in particular proving that any homotopy-invariant cohomology theory of schemes extends uniquely to log schemes. In the case of a log smooth degeneration, we give an explicit construction of the motivic Albanese of the degeneration, and show that the Hodge realization of this construction gives the Albanese of the limit Hodge structure.

  4. Directional moisture transfer through a wild silkworm cocoon wall.

    PubMed

    Jin, Xing; Zhang, Jin; Gao, Weimin; Du, Shan; Li, Jingliang; Wang, Xungai

    2016-06-25

    A silkworm cocoon is a porous biological structure with multiple protective functions. In the current work, the authors have used both experimental and numerical methods to reveal the unique moisture transfer characteristics through a wild Antheraea pernyi silkworm cocoon wall, in comparison with the long-domesticated Bombyx mori silkworm cocoon walls. The water vapor transmission and water vapor permeability (WVP) properties show that the A. pernyi cocoons exhibit directional moisture transfer behavior, with easier moisture transfer from inside out than outside in [e.g., the average WVP is 0.057 g/(h m bar) from inside out and is 0.034 g/(h m bar) from outside in]. Numerical analysis shows that the cubic mineral crystals in the outer section of the A. pernyi cocoon wall create a rough surface that facilitates air turbulence and promotes disturbance amplitude of the flow field, leading to lengthened water vapor transfer path and increased tortuosity of the moist air. It also indicates the vortex of water vapor can be generated in the outer section of cocoon wall, which increases the diffusion distance of water vapor and enhances the turbulence kinetic energy and turbulence eddy dissipation, signifying higher moisture resistance in the outer section. The difference in moisture resistance of the multiple A. pernyi cocoon layers is largely responsible for the unique directional moisture transfer behavior of this wild silkworm cocoon. These findings may inspire a biomimicry approach to develop novel lightweight moisture management materials and structures.

  5. A Generalized Wall Function

    NASA Technical Reports Server (NTRS)

    Shih, Tsan-Hsing; Povinelli, Louis A.; Liu, Nan-Suey; Potapczuk, Mark G.; Lumley, J. L.

    1999-01-01

    The asymptotic solutions, described by Tennekes and Lumley (1972), for surface flows in a channel, pipe or boundary layer at large Reynolds numbers are revisited. These solutions can be extended to more complex flows such as the flows with various pressure gradients, zero wall stress and rough surfaces, etc. In computational fluid dynamics (CFD), these solutions can be used as the boundary conditions to bridge the near-wall region of turbulent flows so that there is no need to have the fine grids near the wall unless the near-wall flow structures are required to resolve. These solutions are referred to as the wall functions. Furthermore, a generalized and unified law of the wall which is valid for whole surface layer (including viscous sublayer, buffer layer and inertial sublayer) is analytically constructed. The generalized law of the wall shows that the effect of both adverse and favorable pressure gradients on the surface flow is very significant. Such as unified wall function will be useful not only in deriving analytic expressions for surface flow properties but also bringing a great convenience for CFD methods to place accurate boundary conditions at any location away from the wall. The extended wall functions introduced in this paper can be used for complex flows with acceleration, deceleration, separation, recirculation and rough surfaces.

  6. Inner- and outer-wall sorting of double-walled carbon nanotubes

    NASA Astrophysics Data System (ADS)

    Li, Han; Gordeev, Georgy; Wasserroth, Sören; Chakravadhanula, Venkata Sai Kiran; Neelakandhan, Shyam Kumar Chethala; Hennrich, Frank; Jorio, Ado; Reich, Stephanie; Krupke, Ralph; Flavel, Benjamin Scott

    2017-12-01

    Double-walled carbon nanotubes (DWCNTs) consist of two coaxially aligned single-walled carbon nanotubes (SWCNTs), and previous sorting methods only achieved outer-wall electronic-type selectivity. Here, a separation technique capable of sorting DWCNTs by semiconducting (S) or metallic (M) inner- and outer-wall electronic type is presented. Electronic coupling between the inner and outer wall is used to alter the surfactant coating around each of the DWCNT types, and aqueous gel permeation is used to separate them. Aqueous methods are used to remove SWCNT species from the raw material and prepare enriched DWCNT fractions. The enriched DWCNT fractions are then transferred into either chlorobenzene or toluene using the copolymer PFO-BPy to yield the four inner@outer combinations of M@M, M@S, S@M and S@S. The high purity of the resulting fractions is verified by absorption measurements, transmission electron microscopy, atomic force microscopy, resonance Raman mapping and high-density field-effect transistor devices.

  7. Inner- and outer-wall sorting of double-walled carbon nanotubes.

    PubMed

    Li, Han; Gordeev, Georgy; Wasserroth, Sören; Chakravadhanula, Venkata Sai Kiran; Neelakandhan, Shyam Kumar Chethala; Hennrich, Frank; Jorio, Ado; Reich, Stephanie; Krupke, Ralph; Flavel, Benjamin Scott

    2017-12-01

    Double-walled carbon nanotubes (DWCNTs) consist of two coaxially aligned single-walled carbon nanotubes (SWCNTs), and previous sorting methods only achieved outer-wall electronic-type selectivity. Here, a separation technique capable of sorting DWCNTs by semiconducting (S) or metallic (M) inner- and outer-wall electronic type is presented. Electronic coupling between the inner and outer wall is used to alter the surfactant coating around each of the DWCNT types, and aqueous gel permeation is used to separate them. Aqueous methods are used to remove SWCNT species from the raw material and prepare enriched DWCNT fractions. The enriched DWCNT fractions are then transferred into either chlorobenzene or toluene using the copolymer PFO-BPy to yield the four inner@outer combinations of M@M, M@S, S@M and S@S. The high purity of the resulting fractions is verified by absorption measurements, transmission electron microscopy, atomic force microscopy, resonance Raman mapping and high-density field-effect transistor devices.

  8. If walls could talk

    NASA Technical Reports Server (NTRS)

    Braam, J.; McIntire, L. V. (Principal Investigator)

    1999-01-01

    The plant cell wall is very complex, both in structure and function. The wall components and the mechanical properties of the wall have been implicated in conveying information that is important for morphogenesis. Proteoglycans, fragments of polysaccharides and the structural integrity of the wall may relay signals that influence cellular differentiation and growth control. Furthering our knowledge of cell wall structure and function is likely to have a profound impact on our understanding of how plant cells communicate with the extracellular environment.

  9. (a,k)-Anonymous Scheme for Privacy-Preserving Data Collection in IoT-based Healthcare Services Systems.

    PubMed

    Li, Hongtao; Guo, Feng; Zhang, Wenyin; Wang, Jie; Xing, Jinsheng

    2018-02-14

    The widely use of IoT technologies in healthcare services has pushed forward medical intelligence level of services. However, it also brings potential privacy threat to the data collection. In healthcare services system, health and medical data that contains privacy information are often transmitted among networks, and such privacy information should be protected. Therefore, there is a need for privacy-preserving data collection (PPDC) scheme to protect clients (patients) data. We adopt (a,k)-anonymity model as privacy pretection scheme for data collection, and propose a novel anonymity-based PPDC method for healthcare services in this paper. The threat model is analyzed in the client-server-to-user (CS2U) model. On client-side, we utilize (a,k)-anonymity notion to generate anonymous tuples which can resist possible attack, and adopt a bottom-up clustering method to create clusters that satisfy a base privacy level of (a 1 ,k 1 )-anonymity. On server-side, we reduce the communication cost through generalization technology, and compress (a 1 ,k 1 )-anonymous data through an UPGMA-based cluster combination method to make the data meet the deeper level of privacy (a 2 ,k 2 )-anonymity (a 1  ≥ a 2 , k 2  ≥ k 1 ). Theoretical analysis and experimental results prove that our scheme is effective in privacy-preserving and data quality.

  10. Plant glycosylphosphatidylinositol (GPI) anchored proteins at the plasma membrane-cell wall nexus.

    PubMed

    Yeats, Trevor H; Bacic, Antony; Johnson, Kim L

    2018-04-18

    Approximately 1% of plant proteins are predicted to be post-translationally modified with a glycosylphosphatidylinositol (GPI) anchor that tethers the polypeptide to the outer leaflet of the plasma membrane. While the synthesis and structure of GPI anchors is largely conserved across eukaryotes, the repertoire of functional domains present in the GPI-anchored proteome has diverged substantially. In plants, this includes a large fraction of the GPI-anchored proteome being further modified with plant-specific arabinogalactan (AG) O-glycans. The importance of the GPI-anchored proteome to plant development is underscored by the fact that GPI biosynthetic null mutants exhibit embryo lethality. Mutations in genes encoding specific GPI-anchored proteins (GAPs) further supports their contribution to diverse biological processes occurring at the interface of the plasma membrane and cell wall, including signaling, cell wall metabolism, cell wall polymer cross-linking, and plasmodesmatal transport. Here, we review the literature concerning plant GPI-anchored proteins in the context of their potential to act as molecular hubs that mediate interactions between the plasma membrane and the cell wall and their potential to transduce the signal into the protoplast and thereby activate signal transduction pathways. This article is protected by copyright. All rights reserved.

  11. Thermal Performance Evaluation of Walls with Gas Filled Panel Insulation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Shrestha, Som S.; Desjarlais, Andre Omer; Atchley, Jerald Allen

    Gas filled insulation panels (GFP) are very light weight and compact (when uninflated) advanced insulation products. GFPs consist of multiple layers of thin, low emittance (low-e) metalized aluminum. When expanded, the internal, low-e aluminum layers form a honeycomb structure. These baffled polymer chambers are enveloped by a sealed barrier and filled with either air or a low-conductivity gas. The sealed exterior aluminum foil barrier films provide thermal resistance, flammability protection, and properties to contain air or a low conductivity inert gas. This product was initially developed with a grant from the U.S. Department of Energy. The unexpanded product is nearlymore » flat for easy storage and transport. Therefore, transportation volume and weight of the GFP to fill unit volume of wall cavity is much smaller compared to that of other conventional insulation products. This feature makes this product appealing to use at Army Contingency Basing, when transportation cost is significant compared to the cost of materials. The objective of this study is to evaluate thermal performance of walls, similar to those used at typical Barracks Hut (B-Hut) hard shelters, when GFPs are used in the wall cavities. Oak Ridge National Laboratory (ORNL) tested performance of the wall in the rotatable guarded hotbox (RGHB) according to the ASTM C 1363 standard test method.« less

  12. New scheme for braiding Majorana fermions.

    PubMed

    Wu, Long-Hua; Liang, Qi-Feng; Hu, Xiao

    2014-12-01

    Non-Abelian statistics can be achieved by exchanging two vortices in topological superconductors with each grabbing a Majorana fermion (MF) as zero-energy quasi-particle at the cores. However, in experiments it is difficult to manipulate vortices. In the present work, we propose a way to braid MFs without moving vortices. The only operation required in the present scheme is to turn on and off local gate voltages, which liberates a MF from its original host vortex and transports it along the prepared track. We solve the time-dependent Bogoliubov-de Gennes equation numerically, and confirm that the MFs are protected provided the switching of gate voltages for exchanging MFs are adiabatic, which takes only several nano seconds given reasonable material parameters. By monitoring the time evolution of MF wave-functions, we show that non-Abelian statistics is achieved.

  13. Modifications to Langley 0.3-m TCT adaptive wall software for heavy gas test medium, phase 1 studies

    NASA Technical Reports Server (NTRS)

    Murthy, A. V.

    1992-01-01

    The scheme for two-dimensional wall adaptation with sulfur hexafluoride (SF6) as test gas in the NASA Langley Research Center 0.3-m Transonic Cryogenic Tunnel (0.3-m TCT) is presented. A unified version of the wall adaptation software has been developed to function in a dual gas operation mode (nitrogen or SF6). The feature of ideal gas calculations for nitrogen operation is retained. For SF6 operation, real gas properties have been computed using the departure function technique. Installation of the software on the 0.3-m TCT ModComp-A computer and preliminary validation with nitrogen operation were found to be satisfactory. Further validation and improvements to the software will be undertaken when the 0.3-m TCT is ready for operation with SF6 gas.

  14. Secure Dynamic access control scheme of PHR in cloud computing.

    PubMed

    Chen, Tzer-Shyong; Liu, Chia-Hui; Chen, Tzer-Long; Chen, Chin-Sheng; Bau, Jian-Guo; Lin, Tzu-Ching

    2012-12-01

    With the development of information technology and medical technology, medical information has been developed from traditional paper records into electronic medical records, which have now been widely applied. The new-style medical information exchange system "personal health records (PHR)" is gradually developed. PHR is a kind of health records maintained and recorded by individuals. An ideal personal health record could integrate personal medical information from different sources and provide complete and correct personal health and medical summary through the Internet or portable media under the requirements of security and privacy. A lot of personal health records are being utilized. The patient-centered PHR information exchange system allows the public autonomously maintain and manage personal health records. Such management is convenient for storing, accessing, and sharing personal medical records. With the emergence of Cloud computing, PHR service has been transferred to storing data into Cloud servers that the resources could be flexibly utilized and the operation cost can be reduced. Nevertheless, patients would face privacy problem when storing PHR data into Cloud. Besides, it requires a secure protection scheme to encrypt the medical records of each patient for storing PHR into Cloud server. In the encryption process, it would be a challenge to achieve accurately accessing to medical records and corresponding to flexibility and efficiency. A new PHR access control scheme under Cloud computing environments is proposed in this study. With Lagrange interpolation polynomial to establish a secure and effective PHR information access scheme, it allows to accurately access to PHR with security and is suitable for enormous multi-users. Moreover, this scheme also dynamically supports multi-users in Cloud computing environments with personal privacy and offers legal authorities to access to PHR. From security and effectiveness analyses, the proposed PHR access

  15. A Secure Dynamic Identity and Chaotic Maps Based User Authentication and Key Agreement Scheme for e-Healthcare Systems.

    PubMed

    Li, Chun-Ta; Lee, Cheng-Chi; Weng, Chi-Yao; Chen, Song-Jhih

    2016-11-01

    Secure user authentication schemes in many e-Healthcare applications try to prevent unauthorized users from intruding the e-Healthcare systems and a remote user and a medical server can establish session keys for securing the subsequent communications. However, many schemes does not mask the users' identity information while constructing a login session between two or more parties, even though personal privacy of users is a significant topic for e-Healthcare systems. In order to preserve personal privacy of users, dynamic identity based authentication schemes are hiding user's real identity during the process of network communications and only the medical server knows login user's identity. In addition, most of the existing dynamic identity based authentication schemes ignore the inputs verification during login condition and this flaw may subject to inefficiency in the case of incorrect inputs in the login phase. Regarding the use of secure authentication mechanisms for e-Healthcare systems, this paper presents a new dynamic identity and chaotic maps based authentication scheme and a secure data protection approach is employed in every session to prevent illegal intrusions. The proposed scheme can not only quickly detect incorrect inputs during the phases of login and password change but also can invalidate the future use of a lost/stolen smart card. Compared the functionality and efficiency with other authentication schemes recently, the proposed scheme satisfies desirable security attributes and maintains acceptable efficiency in terms of the computational overheads for e-Healthcare systems.

  16. Wall of fundamental constants

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Olive, Keith A.; School of Physics and Astronomy, University of Minnesota, Minneapolis, Minnesota, 55455; Peloso, Marco

    2011-02-15

    We consider the signatures of a domain wall produced in the spontaneous symmetry breaking involving a dilatonlike scalar field coupled to electromagnetism. Domains on either side of the wall exhibit slight differences in their respective values of the fine-structure constant, {alpha}. If such a wall is present within our Hubble volume, absorption spectra at large redshifts may or may not provide a variation in {alpha} relative to the terrestrial value, depending on our relative position with respect to the wall. This wall could resolve the contradiction between claims of a variation of {alpha} based on Keck/Hires data and of themore » constancy of {alpha} based on Very Large Telescope data. We derive the properties of the wall and the parameters of the underlying microscopic model required to reproduce the possible spatial variation of {alpha}. We discuss the constraints on the existence of the low-energy domain wall and describe its observational implications concerning the variation of the fundamental constants.« less

  17. The growing outer epidermal wall: design and physiological role of a composite structure.

    PubMed

    Kutschera, U

    2008-04-01

    The cells of growing plant organs secrete an extracellular fibrous composite (the primary wall) that allows the turgid protoplasts to expand irreversibly via wall-yielding events, which are regulated by processes within the cytoplasm. The role of the epidermis in the control of stem elongation is described with special reference to the outer epidermal wall (OEW), which forms a 'tensile skin'. The OEW is much thicker and less extensible than the walls of the inner tissues. Moreover, in the OEW the amount of cellulose per unit wall mass is considerably greater than in the inner tissues. Ultrastructural studies have shown that the expanding OEW is composed of a highly ordered internal and a diffuse outer half, with helicoidally organized cellulose microfibrils in the inner (load-bearing) region of this tension-stressed organ wall. The structural and mechanical backbone of the wall consists of helicoids, i.e. layers of parallel, inextensible cellulose microfibrils. These 'plywood laminates' contain crystalline 'cables' orientated in all directions with respect to the axis of elongation (isotropic material). Cessation of cell elongation is accompanied by a loss of order, i.e. the OEW is a dynamic structure. Helicoidally arranged extracellular polymers have also been found in certain bacteria, algae, fungi and animals. In the insect cuticle crystalline cutin nanofibrils form characteristic 'OEW-like' herringbone patterns. Theoretical considerations, in vitro studies and computer simulations suggest that extracellular biological helicoids form by directed self-assembly of the crystalline biopolymers. This spontaneous generation of complex design 'without an intelligent designer' evolved independently in the protective 'skin' of plants, animals and many other organisms.

  18. Bacterial cell-wall recycling

    PubMed Central

    Johnson, Jarrod W.; Fisher, Jed F.; Mobashery, Shahriar

    2012-01-01

    Many Gram-negative and Gram-positive bacteria recycle a significant proportion of the peptidoglycan components of their cell walls during their growth and septation. In many—and quite possibly all—bacteria, the peptidoglycan fragments are recovered and recycled. While cell-wall recycling is beneficial for the recovery of resources, it also serves as a mechanism to detect cell-wall–targeting antibiotics and to regulate resistance mechanisms. In several Gram-negative pathogens, anhydro-MurNAc-peptide cell-wall fragments regulate AmpC β-lactamase induction. In some Gram-positive organisms, short peptides derived from the cell wall regulate the induction of both β-lactamase and β-lactam-resistant penicillin-binding proteins. The involvement of peptidoglycan recycling with resistance regulation suggests that inhibitors of the enzymes involved in the recycling might synergize with cell-wall-targeted antibiotics. Indeed, such inhibitors improve the potency of β-lactams in vitro against inducible AmpC β-lactamase-producing bacteria. We describe the key steps of cell-wall remodeling and recycling, the regulation of resistance mechanisms by cell-wall recycling, and recent advances toward the discovery of cell-wall recycling inhibitors. PMID:23163477

  19. Cell Wall Structure of Coccoid Green Algae as an Important Trade-Off Between Biotic Interference Mechanisms and Multidimensional Cell Growth.

    PubMed

    Dunker, Susanne; Wilhelm, Christian

    2018-01-01

    Coccoid green algae can be divided in two groups based on their cell wall structure. One group has a highly chemical resistant cell wall (HR-cell wall) containing algaenan. The other group is more susceptible to chemicals (LR-cell wall - Low resistant cell wall). Algaenan is considered as important molecule to explain cell wall resistance. Interestingly, cell wall types (LR- and HR-cell wall) are not in accordance with the taxonomic classes Chlorophyceae and Trebouxiophyceae, which makes it even more interesting to consider the ecological function. It was already shown that algaenan helps to protect against virus, bacterial and fungal attack, but in this study we show for the first time that green algae with different cell wall properties show different sensitivity against interference competition with the cyanobacterium Microcystis aeruginosa . Based on previous work with co-cultures of M. aeruginosa and two green algae ( Acutodesmus obliquus and Oocystis marssonii ) differing in their cell wall structure, it was shown that M. aeruginosa could impair only the growth of the green algae if they belong to the LR-cell wall type. In this study it was shown that the sensitivity to biotic interference mechanism shows a more general pattern within coccoid green algae species depending on cell wall structure.

  20. Application of high-order numerical schemes and Newton-Krylov method to two-phase drift-flux model

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Zou, Ling; Zhao, Haihua; Zhang, Hongbin

    This study concerns the application and solver robustness of the Newton-Krylov method in solving two-phase flow drift-flux model problems using high-order numerical schemes. In our previous studies, the Newton-Krylov method has been proven as a promising solver for two-phase flow drift-flux model problems. However, these studies were limited to use first-order numerical schemes only. Moreover, the previous approach to treating the drift-flux closure correlations was later revealed to cause deteriorated solver convergence performance, when the mesh was highly refined, and also when higher-order numerical schemes were employed. In this study, a second-order spatial discretization scheme that has been tested withmore » two-fluid two-phase flow model was extended to solve drift-flux model problems. In order to improve solver robustness, and therefore efficiency, a new approach was proposed to treating the mean drift velocity of the gas phase as a primary nonlinear variable to the equation system. With this new approach, significant improvement in solver robustness was achieved. With highly refined mesh, the proposed treatment along with the Newton-Krylov solver were extensively tested with two-phase flow problems that cover a wide range of thermal-hydraulics conditions. Satisfactory convergence performances were observed for all test cases. Numerical verification was then performed in the form of mesh convergence studies, from which expected orders of accuracy were obtained for both the first-order and the second-order spatial discretization schemes. Finally, the drift-flux model, along with numerical methods presented, were validated with three sets of flow boiling experiments that cover different flow channel geometries (round tube, rectangular tube, and rod bundle), and a wide range of test conditions (pressure, mass flux, wall heat flux, inlet subcooling and outlet void fraction).« less

  1. Application of high-order numerical schemes and Newton-Krylov method to two-phase drift-flux model

    DOE PAGES

    Zou, Ling; Zhao, Haihua; Zhang, Hongbin

    2017-08-07

    This study concerns the application and solver robustness of the Newton-Krylov method in solving two-phase flow drift-flux model problems using high-order numerical schemes. In our previous studies, the Newton-Krylov method has been proven as a promising solver for two-phase flow drift-flux model problems. However, these studies were limited to use first-order numerical schemes only. Moreover, the previous approach to treating the drift-flux closure correlations was later revealed to cause deteriorated solver convergence performance, when the mesh was highly refined, and also when higher-order numerical schemes were employed. In this study, a second-order spatial discretization scheme that has been tested withmore » two-fluid two-phase flow model was extended to solve drift-flux model problems. In order to improve solver robustness, and therefore efficiency, a new approach was proposed to treating the mean drift velocity of the gas phase as a primary nonlinear variable to the equation system. With this new approach, significant improvement in solver robustness was achieved. With highly refined mesh, the proposed treatment along with the Newton-Krylov solver were extensively tested with two-phase flow problems that cover a wide range of thermal-hydraulics conditions. Satisfactory convergence performances were observed for all test cases. Numerical verification was then performed in the form of mesh convergence studies, from which expected orders of accuracy were obtained for both the first-order and the second-order spatial discretization schemes. Finally, the drift-flux model, along with numerical methods presented, were validated with three sets of flow boiling experiments that cover different flow channel geometries (round tube, rectangular tube, and rod bundle), and a wide range of test conditions (pressure, mass flux, wall heat flux, inlet subcooling and outlet void fraction).« less

  2. Endomembrane proteomics reveals putative enzymes involved in cell wall metabolism in wheat grain outer layers

    PubMed Central

    Chateigner-Boutin, Anne-Laure; Suliman, Muhtadi; Bouchet, Brigitte; Alvarado, Camille; Lollier, Virginie; Rogniaux, Hélène; Guillon, Fabienne; Larré, Colette

    2015-01-01

    Cereal grain outer layers fulfil essential functions for the developing seed such as supplying energy and providing protection. In the food industry, the grain outer layers called ‘the bran’ is valuable since it is rich in dietary fibre and other beneficial nutriments. The outer layers comprise several tissues with a high content in cell wall material. The cell wall composition of the grain peripheral tissues was investigated with specific probes at a stage of active cell wall synthesis. Considerable wall diversity between cell types was revealed. To identify the cellular machinery involved in cell wall synthesis, a subcellular proteomic approach was used targeting the Golgi apparatus where most cell wall polysaccharides are synthesized. The tissues were dissected into outer pericarp and intermediate layers where 822 and 1304 proteins were identified respectively. Many carbohydrate-active enzymes were revealed: some in the two peripheral grain fractions, others only in one tissue. Several protein families specific to one fraction and with characterized homologs in other species might be related to the specific detection of a polysaccharide in a particular cell layer. This report provides new information on grain cell walls and its biosynthesis in the valuable outer tissues, which are poorly studied so far. A better understanding of the mechanisms controlling cell wall composition could help to improve several quality traits of cereal products (e.g. dietary fibre content, biomass conversion to biofuel). PMID:25769308

  3. Numerical Simulation of Dry Granular Flow Impacting a Rigid Wall Using the Discrete Element Method

    PubMed Central

    Wu, Fengyuan; Fan, Yunyun; Liang, Li; Wang, Chao

    2016-01-01

    This paper presents a clump model based on Discrete Element Method. The clump model was more close to the real particle than a spherical particle. Numerical simulations of several tests of dry granular flow impacting a rigid wall flowing in an inclined chute have been achieved. Five clump models with different sphericity have been used in the simulations. By comparing the simulation results with the experimental results of normal force on the rigid wall, a clump model with better sphericity was selected to complete the following numerical simulation analysis and discussion. The calculation results of normal force showed good agreement with the experimental results, which verify the effectiveness of the clump model. Then, total normal force and bending moment of the rigid wall and motion process of the granular flow were further analyzed. Finally, comparison analysis of the numerical simulations using the clump model with different grain composition was obtained. By observing normal force on the rigid wall and distribution of particle size at the front of the rigid wall at the final state, the effect of grain composition on the force of the rigid wall has been revealed. It mainly showed that, with the increase of the particle size, the peak force at the retaining wall also increase. The result can provide a basis for the research of relevant disaster and the design of protective structures. PMID:27513661

  4. Iridium Aluminide Coats For Protection Against Ox idation

    NASA Technical Reports Server (NTRS)

    Kaplan, Richard B.; Tuffias, Robert H.; La Ferla, Raffaele; Jang, Qin

    1996-01-01

    Iridium aluminide coats investigated for use in protecting some metallic substrates against oxidation at high temperatures. Investigation prompted by need for cost-effective anti-oxidation coats for walls of combustion chambers in rocket engines. Also useful in special terrestrial applications like laboratory combustion chambers and some chemical-processing chambers.

  5. Typical Window, Interior Wall Paint Sequence, Wall Section, and Foundation ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    Typical Window, Interior Wall Paint Sequence, Wall Section, and Foundation Sections - Civilian Conservation Corps (CCC) Camp NP-5-C, Barracks No. 5, CCC Camp Historic District at Chapin Mesa, Cortez, Montezuma County, CO

  6. Regulation of cell wall biosynthesis.

    PubMed

    Zhong, Ruiqin; Ye, Zheng-Hua

    2007-12-01

    Plant cell walls differ in their amount and composition among various cell types and even in different microdomains of the wall of a given cell. Plants must have evolved regulatory mechanisms controlling biosynthesis, targeted secretion, and assembly of wall components to achieve the heterogeneity in cell walls. A number of factors, including hormones, the cytoskeleton, glycosylphosphatidylinositol-anchored proteins, phosphoinositides, and sugar nucleotide supply, have been implicated in the regulation of cell wall biosynthesis or deposition. In the past two years, there have been important discoveries in transcriptional regulation of secondary wall biosynthesis. Several transcription factors in the NAC and MYB families have been shown to be the key switches for activation of secondary wall biosynthesis. These studies suggest a transcriptional network comprised of a hierarchy of transcription factors is involved in regulating secondary wall biosynthesis. Further investigation and integration of the regulatory players participating in the making of cell walls will certainly lead to our understanding of how wall amounts and composition are controlled in a given cell type. This may eventually allow custom design of plant cell walls on the basis of our needs.

  7. Plant cell wall extensibility: connecting plant cell growth with cell wall structure, mechanics, and the action of wall-modifying enzymes

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Cosgrove, Daniel J.

    The advent of user-friendly instruments for measuring force/deflection curves of plant surfaces at high spatial resolution has resulted in a recent outpouring of reports of the ‘Young's modulus’ of plant cell walls. The stimulus for these mechanical measurements comes from biomechanical models of morphogenesis of meristems and other tissues, as well as single cells, in which cell wall stress feeds back to regulate microtubule organization, auxin transport, cellulose deposition, and future growth directionality. In this article I review the differences between elastic modulus and wall extensibility in the context of cell growth. Some of the inherent complexities, assumptions, and potentialmore » pitfalls in the interpretation of indentation force/deflection curves are discussed. Reported values of elastic moduli from surface indentation measurements appear to be 10- to >1000-fold smaller than realistic tensile elastic moduli in the plane of plant cell walls. Potential reasons for this disparity are discussed, but further work is needed to make sense of the huge range in reported values. The significance of wall stress relaxation for growth is reviewed and connected to recent advances and remaining enigmas in our concepts of how cellulose, hemicellulose, and pectins are assembled to make an extensible cell wall. A comparison of the loosening action of α-expansin and Cel12A endoglucanase is used to illustrate two different ways in which cell walls may be made more extensible and the divergent effects on wall mechanics.« less

  8. Abdominal wall fat pad biopsy

    MedlinePlus

    Amyloidosis - abdominal wall fat pad biopsy; Abdominal wall biopsy; Biopsy - abdominal wall fat pad ... most common method of taking an abdominal wall fat pad biopsy . The health care provider cleans the ...

  9. FPGA implementation cost and performance evaluation of IEEE 802.11 protocol encryption security schemes

    NASA Astrophysics Data System (ADS)

    Sklavos, N.; Selimis, G.; Koufopavlou, O.

    2005-01-01

    The explosive growth of internet and consumer demand for mobility has fuelled the exponential growth of wireless communications and networks. Mobile users want access to services and information, from both internet and personal devices, from a range of locations without the use of a cable medium. IEEE 802.11 is one of the most widely used wireless standards of our days. The amount of access and mobility into wireless networks requires a security infrastructure that protects communication within that network. The security of this protocol is based on the wired equivalent privacy (WEP) scheme. Currently, all the IEEE 802.11 market products support WEP. But recently, the 802.11i working group introduced the advanced encryption standard (AES), as the security scheme for the future IEEE 802.11 applications. In this paper, the hardware integrations of WEP and AES are studied. A field programmable gate array (FPGA) device has been used as the hardware implementation platform, for a fair comparison between the two security schemes. Measurements for the FPGA implementation cost, operating frequency, power consumption and performance are given.

  10. Anti-islanding Protection of Distributed Generation Using Rate of Change of Impedance

    NASA Astrophysics Data System (ADS)

    Shah, Pragnesh; Bhalja, Bhavesh

    2013-08-01

    Distributed Generation (DG), which is interlinked with distribution system, has inevitable effect on distribution system. Integrating DG with the utility network demands an anti-islanding scheme to protect the system. Failure to trip islanded generators can lead to problems such as threats to personnel safety, out-of-phase reclosing, and degradation of power quality. In this article, a new method for anti-islanding protection based on impedance monitoring of distribution network is carried out in presence of DG. The impedance measured between two phases is used to derive the rate of change of impedance (dz/dt), and its peak values are used for final trip decision. Test data are generated using PSCAD/EMTDC software package and the performance of the proposed method is evaluated in MatLab software. The simulation results show the effectiveness of the proposed scheme as it is capable to detect islanding condition accurately. Subsequently, it is also observed that the proposed scheme does not mal-operate during other disturbances such as short circuit and switching event.

  11. Validation of Martilli's urban boundary layer scheme with measurements from two mid-latitude European cities

    NASA Astrophysics Data System (ADS)

    Hamdi, R.; Schayes, G.

    2007-08-01

    Martilli's urban parameterization scheme is improved and implemented in a mesoscale model in order to take into account the typical effects of a real city on the air temperature near the ground and on the surface exchange fluxes. The mesoscale model is run on a single column using atmospheric data and radiation recorded above roof level as forcing. Here, the authors validate Martilli's urban boundary layer scheme using measurements from two mid-latitude European cities: Basel, Switzerland and Marseilles, France. For Basel, the model performance is evaluated with observations of canyon temperature, surface radiation, and energy balance fluxes obtained during the Basel urban boundary layer experiment (BUBBLE). The results show that the urban parameterization scheme represents correctly most of the behavior of the fluxes typical of the city center of Basel, including the large heat uptake by the urban fabric and the positive sensible heat flux at night. For Marseilles, the model performance is evaluated with observations of surface temperature, canyon temperature, surface radiation, and energy balance fluxes collected during the field experiments to constrain models of atmospheric pollution and transport of emissions (ESCOMPTE) and its urban boundary layer (UBL) campaign. At both urban sites, vegetation cover is less than 20%, therefore, particular attention was directed to the ability of Martilli's urban boundary layer scheme to reproduce the observations for the Marseilles city center, where the urban parameters and the synoptic forcing are totally different from Basel. Evaluation of the model with wall, road, and roof surface temperatures gave good results. The model correctly simulates the net radiation, canyon temperature, and the partitioning between the turbulent and storage heat fluxes.

  12. On a fourth order accurate implicit finite difference scheme for hyperbolic conservation laws. II - Five-point schemes

    NASA Technical Reports Server (NTRS)

    Harten, A.; Tal-Ezer, H.

    1981-01-01

    This paper presents a family of two-level five-point implicit schemes for the solution of one-dimensional systems of hyperbolic conservation laws, which generalized the Crank-Nicholson scheme to fourth order accuracy (4-4) in both time and space. These 4-4 schemes are nondissipative and unconditionally stable. Special attention is given to the system of linear equations associated with these 4-4 implicit schemes. The regularity of this system is analyzed and efficiency of solution-algorithms is examined. A two-datum representation of these 4-4 implicit schemes brings about a compactification of the stencil to three mesh points at each time-level. This compact two-datum representation is particularly useful in deriving boundary treatments. Numerical results are presented to illustrate some properties of the proposed scheme.

  13. A new flux splitting scheme

    NASA Technical Reports Server (NTRS)

    Liou, Meng-Sing; Steffen, Christopher J., Jr.

    1993-01-01

    A new flux splitting scheme is proposed. The scheme is remarkably simple and yet its accuracy rivals and in some cases surpasses that of Roe's solver in the Euler and Navier-Stokes solutions performed in this study. The scheme is robust and converges as fast as the Roe splitting. An approximately defined cell-face advection Mach number is proposed using values from the two straddling cells via associated characteristic speeds. This interface Mach number is then used to determine the upwind extrapolation for the convective quantities. Accordingly, the name of the scheme is coined as Advection Upstream Splitting Method (AUSM). A new pressure splitting is introduced which is shown to behave successfully, yielding much smoother results than other existing pressure splittings. Of particular interest is the supersonic blunt body problem in which the Roe scheme gives anomalous solutions. The AUSM produces correct solutions without difficulty for a wide range of flow conditions as well as grids.

  14. A new flux splitting scheme

    NASA Technical Reports Server (NTRS)

    Liou, Meng-Sing; Steffen, Christopher J., Jr.

    1991-01-01

    A new flux splitting scheme is proposed. The scheme is remarkably simple and yet its accuracy rivals and in some cases surpasses that of Roe's solver in the Euler and Navier-Stokes solutions performed in this study. The scheme is robust and converges as fast as the Roe splitting. An approximately defined cell-face advection Mach number is proposed using values from the two straddling cells via associated characteristic speeds. This interface Mach number is then used to determine the upwind extrapolation for the convective quantities. Accordingly, the name of the scheme is coined as Advection Upstream Splitting Method (AUSM). A new pressure splitting is introduced which is shown to behave successfully, yielding much smoother results than other existing pressure splittings. Of particular interest is the supersonic blunt body problem in which the Roe scheme gives anomalous solutions. The AUSM produces correct solutions without difficulty for a wide range of flow conditions as well as grids.

  15. 12. Interior view of north wall of Chapel. The wall ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    12. Interior view of north wall of Chapel. The wall panel is one of two carved with lists of those missing in nearby combat. - Flanders Field American Cemetery & Memorial, Chapel, Wortegemseweg 117, Waregem, West Flanders (Belgium)

  16. Spontaneous and controlled-diameter synthesis of single-walled and few-walled carbon nanotubes

    NASA Astrophysics Data System (ADS)

    Inoue, Shuhei; Lojindarat, Supanat; Kawamoto, Takahiro; Matsumura, Yukihiko; Charinpanitkul, Tawatchai

    2018-05-01

    In this study, we explored the spontaneous and controlled-diameter growth of carbon nanotubes. We evaluated the effects of catalyst density, reduction time, and a number of catalyst coating on the substrate (for multi-walled carbon nanotubes) on the diameter of single-walled carbon nanotubes and the number of layers in few-walled carbon nanotubes. Increasing the catalyst density and reduction time increased the diameters of the carbon nanotubes, with the average diameter increasing from 1.05 nm to 1.86 nm for single-walled carbon nanotubes. Finally, we succeeded in synthesizing a significant double-walled carbon nanotube population of 24%.

  17. Regulation of Cell Wall Biogenesis in Saccharomyces cerevisiae: The Cell Wall Integrity Signaling Pathway

    PubMed Central

    Levin, David E.

    2011-01-01

    The yeast cell wall is a strong, but elastic, structure that is essential not only for the maintenance of cell shape and integrity, but also for progression through the cell cycle. During growth and morphogenesis, and in response to environmental challenges, the cell wall is remodeled in a highly regulated and polarized manner, a process that is principally under the control of the cell wall integrity (CWI) signaling pathway. This pathway transmits wall stress signals from the cell surface to the Rho1 GTPase, which mobilizes a physiologic response through a variety of effectors. Activation of CWI signaling regulates the production of various carbohydrate polymers of the cell wall, as well as their polarized delivery to the site of cell wall remodeling. This review article centers on CWI signaling in Saccharomyces cerevisiae through the cell cycle and in response to cell wall stress. The interface of this signaling pathway with other pathways that contribute to the maintenance of cell wall integrity is also discussed. PMID:22174182

  18. Adaptive Packet Combining Scheme in Three State Channel Model

    NASA Astrophysics Data System (ADS)

    Saring, Yang; Bulo, Yaka; Bhunia, Chandan Tilak

    2018-01-01

    The two popular techniques of packet combining based error correction schemes are: Packet Combining (PC) scheme and Aggressive Packet Combining (APC) scheme. PC scheme and APC scheme have their own merits and demerits; PC scheme has better throughput than APC scheme, but suffers from higher packet error rate than APC scheme. The wireless channel state changes all the time. Because of this random and time varying nature of wireless channel, individual application of SR ARQ scheme, PC scheme and APC scheme can't give desired levels of throughput. Better throughput can be achieved if appropriate transmission scheme is used based on the condition of channel. Based on this approach, adaptive packet combining scheme has been proposed to achieve better throughput. The proposed scheme adapts to the channel condition to carry out transmission using PC scheme, APC scheme and SR ARQ scheme to achieve better throughput. Experimentally, it was observed that the error correction capability and throughput of the proposed scheme was significantly better than that of SR ARQ scheme, PC scheme and APC scheme.

  19. PREFACE: Domain wall dynamics in nanostructures Domain wall dynamics in nanostructures

    NASA Astrophysics Data System (ADS)

    Marrows, C. H.; Meier, G.

    2012-01-01

    Domain structures in magnetic materials are ubiquitous and have been studied for decades. The walls that separate them are topological defects in the magnetic order parameter and have a wide variety of complex forms. In general, their investigation is difficult in bulk materials since only the domain structure on the surface of a specimen is visible. Cutting the sample to reveal the interior causes a rearrangement of the domains into a new form. As with many other areas of magnetism, the study of domain wall physics has been revitalised by the advent of nanotechnology. The ability to fabricate nanoscale structures has permitted the formation of simplified and controlled domain patterns; the development of advanced microscopy methods has permitted them to be imaged and then modelled; subjecting them to ultrashort field and current pulses has permitted their dynamics to be explored. The latest results from all of these advances are described in this special issue. Not only has this led to results of great scientific beauty, but also to concepts of great applicability to future information technologies. In this issue the reader will find the latest results for these domain wall dynamics and the high-speed processes of topological structures such as domain walls and magnetic vortices. These dynamics can be driven by the application of magnetic fields, or by flowing currents through spintronic devices using the novel physics of spin-transfer torque. This complexity has been studied using a wide variety of experimental techniques at the edge of the spatial and temporal resolution currently available, and can be described using sophisticated analytical theory and computational modelling. As a result, the dynamics can be engineered to give rise to finely controlled memory and logic devices with new functionality. Moreover, the field is moving to study not only the conventional transition metal ferromagnets, but also complex heterostructures, novel magnets and even other

  20. Compact Spreader Schemes

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Placidi, M.; Jung, J. -Y.; Ratti, A.

    2014-07-25

    This paper describes beam distribution schemes adopting a novel implementation based on low amplitude vertical deflections combined with horizontal ones generated by Lambertson-type septum magnets. This scheme offers substantial compactness in the longitudinal layouts of the beam lines and increased flexibility for beam delivery of multiple beam lines on a shot-to-shot basis. Fast kickers (FK) or transverse electric field RF Deflectors (RFD) provide the low amplitude deflections. Initially proposed at the Stanford Linear Accelerator Center (SLAC) as tools for beam diagnostics and more recently adopted for multiline beam pattern schemes, RFDs offer repetition capabilities and a likely better amplitude reproducibilitymore » when compared to FKs, which, in turn, offer more modest financial involvements both in construction and operation. Both solutions represent an ideal approach for the design of compact beam distribution systems resulting in space and cost savings while preserving flexibility and beam quality.« less

  1. Low- and high-order accurate boundary conditions: From Stokes to Darcy porous flow modeled with standard and improved Brinkman lattice Boltzmann schemes

    NASA Astrophysics Data System (ADS)

    Silva, Goncalo; Talon, Laurent; Ginzburg, Irina

    2017-04-01

    The present contribution focuses on the accuracy of reflection-type boundary conditions in the Stokes-Brinkman-Darcy modeling of porous flows solved with the lattice Boltzmann method (LBM), which we operate with the two-relaxation-time (TRT) collision and the Brinkman-force based scheme (BF), called BF-TRT scheme. In parallel, we compare it with the Stokes-Brinkman-Darcy linear finite element method (FEM) where the Dirichlet boundary conditions are enforced on grid vertices. In bulk, both BF-TRT and FEM share the same defect: in their discretization a correction to the modeled Brinkman equation appears, given by the discrete Laplacian of the velocity-proportional resistance force. This correction modifies the effective Brinkman viscosity, playing a crucial role in the triggering of spurious oscillations in the bulk solution. While the exact form of this defect is available in lattice-aligned, straight or diagonal, flows; in arbitrary flow/lattice orientations its approximation is constructed. At boundaries, we verify that such a Brinkman viscosity correction has an even more harmful impact. Already at the first order, it shifts the location of the no-slip wall condition supported by traditional LBM boundary schemes, such as the bounce-back rule. For that reason, this work develops a new class of boundary schemes to prescribe the Dirichlet velocity condition at an arbitrary wall/boundary-node distance and that supports a higher order accuracy in the accommodation of the TRT-Brinkman solutions. For their modeling, we consider the standard BF scheme and its improved version, called IBF; this latter is generalized in this work to suppress or to reduce the viscosity correction in arbitrarily oriented flows. Our framework extends the one- and two-point families of linear and parabolic link-wise boundary schemes, respectively called B-LI and B-MLI, which avoid the interference of the Brinkman viscosity correction in their closure relations. The performance of LBM and FEM

  2. Is it worth protecting groundwater from diffuse pollution with agri-environmental schemes? A hydro-economic modeling approach.

    PubMed

    Hérivaux, Cécile; Orban, Philippe; Brouyère, Serge

    2013-10-15

    In Europe, 30% of groundwater bodies are considered to be at risk of not achieving the Water Framework Directive (WFD) 'good status' objective by 2015, and 45% are in doubt of doing so. Diffuse agricultural pollution is one of the main pressures affecting groundwater bodies. To tackle this problem, the WFD requires Member States to design and implement cost-effective programs of measures to achieve the 'good status' objective by 2027 at the latest. Hitherto, action plans have mainly consisted of promoting the adoption of Agri-Environmental Schemes (AES). This raises a number of questions concerning the effectiveness of such schemes for improving groundwater status, and the economic implications of their implementation. We propose a hydro-economic model that combines a hydrogeological model to simulate groundwater quality evolution with agronomic and economic components to assess the expected costs, effectiveness, and benefits of AES implementation. This hydro-economic model can be used to identify cost-effective AES combinations at groundwater-body scale and to show the benefits to be expected from the resulting improvement in groundwater quality. The model is applied here to a rural area encompassing the Hesbaye aquifer, a large chalk aquifer which supplies about 230,000 inhabitants in the city of Liege (Belgium) and is severely contaminated by agricultural nitrates. We show that the time frame within which improvements in the Hesbaye groundwater quality can be expected may be much longer than that required by the WFD. Current WFD programs based on AES may be inappropriate for achieving the 'good status' objective in the most productive agricultural areas, in particular because these schemes are insufficiently attractive. Achieving 'good status' by 2027 would demand a substantial change in the design of AES, involving costs that may not be offset by benefits in the case of chalk aquifers with long renewal times. Copyright © 2013 Elsevier Ltd. All rights reserved.

  3. High-resolution schemes for hyperbolic conservation laws

    NASA Technical Reports Server (NTRS)

    Harten, A.

    1982-01-01

    A class of new explicit second order accurate finite difference schemes for the computation of weak solutions of hyperbolic conservation laws is presented. These highly nonlinear schemes are obtained by applying a nonoscillatory first order accurae scheme to an appropriately modified flux function. The so derived second order accurate schemes achieve high resolution while preserving the robustness of the original nonoscillatory first order accurate scheme.

  4. Wonderful Walls

    ERIC Educational Resources Information Center

    Greenman, Jim

    2006-01-01

    In this article, the author emphasizes the importance of "working" walls in children's programs. Children's programs need "working" walls (and ceilings and floors) which can be put to use for communication, display, storage, and activity space. The furnishings also work, or don't work, for the program in another sense: in aggregate, they serve as…

  5. Finite-volume application of high order ENO schemes to multi-dimensional boundary-value problems

    NASA Technical Reports Server (NTRS)

    Casper, Jay; Dorrepaal, J. Mark

    1990-01-01

    The finite volume approach in developing multi-dimensional, high-order accurate essentially non-oscillatory (ENO) schemes is considered. In particular, a two dimensional extension is proposed for the Euler equation of gas dynamics. This requires a spatial reconstruction operator that attains formal high order of accuracy in two dimensions by taking account of cross gradients. Given a set of cell averages in two spatial variables, polynomial interpolation of a two dimensional primitive function is employed in order to extract high-order pointwise values on cell interfaces. These points are appropriately chosen so that correspondingly high-order flux integrals are obtained through each interface by quadrature, at each point having calculated a flux contribution in an upwind fashion. The solution-in-the-small of Riemann's initial value problem (IVP) that is required for this pointwise flux computation is achieved using Roe's approximate Riemann solver. Issues to be considered in this two dimensional extension include the implementation of boundary conditions and application to general curvilinear coordinates. Results of numerical experiments are presented for qualitative and quantitative examination. These results contain the first successful application of ENO schemes to boundary value problems with solid walls.

  6. The CWI Pathway: Regulation of the Transcriptional Adaptive Response to Cell Wall Stress in Yeast

    PubMed Central

    Sanz, Ana Belén; García, Raúl; Rodríguez-Peña, José M.; Arroyo, Javier

    2017-01-01

    Fungi are surrounded by an essential structure, the cell wall, which not only confers cell shape but also protects cells from environmental stress. As a consequence, yeast cells growing under cell wall damage conditions elicit rescue mechanisms to provide maintenance of cellular integrity and fungal survival. Through transcriptional reprogramming, yeast modulate the expression of genes important for cell wall biogenesis and remodeling, metabolism and energy generation, morphogenesis, signal transduction and stress. The yeast cell wall integrity (CWI) pathway, which is very well conserved in other fungi, is the key pathway for the regulation of this adaptive response. In this review, we summarize the current knowledge of the yeast transcriptional program elicited to counterbalance cell wall stress situations, the role of the CWI pathway in the regulation of this program and the importance of the transcriptional input received by other pathways. Modulation of this adaptive response through the CWI pathway by positive and negative transcriptional feedbacks is also discussed. Since all these regulatory mechanisms are well conserved in pathogenic fungi, improving our knowledge about them will have an impact in the developing of new antifungal therapies. PMID:29371494

  7. Two-level schemes for the advection equation

    NASA Astrophysics Data System (ADS)

    Vabishchevich, Petr N.

    2018-06-01

    The advection equation is the basis for mathematical models of continuum mechanics. In the approximate solution of nonstationary problems it is necessary to inherit main properties of the conservatism and monotonicity of the solution. In this paper, the advection equation is written in the symmetric form, where the advection operator is the half-sum of advection operators in conservative (divergent) and non-conservative (characteristic) forms. The advection operator is skew-symmetric. Standard finite element approximations in space are used. The standard explicit two-level scheme for the advection equation is absolutely unstable. New conditionally stable regularized schemes are constructed, on the basis of the general theory of stability (well-posedness) of operator-difference schemes, the stability conditions of the explicit Lax-Wendroff scheme are established. Unconditionally stable and conservative schemes are implicit schemes of the second (Crank-Nicolson scheme) and fourth order. The conditionally stable implicit Lax-Wendroff scheme is constructed. The accuracy of the investigated explicit and implicit two-level schemes for an approximate solution of the advection equation is illustrated by the numerical results of a model two-dimensional problem.

  8. Effects of vertical wall and tetrapod weights on wave overtopping in rubble mound breakwaters under irregular wave conditions

    NASA Astrophysics Data System (ADS)

    Park, Sang Kil; Dodaran, Asgar Ahadpour; Han, Chong Soo; Shahmirzadi, Mohammad Ebrahim Meshkati

    2014-12-01

    Rubble mound breakwaters protect the coastal line against severe erosion caused by wave action. This study examined the performance of different sizes and properties (i.e. height of vertical wall and tetrapod size) of rubble mound breakwaters on reducing the overtopping discharge. The physical model used in this study was derived based on an actual rubble mound in Busan Yacht Harbor. This research attempts to fill the gap in practical knowledge on the combined effect of the armor roughness and vertical wall on wave overtopping in rubble mound breakwaters. The main governing parameters used in this study were the vertical wall height, variation of the tetrapod weights, initial water level elevation, and the volume of overtopping under constant wave properties. The experimental results showed that the roughness factor differed according to the tetrapod size. Furthermore, the overtopping discharge with no vertical wall was similar to that with relatively short vertical walls ( 1 γv = 1). Therefore, the experimental results highlight the importance of the height of the vertical wall in reducing overtopping discharge. Moreover, a large tetrapod size may allow coastal engineers to choose a shorter vertical wall to save cost, while obtaining better performance.

  9. Comparison of airfoil results from an adaptive wall test section and a porous wall test section

    NASA Technical Reports Server (NTRS)

    Mineck, Raymond E.

    1989-01-01

    Two wind tunnel investigations were conducted to assess two different wall interference alleviation/correction techniques: adaptive test section walls and classical analytical corrections. The same airfoil model has been tested in the adaptive wall test section of the NASA-Langley 0.3 m Transonic Cryogenic Tunnel (TCT) and in the National Aeronautical Establishment (NAE) High Reynolds Number 2-D facility. The model has a 9 in. chord and a CAST 10-2/DOA 2 airfoil section. The 0.3 m TCT adaptive wall test section has four solid walls with flexible top and bottom walls. The NAE test section has porous top and bottom walls and solid side walls. The aerodynamic results corrected for top and bottom wall interference at Mach numbers from 0.3 to 0.8 at a Reynolds number of 10 by 1,000,000. Movement of the adaptive walls was used to alleviate the top and bottom wall interference in the test results from the NASA tunnel.

  10. Balancing the funds in the New Cooperative Medical Scheme in rural China: determinants and influencing factors in two provinces.

    PubMed

    Zhang, Luying; Cheng, Xiaoming; Liu, Xiaoyun; Zhu, Kun; Tang, Shenglan; Bogg, Lennart; Dobberschuetz, Karin; Tolhurst, Rachel

    2010-01-01

    In recent years, the central government in China has been leading the re-establishment of its rural health insurance system, but local government institutions have considerable flexibility in the specific design and management of schemes. Maintaining a reasonable balance of funds is critical to ensure that the schemes are sustainable and effective in offering financial protection to members. This paper explores the financial management of the NCMS in China through a case study of the balance of funds and the factors influencing this, in six counties in two Chinese provinces. The main data source is NCMS management data from each county from 2003 to 2005, supplemented by: a household questionnaire survey, qualitative interviews and focus group discussions with all local stakeholders and policy document analysis. The study found that five out of six counties held a large fund surplus, whilst enrolees obtained only partial financial protection. However, in one county greater risk pooling for enrolees was accompanied by relatively high utilisation levels, resulting in a fund deficit. The opportunities to sustainably increase the financial protection offered to NCMS enrolees are limited by the financial pressures on local government, specific political incentives and low technical capacities at the county level and below. Our analysis suggests that in the short term, efforts should be made to improve the management of the current NCMS design, which should be supported through capacity building for NCMS offices. However, further medium-term initiatives may be required including changes to the design of the schemes. Copyright (c) 2009 John Wiley & Sons, Ltd.

  11. An Efficient Location Verification Scheme for Static Wireless Sensor Networks.

    PubMed

    Kim, In-Hwan; Kim, Bo-Sung; Song, JooSeok

    2017-01-24

    In wireless sensor networks (WSNs), the accuracy of location information is vital to support many interesting applications. Unfortunately, sensors have difficulty in estimating their location when malicious sensors attack the location estimation process. Even though secure localization schemes have been proposed to protect location estimation process from attacks, they are not enough to eliminate the wrong location estimations in some situations. The location verification can be the solution to the situations or be the second-line defense. The problem of most of the location verifications is the explicit involvement of many sensors in the verification process and requirements, such as special hardware, a dedicated verifier and the trusted third party, which causes more communication and computation overhead. In this paper, we propose an efficient location verification scheme for static WSN called mutually-shared region-based location verification (MSRLV), which reduces those overheads by utilizing the implicit involvement of sensors and eliminating several requirements. In order to achieve this, we use the mutually-shared region between location claimant and verifier for the location verification. The analysis shows that MSRLV reduces communication overhead by 77% and computation overhead by 92% on average, when compared with the other location verification schemes, in a single sensor verification. In addition, simulation results for the verification of the whole network show that MSRLV can detect the malicious sensors by over 90% when sensors in the network have five or more neighbors.

  12. An Efficient Location Verification Scheme for Static Wireless Sensor Networks

    PubMed Central

    Kim, In-hwan; Kim, Bo-sung; Song, JooSeok

    2017-01-01

    In wireless sensor networks (WSNs), the accuracy of location information is vital to support many interesting applications. Unfortunately, sensors have difficulty in estimating their location when malicious sensors attack the location estimation process. Even though secure localization schemes have been proposed to protect location estimation process from attacks, they are not enough to eliminate the wrong location estimations in some situations. The location verification can be the solution to the situations or be the second-line defense. The problem of most of the location verifications is the explicit involvement of many sensors in the verification process and requirements, such as special hardware, a dedicated verifier and the trusted third party, which causes more communication and computation overhead. In this paper, we propose an efficient location verification scheme for static WSN called mutually-shared region-based location verification (MSRLV), which reduces those overheads by utilizing the implicit involvement of sensors and eliminating several requirements. In order to achieve this, we use the mutually-shared region between location claimant and verifier for the location verification. The analysis shows that MSRLV reduces communication overhead by 77% and computation overhead by 92% on average, when compared with the other location verification schemes, in a single sensor verification. In addition, simulation results for the verification of the whole network show that MSRLV can detect the malicious sensors by over 90% when sensors in the network have five or more neighbors. PMID:28125007

  13. EAST WALL OF CRYSTALLIZER WING TO THE LEFT, END WALL ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    EAST WALL OF CRYSTALLIZER WING TO THE LEFT, END WALL OF CRUSHING MILL IN CENTER. GABLE END OF BOILING HOUSE IN LEFT BACKGROUND. VIEW FROM THE SOUTH - Kekaha Sugar Company, Sugar Mill Building, 8315 Kekaha Road, Kekaha, Kauai County, HI

  14. Security enhanced BioEncoding for protecting iris codes

    NASA Astrophysics Data System (ADS)

    Ouda, Osama; Tsumura, Norimichi; Nakaguchi, Toshiya

    2011-06-01

    Improving the security of biometric template protection techniques is a key prerequisite for the widespread deployment of biometric technologies. BioEncoding is a recently proposed template protection scheme, based on the concept of cancelable biometrics, for protecting biometric templates represented as binary strings such as iris codes. The main advantage of BioEncoding over other template protection schemes is that it does not require user-specific keys and/or tokens during verification. Besides, it satisfies all the requirements of the cancelable biometrics construct without deteriorating the matching accuracy. However, although it has been shown that BioEncoding is secure enough against simple brute-force search attacks, the security of BioEncoded templates against more smart attacks, such as record multiplicity attacks, has not been sufficiently investigated. In this paper, a rigorous security analysis of BioEncoding is presented. Firstly, resistance of BioEncoded templates against brute-force attacks is revisited thoroughly. Secondly, we show that although the cancelable transformation employed in BioEncoding might be non-invertible for a single protected template, the original iris code could be inverted by correlating several templates used in different applications but created from the same iris. Accordingly, we propose an important modification to the BioEncoding transformation process in order to hinder attackers from exploiting this type of attacks. The effectiveness of adopting the suggested modification is validated and its impact on the matching accuracy is investigated empirically using CASIA-IrisV3-Interval dataset. Experimental results confirm the efficacy of the proposed approach and show that it preserves the matching accuracy of the unprotected iris recognition system.

  15. Mobius domain-wall fermions on gradient-flowed dynamical HISQ ensembles

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Berkowitz, Evan; Bouchard, Chris; Chang, Chia Cheng

    Here, we report on salient features of a mixed lattice QCD action using valence M\\"{o}bius domain-wall fermions solved on the dynamicalmore » $$N_f=2+1+1$$ HISQ ensembles generated by the MILC Collaboration. The approximate chiral symmetry properties of the valence fermions are shown to be significantly improved by utilizing the gradient-flow scheme to first smear the HISQ configurations. The greater numerical cost of the M\\"{o}bius domain-wall inversions is mitigated by the highly efficient QUDA library optimized for NVIDIA GPU accelerated compute nodes. We have created an interface to this optimized QUDA solver in Chroma. We provide tuned parameters of the action and performance of QUDA using ensembles with the lattice spacings $$a \\simeq \\{0.15, 0.12, 0.09\\}$$ fm and pion masses $$m_\\pi \\simeq \\{310, 220,130\\}$$ MeV. We have additionally generated two new ensembles with $$a\\sim0.12$$ fm and $$m_\\pi\\sim\\{400, 350\\}$$ MeV. With a fixed flow-time of $$t_{gf}=1$$ in lattice units, the residual chiral symmetry breaking of the valence fermions is kept below 10\\% of the light quark mass on all ensembles, $$m_{res} \\lesssim 0.1\\times m_l$$, with moderate values of the fifth dimension $$L_5$$ and a domain-wall height $$M_5 \\leq 1.3$$. As a benchmark calculation, we perform a continuum, infinite volume, physical pion and kaon mass extrapolation of $$F_{K^\\pm}/F_{\\pi^\\pm}$$ and demonstrate our results are independent of flow-time, and consistent with the FLAG determination of this quantity at the level of less than one standard deviation.« less

  16. Mobius domain-wall fermions on gradient-flowed dynamical HISQ ensembles

    DOE PAGES

    Berkowitz, Evan; Bouchard, Chris; Chang, Chia Cheng; ...

    2017-09-25

    Here, we report on salient features of a mixed lattice QCD action using valence M\\"{o}bius domain-wall fermions solved on the dynamicalmore » $$N_f=2+1+1$$ HISQ ensembles generated by the MILC Collaboration. The approximate chiral symmetry properties of the valence fermions are shown to be significantly improved by utilizing the gradient-flow scheme to first smear the HISQ configurations. The greater numerical cost of the M\\"{o}bius domain-wall inversions is mitigated by the highly efficient QUDA library optimized for NVIDIA GPU accelerated compute nodes. We have created an interface to this optimized QUDA solver in Chroma. We provide tuned parameters of the action and performance of QUDA using ensembles with the lattice spacings $$a \\simeq \\{0.15, 0.12, 0.09\\}$$ fm and pion masses $$m_\\pi \\simeq \\{310, 220,130\\}$$ MeV. We have additionally generated two new ensembles with $$a\\sim0.12$$ fm and $$m_\\pi\\sim\\{400, 350\\}$$ MeV. With a fixed flow-time of $$t_{gf}=1$$ in lattice units, the residual chiral symmetry breaking of the valence fermions is kept below 10\\% of the light quark mass on all ensembles, $$m_{res} \\lesssim 0.1\\times m_l$$, with moderate values of the fifth dimension $$L_5$$ and a domain-wall height $$M_5 \\leq 1.3$$. As a benchmark calculation, we perform a continuum, infinite volume, physical pion and kaon mass extrapolation of $$F_{K^\\pm}/F_{\\pi^\\pm}$$ and demonstrate our results are independent of flow-time, and consistent with the FLAG determination of this quantity at the level of less than one standard deviation.« less

  17. Effect of multi-layer thermal insulation thickness and location on the hypervelocity impact response of dual-wall structures

    NASA Astrophysics Data System (ADS)

    Schonberg, William P.

    Traditional perforation-resistant wall design for long-duration spacecraft consists of a "bumper" that is placed a small distance away from the main "pressure wall" of a spacecraft compartment or module. This concept has been studied extensively as a means of reducing the perforation threat of hypervelocity projectiles such as meteoroids and orbital debris. If a dual-wall system is employed on an earth-orbiting spacecraft, then a blanket of multi-layer insulation (MLI) will typically be included within the dual-wall system for thermal protection purposes. This paper presents the results of an experimental study in which aluminum dual-wall structures were tested under a variety of high-speed impact conditions to study the effect of MLI thickness and location on perforation resistance. The results presented consist of test-by-test comparisons of the damage sustained by similar dual-wall systems with blanket MLI of various thicknesses and at various locations within the dual-wall systems under similar impact loading conditions. The analyses performed revealed that the placement of the MLI had a significant effect on the ballistic limit of the dual-wall structures considered while reducing the thickness of the MLI by as much as 1/3 did not.

  18. Fabrication of titanium multi-wall Thermal Protection System (TPS) test panel arrays

    NASA Technical Reports Server (NTRS)

    Blair, W.; Meaney, J. E.; Rosenthal, H. A.

    1980-01-01

    Several arrays were designed and tested. Tests included vibrational and acoustical tests, radiant heating tests, and thermal conductivity tests. A feasible manufacturing technique was established for producing the protection system panels.

  19. A New Improving Quantum Secret Sharing Scheme

    NASA Astrophysics Data System (ADS)

    Xu, Ting-Ting; Li, Zhi-Hui; Bai, Chen-Ming; Ma, Min

    2017-04-01

    An improving quantum secret sharing scheme (IQSS scheme) was introduced by Nascimento et al. (Phys. Rev. A 64, 042311 (2001)), which was analyzed by the improved quantum access structure. In this paper, we propose a new improving quantum secret sharing scheme, and more quantum access structures can be realized by this scheme than the previous one. For example, we prove that any threshold and hypercycle quantum access structures can be realized by the new scheme.

  20. Ponzi scheme diffusion in complex networks

    NASA Astrophysics Data System (ADS)

    Zhu, Anding; Fu, Peihua; Zhang, Qinghe; Chen, Zhenyue

    2017-08-01

    Ponzi schemes taking the form of Internet-based financial schemes have been negatively affecting China's economy for the last two years. Because there is currently a lack of modeling research on Ponzi scheme diffusion within social networks yet, we develop a potential-investor-divestor (PID) model to investigate the diffusion dynamics of Ponzi scheme in both homogeneous and inhomogeneous networks. Our simulation study of artificial and real Facebook social networks shows that the structure of investor networks does indeed affect the characteristics of dynamics. Both the average degree of distribution and the power-law degree of distribution will reduce the spreading critical threshold and will speed up the rate of diffusion. A high speed of diffusion is the key to alleviating the interest burden and improving the financial outcomes for the Ponzi scheme operator. The zero-crossing point of fund flux function we introduce proves to be a feasible index for reflecting the fast-worsening situation of fiscal instability and predicting the forthcoming collapse. The faster the scheme diffuses, the higher a peak it will reach and the sooner it will collapse. We should keep a vigilant eye on the harm of Ponzi scheme diffusion through modern social networks.