Indonesia-GTZ Mini-Hydropower Schemes for Sustainable Economic Development
AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are8COaBulkTransmissionSitingProcess.pdfGetecGtel JumpCounty,Jump7Open Energy Information Indonesia UN| Open Energy
Indonesia-GTZ Emissions Reductions in Urban Transport | Open Energy
AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are8COaBulkTransmissionSitingProcess.pdfGetecGtel JumpCounty,Jump7Open Energy Information Indonesia UN
Degradation Scheme graceful degradation
Chiba, Shigeru
Degradation Scheme graceful degradation degradation scheme OS OS degradation scheme OS degradation scheme 1 Java graceful degradation [8] graceful degradation degradation scheme degradation scheme degradation scheme OS degradation scheme OS Solaris Linux FreeBSD Windows Server Linux 3 OS Tomcat Solaris OS
Car Sharing Scheme Car Share Scheme
Martin, Ralph R.
Car Sharing Scheme Car Share Scheme The cost is now reduced to Â£10 per member of staff per share but only own one vehicle between them do not qualify for the car share scheme. A commitment is required for all members of the scheme to car share at all times when they are in work each working day
Low Energy Distillation Schemes
Polley, G. T.
of reducing energy consumption. We look at how the better integrated distillation schemes can be quickly identified. It is found that the design of integrated schemes is quicker than that of non-integrated schemes. We then look at how the use of heat pumps...
TRINITY HALL PUBLICATION SCHEME
Lasenby, Joan
TRINITY HALL PUBLICATION SCHEME PART 1 INTRODUCTION 1. Legal requirement 1.1 Adopting a publication and whether or not charges will be made. 3. The `model' publication scheme for higher education 3.1 Trinity and is committed to publishing the information it describes. 4. Who we are 4.1 Trinity Hall is a college within
Willcock, J J; Lumsdaine, A; Quinlan, D J
2008-08-19T23:59:59.000Z
Tabled execution is a generalization of memorization developed by the logic programming community. It not only saves results from tabled predicates, but also stores the set of currently active calls to them; tabled execution can thus provide meaningful semantics for programs that seemingly contain infinite recursions with the same arguments. In logic programming, tabled execution is used for many purposes, both for improving the efficiency of programs, and making tasks simpler and more direct to express than with normal logic programs. However, tabled execution is only infrequently applied in mainstream functional languages such as Scheme. We demonstrate an elegant implementation of tabled execution in Scheme, using a mix of continuation-passing style and mutable data. We also show the use of tabled execution in Scheme for a problem in formal language and automata theory, demonstrating that tabled execution can be a valuable tool for Scheme users.
Placidi, M.; Jung, J. -Y.; Ratti, A.; Sun, C.
2014-07-25T23:59:59.000Z
This paper describes beam distribution schemes adopting a novel implementation based on low amplitude vertical deflections combined with horizontal ones generated by Lambertson-type septum magnets. This scheme offers substantial compactness in the longitudinal layouts of the beam lines and increased flexibility for beam delivery of multiple beam lines on a shot-to-shot basis. Fast kickers (FK) or transverse electric field RF Deflectors (RFD) provide the low amplitude deflections. Initially proposed at the Stanford Linear Accelerator Center (SLAC) as tools for beam diagnostics and more recently adopted for multiline beam pattern schemes, RFDs offer repetition capabilities and a likely better amplitude reproducibility when compared to FKs, which, in turn, offer more modest financial involvements both in construction and operation. Both solutions represent an ideal approach for the design of compact beam distribution systems resulting in space and cost savings while preserving flexibility and beam quality.
Matrix subdivision schemes Albert Cohen
Cohen, Albert
in the analysis of multivariate scalar schemes, in subdivision processes corresponding to shiftÂinvariant spaces extension of the well studied case of subdivision schemes with scalar masks. Such schemes arise of \\Phi. 1 #12; 1.Introduction Matrix subdivision schemes play an important role in the analysis of mul
2008-01-22T23:59:59.000Z
Permission is granted to make and distribute verbatim copies of this manual provided the copyright notice and .... are best placed in the initialization file, which is a file containing Scheme code. ...... ("hello"). 15.2 Exception objects related to memory management ...... ming practice to use a name with the same case as in C.
TRINITY HALL PUBLICATION SCHEME
Lasenby, Joan
TRINITY HALL PUBLICATION SCHEME PART 2 Main categories The main groups of classes of information Trinity Hall was founded in 1350 by William Bateman, Bishop of Norwich, as a common law corporation to the University and College Statutes. The Education (Listed Bodies) Order 1997 recognises Trinity Hall
Jet Schemes and Truncated Wedge Schemes Cornelia O. Yuen
Smith, Karen E.
Jet Schemes and Truncated Wedge Schemes by Cornelia O. Yuen A dissertation submitted in partial of jets and arcs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 1.2 A higher dimension analog of arcs and jets . . . . . . . . . . . . . . . . . . . 3 1.3 History
Foglietta, J.H.
1999-07-01T23:59:59.000Z
A new LNG cycle has been developed for base load liquefaction facilities. This new design offers a different technical and economical solution comparing in efficiency with the classical technologies. The new LNG scheme could offer attractive business opportunities to oil and gas companies that are trying to find paths to monetize gas sources more effectively; particularly for remote or offshore locations where smaller scale LNG facilities might be applicable. This design offers also an alternative route to classic LNG projects, as well as alternative fuel sources. Conceived to offer simplicity and access to industry standard equipment, This design is a hybrid result of combining a standard refrigeration system and turboexpander technology.
Landeche, D.A. [Entergy Operations, Inc., Killona, LA (United States)
1996-10-01T23:59:59.000Z
In it`s document TR-105834, Project 24414 dated November 1995 and titled {open_quotes}Zero Plastics and the Radiologically Protected Area Low Level Waste Lockout Program{close_quotes}, EPRI describes DAW lockout as a {open_quotes}very advanced{close_quotes} and {open_quotes}perhaps the most powerful of all approaches to LLW minimization.{close_quotes} The report discusses implementation of a lockout program at Kewaunee, LaSalle and Zion stations but states that {open_quotes}no quantifiable results{close_quotes} were available at time of report printing. Waterford 3 Nuclear Station began implementing a limited lockout scheme in 1993. This paper presents Waterford`s experience and results achieved through the lockout approach.
2006-03-16T23:59:59.000Z
Mar 16, 2006 ... security standards for low-cost smart-card applications in the following table,. Scheme. Signature Publ-key Priv-key. Setup Signing Verifying.
Singular Homology of Arithmetic Schemes
]. In this article we motivate and give the definition of the singular homology groups of schemes of finite type over # n k = Spec(k[t 0 , . . . , t n ]/ # t i = 1) is the ndimensional standard simplex over k, a ``standard nsimplex'' should have dimension n but # n S is a scheme of dimension (n + 1). If the Dedekind
Singular Homology of Arithmetic Schemes
]. In this article we motivate and give the definition of the singular homology groups of schemes of finite type over(k[t0, . . . , tn]/ ti = 1) is the n-dimensional standard simplex over k and a finite correspondence, a "standard n-simplex" should have dimension n but n S is a scheme of dimension (n + 1). If the Dedekind
Engineering Scheme Mentor Job description
Anderson, Jim
1 Engineering Scheme Mentor Job description Department: Student Administration and Registry and Outreach Team Job title: Engineering Scheme Mentor Responsible to: UK Student Recruitment and Outreach Team Payment and benefits: £100 overall for e-mentoring plus £6.42 per additional hour Duration: Activities
Operational Signature Schemes Michael Backes
Operational Signature Schemes Michael Backes CISPA, Saarland University Â¨OzgÂ¨ur Dagdelen TU] transferred the idea of functional encryption to signatures. They basically say that, with knowledge
FROM NATIONAL APPROVAL SCHEME TO INTERNATIONAL CERTIFICATION SCHEME
turbines has been performed since 1979. In January 2005 a certification scheme was introduced based on IEC certification standard "IEC WT 01" [5] and the load and safety standard "IEC 61400-1" [6] and "IEC 61400-2" [7 Turbines has been developed (IEC WT01) · Some procedures and requirements in the old system did not meet
Forestry Commission Disability Equality Scheme
Forestry Commission Disability Equality Scheme 2009-2012 #12;CONTENTS Page Â· Foreword by the Forestry Commissioners 3 Â· Introduction 4 Â· The Forestry Commission's Structure 9 Â· Legal Obligations 12 20 Â· The Forestry Commission as a Service Provider 22 Â· The Forestry Commission as an Employer 23
CECC'08 L. Csirmaz: Secret Sharing Schemes 1 / 35 Secret Sharing Schemes
Csirmaz, László
CECC'08 L. Csirmaz: Secret Sharing Schemes 1 / 35 Secret Sharing Schemes: Solved & Unsolved Problems Laszlo Csirmaz Central European University July 3, 2008 #12;CECC'08 L. Csirmaz: Secret Sharing Schemes 2 / 35 Secret Sharing Scheme { the beginning Contents 1 Secret Sharing Scheme { the beginning 2 De
Regular differentials and equidimensional scheme-maps.
1910-30-30T23:59:59.000Z
Now fix a base scheme S, and restrict attention to those S-schemes Z whose ... g is smooth at f(x); and since all the relevant data are compatible with flat base.
Sustainable Energy Scheme Mentor Job description
Anderson, Jim
1 Sustainable Energy Scheme Mentor Job description Department: Student Administration and Registry and agreement between the Sustainable Energy Scheme Mentor and the UK Student Recruitment and Outreach Team Sustainable Energy Scheme · To participate in both on and off campus mentoring activities throughout
Matroids and quantum-secret-sharing schemes
Sarvepalli, Pradeep; Raussendorf, Robert [Department of Physics and Astronomy, University of British Columbia, Vancouver V6T 1Z1 (Canada)
2010-05-15T23:59:59.000Z
A secret-sharing scheme is a cryptographic protocol to distribute a secret state in an encoded form among a group of players such that only authorized subsets of the players can reconstruct the secret. Classically, efficient secret-sharing schemes have been shown to be induced by matroids. Furthermore, access structures of such schemes can be characterized by an excluded minor relation. No such relations are known for quantum secret-sharing schemes. In this paper we take the first steps toward a matroidal characterization of quantum-secret-sharing schemes. In addition to providing a new perspective on quantum-secret-sharing schemes, this characterization has important benefits. While previous work has shown how to construct quantum-secret-sharing schemes for general access structures, these schemes are not claimed to be efficient. In this context the present results prove to be useful; they enable us to construct efficient quantum-secret-sharing schemes for many general access structures. More precisely, we show that an identically self-dual matroid that is representable over a finite field induces a pure-state quantum-secret-sharing scheme with information rate 1.
Purely Algebraic Method to Construct Toric Schemes
Li, Ting
2007-01-01T23:59:59.000Z
In this article, we first give some elementary proprieties of monoids and fans, then construct a toric scheme over an arbitrary ring, from a given fan. Using Valuative Criterion, we prove that this scheme is separated and give the sufficient and necessary condition when it is proper. We also study the regularity and logarithmic regularity of it. Finally we study the morphisms of toric schemes induced by the homomorphisms of fans.
Optimization Online - Total variation superiorization schemes in ...
S.N. Penfold
2010-10-08T23:59:59.000Z
Oct 8, 2010 ... Total variation superiorization schemes in proton computed tomography ... check improved the image quality, in particular image noise, in the ...
High-Order Energy Stable WENO Schemes
A third-order Energy Stable Weighted Essentially Non--Oscillatory (ESWENO) finite difference scheme developed by the authors of the paper [N. K. Yamaleev ...
Point transformations in invariant difference schemes
Francis Valiquette
2005-07-17T23:59:59.000Z
In this paper, we show that when two systems of differential equations admitting a symmetry group are related by a point transformation it is always possible to generate invariant schemes, one for each system, that are also related by the same transformation. This result is used to easily obtain new invariant schemes of some differential equations.
Finite volume renormalization scheme for fermionic operators
Monahan, Christopher; Orginos, Kostas [JLAB
2013-11-01T23:59:59.000Z
We propose a new finite volume renormalization scheme. Our scheme is based on the Gradient Flow applied to both fermion and gauge fields and, much like the Schr\\"odinger functional method, allows for a nonperturbative determination of the scale dependence of operators using a step-scaling approach. We give some preliminary results for the pseudo-scalar density in the quenched approximation.
Retirement Benefits Scheme Benefiting from membership
Mumby, Peter J.
7 Temporary absence 8 Part-time employment 8 Normal retirement 8 Late retirement 9 Early retirementRetirement Benefits Scheme Benefiting from membership: Your guide to the Scheme www 9 Incapacity retirement 10 Cash sum options 10 Pension increases 10 Paymeny of pension 10 Leaving
Y AND RELIABILITY: LOGO MANUAL COLOR SCHEME
Bordenstein, Seth
AND RELIABILITY: LOGO MANUAL COLOR SCHEME TYPOGRAPHY RECOMMENDED DISPLAY SPACE PMS 131C PMS COOL GRAY 11C VERSION HORIZONTAL 1J COLOR SCHEME R=203 G=163 B=57 C=21 M=34 Y=93 K=2 20,0 @Me Nas $10M in equipment Machine shop equipped conference facility All-purpose machine shop Skilled engineering staff
Graph Decompositions and Secret Sharing Schemes 1
Stinson, Douglas
Graph Decompositions and Secret Sharing Schemes 1 C. Blundo and A. De Santis Dipartimento di In this paper, we continue a study of secret sharing schemes for access structures based on graphs. Given a graph G, we require that a subset of participants can compute a secret key if they contain an edge of G
Strongly Secure Ramp Secret Sharing Schemes for General Access Structures
Yamamoto, Hirosuke
Strongly Secure Ramp Secret Sharing Schemes for General Access Structures Mitsugu Iwamoto 1 , Hirosuke Yamamoto 2 Abstract Ramp secret sharing (SS) schemes can be classified into strong ramp SS schemes and weak ramp SS schemes. The strong ramp SS schemes do not leak out any part of a secret explicitly even
Topology optimization of building bracing schemes
Goo, Zhen John
2013-01-01T23:59:59.000Z
The thesis presents a technique for producing economical solutions for conventional structural steel frames using topology optimization on the lateral bracing scheme. The study focuses mainly on minimizing the amount of ...
Efficient multiparty quantum-secret-sharing schemes
Xiao Li; Deng Fuguo [Department of Physics, Tsinghua University, Beijing 100084 (China); Key Laboratory for Quantum Information and Measurements, MOE, Beijing 100084 (China); Long Guilu [Department of Physics, Tsinghua University, Beijing 100084 (China); Key Laboratory for Quantum Information and Measurements, MOE, Beijing 100084 (China); Center of Atomic and Molecular NanoSciences, Tsinghua University, Beijing 100084 (China); Center for Quantum Information, Tsinghua University, Beijing 100084 (China); Pan Jianwei [Institute for Experimental Physics University of Vienna, Boltzmanngasse 5, Vienna 9 (Austria)
2004-05-01T23:59:59.000Z
In this work, we generalize the quantum-secret-sharing scheme of Hillery, Buzek, and Berthiaume [Phys. Rev. A 59, 1829 (1999)] into arbitrary multiparties. Explicit expressions for the shared secret bit is given. It is shown that in the Hillery-Buzek-Berthiaume quantum-secret-sharing scheme the secret information is shared in the parity of binary strings formed by the measured outcomes of the participants. In addition, we have increased the efficiency of the quantum-secret-sharing scheme by generalizing two techniques from quantum key distribution. The favored-measuring-basis quantum-secret-sharing scheme is developed from the Lo-Chau-Ardehali technique [H. K. Lo, H. F. Chau, and M. Ardehali, e-print quant-ph/0011056] where all the participants choose their measuring-basis asymmetrically, and the measuring-basis-encrypted quantum-secret-sharing scheme is developed from the Hwang-Koh-Han technique [W. Y. Hwang, I. G. Koh, and Y. D. Han, Phys. Lett. A 244, 489 (1998)] where all participants choose their measuring basis according to a control key. Both schemes are asymptotically 100% in efficiency, hence nearly all the Greenberger-Horne-Zeilinger states in a quantum-secret-sharing process are used to generate shared secret information.
automatic scheme selection: Topics by E-print Network
Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)
register management in the interpreter, allows ... Berlin, Andrew A. 1988-04-01 154 Car Sharing Scheme Car Share Scheme Computer Technologies and Information Sciences...
advanced emms scheme: Topics by E-print Network
Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)
register management in the interpreter, allows ... Berlin, Andrew A. 1988-04-01 37 Car Sharing Scheme Car Share Scheme Computer Technologies and Information Sciences...
admission control scheme: Topics by E-print Network
Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)
maximum power point tracking, partial feedback linearizing Pota, Himanshu Roy 439 Car Sharing Scheme Car Share Scheme Computer Technologies and Information Sciences...
active absorber scheme: Topics by E-print Network
Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)
that may describe such sub-diffusive processes. Yacov Kantor; Mehran Kardar 2007-10-31 76 Car Sharing Scheme Car Share Scheme Computer Technologies and Information Sciences...
alternative readout schemes: Topics by E-print Network
Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)
quantum dots, or phosphorus donors in silicon. Shilin Ng; Mankei Tsang 2014-05-28 129 Car Sharing Scheme Car Share Scheme Computer Technologies and Information Sciences...
active interferometer-stabilization scheme: Topics by E-print...
Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)
register management in the interpreter, allows ... Berlin, Andrew A. 1988-04-01 29 Car Sharing Scheme Car Share Scheme Computer Technologies and Information Sciences...
adaptive computerized scheme: Topics by E-print Network
Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)
probability of faithful teleportation. Joanna Modlawska; Andrzej Grudka 2009-06-07 168 Car Sharing Scheme Car Share Scheme Computer Technologies and Information Sciences...
apprenticeship scheme honoured: Topics by E-print Network
Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)
register management in the interpreter, allows ... Berlin, Andrew A. 1988-04-01 187 Car Sharing Scheme Car Share Scheme Computer Technologies and Information Sciences...
Utility Energy Efficiency Schemes: Savings Obligations and Trading...
Schemes: Savings Obligations and Trading **Subscription Required** Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Utility Energy Efficiency Schemes: Savings Obligations...
An efficient parallelization scheme for molecular dynamics simulations...
Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)
efficient parallelization scheme for molecular dynamics simulations with many-body, flexible, polarizable empirical An efficient parallelization scheme for molecular dynamics...
Moelders, Nicole
ii Evaluation of the Hydro-Thermodynamic Soil Vegetation Scheme and implementation of a new.S. Fairbanks, Alaska August 2005 #12;iii Abstract The Hydro-Thermodynamic Soil-Vegetation Scheme (HTSVS........................................................................................................................... 24 Evaluation of snow depth and soil temperatures predicted by the Hydro- Thermodynamic Soil
Cooling scheme for turbine hot parts
Hultgren, Kent Goran (Winter Park, FL); Owen, Brian Charles (Orlando, FL); Dowman, Steven Wayne (Orlando, FL); Nordlund, Raymond Scott (Orlando, FL); Smith, Ricky Lee (Oviedo, FL)
2000-01-01T23:59:59.000Z
A closed-loop cooling scheme for cooling stationary combustion turbine components, such as vanes, ring segments and transitions, is provided. The cooling scheme comprises: (1) an annular coolant inlet chamber, situated between the cylinder and blade ring of a turbine, for housing coolant before being distributed to the turbine components; (2) an annular coolant exhaust chamber, situated between the cylinder and the blade ring and proximate the annular coolant inlet chamber, for collecting coolant exhaust from the turbine components; (3) a coolant inlet conduit for supplying the coolant to said coolant inlet chamber; (4) a coolant exhaust conduit for directing coolant from said coolant exhaust chamber; and (5) a piping arrangement for distributing the coolant to and directing coolant exhaust from the turbine components. In preferred embodiments of the invention, the cooling scheme further comprises static seals for sealing the blade ring to the cylinder and flexible joints for attaching the blade ring to the turbine components.
Scheme Evolution and the Relational Algebra Edwin McKenzie*
North Carolina at Chapel Hill, University of
Scheme Evolution and the Relational Algebra TR87-003 Revised May 1988 Edwin McKenzie* Richard Institution. #12;Scheme Evolution and the Relational Algebra Edwin McKenzie and Richard Snodgrass Department, evolution of a database's contents and evolution of a database's scheme. We define a relation's scheme
Security problem on arbitrated quantum signature schemes
Jeong Woon Choi; Ku-Young Chang; Dowon Hong
2011-06-27T23:59:59.000Z
Until now, there have been developed many arbitrated quantum signature schemes implemented with a help of a trusted third party. In order to guarantee the unconditional security, most of them take advantage of the optimal quantum one-time encryption method based on Pauli operators. However, we in this paper point out that the previous schemes only provides a security against total break and actually show that there exists a simple existential forgery attack to validly modify the transmitted pair of message and signature. In addition, we also provide a simple method to recover the security against the proposed attack.
Security problem on arbitrated quantum signature schemes
Choi, Jeong Woon [Emerging Technology R and D Center, SK Telecom, Kyunggi 463-784 (Korea, Republic of); Chang, Ku-Young; Hong, Dowon [Cryptography Research Team, Electronics and Telecommunications Research Institute, Daejeon 305-700 (Korea, Republic of)
2011-12-15T23:59:59.000Z
Many arbitrated quantum signature schemes implemented with the help of a trusted third party have been developed up to now. In order to guarantee unconditional security, most of them take advantage of the optimal quantum one-time encryption based on Pauli operators. However, in this paper we point out that the previous schemes provide security only against a total break attack and show in fact that there exists an existential forgery attack that can validly modify the transmitted pair of message and signature. In addition, we also provide a simple method to recover security against the proposed attack.
Cross Layer Coding Schemes for Broadcasting and Relaying
John Wilson, Makesh Pravin
2011-08-08T23:59:59.000Z
) in the presence of side information about the source known only to the receiver. We introduce hybrid digital analog forms of the Costa and Wyner-Ziv cod- ing schemes. We present random coding based schemes in contrast to lattice based schemes proposed... constrained additive white Gaussian noise channels. We propose structured coding schemes using lattices for this problem. We study two decoding approaches, namely lattice decoding and minimum angle decoding. Both the decoding schemes can be shown to achieve...
BRAZIL VISITING FELLOWSHIP SCHEME Application Form
Birmingham, University of
BRAZIL VISITING FELLOWSHIP SCHEME Application Form APPLICATIONS SHOULD BE TYPEWRITTEN AND BOXES of attendance Qualifications awarded and class of Honours, etc. Principal Subject(s) taken #12;BRAZIL VISITING): Date(s) From To To Nature of work and Position held Name and address of employer #12;BRAZIL VISITING
Analysis of modulation scheme using GNU Radio
Yu, Chansu
1 Analysis of modulation scheme using GNU Radio By: Zeyu long Outline Introduce Project Goal QPSK CPFSK Resolute Project conclusion Project challenges Reference #12;2 Introduce (1) GNU radio: One of the most popular applications of Software Defined Radios Use C++ to write blocks Use python to connect
AN ALGEBRAIC DESCRIPTION OF ITERATIVE DECODING SCHEMES
Soljanin, Emina
AN ALGEBRAIC DESCRIPTION OF ITERATIVE DECODING SCHEMES ELKE OFFER AND EMINA SOLJANIN Abstract University of Technology, D- 80290 Munich, Germany, elke@lnt.e-technik.tu-muenchen.de Mathematical Sciences Research Center, Bell Labs, Lucent Technologies, Murray Hill, NJ 07974, USA. emina@lucent.com 1 #12;2 E
Bonus points The National Access Scheme
Chen, Ying
Bonus points The National Access Scheme ANU offers bonus points for nationally strategic senior secondary subjects, and in recognition of difficult circumstances that students face in their studies. Bonus) will be awarded. Bonus points to do not apply to programs with an ATAR cut-off of 98 or higher. Bonus Points
Inoculating Multivariate Schemes Against Differential Attacks
adding as few as 10 Plus poly- nomials to the Perturbed Matsumoto-Imai (PMI) cryptosystem when g = 1 scheme the Perturbed Matsumoto-Imai-Plus (PMI+) cryptosystem. Keywords: multivariate, public key, called the perturbed Matsumoto-Imai cryptosystem (PMI), is slower as one needs to go through a search
Generalized Semi-Quantum Secret Sharing Schemes
Gheorghiu, Vlad
2012-01-01T23:59:59.000Z
We investigate quantum secret sharing schemes constructed from $[n,k,delta]_D$ non-binary stabilizer quantum error correcting codes with carrier qudits of prime dimension $D$. We provide a systematic way of determining the access structure, which completely determines the forbidden and intermediate structures. We then show that the information available to the intermediate structure can be fully described and quantified by what we call the \\emph{information group}, a subgroup of the Pauli group of $k$ qudits, and employ this group structure to construct a method for hiding the information from the intermediate structure via twirling of the information group and sharing of classical bits between the dealer and the players. Our scheme allows the transformation of a ramp (intermediate) quantum secret sharing scheme into a semi-quantum perfect secret sharing scheme with the same access structure as the ramp one but without any intermediate subsets, and is optimal in the amount of classical bits the dealer has to ...
Fluid = particles A Conservative Numerical Scheme
Al Hanbali, Ahmad
of this continuum formulation will 'directly' lead to a discrete Hamiltonian scheme: HPM. · alternative is fully Lagrangian description, which can be discretized into SPH. · both HPM and SPH require some sort of smoothing to maintain accuracy over long-time integrations. Eulerian grid in HPM allows for efficient numerical
How might a statistical cloud scheme be coupled to a mass-flux convection scheme?
Klein, Stephen A.; Pincus, Robert; Hannay, Cecile; Xu, Kuan-man
2004-09-27T23:59:59.000Z
The coupling of statistical cloud schemes with mass-flux convection schemes is addressed. Source terms representing the impact of convection are derived within the framework of prognostic equations for the width and asymmetry of the probability distribution function of total water mixing ratio. The accuracy of these source terms is quantified by examining output from a cloud resolving model simulation of deep convection. Practical suggestions for inclusion of these source terms in large-scale models are offered.
The Scheme of Beam Synchronization in MEIC
Zhang, Yuhong; Derbenev, Yaroslav S.; Hutton, Andrew M.
2013-06-01T23:59:59.000Z
Synchronizing colliding beams at single or multiple collision points is a critical R&D issue in the design of a medium energy electron-ion collider (MEIC) at Jefferson Lab. The path-length variation due to changes in the ion energy, which varies over 20 to 100 GeV, could be more than several times the bunch spacing. The scheme adopted in the present MEIC baseline is centered on varying the number of bunches (i.e., harmonic number) stored in the collider ring. This could provide a set of discrete energies for proton or ions such that the beam synchronization condition is satisfied. To cover the ion energy between these synchronized values, we further propose to vary simultaneously the electron ring circumference and the frequency of the RF systems in both collider rings. We also present in this paper the requirement of frequency tunability of SRF cavities to support the scheme.
Adaptive Resource Management Schemes for Web Services
Lee, Heung Ki
2011-02-22T23:59:59.000Z
cluster system. Our schemes avoid the skewed distribution of requests in the web cluster system. C. Web Streaming Service This research provides a solution to networking issues related to web streaming ser- vice in the wireless home environment...-deflned threshold, the disk with fast response time serves it, and vice versa. E. Pinheiro et al., [30] have proposed a dynamic cluster reconflguration technique., to bring down the energy consumption in servers. In this technique, a cluster node is dynamically...
The Emergent Universe scheme and tunneling
Labraña, Pedro [Departamento de Física, Universidad del Bío-Bío, Avenida Collao 1202, Casilla 5-C, Concepción, Chile and Departament d'Estructura i Constituents de la Matèria and Institut de Ciències del Cosmos, Universitat (Spain)
2014-07-23T23:59:59.000Z
We present an alternative scheme for an Emergent Universe scenario, developed previously in Phys. Rev. D 86, 083524 (2012), where the universe is initially in a static state supported by a scalar field located in a false vacuum. The universe begins to evolve when, by quantum tunneling, the scalar field decays into a state of true vacuum. The Emergent Universe models are interesting since they provide specific examples of non-singular inflationary universes.
antiproton acceleration scheme: Topics by E-print Network
Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)
F; Gaz, A; Margoni, M; Morandin, M; Pompili, A; Posocco, M; Rotondo, M 2006-01-01 244 Car Sharing Scheme Car Share Scheme Computer Technologies and Information Sciences...
Congestion pricing using a raffle-based scheme
Amin, Saurabh
We propose a raffle-based scheme for the decongestion of a shared resource. Our scheme builds on ideas from the economic literature on incentivizing contributions to a public good. We formulate a game-theoretic model for ...
E#cient Oblivious Transfer Schemes # WenGuey Tzeng
of exchanged messages for the case that the reÂ ceiver's choice is unconditionally secure. The computation time of them. For our OT 1 n scheme, the privacy of the receiver's choice is unconditionally secure. It achieves better security than Noar and Pinkas's scheme does in many aspects. For example, our scheme
Optimal information rate of secret sharing schemes on trees
Tardos, GÃ¡bor
The information rate for an access structure is the reciprocal of the load of the optimal secret sharing scheme method. AMS classification numbers. 05B40, 05C85, 94A60, 94A62, 94A17 1 Introduction Secret sharing sharing scheme for the access structure based on a graph G a secret sharing scheme on G. The load
New Monte Carlo schemes for simulating diffusions in discontinuous media
Paris-Sud XI, Université de
New Monte Carlo schemes for simulating diffusions in discontinuous media Antoine Lejay1,2,3,4,5 Sylvain Maire6,7 April 28, 2012 Abstract We introduce new Monte Carlo simulation schemes for diffusions in a dis- continuous media divided in subdomains with piecewise constant diffusivity. These schemes
New Monte Carlo schemes for simulating diffusions in discontinuous media
Paris-Sud XI, Université de
New Monte Carlo schemes for simulating diffusions in discontinuous media Antoine Lejay1,2,3,4,5 Sylvain Maire6,7 December 13, 2012 Abstract We introduce new Monte Carlo simulation schemes for diffusions in a dis- continuous media divided in subdomains with piecewise constant diffusivity. These schemes
Jet schemes of rational double point singularities Hussein MOURTADA
Favre, Charles - Institut de Mathématiques de Jussieu, Université Paris 7
Jet schemes of rational double point singularities Hussein MOURTADA April 9, 2013 Abstract We prove that for m N, m big enough, the number of irreducible components of the schemes of m-jets centered of the jet schemes of an E6 singularity to its "minimal" embedded resolutions of singularities. 1
Jet schemes of rational double point singularities Hussein MOURTADA
Jet schemes of rational double point singularities Hussein MOURTADA September 30, 2012 Abstract We prove that for m N, m big enough, the number of irreducble components of the schemes of m-jets centered of the jet schemes of an E6 singularity to its "minimal" embedded resolutions of singularities. 1
Jet schemes of rational double point singularities Hussein Mourtada
Bodin, Arnaud
Jet schemes of rational double point singularities Hussein Mourtada Abstract. We prove that for m N, m big enough, the number of irreducible compo- nents of the schemes of m-jets centered at a point on the minimal reso- lution of the singularity. We also relate some irreducible components of the jet schemes
Perfect Secret Sharing Schemes from Room GhulamRasool Chaudhry
Seberry, Jennifer
Perfect Secret Sharing Schemes from Room Squares GhulamÂRasool Chaudhry Hossein Ghodosi Jennifer retirement Abstract Secret sharing schemes are one of the most important primitives in distributed systems. In perfect secret sharing schemes, collaboÂ ration between unauthorised participants cannot reduce
Weakly-Private Secret Sharing Schemes Amos Beimel1
Beimel, Amos
Weakly-Private Secret Sharing Schemes Amos Beimel1 and Matthew Franklin2 1 Department of Computer. Abstract. Secret-sharing schemes are an important tool in cryptogra- phy that is used in the construction of many secure protocols. However, the shares' size in the best known secret-sharing schemes realizing gen
Perfect Secret Sharing Schemes from Room Ghulam-Rasool Chaudhry
Seberry, Jennifer
Perfect Secret Sharing Schemes from Room Squares Ghulam-Rasool Chaudhry Hossein Ghodosi Jennifer retirement Abstract Secret sharing schemes are one of the most important primitives in distributed systems. In perfect secret sharing schemes, collabo- ration between unauthorised participants cannot reduce
Hardware implementation of secure Shamir's secret sharing scheme
Karpovsky, Mark
Hardware implementation of secure Shamir's secret sharing scheme Pei Luo and Andy Yu-Lun Lin Electrical and Computer Engineering Boston University Email: markkar@bu.edu Abstract--Shamir's secret sharing scheme is an effective way to distribute secret to a group of shareholders. But this scheme is vulnerable
Two Optimum Secret Sharing Schemes Revisited Zhengjun Cao Olivier Markowitch
Markowitch, Olivier
Two Optimum Secret Sharing Schemes Revisited Zhengjun Cao Olivier Markowitch Department of Computer, caoamss@gmail.com Abstract In 2006, Obana et al proposed two optimum secret shar- ing schemes secure efficient because they only extend the secret to an array of two elements. The new scheme for a single se
Anonymous Secret Sharing Schemes Dipartimento di Informatica ed Applicazioni
Stinson, Douglas
Anonymous Secret Sharing Schemes C. Blundo Dipartimento di Informatica ed Applicazioni Universit January 29, 1996 Abstract In this paper we study anonymous secret sharing schemes. Informally, in an anonyÂ mous secret sharing scheme the secret can be reconstructed without knowledge of which participants hold
Reusing Shares in Secret Sharing Schemes Yuliang Zheng
Zheng, Yuliang
Reusing Shares in Secret Sharing Schemes Yuliang Zheng Thomas Hardjono Jennifer Seberry The Centre for The Computer Journal 1 #12;Reusing Shares in Secret Sharing Schemes Abstract A (t w) threshold scheme is a method for sharing a secret among w shareholders so that the collaboration of at least t shareholders
The gradient flow running coupling scheme
Zoltan Fodor; Kieran Holland; Julius Kuti; Daniel Nogradi; Chik Him Wong
2012-11-14T23:59:59.000Z
The Yang-Mills gradient flow in finite volume is used to define a running coupling scheme. As our main result the discrete beta-function, or step scaling function, is calculated for scale change s=3/2 at several lattice spacings for SU(3) gauge theory coupled to N_f = 4 fundamental massless fermions. The continuum extrapolation is performed and agreement is found with the continuum perturbative results for small renormalized coupling. The case of SU(2) gauge group is briefly commented on.
Automated distribution scheme speeds service restoration
Atwell, E. [Lakeland Electric and Water, FL (United States)] [Lakeland Electric and Water, FL (United States); Gamvrelis, T. [Harris Canada, Inc., Calgary, Alberta (Canada). Control Div.] [Harris Canada, Inc., Calgary, Alberta (Canada). Control Div.; Kearns, D. [S and C Electric Co., Chicago, IL (United States)] [S and C Electric Co., Chicago, IL (United States); Landman, R. [H and L Instruments, North Hampton, NH (United States)] [H and L Instruments, North Hampton, NH (United States)
1996-01-01T23:59:59.000Z
This article describes an automated distribution scheme that met Lakeland Electric requirements for an automated scheme that would restore power to a major customer in less than 60 seconds. In January 1993, Lakeland Electric and Water (LEW) took on the design and construction of a new 12.47-kV automated distribution system for the Publix Supermarket Industrial complex. The industrial complex in Lakeland, Florida, totals 2 million square feet and houses a dairy processing plant, bakery, produce plant, deli plant, data processing facility for Publix`s entire retail network, purchasing department, as well as several maintenance facilities. The retail chain is LEW`s largest customer with a peak demand of 15.5 MW and a load factor of 81%. Publix`s rapid expansion plan has placed a great deal of pressure on this facility to perform at peak level with no interruptions of product flow. The task at hand was to provide Publix with a state-of-the-art, automated, distribution system built to withstand the inherent weather-related situations in central Florida, lightning and hurricanes.
Finite-difference schemes for anisotropic diffusion
Es, Bram van, E-mail: es@cwi.nl [Centrum Wiskunde and Informatica, P.O. Box 94079, 1090GB Amsterdam (Netherlands); FOM Institute DIFFER, Dutch Institute for Fundamental Energy Research, Association EURATOM-FOM (Netherlands); Koren, Barry [Eindhoven University of Technology (Netherlands); Blank, Hugo J. de [FOM Institute DIFFER, Dutch Institute for Fundamental Energy Research, Association EURATOM-FOM (Netherlands)
2014-09-01T23:59:59.000Z
In fusion plasmas diffusion tensors are extremely anisotropic due to the high temperature and large magnetic field strength. This causes diffusion, heat conduction, and viscous momentum loss, to effectively be aligned with the magnetic field lines. This alignment leads to different values for the respective diffusive coefficients in the magnetic field direction and in the perpendicular direction, to the extent that heat diffusion coefficients can be up to 10{sup 12} times larger in the parallel direction than in the perpendicular direction. This anisotropy puts stringent requirements on the numerical methods used to approximate the MHD-equations since any misalignment of the grid may cause the perpendicular diffusion to be polluted by the numerical error in approximating the parallel diffusion. Currently the common approach is to apply magnetic field-aligned coordinates, an approach that automatically takes care of the directionality of the diffusive coefficients. This approach runs into problems at x-points and at points where there is magnetic re-connection, since this causes local non-alignment. It is therefore useful to consider numerical schemes that are tolerant to the misalignment of the grid with the magnetic field lines, both to improve existing methods and to help open the possibility of applying regular non-aligned grids. To investigate this, in this paper several discretization schemes are developed and applied to the anisotropic heat diffusion equation on a non-aligned grid.
Security Schemes for Wireless Sensor Networks with Mobile Sink
Rasheed, Amar Adnan
2011-08-08T23:59:59.000Z
multi-hop approach used alone. 9 CHAPTER II KEY PRE-DISTRIBUTION SCHEMES FOR TOLERATING NODES CAPTURE IN SENSOR NETWORK WITH MS In this chapter, we propose two key pre-distribution schemes.... Taylor May 2010 Major Subject: Computer Science iii ABSTRACT Security Schemes for Wireless Sensor Networks with Mobile Sink. (May 2010) Amar Adnan Rasheed, B.S., University of Baghdad; M.S., Northeastern Illinois University Chair...
adaptive control scheme: Topics by E-print Network
Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)
systems concepts. Based Alpcan, Tansu 5 Adaptive predictive lighting controllers for daylight artificial light integrated schemes. Open Access Theses and Dissertations Summary:...
Forcing scheme in pseudopotential lattice Boltzmann model for multiphase flows
Q. Li; K. H. Luo; X. J. Li
2012-04-18T23:59:59.000Z
The pseudo-potential lattice Boltzmann (LB) model is a widely used multiphase model in the LB community. In this model, an interaction force, which is usually implemented via a forcing scheme, is employed to mimic the molecular interactions that cause phase segregation. The forcing scheme is therefore expected to play an important role in the pseudo-potential LB model. In this paper, we aim to address some key issues about forcing schemes in the pseudo-potential LB model. Firstly, theoretical and numerical analyses will be made for Shan-Chen's forcing scheme and the exact-difference-method (EDM) forcing scheme. The nature of these two schemes and their recovered macroscopic equations will be shown. Secondly, through a theoretical analysis, we will reveal the physics behind the phenomenon that different forcing schemes exhibit different performances in the pseudo-potential LB model. Moreover, based on the analysis, we will present an improved forcing scheme and numerically demonstrate that the improved scheme can be treated as an alternative approach for achieving thermodynamic consistency in the pseudo-potential LB model.
Energy stable schemes and numerical simulations of two phase ...
Title: Energy stable schemes and numerical simulations of two phase complex fluids by the phase-field method Abstact: We present an energetic variational ...
second-order convex splitting schemes for gradient flows with ...
2011-11-08T23:59:59.000Z
Abstract. We construct unconditionally stable, unconditionally uniquely solvable, and second-order accurate (in time) schemes for gradient flows with energy of ...
Positivity-preserving high order finite difference WENO schemes for ...
In a conservative numerical scheme, the internal energy is obtained by subtracting the kinetic energy from the total energy, thus the resulting pressure may be ...
Efficient energy stable schemes with spectral discretization in space ...
2012-04-03T23:59:59.000Z
We construct energy stable schemes for the time discretization of the highly nonlinear ... shape) in order to achieve a well-defined energy for the system.
DECOUPLED ENERGY STABLE SCHEMES FOR A PHASE-FIELD ...
2014-04-24T23:59:59.000Z
cally consistent phase-field model that admits an energy law. ... numerical schemes which do not respect the energy dissipation laws may be “overloaded” with ...
Discretization schemes for diffusion operators on general meshes
Herbin, Raphaèle
: Navier Stokes equations Flow in porous media, Darcy equation. discretization of -div( u)) A can Supplementary constraint from the oil reservoir simulation community: cell centred schemes transport equations
A Three-Operator Splitting Scheme and its Optimization Applications
Damek Davis
2015-03-04T23:59:59.000Z
Mar 4, 2015 ... Abstract: Operator splitting schemes have been successfully used in computational sciences to reduce complex problems into a series of ...
alternating coupling scheme: Topics by E-print Network
Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)
Formula and a symmetric interior penalty Discontinuous Galerkin method. The kinematic wave equation governing the overland flow is discretized using a Godunov scheme....
aligned coupling scheme: Topics by E-print Network
Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)
Formula and a symmetric interior penalty Discontinuous Galerkin method. The kinematic wave equation governing the overland flow is discretized using a Godunov scheme....
adaptive modelling scheme: Topics by E-print Network
Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)
the implementation of the present scheme requires only information about the local enviroment and this allows to treat also system with very complicated boundary conditions....
Energy Supplier Obligations and White Certificate Schemes: Comparative...
Results in the European Union Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Energy Supplier Obligations and White Certificate Schemes: Comparative Analysis of Results...
An active interferometer-stabilization scheme with linear phase control
Potma, Eric Olaf
An active interferometer-stabilization scheme with linear phase control Vishnu Vardhan not require modulation of the interfering beams and relies on an error signal which is linearly related scheme enables adjustable phase control with 20 ms switching times in the range from 0.02 radians to 6
UNCORRECTEDPROOF The use of scintillometry for validating aggregation schemes over
Paris-Sud XI, Université de
evapotranspiration is based on the use of aggregation schemes in conjunction with energy-balance or land of the energy balance providing the estimates of the available energy (AE(=Rn À G), where Rn and G are the net the Marrakech city (Morocco), have been used to test the aggregation schemes. The Agdal oliveyard was made up
Nested punctual Hilbert schemes and commuting varieties of parabolic subalgebras
Boyer, Edmond
be an algebraically closed field of arbitrary characteristic. Let S[n] denote the Hilbert scheme parametrizing- sional schemes zk1 zk2 Â· Â· Â· zkr organised in a tower of successive inclusions [Ch1, Ch2]. Let C and commut- ing varieties. If zn S[n] is a zero dimensional subscheme, and if b1, . . . , bn is a base
A PRIORITY-BASED ADAPTIVE SCHEME FOR WIRELESS MULTIMEDIA DELIVERY
A PRIORITY-BASED ADAPTIVE SCHEME FOR WIRELESS MULTIMEDIA DELIVERY Edward Casey and Gabriel, Dublin 9, Ireland Email: {caseye, munteang}@eeng.dcu.ie ABSTRACT In wireless multimedia streaming proposes a priority-based wireless adaptive multimedia delivery scheme that enables client prioritisation
A Sensorless Direct Torque Control Scheme Suitable for Electric Vehicles
Paris-Sud XI, Université de
A Sensorless Direct Torque Control Scheme Suitable for Electric Vehicles Farid Khoucha, Khoudir an Electric Vehicle (EV). The proposed scheme uses an adaptive flux and speed observer that is based on a full is a good candidate for EVs propulsion. Index Terms--Electric vehicle, Induction motor, sensorless drive
Hierarchical Control Scheme for Voltage Unbalance Compensation in Islanded Microgrids
Vasquez, Juan Carlos
Hierarchical Control Scheme for Voltage Unbalance Compensation in Islanded Microgrids Mehdi@et.aau.dk Abstract-- The concept of microgrid hierarchical control is presented, recently. In this paper, a hierarchical scheme which includes primary and secondary control levels is proposed for islanded microgrids
Coordinated Renewable Energy Support Schemes Stine Grenaa Jensen1
Coordinated Renewable Energy Support Schemes Stine Grenaa Jensen1 , and Poul Erik Morthorst2 Risø for renewable energy are regionalised. Two theoretical examples are used to explain interactive effects on, e-ordination of support schemes for renewable energy technologies plays a prominent role at the European agenda (EC, 2005
Cryptanalysis of a recent two factor authentication scheme
Centre Dublin City University Ballymun, Dublin 9, Ireland. mike.scott@certivox.com Abstract. Very recently a scheme has been proposed by Wang and Ma for a robust smart-card based password authentication scheme, which claims to be secure against a Smart Card security breach. In this short note we attempt
On Identification Secret Sharing Schemes Departmant of Information Engineering
Bielefeld, University of
1 On Identification Secret Sharing Schemes Ning Cai Departmant of Information Engineering. #12; 2 Running head: Identification Secret Sharing Corresponding Author: Ning Cai Departmant be a set of participants sharing a secret from a set of secrets. A secret sharing scheme is a protocol
Dynamic access policies for unconditionally secure secret sharing schemes
Martin, Keith
Dynamic access policies for unconditionally secure secret sharing schemes Keith M. Martin.martin@rhul.ac.uk Abstract--- Secret sharing schemes are cryptographic primitives that can be employed in any situation where it is desirable to distribute information relating to secret data amongst a number of entities. Following a secure
A Novel Visual Secret Sharing Scheme without Image Size Expansion
Heys, Howard
A Novel Visual Secret Sharing Scheme without Image Size Expansion Nazanin Askari, Cecilia Moloney. Visual cryptography is a secure secret sharing scheme that divides secret images into shares which on their own reveal no information of the original secret image. Recovery of the secret image can be performed
The dealer's random bits in perfect secret sharing schemes
Csirmaz, László
The dealer's random bits in perfect secret sharing schemes L#19;aszl#19;o Csirmaz #3; Mathematical A secret sharing scheme permits a secret to be shared among partici- pants of an n-element group in such a way that only quali#12;ed subsets of participants can recover the secret. If any non-quali#12;ed
Quantum secret sharing schemes and reversibility of quantum operations
Ogawa, Tomohiro [Graduate School of Information Science and Technology, University of Tokyo, 7-3-1 Hongo, Bunkyo-ku, Tokyo, 113-8656 (Japan); Sasaki, Akira [Sumitomo Mitsui Banking Corporation, 1-3-2, Marunouchi, Chiyoda-ku, Tokyo 100-0005 (Japan); Iwamoto, Mitsugu [Graduate School of Information Systems, University of Electro-Communications, 1-5-1 Chofugaoka, Chofu-shi, Tokyo, 182-8585 (Japan); Yamamoto, Hirosuke [Graduate School of Frontier Sciences, University of Tokyo, 5-1-5 Kashiwanoha, Kashiwa-shi, Chiba, 277-8561 (Japan)
2005-09-15T23:59:59.000Z
Quantum secret sharing schemes encrypting a quantum state into a multipartite entangled state are treated. The lower bound on the dimension of each share given by Gottesman [Phys. Rev. A 61, 042311 (2000)] is revisited based on a relation between the reversibility of quantum operations and the Holevo information. We also propose a threshold ramp quantum secret sharing scheme and evaluate its coding efficiency.
Secret sharing schemes on graphs L aszl o Csirmaz
Csirmaz, László
Secret sharing schemes on graphs L#19;aszl#19;o Csirmaz Mathematical Institute of the Hungarian secret sharing scheme based on G is a method to distribute a secret data among the vertices of G, the participants, so that a subset of participants can recover the secret if they contain an edge of G, otherwise
Secret-Sharing Schemes: A Survey Amos Beimel
Beimel, Amos
Secret-Sharing Schemes: A Survey Amos Beimel Department of Computer Science, Ben-Gurion University, Beer-Sheva, Israel. Abstract. A secret-sharing scheme is a method by which a dealer dis- tributes shares to parties such that only authorized subsets of parties can reconstruct the secret. Secret
Ideal Secret Sharing Schemes: Yet Another Combinatorial Characterization, Certain Access
Fuji-Hara, Ryoh
Ideal Secret Sharing Schemes: Yet Another Combinatorial Characterization, Certain Access Structures secret sharing scheme is a method of sharing a secret key in some key space among a finite set of participants in such a way that only the authorized subsets of participants can reconstruct the secret key from
SETUP in Secret Sharing Schemes using Random Values
SETUP in Secret Sharing Schemes using Random Values Ruxandra F. Olimid E-mail: ruxandra.olimid@fmi.unibuc.ro Abstract. Secret sharing schemes divide a secret among multiple par- ticipants so that only authorized subsets of parties can reconstruct it. We show that SETUP (Secretly Embedded Trapdoor with Universal Pro
Job Scheduling Scheme for Pure Space Sharing among Rigid Jobs
Feitelson, Dror
Job Scheduling Scheme for Pure Space Sharing among Rigid Jobs Kento Aida1, Hironori Kasahara2. This paper evaluates the performance of job scheduling sche- mes for pure space sharing among rigid jobs. Conventional job scheduling schemes for the pure space sharing among rigid jobs have been achieved by First
Carmona, Rene
Key words. Emissions markets, Cap-and-trade schemes, Equilibrium models, Environmental Finance. MARKET DESIGN FOR EMISSION TRADING SCHEMES REN´E CARMONA , MAX FEHR , JURI HINZ , AND ARNAUD PORCHET to help policy makers and regulators understand the pros and the cons of the emissions markets. We propose
Capdeboscq, Yves
THE QUEEN'S COLLEGE RECYCLING SCHEME Under the new recycling scheme commencing at the beginning in all student rooms and offices o one for normal waste o one for co-mingled recycling1 Bins these bins. If any recycling is contaminated it will be `waste' not recycling and it would need to go
Total Break of the -IC Signature Scheme Pierre-Alain Fouque1
Fouque, Pierre-Alain
- analysis of multivariate schemes and have lead to the efficient break of SFLASH in practice. In this work- signature scheme recently proposed at PKC 2007. This cryptosystem is a multivariate scheme based on a new internal quadratic primitive which avoids some drawbacks of previous multivari- ate schemes: the scheme
Wang, Yongge
Efficient LDPC Code Based Secret Sharing Schemes and Private Data Storage in Cloud without in LDPC and LT codes, this paper introduces three classes of secret sharing schemes called BP-XOR secret sharing schemes, pseudo-BP-XOR secret sharing schemes, and LDPC secret sharing schemes. By establishing
UTRECHT NETWORK RESEARCH GRANT (Mobility Scheme) Template Final Report
SchÃ¼ler, Axel
UTRECHT NETWORK RESEARCH GRANT (Mobility Scheme) Template Final Report Students, who received an Utrecht Network Research Grant are required to hand in a report to their Utrecht Network contact person
Towards an Emissions Trading Scheme for Air Pollutants in India
Duflo, Esther
Emissions trading schemes have great potential to lower pollution while minimizing compliance costs for firms in many areas now subject to traditional command-and-control regulation. This paper connects experience with ...
act coding scheme: Topics by E-print Network
Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)
18 19 20 21 22 23 24 25 Next Page Last Page Topic Index 1 New decoding scheme for LDPC codes based on simple product code structure CERN Preprints Summary: In this paper, a new...
Transformation optics scheme for two-dimensional materials
Kumar, Anshuman
Two-dimensional optical materials, such as graphene, can be characterized by surface conductivity. So far, the transformation optics schemes have focused on three-dimensional properties such as permittivity ? and permeability ...
Security Schemes for Wireless Sensor Networks with Mobile Sink
Rasheed, Amar Adnan
2011-08-08T23:59:59.000Z
components for the secure operation of such networks. Due to the sensors, limited resources designing efficient security schemes with low communication overhead to secure communication links between sensors and MS (Mobile Sink) is not a trivial task...
CharacteristicBased Dissipative Schemes and Characteristic Time Stepping
Pierce, Niles A.
in the boundary layer. The present work examines the development of pre conditioning techniques that approximate scheme is developed for scalar conservation laws to serve as the basis for nonoscillatory high
Distributed Space-Time Cooperative Schemes for Underwater Acoustic Communications
Stojanovic, Milica
Distributed Space-Time Cooperative Schemes for Underwater Acoustic Communications Madhavan, which is a main characteristic of underwater acoustic channels. A time-reversal distributed space in oceanic research, such as [3] [4]: data collec- tion, pollution monitoring, tactical surveillance
Program Mobile Robots in Scheme1 Jonathan Rees Bruce Donald
Richardson, David
that permits a small mobile robot to be programmed us- ing the Scheme programming language 3]. The envi under grants no. IRI-8802390 and IRI-9000532and by a Presidential Young Investigator award to Bruce
Auxiliary power controls on the Nelson River HVDC scheme
Chand, J. (Manitoba Hydro, Winnipeg, Manitoba (CA))
1992-02-01T23:59:59.000Z
This paper describes the auxiliary power controls on the Nelson River HVDC scheme. It shows how the fast control feature of the HVDC link can be utilized to enhance the operation of an integrated ac/dc power system.
EM algorithm estimation of TCM scheme over multipath fading
Gunawan, Wiedy
1997-01-01T23:59:59.000Z
The performance of Trellis Coded Modulation scheme via Expectation-Maximization algorithm utilizing a Kalman filter over multipath fading is presented. EM algorithm offers an easier computation than the classical ML estimation does. To get a better...
INDUSTRIAL ASSOCIATESHIP SCHEME Centre for Industrial Consultancy and Sponsored Research
Bhashyam, Srikrishna
this scheme: #12;(i) Energy Energy Storage (1990) Strategies for Energy Saving in Industry (1993) Pollution Control Equipment (2001) Acoustics and Noise Control for Industry (2005) Urban Air Quality
Designing data collection schemes for process capability analysis
Mantri, Nitin Ramesh
1994-01-01T23:59:59.000Z
DESIGNING DATA COLLECTION SCHEMES FOR PROCESS CAPABILITY ANALYSIS A Thesis by NITIN RAMESH MANTRI Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree of MASTER... OF SCIENCE May 1994 Major Subject: Industrial Engineering DESIGNING DATA COLLECTION SCHEMES FOR PROCESS CAPABILITY ANALYSIS A Thesis by NITIN RAMESH MANTRI Submitted to Texas A&M University in partial fulfillment of the requirements for the degree...
Conformal Behavior at Four Loops and Scheme (In)Dependence
Thomas A. Ryttov
2014-10-01T23:59:59.000Z
We search for infrared zeros of the beta function and evaluate the anomalous dimension of the mass at the associated fixed point for asymptotically free vector-like fermionic gauge theories with gauge group SU(N). The fixed points of the beta function are studied at the two, three and four loop level in two different explicit schemes. These are the modified regularization invariant, RI', scheme and the minimal momentum subtraction, mMOM, scheme. The search is performed in Landau gauge where the beta function of the gauge parameter vanishes. We then compare our findings to earlier identical investigations performed in the modified minimal subtraction, $\\bar{\\text{MS}}$, scheme. It is found that the value of the anomalous dimension of the mass is smaller at three and four loops than at two loops. This seems to be a generic pattern that is observed in all three different schemes. We then estimate the value of the anomalous dimension to be $\\gamma \\sim 0.225-0.375$ for twelve fundamental flavors and three colors, $\\gamma \\sim 0.500 - 0.593$ for two adjoint flavors and two colors and finally $\\gamma \\sim 1.12-1.70$ for two two-indexed flavors and three colors with the lower and upper bound set by the minimum and maximum value respectively over all three schemes and at three and four loops. Our analysis suggests that the former two theories lie in the conformal window while the latter belongs to the chirally broken phase.
Stadler, Michael
2010-01-01T23:59:59.000Z
The Influence of a CO2 Pricing Scheme on Distributed Energy5. Regional Results for the CO2 Pricing Scheme no-invest
Decoupled energy stable schemes for phase-field models of two ...
Jie Shen
2015-01-21T23:59:59.000Z
Jan 7, 2015 ... Efficient energy stable numerical schemes for a phase field ... conditions and a linear decoupled energy stable scheme for systems with static ...
Decoupled energy stable schemes for phase-field models of two ...
2014-11-11T23:59:59.000Z
decoupled, unconditionally energy stable schemes for Cahn-Hilliard phase-field models of two-phase incompressible flows. At each time step, these schemes ...
affinity-based scoring scheme: Topics by E-print Network
Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)
register management in the interpreter, allows ... Berlin, Andrew A. 1988-04-01 27 Car Sharing Scheme Car Share Scheme Computer Technologies and Information Sciences...
Hybrid Automatic Repeat Request Scheme With Turbo Codes
Jozef Hamorsky; Udo Wachsmann; Johannes B. Huber; Anton Cizmar
A novel hybrid automatic repeat request system based on turbo codes, called turbo HARQ system, is proposed. The iterative turbo decoding procedure is exploited to request retransmission of not decodable blocks without the necessity of an outer error--detecting code. It is shown that the turbo HARQ scheme with code rate R c = 1=2 and interleaver length 1024 significantly outperforms the classical turbo coding scheme --- especially for low SNR --- without essential loss in throughput. 1 INTRODUCTION Automatic repeat request (ARQ) protocols are well--known methods to achieve high reliability in digital transmission schemes. The information is protected by an error--detecting block code. If the decoder detects an erroneous transmitted block, retransmission of this block is requested via a feedback channel which is assumed to be error--free throughout this paper. Additionally, the request is assumed to be repeated until the decoder detects error--free transmission. The great advantage of s...
A bottom-up analysis of including aviation within theEU's Emissions Trading Scheme
Watson, Andrew
A bottom-up analysis of including aviation within theEU's Emissions Trading Scheme Alice Bows-up analysis of including aviation within the EU's Emissions Trading Scheme Alice Bows & Kevin Anderson Tyndall's emissions trading scheme. Results indicate that unless the scheme adopts both an early baseline year
A New (k, n)-Threshold Secret Sharing Scheme and Its Extension
A New (k, n)-Threshold Secret Sharing Scheme and Its Extension Jun Kurihara, Shinsaku Kiyomoto)-threshold secret sharing scheme (threshold scheme), a heavy computational cost is required to make n shares and recover the secret. As a solution to this problem, several fast thresh- old schemes have been proposed
Implementaion and performance of checkpointing schemes in a distributed environment
Soni, Sameer
1994-01-01T23:59:59.000Z
the Parameters V. B. 1 Number of Application Messages Number of messages is controBed by changing the value of NUM JUIESG in the program. We have controlled the number of messages to 10, 100, and 200. V. B. 2 Checkpoint Interval UNIX system caD 'settimer.... D. 1 Comparison of Schemes Consider Table I. The P value column has been obtained from the ANOVA result. Then the Tukey-Kramer Comparison Test has been run on all the combinations with significant difference (P&0. 05) to know exactly which schemes...
Set Theory as the Unified Scheme for Physics
Andrey V. Novikov-Borodin
2015-01-08T23:59:59.000Z
The process of cognition is analysed to adjust the set theory to physical description. Postulates and basic definitions are revised. The specific sets of predicates, called presets, corresponding to the physical objects identified by an observer during cognition are introduced. Unlike sets, the presets are free of logical or set-theoretical paradoxes and may be consistently used in physical description. Schemes of cognition based on presets are considered. Being different logical systems, the relativistic and quantum theories, observations in modern cosmology cannot be consistently considered in one `unified physical theory', but they are in frames of introduced schemes of cognition.
Coupling schemes for modeling hydraulic fracture propagation using the XFEM
Peirce, Anthony
Coupling schemes for modeling hydraulic fracture propagation using the XFEM Elizaveta Gordeliy of hydraulic fractures in an elastic medium. With appropriate enrichment, the XFEM resolves the Neumann(h) accuracy. For hydraulic fracture problems with a lag separating the uid front from the fracture front, we
Dynamic System Performance of SISO, MISO and MIMO Alamouti Schemes
Paris-Sud XI, Université de
Dynamic System Performance of SISO, MISO and MIMO Alamouti Schemes Dorra Ben Cheikh Battikh , Jean, coupecho, godlewski}@enst.fr Abstract--In this paper, the performance of a SISO system, a 2 × 1 MISO multiplexing tradeoff for a 2 × 1 MISO system. Many other techniques have been proposed to exploit antennas
On Constructing Homomorphic Encryption Schemes from Coding Theory
Paris-Sud XI, UniversitÃ© de
on Reed-Muller codes where for Âµ = 2 and Âµ = 3 and security levels between 80 and 128 bits, all operations Homomorphic encryption schemes are very useful cryptographic tools that en- able secure computation (PIR) [35], oblivious polynomial evalu- ation (OPE) [39], or multiparty computation [18]. The work
On Constructing Homomorphic Encryption Schemes from Coding Theory
= 2 and Âµ = 3 and security levels between 80 and 128 bits, all operations take less than a second encryption schemes are very useful cryptographic tools that enable secure computation. Informally applications, such as electronic voting [14, 5, 18, 19], private information retrieval (PIR) [33], oblivi- ous
Sparse grid collocation schemes for stochastic natural convection problems
Zabaras, Nicholas J.
stochastic methods and Monte-Carlo based sam- pling methods are two approaches that have been used to analyzeSparse grid collocation schemes for stochastic natural convection problems Baskar on the Smolyak algorithm offers a viable alternate method for solving high-dimensional stochastic partial
An Improved Vertex Caching Scheme for 3D Mesh Rendering
Lin, Gang
An Improved Vertex Caching Scheme for 3D Mesh Rendering Gang Lin and Thomas P.-Y. Yu Abstract to the graphics pipeline during rendering. To make effective use of the cache and facilitate rendering, it is key effective algorithm for generating a sequence for efficient rendering of 3D polygonal meshes based on greedy
Conservativeness and translation-dependent T-schemes
Ketland, Jeffrey
2000-01-01T23:59:59.000Z
Certain translational T-schemes of the form True(“f”) « f(f), where f(f) can be almost any translation you like of f, will be a conservative extension of Peano arithmetic. I have an inkling that this means something ...
FINITE VOLUME SCHEMES FOR DISPERSIVE WAVE PROPAGATION AND RUNUP
Boyer, Edmond
FINITE VOLUME SCHEMES FOR DISPERSIVE WAVE PROPAGATION AND RUNUP DENYS DUTYKH , THEODOROS KATSAOUNIS to bidirectional nonlinear, dispersive wave propagation in one space dimension. Special emphasis is given require the computation of the wave generation [DD07, KDD07], propagation [TG97], interaction with solid
Connectivity Based Location Estimation Scheme for Wireless Ad Hoc Networks
Ramanathan, Parameswaran "Parmesh"
Connectivity Based Location Estimation Scheme for Wireless Ad Hoc Networks Niveditha Sundaram. The loca- tion estimates rely on neighborhood relationships gathered by each user through message, form factors, energy consumption, etc., providing GPS support may not be feasible even in outdoor
A new blowdown compensation scheme for boiler leak detection
Marquez, Horacio J.
considers the blowdown effect in industrial boiler operation. This adds to the efficiency of recent advancesA new blowdown compensation scheme for boiler leak detection A. M. Pertew ,1 X. Sun ,1 R. Kent in identification-based leak detection techniques of boiler steam- water systems. Keywords: Industrial Boilers, Tube
Efficient Algorithms for Implementing Elliptic Curve PublicKey Schemes
Efficient Algorithms for Implementing Elliptic Curve PublicÂKey Schemes by Dan Beauregard A Thesis Cyganski Thesis Advisor Thesis Committee Dr. Stanley Selkow Dr. John Orr Thesis Committee Department Head #12; Preface This thesis describes the research which I conducted while completing my graduate work
On thermodynamically consistent schemes for phase field equations
Fife, Paul
and at the phase change front. A somewhat different approach of Charach and Zemel [2] combines bal- ance equationsOn thermodynamically consistent schemes for phase field equations C. Charach and P. C. Fife thermodynamics. The principal applications are to the solidification of a pure material and of a binary alloy
FLIPS AND THE HILBERT SCHEME OVER AN EXTERIOR ALGEBRA
Peeva, Irena
FLIPS AND THE HILBERT SCHEME OVER AN EXTERIOR ALGEBRA Irena Peeva and Mike Stillman Department of Mathematics, Cornell University, Ithaca, NY 14853, USA. Abstract: We study the tangent space at a monomial an exterior algebra. 1. Introduction Throughout the paper k stands for an infinite field. Let E
Minimal Schemes for Large Neutrino Mixings with Inverted Hierarchy
Duane A. Dicus; Hong-Jian He; John N. Ng
2002-05-17T23:59:59.000Z
Existing oscillation data point to nonzero neutrino masses with large mixings. We analyze the generic features of the neutrino Majorana mass matrix with inverted hierarchy and construct realistic {\\it minimal schemes} for the neutrino mass matrix that can explain the large (but not maximal) \
A Directionality based Location Discovery Scheme for Wireless Sensor Networks
Ha, Dong S.
A Directionality based Location Discovery Scheme for Wireless Sensor Networks Asis Nasipuri and Kai is a large ad hoc network of densely dis- tributed sensors that are equipped with low power wireless number of such wireless sensors can be networked to coordinate amongst themselves and per- form the much
Energy-Efficient Routing Schemes for Wireless Sensor Networks
Khan, Maleq
1 Energy-Efficient Routing Schemes for Wireless Sensor Networks Maleq Khan Gopal Pandurangan Bharat be manually placed in specific positions. The sensor network is typically ad hoc, formed by local self-configuration. Data-centric routing is a new use- ful paradigm for energy-constrained sensor networks. The data coming
AN LMIBASED CONSTRAINED MPC SCHEME WITH TIMEVARYING TERMINAL
#12; #12; AN LMIBASED CONSTRAINED MPC SCHEME WITH TIMEVARYING TERMINAL COST B. Pluymers, L in the general acceptance of a theoretical MPC stability framework introducing a terminal cost and terminal guarantees stability by use of a timevarying terminal cost and terminal constraint. The online calculation
PLM: Fast Convergence for Cumulative Layered Multicast Transmission Schemes
Legout, Arnaud
PLM: Fast Convergence for Cumulative Layered Multicast Transmission Schemes A. Legout and E. W- ticast congestion control protocol (called PLM) for audio/video and file transfer applications based PLM for a large variety of scenarios and show that it converges fast to the optimal link utilization
Model Predictive Control based Real Time Power System Protection Schemes
Kumar, Ratnesh
1 Model Predictive Control based Real Time Power System Protection Schemes Licheng Jin, Member by controlling the production, absorption as well as flow of reactive power at various locations in the system predictive control, trajectory sensitivity, voltage stabilization, switching control, power system I
Gas Evolution Dynamics and Numerical Dissipation in Shock Capturing Schemes
& Technology, Clear Water Bay, Kowloon, Hong Kong. Email:makxu@uxmail.ust.hk Fax:(852)2358Â1643 Tel: (852 started from the constructed data. The reconstruction stage is a kinematic description of the flow. The first group is the FVS schemes [11, 14], where the waves generated in the left and right hand side
INFORMATION SYSTEMS MODELLING USING LOOPN++, AN OBJECT PETRI NET SCHEME
Lakos, Charles
INFORMATION SYSTEMS MODELLING USING LOOPN++, AN OBJECT PETRI NET SCHEME Chris Keen and Charles, object petri nets, information systems modelling, ontological expressiveness Abstract There have been formalisms based on petri nets. In particular, the application of objectÂbased design principles have
A SELF SYNCHRONISED SCHEME FOR AUTOMATED COMMUNICATION IN WIRELESS
Kent, University of
attached to sensor nodes have a limited transmission range, multi-hop communication is needed to flexiblyA SELF SYNCHRONISED SCHEME FOR AUTOMATED COMMUNICATION IN WIRELESS SENSOR NETWORKS #Antonio Gonzalez-Velazquez1 , Ian W Marshall2 , Lionel Sacks1 1 Department of Electronic and electric engineering
DUALIZING COMPLEXES AND PERVERSE SHEAVES ON NONCOMMUTATIVE RINGED SCHEMES
Zhang, James
algebras over a base field _. In the decade since its introduction the theory of noncommutative dualizing affine theory was introduced in [Ye1]. By "affine" we mean that this theory deals with noncommutative DUALIZING COMPLEXES AND PERVERSE SHEAVES ON NONCOMMUTATIVE RINGED SCHEMES
Cryptanalysis of Two Dynamic IDbased Remote User Authentication Schemes for
University, Harbin City 150001, China 2 Automobile Management Institute of PLA, Bengbu City 233011, China guessing attack under their nontamper resistance assumption of the smart card; (2) It fails to provide of schemes. Keywords: Cryptanalysis, Authentication protocol, O#ine password guessing attack, Smart card
Offline Dictionary Attack on Password Authentication Schemes using Smart Cards
decades of intensive research in the security community, and the current crux lies in how to achieve truly scenario and gives rise to the strongest adversary model so far (Note that Wang's PSCAV scheme is secure poorly-chosen passwords from the notorious offline dictionary attacks and thus confirms the feasibility
Staggered Schemes for Fluctuating Hydrodynamics Florencio Balboa,1
stochastic forcing terms, as first proposed by Landau and Lifshitz [16]. Numerically solving the continuum. [18] developed a simple scheme for the stochastic heat equation and the linearized one in modeling the breakup of nanojets. Sharma and Patankar [20] developed a fluid-structure coupling between
Cryptanalysis and Improvement of an Efficient CCA Secure PKE Scheme
that it is more efficient in the public/private keys than the famous CS98 and BMW05 CCA secure public key-time signature based on the BMW05 paradigm [2]. The third way owns to the concept of lossy trapdoor function than the famous CS98 and BMW05 CCA secure public key encryption scheme. However we will show
RELIABILITY OF SAMPLING INSPECTION SCHEMES APPLIED TO REPLACEMENT STEAM GENERATORS
Cizelj, Leon
RELIABILITY OF SAMPLING INSPECTION SCHEMES APPLIED TO REPLACEMENT STEAM GENERATORS Guy Roussel the size of the random sample of tubes to be inspected in replacement steam generators is revisited in this paper. A procedure to estimate the maximum number of defective tubes left in the steam generator after
THE BASELINE POSITRON PRODUCTION AND CAPTURE SCHEME FOR CLIC
Paris-Sud XI, Université de
THE BASELINE POSITRON PRODUCTION AND CAPTURE SCHEME FOR CLIC O. Dadoun , I. Chaikovska, P. Lepercq chan- neling as the baseline for unpolarised positron production. The hybrid source uses a few GeV electron beam imping- ing on a tungsten crystal target. With the crystal oriented on its axis
Energy Efficiency of Encryption Schemes Applied to Wireless Sensor Networks
Heys, Howard
University. 2. Based on "An Analysis of Link Layer Encryption Schemes in Wireless Sensor Networks" by X In this paper, we focus on the energy efficiency of secure communication in wireless sensor networks (WSNs). Our - wireless sensor networks; security; encryption; cryptographic algorithm; stream cipher; block cipher 1
Novel coupling scheme to control dynamics of coupled discrete systems
Snehal M. Shekatkar; G. Ambika
2014-11-05T23:59:59.000Z
We present a new coupling scheme to control spatio-temporal patterns and chimeras on 1-d and 2-d lattices and random networks of discrete dynamical systems. The scheme involves coupling with an external lattice or network of damped systems. When the system network and external network are set in a feedback loop, the system network can be controlled to a homogeneous steady state or synchronized periodic state with suppression of the chaotic dynamics of the individual units. The control scheme has the advantage that its design does not require any prior information about the system dynamics or its parameters and works effectively for a range of parameters of the control network. We analyze the stability of the controlled steady state or amplitude death state of lattices using the theory of circulant matrices and Routh-Hurwitz's criterion for discrete systems and this helps to isolate regions of effective control in the relevant parameter planes. The conditions thus obtained are found to agree well with those obtained from direct numerical simulations in the specific context of lattices with logistic map and Henon map as on-site system dynamics. We show how chimera states developed in an experimentally realizable 2-d lattice can be controlled using this scheme. We propose this mechanism can provide a phenomenological model for the control of spatio-temporal patterns in coupled neurons due to non-synaptic coupling with the extra cellular medium. We extend the control scheme to regulate dynamics on random networks and adapt the master stability function method to analyze the stability of the controlled state for various topologies and coupling strengths.
Quantum fully homomorphic encryption scheme based on quantum fault-tolerant construction
Min Liang; Li Yang
2015-03-13T23:59:59.000Z
Fully homomorphic encryption is a kind of encryption scheme, which enables arbitrary computation on encrypted data without accessing the data. We present the quantum version of fully homomorphic encryption scheme, which is constructed based on quantum fault-tolerant construction. Two schemes are constructed. The first is a symmetric scheme, and the secret key is the quantum CSS code. In the scheme, when Server performs quantum computation on the encrypted plaintext, some ancillary quantum states should be provided by Client. The second is an asymmetric scheme, which contains the periodical interaction between Client and Server.
A Secret Sharing Scheme Based on Group Presentations and the Word Problem
Habeeb, Maggie; Shpilrain, Vladimir
2012-01-01T23:59:59.000Z
A (t,n)-threshold secret sharing scheme is a method to distribute a secret among n participants in such a way that any t participants can recover the secret, but no t-1 participants can. In this paper, we propose two secret sharing schemes using non-abelian groups. One scheme is the special case where all the participants must get together to recover the secret. The other one is a (t,n)-threshold scheme that is a combination of Shamir's scheme and the group-theoretic scheme proposed in this paper.
Competition of different coupling schemes in atomic nuclei
Qi, C; Wyss, R
2012-01-01T23:59:59.000Z
Shell model calculations reveal that the ground and low-lying yrast states of the $N=Z$ nuclei $^{92}_{46}$Pd and $^{96}$Cd are mainly built upon isoscalar spin-aligned neutron-proton pairs each carrying the maximum angular momentum J=9 allowed by the shell $0g_{9/2}$ which is dominant in this nuclear region. This mode of excitation is unique in nuclei and indicates that the spin-aligned pair has to be considered as an essential building block in nuclear structure calculations. In this contribution we will discuss this neutron-proton pair coupling scheme in detail. In particular, we will explore the competition between the normal monopole pair coupling and the spin-aligned coupling schemes. Such a coupling may be useful in elucidating the structure properties of $N=Z$ and neighboring nuclei.
Competition of different coupling schemes in atomic nuclei
C. Qi; R. J. Liotta; R. Wyss
2012-02-17T23:59:59.000Z
Shell model calculations reveal that the ground and low-lying yrast states of the $N=Z$ nuclei $^{92}_{46}$Pd and $^{96}$Cd are mainly built upon isoscalar spin-aligned neutron-proton pairs each carrying the maximum angular momentum J=9 allowed by the shell $0g_{9/2}$ which is dominant in this nuclear region. This mode of excitation is unique in nuclei and indicates that the spin-aligned pair has to be considered as an essential building block in nuclear structure calculations. In this contribution we will discuss this neutron-proton pair coupling scheme in detail. In particular, we will explore the competition between the normal monopole pair coupling and the spin-aligned coupling schemes. Such a coupling may be useful in elucidating the structure properties of $N=Z$ and neighboring nuclei.
COMPARING THE EFFECT OF RADIATIVE TRANSFER SCHEMES ON CONVECTION SIMULATIONS
Tanner, Joel D.; Basu, Sarbani; Demarque, Pierre [Astronomy Department, Yale University, P.O. Box 208101, New Haven, CT 06520-8101 (United States)
2012-11-10T23:59:59.000Z
We examine the effect of different radiative transfer schemes on the properties of three-dimensional (3D) simulations of near-surface stellar convection in the superadiabatic layer, where energy transport transitions from fully convective to fully radiative. We employ two radiative transfer schemes that fundamentally differ in the way they cover the 3D domain. The first solver approximates domain coverage with moments, while the second solver samples the 3D domain with ray integrations. By comparing simulations that differ only in their respective radiative transfer methods, we are able to isolate the effect that radiative efficiency has on the structure of the superadiabatic layer. We find the simulations to be in good general agreement, but they show distinct differences in the thermal structure in the superadiabatic layer and atmosphere.
Vorticity Preserving Flux Corrected Transport Scheme for the Acoustic Equations
Lung, Tyler B. [Los Alamos National Laboratory; Roe, Phil [University of Michigan; Morgan, Nathaniel R. [Los Alamos National Laboratory
2012-08-15T23:59:59.000Z
Long term research goals are to develop an improved cell-centered Lagrangian Hydro algorithm with the following qualities: 1. Utilizes Flux Corrected Transport (FCT) to achieve second order accuracy with multidimensional physics; 2. Does not rely on the one-dimensional Riemann problem; and 3. Implements a form of vorticity control. Short term research goals are to devise and implement a 2D vorticity preserving FCT solver for the acoustic equations on an Eulerian mesh: 1. Develop a flux limiting mechanism for systems of governing equations with symmetric wave speeds; 2. Verify the vorticity preserving properties of the scheme; and 3. Compare the performance of the scheme to traditional MUSCL-Hancock and other algorithms.
Intra-bodyhybrid communication scheme for healthcare systems
Alshehab, Abdullah; Kobayashi, Nao; Sok, Sikieng; Shimamoto, Shigeru
2012-01-01T23:59:59.000Z
Intra-body communication (IBC) is a type of Body Area Network (BAN)that utilizes human body as the medium for data transmission. Thelow power requirements of intra-body communication (IBC) as compared to near field electromagnetic waves showed that it can be a suitable solution for Medical Body Area Networks (MBANs) in a mobile health care system.In this paper, we investigate the transmission characteristics of the human body as a conductor of signals by considering different data transmission rates of multi-point to point network in order to reduce overall power consumption of the BAN.Furthermore, we utilize IBC and propose a new scheme to combines Slotted ALOHA, TDMA, and Reservation ALOHA together to increase the throughput and decrease the delay. By using our new hybrid scheme with the movable boundary designed for health status monitoring, we are able to increase the efficiency of data transmission by prioritizing the more critical data from the sensors.
A Parallelizable Implicit Evolution Scheme for Regge Calculus
John W. Barrett; Mark Galassi; Warner A. Miller; Rafael D. Sorkin; Philip A. Tuckey; Ruth M. Williams
1994-11-03T23:59:59.000Z
The role of Regge calculus as a tool for numerical relativity is discussed, and a parallelizable implicit evolution scheme described. Because of the structure of the Regge equations, it is possible to advance the vertices of a triangulated spacelike hypersurface in isolation, solving at each vertex a purely local system of implicit equations for the new edge-lengths involved. (In particular, equations of global ``elliptic-type'' do not arise.) Consequently, there exists a parallel evolution scheme which divides the vertices into families of non-adjacent elements and advances all the vertices of a family simultaneously. The relation between the structure of the equations of motion and the Bianchi identities is also considered. The method is illustrated by a preliminary application to a 600--cell Friedmann cosmology. The parallelizable evolution algorithm described in this paper should enable Regge calculus to be a viable discretization technique in numerical relativity.
The impact of the European Union Emissions Trading Scheme on US aviation
Malina, Robert
We estimate the economic impacts on US airlines that may arise from the inclusion of aviation in the European Union Emissions Trading Scheme from 2012 to 2020. We find that the Scheme would only have a small impact on US ...
A Distributed Power Control and Routing Scheme for Rechargeable Sensor Networks
Nasipuri, Asis
A Distributed Power Control and Routing Scheme for Rechargeable Sensor Networks Amitangshu Pal power control and quality aware routing scheme for rechargeable wireless sensor networks (WSNs consumption based on estimated energy resources. Transmission power control has been widely researched
Jasperse, Craig P.
in Methanol 1. Turn hot plate to 5. 2. To the flask with your product 3 from Scheme 1, attach a condener with gentle water flow. 3. Add 15 mL of methanol. · For 4-methoxy compoud 3c, you may need to add 20 mL of methanol, since the 4-methoxy substrates is probably less soluble. 4. Heat the mixture on the hot plate
PROPOSAL OF A FINANCING SCHEME FOR A THIRD NPP IN BRAZIL
Filho, Z.D.T.
2004-10-06T23:59:59.000Z
This presentation discusses a proposal of a financing scheme for a third nuclear power plant in Brazil.
Microprocessor-based random PWM schemes for DC-AC power conversion
Hui, S.Y.R. [Univ. of Sydney, New South Wales (Australia). Dept. of Electrical Engineering] [Univ. of Sydney, New South Wales (Australia). Dept. of Electrical Engineering; [City Univ. of Hong Kong, Kowloon (Hong Kong). Dept. of Electronic Engineering; Oppermann, I.; Sathiakumar, S. [Univ. of Sydney, New South Wales (Australia). Dept. of Electrical Engineering] [Univ. of Sydney, New South Wales (Australia). Dept. of Electrical Engineering
1997-03-01T23:59:59.000Z
Two classes of microprocessor-based random PWM (RPWM) real-time schemes for dc-ac power conversion are compared and evaluated. Performance of the RPWM schemes based on the mathematical and logical approaches is examined. The proposed schemes exhibit excellent harmonic content with all low and high-order harmonics suppressed and are suitable for both MOSFET and IGBT inverters.
IEEE COMMUNICATIONS LETTERS, VOL. 17, NO. 1, JANUARY 2013 127 Capacity of Zero-Outage Scheme
Candan, Cagatay
IEEE COMMUNICATIONS LETTERS, VOL. 17, NO. 1, JANUARY 2013 127 Capacity of Zero-Outage Scheme Under Imprecise Channel State Information C¸ a~gatay Candan Abstract--The capacity of zero-outage scheme-to-noise-ratio fluctuates and the scheme suffers from com- munication outages. Exact analytical expressions characterizing
TU/e -Savings schemes 2011 Personnel Department 8-12-2010
Franssen, Michael
12 TU/e - Savings schemes 2011 Personnel Department 8-12-2010 The TU/e offers you the opportunity to participate in a salary savings scheme (spaarloonregeling). There are a number of general rules for you ""course-of-life""arrangement in the same year. Salary savings scheme TU/e staff can save up to a certain
SECRET SHARING SCHEMES 679 Received May 13, 1997; accepted March 10, 1998.
Shieh, Shiuhpyng Winston
SECRET SHARING SCHEMES 679 Received May 13, 1997; accepted March 10, 1998. Communicated by Jean) Constructing Perfect Secret Sharing Schemes for General And Uniform Access Structures HUNG-MIN SUN AND SHIUH secret sharing scheme allows a secret K to be shared among a set of partici- pants in such a way
WeaklyPrivate Secret Sharing Schemes # Amos Beimel 1 and Matthew Franklin 2
Beimel, Amos
WeaklyÂPrivate Secret Sharing Schemes # Amos Beimel 1 and Matthew Franklin 2 1 Department. Abstract. SecretÂsharing schemes are an important tool in cryptograÂ phy that is used in the construction of many secure protocols. However, the shares' size in the best known secretÂsharing schemes realizing gen
Secret sharing schemes with three or four minimal quali ed subsets
Secret sharing schemes with three or four minimal quali#12;ed subsets #3; Jaume Mart#19;#16;-Farr@mat.upc.es Abstract In this paper we study secret sharing schemes whose access structure has three or four minimal bounds on the optimal information rate. Keywords. Cryptography; secret sharing schemes; information rate
Syamlal, Madhava; Benyahia, Sofiane
2013-11-20T23:59:59.000Z
When high resolution convection schemes are used for discretizing chemical species mass balance equations, the mass fractions are not guaranteed to add to one. We show that a proposed remedy called ?-scheme (Darwish and Moukalled, Comput.Methods Appl.Mech. Engrg. 192 (2003): 1711) will degrade to a diffusive first-order scheme when a chemical species vanishes from the mixture, for example, because of chemical reactions. We propose an improvement to the ?-scheme to overcome this problem. Furthermore, a computationally efficient alternative scheme is proposed and evaluated with several examples, to quantify the improvements in the accuracy and the computational time.
Remote which-way-choice scheme: proposed foundations experiments
Artur Szczepanski
2005-09-10T23:59:59.000Z
Twin photons from spontaneous parametric down-conversion with preselected polarization are used as spatially disjoint subsystems. One photon is subject to an interference measurement, while a projective measurement of the second photon induces the way-choice of the first photon. This would be an example of way-choice free of direct action on the interfering photon. Two further applications of the proposed scheme are considered: a new method of quantum information speed measurement, and a test of commutation of space-like remote measurements.
Nonlinearly consistent schemes for coupled problems in reactor analysis
Mahadevan, Vijay Subramaniam
2007-04-25T23:59:59.000Z
physical systems, the nonlinear vector function N(y) may be factorized as G(y)y, where G(y) is a matrix whose elements depend on y. Using this factorization, Equation (1.2) can be re-cast as ' ( )y b (1.3) Most coupled phenomena..., the very popular theta discretization method can be used. When this scheme is applied to Equation (1.3), we obtain the following equation. 1 1 1 1 1 1 ( ) ] (1 ( ) ] n n n n n n n n n n n n y y L y N y b L y N y b t t + + + + + + - = theta [ + + + -theta...
Harmonic measurements from a group connected generator HVdc converter scheme
Macdonald, S.J.; Enright, W.; Arrillaga, J. [Univ. of Canterbury, Christchurch (New Zealand)] [Univ. of Canterbury, Christchurch (New Zealand); O`Brien, M.T.
1995-10-01T23:59:59.000Z
A recent CIGRE document published in ELECTRA has described the potential benefits of a direct connection of generators to HVdc converters. While many theoretical contributions have been made, no practical test data has become available so far. This paper reports on harmonic tests carried out at the Benmore end of the New Zealand HVdc link operating as a group connected scheme. It was found that the measured harmonic current levels were well below specified generator ratings. Dynamic simulation accurately predicted the harmonic currents whereas the results of a steady state formulation were less reliable.
Classification of Geothermal Systems: A Possible Scheme | Open Energy
AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealand JumpConceptual Model, clickInformation SmyrnaNew York:Information Systems: A Possible Scheme
Single-cone real-space finite difference schemes for the Dirac von Neumann equation
Schreilechner, Magdalena
2015-01-01T23:59:59.000Z
Two finite difference schemes for the numerical treatment of the von Neumann equation for the (2+1)D Dirac Hamiltonian are presented. Both utilize a single-cone staggered space-time grid which ensures a single-cone energy dispersion to formulate a numerical treatment of the mixed-state dynamics within the von Neumann equation. The first scheme executes the time-derivative according to the product rule for "bra" and "ket" indices of the density operator. It therefore directly inherits all the favorable properties of the difference scheme for the pure-state Dirac equation and conserves positivity. The second scheme proposed here performs the time-derivative in one sweep. This direct scheme is investigated regarding stability and convergence. Both schemes are tested numerically for elementary simulations using parameters which pertain to topological insulator surface states. Application of the schemes to a Dirac Lindblad equation and real-space-time Green's function formulations are discussed.
Generating Unstable Resonances for Extraction Schemes Based on Transverse Splitting
Giovannozzi, M; Turchetti, G
2009-01-01T23:59:59.000Z
A few years ago, a novel multi-turn extraction scheme was proposed, based on particle trapping inside stable resonances. Numerical simulations and experimental tests have confirmed the feasibility of such a scheme for low order resonances. While the third-order resonance is generically unstable and those higher than fourth-order are generically stable, the fourth-order resonance can be either stable or unstable depending on the specifics of the system under consideration. By means of the Normal Form a general approach to control the stability of the fourth-order resonance has been derived. This approach is based on the control of the amplitude detuning and the general form for a lattice with an arbitrary number of sextupole and octupole families is derived in this paper. Numerical simulations have confirmed the analytical results and have shown that, when crossing the unstable fourth-order resonance, the region around the centre of the phase space is depleted and particles are trapped in only the four stable ...
An Extended Network Coding Opportunity Discovery Scheme in Wireless Networks
Zhao, Yunlong; Iwai, Masayuki; Sezaki, Kaoru; Tobe, Yoshito; 10.5121/ijcnc.2012.4106
2012-01-01T23:59:59.000Z
Network coding is known as a promising approach to improve wireless network performance. How to discover the coding opportunity in relay nodes is really important for it. There are more coding chances, there are more times it can improve network throughput by network coding operation. In this paper, an extended network coding opportunity discovery scheme (ExCODE) is proposed, which is realized by appending the current node ID and all its 1-hop neighbors' IDs to the packet. ExCODE enables the next hop relay node to know which nodes else have already overheard the packet, so it can discover the potential coding opportunities as much as possible. ExCODE expands the region of discovering coding chance to n-hops, and have more opportunities to execute network coding operation in each relay node. At last, we implement ExCODE over the AODV protocol, and efficiency of the proposed mechanism is demonstrated with NS2 simulations, compared to the existing coding opportunity discovery scheme.
On the condensed matter scheme for emergent gravity and interferometry
G. Jannes
2008-11-10T23:59:59.000Z
An increasingly popular approach to quantum gravity rests on the idea that gravity (and maybe electromagnetism and the other gauge fields) might be an 'emergent phenomenon', in the sense of representing a collective behaviour resulting from a very different microscopic physics. A prominent example of this approach is the condensed matter scheme for quantum gravity, which considers the possibility that gravity emerges as an effective low-energy phenomenon from the quantum vacuum in a way similar to the emergence of collective excitations in condensed matter systems. This condensed matter view of the quantum vacuum clearly hints that, while the term 'ether' has been discredited for about a century, quantum gravity holds many (if not all) of the characteristics that have led people in the past to label various hypothetical substances with the term 'ether'. Since the last burst of enthusiasm for an ether, at the end of the 19th century, was brought to the grave in part by the performance of a series of important experiments in interferometry, the suggestion then naturally arises that maybe interferometry could also play a role in the current discussion on quantum gravity. We will highlight some aspects of this suggestion in the context of the condensed matter scheme for emergent gravity.
A new configurational bias scheme for sampling supramolecular structures
Robin De Gernier; Tine Curk; Galina V. Dubacheva; Ralf P. Richter; Bortolo M. Mognetti
2014-12-09T23:59:59.000Z
We present a new simulation scheme which allows an efficient sampling of reconfigurable supramolecular structures made of polymeric constructs functionalized by reactive binding sites. The algorithm is based on the configurational bias scheme of Siepmann and Frenkel and is powered by the possibility of changing the topology of the supramolecular network by a non-local Monte Carlo algorithm. Such plan is accomplished by a multi-scale modelling that merges coarse-grained simulations, describing the typical polymer conformations, with experimental results accounting for free energy terms involved in the reactions of the active sites. We test the new algorithm for a system of DNA coated colloids for which we compute the hybridisation free energy cost associated to the binding of tethered single stranded DNAs terminated by short sequences of complementary nucleotides. In order to demonstrate the versatility of our method, we also consider polymers functionalized by receptors that bind a surface decorated by ligands. In particular we compute the density of states of adsorbed polymers as a function of the number of ligand-receptor complexes formed. Such a quantity can be used to study the conformational properties of adsorbed polymers useful when engineering adsorption with tailored properties. We successfully compare the results with the predictions of a mean field theory. We believe that the proposed method will be a useful tool to investigate supramolecular structures resulting from direct interactions between functionalized polymers for which efficient numerical methodologies of investigation are still lacking.
New Pellet Injection Schemes on DIII-D
Anderson, P.M.; Baylor, L.R.; Combs, S.K.; Foust, C.R.; Jernigan, T.C.; Robinson, J.I.
1999-11-13T23:59:59.000Z
The pellet fueling system on DIII-D has been modified for injection of deuterium pellets from two vertical ports and two inner wall locations on the magnetic high-field side (HFS) of the tokamak. The HFS pellet injection technique was first employed on ASDEX-Upgrade with significant improvements reported in both pellet penetration and fueling efficiency. The new pellet injection schemes on DIII-D required the installation of new guide tubes. These lines are {approx_equal}12.5 m in total length and are made up of complex bends and turns (''roller coaster'' like) to route pellets from the injector to the plasma, including sections inside the torus. The pellet speed at which intact pellets can survive through the curved guide tubes is limited ({approx_equal}200-300 m/s for HFS injection schemes). Thus, one of the three gas guns on the injector was modified to provide pellets in a lower speed regime than the original guns (normal speed range {approx_equal}500 to 1000 m/s). The guide tube installations and gun modifications are described along with the injector operating parameters, and the latest test results are highlighted.
CAISO flicks switch on nodal scheme and lights stay on
NONE
2009-06-15T23:59:59.000Z
In 2000-01, two years after introducing a competitive wholesale power auction in California - with a separate day-ahead zonal market operated by the California Power Exchange and a zonal market for ancillary services and balancing energy operated by the California Independent System Operator (CAISO) - the California market collapsed from exorbitant prices, flagrant gaming, and abuse of market power. Nine years later, CAISO introduced a nodal pricing auction for the wholesale market in April, replacing the zonal scheme, which was among many causes of the original market's demise. With nearly 3,000 nodes on the network, high prices in one region do not affect prices everywhere on the system. After investing some $200 million to upgrade the software, countless delays, and 18 months of market simulation and testing, the new auction was introduced and nothing unusual happened.
Basic issues associated with four potential EUV resist schemes
Wheeler, D.R. [Sandia National Labs., Albuquerque, NM (United States); Kubiak, G.; Ray-Chaudhuri, A.; Henderson, C. [Sandia National Labs., Livermore, CA (United States)
1996-06-01T23:59:59.000Z
Four of the better developed resist schemes that are outgrowths of DUV (248 and 193 nm) resist development are considered as candidates for EUV. They are as follows: trilayer, a thin imaging layer on top of a refractor masking/pattern transfer layer on top of a planarizing and processing layer (PPL); solution developed, organometallic bilayer where the imaging and masking layer have been combined into one material on top of a PPL; and finally silylated resists. They are examined in a very general form without regard to the specifics of chemistry of the variations within each group, but rather to what is common to each group and how that affects their effectiveness as candidates for a near term EUV resist. In particular they are examined with respect to sensitivity, potential resolution, optical density, etching selectivity during pattern transfer, and any issues associated with pattern fidelity such as swelling.
Self-consistent resummation scheme in scalar QED
Carrington, M.E. (Physics Department, University of Winnipeg, 515 Portage Avenue, Winnipeg, Manitoba, R3B 2E9 (Canada))
1993-10-15T23:59:59.000Z
In this paper we derive a resummation scheme that may be useful in the calculation of finite temperature processes that involve infrared-divergent diagrams. We discuss the inclusion of self-consistent vertices in calculations of diagrams with very soft external momenta. We work with scalar QED and show that the use of self-consistent vertices in the infrared limit of the retarded photon polarization tensor is equivalent to the resummation of dominant diagrams. To lowest order in an expansion about the parameter that is to be determined self-consistently, we find that the result is independent of this parameter and equal to the expression obtained with uncorrected lines and vertices. The motivation for this work is the hope that it will be possible to use this technique to perform self-consistent calculations beyond leading order.
Ordering schemes for parallel processing of certain mesh problems
O'Leary, D.
1984-09-01T23:59:59.000Z
In this work, some ordering schemes for mesh points are presented which enable algorithms such as the Gauss-Seidel or SOR iteration to be performed efficiently for the nine-point operator finite difference method on computers consisting of a two-dimensional grid of processors. Convergence results are presented for the discretization of u /SUB xx/ + u /SUB yy/ on a uniform mesh over a square, showing that the spectral radius of the iteration for these orderings is no worse than that for the standard row by row ordering of mesh points. Further applications of these mesh point orderings to network problems, more general finite difference operators, and picture processing problems are noted.
Impact of Geoengineering Schemes on the Global Hydrological Cycle
Bala, G; Duffy, P; Taylor, K
2007-12-07T23:59:59.000Z
The rapidly rising CO{sub 2} level in the atmosphere has led to proposals of climate stabilization via 'Geoengineering' schemes that would mitigate climate change by intentionally reducing the solar radiation incident on earth's surface. In this paper, we address the impact of these climate stabilization schemes on the global hydrological cycle, using equilibrium simulations from an atmospheric general circulation model coupled to a slab ocean model. We show that insolation reductions sufficient to offset global-scale temperature increases lead to a decrease in the intensity of the global hydrologic cycle. This occurs because solar forcing is more effective in driving changes in global mean evaporation than is CO{sub 2} forcing of a similar magnitude. In the model used here, the hydrologic sensitivity, defined as the percentage change in global mean precipitation per degree warming, is 2.4% for solar forcing, but only 1.5% for CO{sub 2} forcing. Although other models and the climate system itself may differ quantitatively from this result, the conclusion can be understood based on simple considerations of the surface energy budget and thus is likely to be robust. Compared to changing temperature by altering greenhouse gas concentrations, changing temperature by varying insolation results in larger changes in net radiative fluxes at the surface; these are compensated by larger changes in latent and sensible heat fluxes. Hence the hydrological cycle is more sensitive to temperature adjustment via changes in insolation than changes in greenhouse gases. This implies that an alteration in solar forcing might offset temperature changes or hydrological changes from greenhouse warming, but could not cancel both at once.
Lattice Boltzmann method and gas-kinetic BGK scheme in the low-Mach number viscous flow simulations
Xu, Kun
and collisions process. On the other hand, the gas-kinetic BGK scheme is a finite volume scheme, where the timeLattice Boltzmann method and gas-kinetic BGK scheme in the low-Mach number viscous flow simulations method (LBM) and the gas-kinetic BGK scheme are based on the numerical discretization of the Boltzmann
A scheme comparison of Autler-Townes based slow light in inhomogeneously broadened quantum dot media
Per Lunnemann; Jesper Mørk
2010-08-23T23:59:59.000Z
We propose a method to achieve significant optical signal delays exploiting the effect of Autler-Townes splitting in an inhomogeneously broadened quantum dot medium. The absorption and slow-down effects are compared for three schemes i.e. $\\Xi$, V and $\\Lambda$, corresponding to different excitation configurations. Qualitative differences of the V-scheme compared to the $\\Xi$- and $\\Lambda$-scheme are found, which show that features of Autler-Townes splitting are only revealed in the V-scheme. The underlying physical mechanisms causing this discrepancy are analyzed and discussed. Finally we compare field propagation calculations of the schemes showing significantly larger achievable signal delays for the V-scheme despite finite absorption of the coupling field. This opens the possibility for using waveguide structures for both coupling and probe fields, thus significantly increasing the achievable signal delays.
Finite-difference schemes for elastic waves based on the integration approach
Zahradnik, J. (Charles Univ., Prague (Czech Republic). Faculty of Mathematics and Physics); O'Leary, P. (Univ. of Wyoming, Laramie, WY (United States). Dept. of Mathematics); Sochacki, J. (James Madison Univ., Harrisonburg, VA (United States). Dept. of Mathematics)
1994-06-01T23:59:59.000Z
The authors present a second order explicit finite-difference scheme for elastic waves in 2-D nonhomogeneous media. These schemes are based on integrating the equations of motion and the stress-free surface conditions across the discontinuities before discretizing them on a grid. As an alternative for the free-surface treatment, a scheme using zero density above the surface is suggested. This scheme is first order and is shown to be a natural consequence of the integrated equations of motion and is called a vacuum formalism. These schemes remove instabilities encountered in earlier integration schemes. The consistency study reveals a close link between the vacuum formalism and the integrated/discretized stress-free condition, giving priority to the vacuum formalism when a material discontinuity reaches the free surface. The two presented free-surface treatments coincide in the sense of the limit (grid size [yields] 0) for lateral homogeneity at or near the free surface.
Enhanced Harmonic Up-Conversion Using a Hybrid HGHG-EEHG Scheme
Marksteiner, Quinn R. [Los Alamos National Laboratory; Bishofberger, Kip A. [Los Alamos National Laboratory; Carlsten, Bruce E. [Los Alamos National Laboratory; Freund, Henry P. [Los Alamos National Laboratory; Yampolsky, Nikolai A. [Los Alamos National Laboratory
2012-04-30T23:59:59.000Z
We introduce a novel harmonic generation scheme which can be used, for a given desired harmonic, to achieve higher bunching factors, weaker chicanes, and/or less final energy spread than can be achieved using Echo-Enabled Harmonic Generation. This scheme only requires a single laser with relatively low power, and is a hybrid of High-Gain Harmonic Generation and EEHG. We present a design of this scheme applied to the Next Generation Light Source (NGLS).
Hierarchical Control Scheme for Voltage Harmonics Compensation in an Islanded Droop-
Vasquez, Juan Carlos
Hierarchical Control Scheme for Voltage Harmonics Compensation in an Islanded Droop- Controlled on the resistance emulation. Furthermore, a droop characteristic based on DG harmonic reactive power has been
A Novel PSK Demodulation Scheme Using 1bit-sampling Phase Comparison
Choi, Woo-Young
-II: Retinal Prosthesis ..............................................8 C. Conventional IQ-Demodulation Scheme IV. Implementation-II: Retinal Prosthesis ...........................................63 A. Circuit prosthesis...............................................................10 Figure 1.4 IQ
An Efficient, Energy Stable Scheme for the Cahn-Hilliard-Brinkman ...
2012-06-09T23:59:59.000Z
We present an unconditionally energy stable and uniquely solvable finite difference ... The scheme is based on a convex splitting of the discrete CH energy and.
Energy Stable Schemes for Cahn-Hilliard phase-field model of two ...
2010-08-14T23:59:59.000Z
Aug 25, 2010 ... Several efficient and energy stable time discretization schemes for the coupled nonlinear Cahn-Hilliard phase-field system for both the matched ...
Prime Number-Based Hierarchical Data Labeling Scheme for Relational Databases
Morozov, Serhiy
2007-12-13T23:59:59.000Z
reusable prime number labeling (rPNL) that reduces the effects of the mentioned weaknesses. The proposed scheme advantage is discussed in detail, proven mathematically, and experimentally confirmed....
Madhow, Upamanyu
Adaptive MPEG-2 Video Data Hiding Scheme Anindya Sarkar, Upamanyu Madhow, Shivkumar Chandrasekaran author information: (Send correspondence to Anindya Sarkar) Anindya Sarkar: E-mail: anindya
Low complexity concurrent constant modulus algorithm and soft decision directed scheme for blind
Chen, Sheng
Low complexity concurrent constant modulus algorithm and soft decision directed scheme for blind-directed (DD) scheme provides a state-of-the-art low-complexity blind equalisation technique for high of the standard CMA blind equaliser, this concurrent CMA and DD blind equaliser achieves a dramatic improvement
PUBLISHED IN: PROCEEDINGS OF THE IEEE ICC 2013 1 Towards an Error Control Scheme for a
Chatziantoniou, Damianos
evaluation of its performance. An obvious use case for our scheme is the reliable delivery of softwarePUBLISHED IN: PROCEEDINGS OF THE IEEE ICC 2013 1 Towards an Error Control Scheme for a Publish for efficient content distribution. However, the design of efficient reliable transport protocols for multicast
A Generalized Diffusion Based Inter-Iteration Nonlinear Bilateral Filtering Scheme for PET
Paris-Sud XI, UniversitÃ© de
A Generalized Diffusion Based Inter-Iteration Nonlinear Bilateral Filtering Scheme for PET Image inter-iteration filtering scheme based diffusion MAP estimate for PET image reconstruction is proposed,version1 #12;1. Introduction Positron emission tomography (PET) is one of the most important imaging tools
Secure Demand Shaping for Smart Grid On constructing probabilistic demand response schemes
Sastry, S. Shankar
Secure Demand Shaping for Smart Grid On constructing probabilistic demand response schemes. Developing novel schemes for demand response in smart electric gird is an increasingly active research area/SCADA for demand response in smart infrastructures face the following dilemma: On one hand, in order to increase
Shu, Chi-Wang
A conservative Lagrangian scheme for solving compressible fluid flows with multiple internal energy. In some of these ap- plications, multiple internal energy equations such as those for electron, ion developed which are designed to solve the internal energy equation directly. These schemes can be easily
A task-parallel scheme for the revised simplex method Julian Hall
Hall, Julian
SYNPLEX A task-parallel scheme for the revised simplex method Julian Hall School of Mathematics University of Edinburgh June 15th 2005 SYNPLEX, a task-parallel scheme for the revised simplex method #12;Overview · The (standard and revised) simplex method for linear programming #12;Overview · The (standard
A task-parallel scheme for the revised simplex method Julian Hall
Hall, Julian
SYNPLEX A task-parallel scheme for the revised simplex method Julian Hall School of Mathematics University of Edinburgh June 23rd 2005 SYNPLEX, a task-parallel scheme for the revised simplex method #12;Overview · The (standard and revised) simplex method for linear programming #12;Overview · The (standard
A gas-kinetic scheme for reactive ows Yongsheng Lian, Kun Xu*
Xu, Kun
A gas-kinetic scheme for reactive Â¯ows Yongsheng Lian, Kun Xu* Department of Mathematics, Hong Kong in revised form 22 July 1999; accepted 22 July 1999 Abstract In this paper, the gas-kinetic BGK scheme for the compressible Â¯ow equations is extended to chemical reactive Â¯ow. The mass fraction of the unburnt gas
Research Summary Evaluation of the Better Woodlands for Wales Grant Scheme
. The scheme was shown to have had small, but measurable impacts on carbon sequestration, biodiversity benefits. Methods o Carbon sequestration values draw upon the UK government's approach to valuing carbon. o Benefit that planted as a consequence of the BWW scheme. Carbon sequestration values show that over a 20-year time
Abgrall, RÃ©mi
Application of conservative residual distribution schemes to the solution of the shallow water. Keywords: Conservative schemes; Residual distribution; Shallow water equations; Lake at rest solution solution of the shallow water equations on unstructured grids. We focus on flows over wet areas
Arctic Region Evaluation of the Hydro-Thermodynamic Soil Vegetation Scheme (HTSVS)
Moelders, Nicole
Arctic Region Evaluation of the Hydro-Thermodynamic Soil Vegetation Scheme (HTSVS) Pamela Spier, University of Alaska, Fairbanks, AK Abstract This paper presents an evaluation of the Hydro. Introduction and Motivation The Hydro-Thermodynamic Soil Vegetation Scheme (HTSVS, Kramm et al. 1996, MÃ¶lders
Energy Aware Power Allocation strategies for Multihop-Cooperative transmission schemes
Savazzi, Stefano
1 Energy Aware Power Allocation strategies for Multihop-Cooperative transmission schemes S. Savazzi scheme is known to be an energy aware strategy that allocate the power on each independent hop according allocation strategies for nodes belonging to a single primary route towards a destination. The proposed
Energy Aware Power Allocation strategies for Multihop-Cooperative transmission schemes
Spagnolini, Umberto
1 Energy Aware Power Allocation strategies for Multihop-Cooperative transmission schemes S. Savazzi nodes are able to relay their packets. Designing multihop routing strategy together with energy scheme is known to be an energy aware strategy that allocate the power on each independent hop according
Energy Balancing Routing Schemes for Low-Power Wireless Networks Eun-Sook Sung, Miodrag Potkonjak
Potkonjak, Miodrag
Energy Balancing Routing Schemes for Low-Power Wireless Networks Eun-Sook Sung, Miodrag Potkonjak}@cs.ucla.edu Abstract-- We address the problem of energy balancing in multi-hop wireless networks to optimize results show, firstly, that both schemes achieve significant improvement of energy balancing proportional
A Cluster-based Energy Balancing Scheme in Heterogeneous Wireless Sensor Networks
BÃ¶lÃ¶ni, Ladislau L
A Cluster-based Energy Balancing Scheme in Heterogeneous Wireless Sensor Networks Jing Ai, Damla,turgut,lboloni}@cpe.ucf.edu Abstract. In this paper, we propose a novel, cluster-based energy balancing scheme. We assume the existence significant improvements in energy balancing leading to a longer con- nected time of the network
A System-level Scheme for Resistance Drift Tolerance of a Multilevel Phase Change Memory
Han, Jie
of a phase change material such as GTS tends to drift over time. The change in resistance severely degradesA System-level Scheme for Resistance Drift Tolerance of a Multilevel Phase Change Memory Pilin presents a system-level scheme to alleviate the effect of resistance drift in a multilevel phase change
Memory Consumption Analysis for the GOE and PET Unequal Erasure Protection Schemes
Paris-Sud XI, UniversitÃ© de
Memory Consumption Analysis for the GOE and PET Unequal Erasure Protection Schemes Aline Roumy Encoding Transmission (PET) [2], while the other family uses a dedicated signaling scheme, as is the case such a practical metric as the peak memory consumption. Thanks to a modeling of the packet storage behavior
Evaluation of an Optimal Watermark Tampering Attack Against Dirty Paper Trellis Schemes
Paris-Sud XI, UniversitÃ© de
Evaluation of an Optimal Watermark Tampering Attack Against Dirty Paper Trellis Schemes Patrick Bas powerful attacks. This paper further refines an attack on dirty paper watermarking schemes which relies to be able to handle `complex' trellises. Moreover, the ef- ficiency of this attack has been evaluated
High Resolution Wave Propagation Schemes for Two-Fluid Plasma Simulations
Shumlak, Uri
High Resolution Wave Propagation Schemes for Two-Fluid Plasma Simulations Ammar H. Hakim Information and Learning, 300 North Zeeb Road, Ann Arbor, MI 48106-1346, 1-800-521-0600, to whom the author Abstract High Resolution Wave Propagation Schemes for Two-Fluid Plasma Simulations Ammar H. Hakim Chair
A PFMIPv6 Scheme Based on Handover Failure Probability for Mobile Nodes
Jang, Ju-Wook
cost problem. This is due to Handover Initiate (HI) and/or Handover Acknowledge (HAck) message exchange a new PFMIPv6 scheme which employs the handover failure probability (to be determined by speed scheme is more efficient in choosing MAG with 47% reduction of handover latencies, 34% reduction
Beamforming-Based Broadcast Scheme for Multihop Wireless Networks with Transmission
Paris-Sud XI, Université de
Beamforming-Based Broadcast Scheme for Multihop Wireless Networks with Transmission Range transmission power for a beamforming-based broadcast scheme in multihop wireless networks? To address wireless network, and demonstrated in terms of implicated nodes'ratio, power transmission gain
Chen, Zhe
2013 China-Korea Relay Protection Forum 1 Wide Area Protection Scheme Preventing Cascading Events from short circuits. A wide area protection scheme is proposed based on this improved im- pedance relay area protection 1 Introduction In many past blackouts, zone 3 impedance relay played an important role
A LOW POWER SCHEDULING SCHEME WITH RESOURCES OPERATING AT MULTIPLE VOLTAGES
Kambhampati, Subbarao
A LOW POWER SCHEDULING SCHEME WITH RESOURCES OPERATING AT MULTIPLE VOLTAGES Ali Manzak and Chaitali Tempe, AZ 852875706 istanbul@asu.edu, chaitali@asu.edu ABSTRACT This paper presents a new resource the resources operate at multi ple voltages. The scheduling scheme is list based. In each control cycle
Writing Hygienic Macros in Scheme with Syntax-Case R. Kent Dybvig
Dybvig, R. Kent
Writing Hygienic Macros in Scheme with Syntax-Case R. Kent Dybvig Indiana University Computer Abstract This article describes a pattern-based hygienic macro system for Scheme and provides numerous examples of its use. Macros defined using this system are automatically hygienic and referentially
A Framework for Distributed Key Management Schemes in Heterogeneous Wireless Sensor Networks
Hu, Jiankun
A Framework for Distributed Key Management Schemes in Heterogeneous Wireless Sensor Networks Kejie propose a framework for key management schemes in distributed wireless sensor networks with heterogeneous, the wireless sensor network can achieve higher key connectivity and higher resilience. I. INTRODUCTION Wireless
Convergence of the Approximation Scheme to American Option Pricing via the Discrete Morse Semiflow
Ishii, Katsuyuki, E-mail: ishii@maritime.kobe-u.ac.jp [Kobe University, Graduate School of Maritime Sciences (Japan); Omata, Seiro, E-mail: omata@kenroku.kanazawa-u.ac.jp [Kanazawa University, School of Mathematics and Physics, Institute of Science and Engineering (Japan)
2011-12-15T23:59:59.000Z
We consider the approximation scheme to the American call option via the discrete Morse semiflow, which is a minimizing scheme of a time semi-discretized variational functional. In this paper we obtain a rate of convergence of approximate solutions and the convergence of approximate free boundaries. We mainly apply the theory of variational inequalities and that of viscosity solutions to prove our results.
An active queue management scheme to contain high bandwidth flows at a congested router
Smitha
2001-01-01T23:59:59.000Z
be incorporated in RED, an active queue management scheme. The proposed scheme possesses all the advantages of RED. In addition, it lowers the drop rates of short-lived flows and also those high bandwidth flows that reduce their sending rate when congestion...
A Quadrature Finite Element Galerkin Scheme for a Biharmonic Problem on a Rectangular Polygon
Aitbayev, Rakhim
to the OSC method (see [3]), which uses Gaussian quadrature nodes as collocation points and a finite elementA Quadrature Finite Element Galerkin Scheme for a Biharmonic Problem on a Rectangular Polygon with an underdetermined orthogonal spline collocation scheme. © 2007 Wiley Periodicals, Inc. Numer Methods Partial
The impact of the European Union Emission Trading Scheme on electricity generation sectors
Paris-Sud XI, Université de
The impact of the European Union Emission Trading Scheme on electricity generation sectors Djamel the Kyoto Protocol, France and Germany par- ticipate to the European Union Emission Trading Scheme (EU ETS, the European market for emission allowances has increased the market power of the historical French electricity
ASSESSING A RECLAIMED CONCRETE UP-CYCLING SCHEME THROUGH LIFE-CYCLE ANALYSIS
Paris-Sud XI, UniversitÃ© de
ASSESSING A RECLAIMED CONCRETE UP-CYCLING SCHEME THROUGH LIFE-CYCLE ANALYSIS Sylvain Guignot1 Concrete, aggregate, electro-fragmentation, recycling, life-cycle analysis Abstract The present study evaluates the environmental impacts of a recycling scheme for gravels from building concretes wastes
Symmetric chains, Gelfand-Tsetlin chains, and the Terwilliger algebra of the binary Hamming scheme
Srinivasan, Murali K.
Symmetric chains, Gelfand-Tsetlin chains, and the Terwilliger algebra of the binary Hamming scheme of the Terwilliger algebra of the binary Hamming scheme. We also give a representation theoretic characterization constructive proof of the explicit block diagonalization of the Terwilliger algebra of the binary Hamming
JET SCHEMES OF TORIC SURFACES ESPACES DE JETS DES SURFACES TORIQUES
Favre, Charles - Institut de Mathématiques de Jussieu, Université Paris 7
JET SCHEMES OF TORIC SURFACES ESPACES DE JETS DES SURFACES TORIQUES HUSSEIN MOURTADA Abstract. For m N, m 1, we determine the irreducible components of the m - th jet scheme of a toric surface S irr´eductibles des m-espaces des jets d'une surface torique S. Pour m assez grand, on relie le nombre
Personnel Department 8-12-2010 TU/e -Salary savings scheme 2011 (ASN Bank)
Franssen, Michael
12 Personnel Department 8-12-2010 TU/e - Salary savings scheme 2011 (ASN Bank) Alteration from his/her salary relating to the salary savings scheme. Personal details Family name Initials male Telephone numbers TU/e Home Do you already have an employee savings account with the ASN Bank? yes
An efficient numerical terrestrial scheme (ENTS) for fast earth system modelling
Williamson, Mark
An efficient numerical terrestrial scheme (ENTS) for fast earth system modelling Mark Williamson Working Paper 83 #12;An efficient numerical terrestrial scheme (ENTS) for fast earth system modelling Mark for long time period simulations and large ensemble studies in Earth system models of intermediate
Energy Efficiency Analysis of Link Layer Backoff Schemes on Point-to-Point
Chockalingam, A.
416 Energy Efficiency Analysis of Link Layer Backoff Schemes on Point-to-Point Markov Fading Links schemes are shown to achieve better energy ef- ficiency without compromising much on the link layer throughput performance. Keywords - Backoff algorithms, fading channels, en- ergy eficiency. 1 Introduction
Efficient MIMO-OFDM Schemes for Future Terrestrial Digital TV with Unequal Received
Paris-Sud XI, Université de
.nasser@insa-rennes.fr Abstract- This article investigates the effect of equal and unequal received powers on the performances- orthogonal schemes: the BLAST scheme, the Linear Dispersion (LD) code and the Golden code, and we compare for modelling the effect of unequal received powers on different receiving antennas. Therefore, we analyze
A Scheme for Reliable Delivery of Events in Distributed Middleware Systems Shrideep Pallickara. These interactions can be encapsulated in events. We describe a scheme for the reliable delivery of events pertaining to transactions, data interchange, system conditions and finally the search, discovery
AN INNOVATIVE RTP-BASED RESIDENTIAL POWER SCHEDULING SCHEME FOR SMART GRIDS
Snyder, Larry
as demand response for residential power usage. In this scheme, the Energy Management Controller (EMCAN INNOVATIVE RTP-BASED RESIDENTIAL POWER SCHEDULING SCHEME FOR SMART GRIDS Chen Chen , Shalinee power usage profile plays the leader level game. The sequential equilib- rium is obtained through
A prediction based control scheme for networked systems with delays and packet dropouts
Knobloch,JÃ¼rgen
A prediction based control scheme for networked systems with delays and packet dropouts Lars Gr based prediction and time-stamps in order to compensate for delays and packet dropouts to analyze the properties of our scheme, we introduce the notion of prediction consistency which enables us
Cryptanalysis of an IDbased Password Authentication Scheme using Smart Cards and
Cryptanalysis of an IDbased Password Authentication Scheme using Smart Cards and Fingerprints Michael Scott School of Computer Applications Dublin City University Ballymun, Dublin 9, Ireland. mike two IDbased password authen tication schemes for logging onto a remote network server using smart
Comparison of Allocation Schemes for Virtual Machines in Energy-aware
Do, Tien Van
Comparison of Allocation Schemes for Virtual Machines in Energy-aware Server Farms TIEN VAN DO. In this paper, a simple energy-aware policy incorporating allocation schemes of virtual servers is proposed in a server farm. Keywords: green computing; virtualization; virtual machine; performance model; energy-aware
Extending Brickell-Davenport Theorem to Non-Perfect Secret Sharing Schemes
Extending Brickell-Davenport Theorem to Non-Perfect Secret Sharing Schemes Oriol Farr`as1 University, Singapore December 18, 2012 Abstract One important result in secret sharing is the Brickell-Davenport Theorem: every ideal perfect secret sharing scheme defines a matroid that is uniquely determined
A Tree Based Recursive Scheme for Space E#cient Secret Sharing
A Tree Based Recursive Scheme for Space E#cient Secret Sharing Abhishek Parakh and Subhash Kak a koutofn recursive secret sharing scheme based on an nary tree data structure. In recursive hiding of secrets, the user encodes additional secrets in the shares of the secret in tended
On Secret Sharing Schemes, Matroids and Polymatroids Jaume Marti-Farre, Carles Padro
On Secret Sharing Schemes, Matroids and Polymatroids Jaume Mart´i-Farr´e, Carles Padr´o Dep. de.edu June 22, 2009 Abstract The complexity of a secret sharing scheme is defined as the ratio between the maximum length of the shares and the length of the secret. The optimization of this parameter for gen
A SECRET SHARING SCHEME BASED ON GROUP PRESENTATIONS AND THE WORD PROBLEM
Shpilrain, Vladimir
A SECRET SHARING SCHEME BASED ON GROUP PRESENTATIONS AND THE WORD PROBLEM MAGGIE HABEEB, DELARAM KAHROBAEI, AND VLADIMIR SHPILRAIN Abstract. A (t, n)-threshold secret sharing scheme is a method to distribute a secret among n participants in such a way that any t participants can recover the secret
An ideal multi-secret sharing scheme based on minimal privileged coalitions
An ideal multi-secret sharing scheme based on minimal privileged coalitions Yun Song , Zhihui Li Abstract How to construct an ideal multi-secret sharing scheme for general access structures is difficult if such coalitions exist. Furthermore, in terms of privileged coalitions, we show that most of the existing multi-secret
A Secret Sharing Scheme for Preventing the Cheaters from Acquiring the Hassan Jameel, Sungyoung Lee
A Secret Sharing Scheme for Preventing the Cheaters from Acquiring the Secret Hassan Jameel { hassan, sylee }@oslab.khu.ac.kr Abstract. In this paper, we propose a secret sharing scheme which prevents the cheaters from recovering the secret when the honest participants cannot, with high probability
A NEW VIDEO-OBJECT WATERMARKING SCHEME ROBUST TO OBJECT MANIPULATION
Paris-Sud XI, Université de
A NEW VIDEO-OBJECT WATERMARKING SCHEME ROBUST TO OBJECT MANIPULATION P. Bas and B. Macq presents a watermarking scheme for image or video objects. The watermarking of video objects implies such as Mpeg-4 and Jpeg-2000, the notion of video-object or image- object is more and more widespread [1
A note on a result of Buss concerning bounded theories and the collection scheme
Edmundo, MÃ¡rio Jorge
A note on a result of Buss concerning bounded theories and the collection scheme Fernando Ferreira Abstract Samuel Buss showed that, under certain circunstances, adding the collection scheme for bounded of Samuel Buss (a good reference for bounded theories is Part C of [HP93]). In [B87] Buss presents two
Bluenet a New Scatternet Formation Scheme Zhifang Wang, Robert J. Thomas, Zygmunt Haas
and facilitate supplier and customer cooperation in an integrated supply-side and demand-side management scheme. In this paper we present "Bluenet" as a novel and practical scheme for building an efficient scatternet for data and information flow at low cost. During recent years, there has been a substantial demand
Kelvin Nanotechnology Ltd (KNT) GUIDE TO INFORMATION AVAILABLE THROUGH OUR PUBLICATION SCHEME
Glasgow, University of
Kelvin Nanotechnology Ltd (KNT) GUIDE TO INFORMATION AVAILABLE THROUGH OUR PUBLICATION SCHEME it might cost. Kelvin Nanotechnology Ltd has adopted the Model Publication Scheme 2011 produced publication and explain why. Copyright Where Kelvin Nanotechnology Ltd holds the copyright in its published
CPMC: An Efficient Proximity Malware Coping Scheme in Smartphone-based Mobile Networks
Wu, Jie
and controllable granularity of security, in smartphone-based mobile networks. The CPMC scheme integrates shortCPMC: An Efficient Proximity Malware Coping Scheme in Smartphone-based Mobile Networks Feng Li- cisions. Extensive real- and synthetic-trace driven simulation results are presented to to evaluate
An Energy Efficient Semi-static Power Control and Link Adaptation Scheme in UMTS HSDPA
Huang, Yi; Qiu, Ling
2012-01-01T23:59:59.000Z
High speed downlink packet access (HSDPA) has been successfully applied in commercial systems and improves user experience significantly. However, it incurs substantial energy consumption. In this paper, we address this issue by proposing a novel energy efficient semi-static power control and link adaptation scheme in HSDPA. Through estimating the EE under different modulation and coding schemes (MCSs) and corresponding transmit power, the proposed scheme can determine the most energy efficient MCS level and transmit power at the Node B. And then the Node B configure the optimal MCS level and transmit power. In order to decrease the signaling overhead caused by the configuration, a dual trigger mechanism is employed. After that, we extend the proposed scheme to the multiple input multiple output (MIMO) scenarios. Simulation results confirm the significant EE improvement of our proposed scheme. Finally, we give a discussion on the potential EE gain and challenge of the energy efficient mode switching between s...
Prokudin, Alexei; Yuan, Feng
2015-01-01T23:59:59.000Z
Following an earlier derivation by Catani-de Florian-Grazzini (2000) on the scheme dependence in the Collins-Soper-Sterman (CSS) resummation formalism in hard scattering processes, we investigate the scheme dependence of the Transverse Momentum Distributions (TMDs) and their applications. By adopting a universal $C$-coefficient function associated with the integrated parton distributions, the difference between various TMD schemes can be attributed to a perturbative calculable function depending on the hard momentum scale. We further apply several TMD schemes to the Drell-Yan process of lepton pair production in hadronic collisions, and find that the constrained non-perturbative form factors in different schemes are remarkably consistent with each other and with that of the standard CSS formalism.
Bounds on the information rate of quantum-secret-sharing schemes
Sarvepalli, Pradeep [Department of Physics and Astronomy, University of British Columbia, Vancouver, British Columbia, V6T 1Z1 (Canada)
2011-04-15T23:59:59.000Z
An important metric of the performance of a quantum-secret-sharing scheme is its information rate. Beyond the fact that the information rate is upper-bounded by one, very little is known in terms of bounds on the information rate of quantum-secret-sharing schemes. Furthermore, not every scheme can be realized with rate one. In this paper we derive upper bounds for the information rates of quantum-secret-sharing schemes. We show that there exist quantum access structures on n players for which the information rate cannot be better than O((log{sub 2}n)/n). These results are the quantum analogues of the bounds for classical-secret-sharing schemes proved by Csirmaz.
BCS theory of superconductivity: the world's largest Madoff scheme?
J. E. Hirsch
2009-01-26T23:59:59.000Z
The time-tested BCS theory of superconductivity is generally accepted to be the correct theory of conventional superconductivity by physicists and, by extension, by the world at large. In a different realm of human activity, until very recently Bernard Madoff's time-tested investment operation was generally accepted as true and legitimate in the financial world. Madoff's Ponzi scheme, where old investors were being paid off by funds contributed by new investors, was fundamentally flawed, yet was able to thrive for decades because of many vested interests. `Red flags' suggesting its illegitimacy were ignored. Here I suggest that the same is true of BCS theory. There are an increasing number of `red flags' that strongly suggest the possibility that BCS theory may be fundamentally flawed. For example, an ever-growing number of superconductors are being classified as `unconventional', not described by the conventional BCS theory and each requiring a different physical mechanism. In addition, I argue that BCS theory is unable to explain the Meissner effect, $the$ most fundamental property of superconductors. There are several other phenomena in superconductors for which BCS theory provides no explanation, and BCS theory has proven unable to predict any new superconducting compounds. From one day to the next, Madoff's edifice came crashing down and a staggering 50 billion dollars evaporated, and I suggest that this may also be the fate of BCS theory. I outline an alternative theory to conventional BCS theory proposed to apply to all superconductors, `conventional' as well as `unconventional', that offers an explanation for the Meissner effect as well as for other puzzles and provides clear guidelines in the search for new high temperature superconductors.
An exact general remeshing scheme applied to physically conservative voxelization
DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)
Powell, Devon; Abel, Tom
2015-09-01T23:59:59.000Z
We present an exact general remeshing scheme to compute analytic integrals of polynomial functions over the intersections between convex polyhedral cells of old and new meshes. In physics applications this allows one to ensure global mass, momentum, and energy conservation while applying higher-order polynomial interpolation. We elaborate on applications of our algorithm arising in the analysis of cosmological N-body data, computer graphics, and continuum mechanics problems. We focus on the particular case of remeshing tetrahedral cells onto a Cartesian grid such that the volume integral of the polynomial density function given on the input mesh is guaranteed to equal themore »corresponding integral over the output mesh. We refer to this as “physically conservative voxelization.” At the core of our method is an algorithm for intersecting two convex polyhedra by successively clipping one against the faces of the other. This algorithm is an implementation of the ideas presented abstractly by Sugihara [48], who suggests using the planar graph representations of convex polyhedra to ensure topological consistency of the output. This makes our implementation robust to geometric degeneracy in the input. We employ a simplicial decomposition to calculate moment integrals up to quadratic order over the resulting intersection domain. We also address practical issues arising in a software implementation, including numerical stability in geometric calculations, management of cancellation errors, and extension to two dimensions. In a comparison to recent work, we show substantial performance gains. We provide a C implementation intended to be a fast, accurate, and robust tool for geometric calculations on polyhedral mesh elements.« less
Please note that there is an ANU maximum of five academic bonus points per student. This includes Academic bonus points from The National Access Scheme and the College Bonus Point Scheme. cecs Admissions Scheme (CECS - SAS) cecs.anu.edu.au/future_students/sas Degree Bonus points Results
Tsuyoshi Hamada; Toshiaki Iitaka
2007-03-06T23:59:59.000Z
We present an algorithm named "Chamomile Scheme". The scheme is fully optimized for calculating gravitational interactions on the latest programmable Graphics Processing Unit (GPU), NVIDIA GeForce8800GTX, which has (a) small but fast shared memories (16 K Bytes * 16) with no broadcasting mechanism and (b) floating point arithmetic hardware of 500 Gflop/s but only for single precision. Based on this scheme, we have developed a library for gravitational N-body simulations, "CUNBODY-1", whose measured performance reaches to 173 Gflop/s for 2048 particles and 256 Gflop/s for 131072 particles.
Robust and Scalable Scheme to Generate Large-Scale Entanglement Webs
Keisuke Fujii; Haruki Maeda; Katsuji Yamamoto
2011-02-23T23:59:59.000Z
We propose a robust and scalable scheme to generate an $N$-qubit $W$ state among separated quantum nodes (cavity-QED systems) by using linear optics and postselections. The present scheme inherits the robustness of the Barrett-Kok scheme [Phys. Rev. A {\\bf 71}, 060310(R) (2005)]. The scalability is also ensured in the sense that an arbitrarily large $N$-qubit $W$ state can be generated with a quasi-polynomial overhead $\\sim 2^{O[(\\log_2 N)^2]}$. The process to breed the $W$ states, which we introduce to achieve the scalability, is quite simple and efficient, and can be applied for other physical systems.
THE SCHEME AND TARIFF FOR DEALING WITH CASES OF PLAGIARISM AND COLLUSION A INTRODUCTION 1. The University
The impact of the European Union Emissions Trading Scheme on US aviation Robert Malina a,c
The impact of the European Union Emissions Trading Scheme on US aviation Robert Malina a, Germany Keywords: European air transport policy Carbon emissions trading US airline industry a b s t r a c in the European Union Emissions Trading Scheme from 2012 to 2020. We find that the Scheme would only have a small
Salary savings scheme 2011 (ING BANK) 11-10-2010 Personnel and Organization Department 1/1
Franssen, Michael
Salary savings scheme 2011 (ING BANK) 11-10-2010 Personnel and Organization Department 1!! The undersigned hereby declares not to participate in a "course-of-life" arrangement or a salary savings scheme-year and you can only participate in a salary savings scheme via one employer Alteration as of (enter date
Ezer,Tal
mixing. Surface waves can enhance turbulence kinetic energy and mixing of the upper ocean via wave interaction on the MellorYamada scheme and upper ocean thermal structure are examined and compared with each scheme. The behaviors of the MellorYamada scheme, as well as the simulated upper ocean thermal structure
Calaf-Forn, Maria, E-mail: mcalaf@ent.cat [Institut de Ciència i Tecnologia Ambientals (ICTA), Universitat Autònoma de Barcelona (UAB), E-08193 Bellaterra, Barcelona (Spain); ENT Environment and Management, Carrer Sant Joan 39, First Floor, E-08800 Vilanova i la Geltrú, Barcelona (Spain); Roca, Jordi [Departament de Teoria Econòmica, Universitat de Barcelona (UB), Diagonal, 696, E-08034 Barcelona (Spain); Puig-Ventosa, Ignasi [ENT Environment and Management, Carrer Sant Joan 39, First Floor, E-08800 Vilanova i la Geltrú, Barcelona (Spain)
2014-05-01T23:59:59.000Z
Highlights: • LATS has been effective to achieve a reduction of the amount of landfilled waste. • LATS has been one of the few environmental instruments for waste management with a cap and trade methodology. • LATS has achieved to increase recycling of the biodegradable and other waste fractions. - Abstract: The Landfill Allowance Trading Scheme (LATS) is one of the main instruments used in England to enforce the landfill diversion targets established in the Directive 1999/31/EC of the European Parliament and of the Council of 26 April 1999 on the landfill of waste (Landfill Directive). Through the LATS, biodegradable municipal waste (BMW) allowances for landfilling are allocated to each local authority, otherwise known as waste disposal authorities (WDAs). The quantity of landfill allowances received is expected to decrease continuously from 2005/06 to 2019/20 so as to meet the objectives of the Landfill Directive. To achieve their commitments, WDAs can exchange, buy, sell or transfer allowances among each other, or may re-profile their own allocation through banking and/or borrowing. Despite the goals for the first seven years – which included two target years (2005/06 and 2009/10) – being widely achieved (the average allocation of allowances per WDA was 22.9% higher than those finally used), market activity among WDAs was high and prices were not very stable. Results in terms of waste reduction and recycling levels have been satisfactory. The reduction of BMW landfilled (in percentage) was higher during the first seven years of the LATS period (2005/06–2011/12) (around 7% annually) than during the previous period (2001/02–2004/05) (4.2% annually). Since 2008, the significance of the LATS diminished because of an increase in the rate of the UK Landfill Tax. The LATS was suppressed after the 2012/13 target year, before what it was initially scheduled. The purpose of this paper is to describe the particularities of the LATS, analyse its performance as a waste management policy, make a comparison with the Landfill Tax, discuss its main features as regards efficiency, effectiveness and the application of the “polluter pays” principle and finally discuss if the effect of the increase in the Landfill Tax is what made the LATS ultimately unnecessary.
Analysis of N-qubit perfectly controlled teleportation schemes from the controller's point of view
Xi-Han Li; Shohini Ghose
2014-12-30T23:59:59.000Z
We quantitatively analyze and evaluate the controller's power in $N$-qubit controlled teleportation schemes. We calculate the minimum control power required to ensure the controller's authority such that the teleportation fidelity without the controller's permission is no more than the classical bound. We revisit several typical controlled teleportation schemes from the controller's point of view and evaluate the control power in these schemes. We find that for teleporting arbitrary N-qubit states, each controller should control at least N bits of useful information to ensure his/her authority over the protocol. We also discuss the general rules that must be satisfied by controlled teleportation schemes to ensure both teleportation fidelity and control power.
THESIS FOR THE DEGREE OF LICENTIATE OF PHILOSOPHY On Artin Schemes of Tiled Orders
Patriksson, Michael
THESIS FOR THE DEGREE OF LICENTIATE OF PHILOSOPHY On Artin Schemes of Tiled Orders ROGER BENGTSSON Salberger for all the time he has spent in the preparations of this licentiate thesis. He formulated
Abdou, Mohamed
scheme simulation Alice Ying *, Mohamed Abdou Mechanical and Aerospace Engineering Department, Uni6ersity Science S.A. All rights reserved. PII S0920-3796(98)00135-5 #12;A. Ying, M. Abdou / Fusion Engineering
Incentive schemes for Internet congestion management: Raffles versus time-of-day pricing
Loiseau, Patrick
The Internet is plagued with congestion problems of growing severity which are worst at peak periods. In this paper, we compare two schemes that incentivize users to shift part of their usage from the peak-time to the ...
Economic Analysis of the Health Champions Scheme in Hammersmith and Fulham
Fryzlewicz, Piotr
Economic Analysis of the Health Champions Scheme in Hammersmith and Fulham Commissioned by Turning of Economics and Political Science #12;2 1 INTRODUCTION AND STRUCTURE OF THE REPORT BUDGET AND THROUGHPUT FIGURES..................................................6 4 ECONOMIC VALUE
A Three-dimensional Fourth Order Central Scheme For Astrophysical MHD
Verma, Prabal Singh
2015-01-01T23:59:59.000Z
A simple fourth order finite volume semi-discrete central scheme is introduced to study astrophysical magneto-hydrodynamics (MHD) problems. Density, momentum and energy are discretized as cell-centered volume averages. However, magnetic fields are discretized as face-centered area averages. The semi-discrete central scheme is combined with the constrained transport (CT) technique to enforce the divergence-free constraint on the magnetic field. The key feature of this scheme is dimensionally split centrally weighted essentially non-oscillatory (CWENO) reconstruction of magnetic field and electric flux at cell interfaces and cell edges respectively. Various 1D, 2D and 3D tests are performed to confirm fourth order accuracy, non-oscillatory and divergence-free property of the scheme.
GreenVis: Energy-Saving Color Schemes for Sequential Data Visualization on OLED Displays
North Virginia Tech Blacksburg, VA north@cs.vt.edu ABSTRACT The organic light emitting diode (OLED, Color Scheme, Visualization 1. INTRODUCTION The organic light-emitting diode (OLED) display is an emerg
The EU’s Emissions Trading Scheme: A Proto-Type Global System?
Ellerman, A. Denny
2008-01-01T23:59:59.000Z
The European Union's Emission Trading Scheme (EU ETS) is the world's first multinational cap-and-trade system for greenhouse gases. As an agreement between sovereign nations with diverse historical, institutional, and ...
The EU’s Emissions Trading Scheme: A Prototype Global System?
Ellerman, A. Denny
The European Union's Emission Trading Scheme (EU ETS) is the world's first multinational cap-and-trade system for greenhouse gases. As an agreement between sovereign nations with diverse historical, institutional, and ...
Allocation and competitiveness in the EU emissions trading scheme: policy overview
Grubb, Michael; Neuhoff, Karsten
The European emissions trading scheme (EU ETS) has an efficient and effective market design that risks being undermined by three interrelated problems: the approach to allocation; the absence of a credible commitment to post-2012 continuation...
Simple scheme for encoding and decoding a qubit in unknown state for various topological codes
Justyna ?odyga; Pawe? Mazurek; Andrzej Grudka; Micha? Horodecki
2014-11-29T23:59:59.000Z
We present a scheme for encoding and decoding an unknown state for CSS codes, based on syndrome measurements. We illustrate our method by means of Kitaev toric code, defected-lattice code, topological subsystem code and Haah 3D code. The protocol is local whenever in a given code the crossings between the logical operators consist of next neighbour pairs, which holds for the above codes. For subsystem code we also present scheme in a noisy case, where we allow for bit and phase-flip errors on qubits as well as state preparation and syndrome measurement errors. Similar scheme can be built for two other codes. We show that the fidelity of the protected qubit in the noisy scenario in a large code size limit is of $1-\\mathcal{O}(p)$, where $p$ is a probability of error on a single qubit. Regarding Haah code we provide noiseless scheme, leaving the noisy case as an open problem.
LDPC code-based bandwidth efficient coding schemes for wireless communications
Sankar, Hari
2009-06-02T23:59:59.000Z
This dissertation deals with the design of bandwidth-efficient coding schemes with Low-Density Parity-Check (LDPC) for reliable wireless communications. Code design for wireless channels roughly falls into three categories: (1) when channel state...
A new landscape ecology mapping scheme for coastal environments: Galveston Island, Texas
Lynch, Karen Marie
1996-01-01T23:59:59.000Z
of landscape ecology to understand the complete picture of the changing environment of a barrier island. Mapping is fundamental to detecting and monitoring change. Currently no mapping scheme can effectively integrate geomorphological and ecological mapping...
Tsang, C.-F.
2011-01-01T23:59:59.000Z
R~fN~EC"(IONSCHEMES'F~RTHE CERRO PRIETO , GEOTHERMAL FIELD,REINJECTION SCHEMES FOR THE CERRO PRIETO GEOTHERMAL FIELD,reinjection patterns for the Cerro Prieto geothermal field,
A RAPID-SCANNING AUTOCORRELATION SCHEME FOR CONTINUOUS MONITORING OF PICOSECOND LASER PULSES
Yasa, Zafer A.
2013-01-01T23:59:59.000Z
of Califomia. A RAPID-SCANNING AUTOCORRELATION SCHEME FORHowever, they have a limited scanning range( 4- 6 ) and arelinear over a wide scanning range )9 and is dispersion-free.
A New Indirect Adaptive Control Scheme for Time-Varying Plants
Ioannou, Petros
A New Indirect Adaptive Control Scheme for Time-Varying Plants Absrmcr of the indirectadaptiveschemewhicharemoreappropriatefortime-varying plants that for successful estimation. the oyerall plant is notrestrictedto var?slowl)withtime. The new estimatorandcontrol
Evaluation of the environmental viability of direct injection schemes for ocean carbon sequestration
Israelsson, Peter H. (Peter Hampus), 1973-
2008-01-01T23:59:59.000Z
This thesis evaluates the expected impact of several promising schemes for ocean carbon sequestration by direct injection of CO2, and serves as an update to the assessment by Auerbach et al. (1997) and Caulfield et al. ...
The Green Building Scheme for a Sustainable Eco-City in Taipei
Sun, S.; Chen, Z.; Clements-Croome, D.
2006-01-01T23:59:59.000Z
Taipei City has put a significant effort toward the implementation of green design and green building schemes towards a sustainable eco-city. Although some of the environmental indicators have not indicated significant progress in environmental...
Li, Depeng
Authentication schemes relying on per-packet signature and per-signature verification introduce heavy cost for computation and communication. Due to its constraint resources, smart grid's authentication requirement cannot ...
Economic impact of the European Union Emission Trading Scheme : evidence from the refining sector
Lacombe, Romain H
2008-01-01T23:59:59.000Z
I study the economic impact of the European Union Emission Trading Scheme (EU ETS) on the refining industry in Europe. I contrast previous ex-ante studies with the lessons from a series of interviews I conducted with ...
A new landscape ecology mapping scheme for coastal environments: Galveston Island, Texas
Lynch, Karen Marie
1996-01-01T23:59:59.000Z
of landscape ecology to understand the complete picture of the changing environment of a barrier island. Mapping is fundamental to detecting and monitoring change. Currently no mapping scheme can effectively integrate geomorphological and ecological mapping...
E-Print Network 3.0 - active defrost scheme Sample Search Results
Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)
Activated Drives 7-18 for Heat Pumps 7.3.4. Integration of Large Heat Pumps into 7... -21 District Heating Schemes. 7.3.5. Advanced Heat Source Equipment 7-25 7.3.6. Establishment...
High fidelity readout scheme for rare-earth solid state quantum computing
A. Walther; L. Rippe; Y. Yan; J. Karlsson; D. Serrano; A. N. Nilsson; S. Bengtsson; S. Kröll
2015-03-29T23:59:59.000Z
We propose and analyze a high fidelity readout scheme for a single instance approach to quantum computing in rare-earth-ion-doped crystals. The scheme is based on using different species of qubit and readout ions, and it is shown that by allowing the closest qubit ion to act as a readout buffer, the readout error can be reduced by more than an order of magnitude. The scheme is shown to be robust against certain experimental variations, such as varying detection efficiencies, and we use the scheme to predict the expected quantum fidelity of a CNOT gate in these solid state systems. In addition, we discuss the potential scalability of the protocol to larger qubit systems. The results are based on parameters which we believed are experimentally feasible with current technology, and which can be simultaneously realized.
Transactions of NAMRI/SME 589 Volume 31, 2003 MODELING SCHEMES, TRANSIENCY, AND STRAIN MEASUREMENT
Yao, Y. Lawrence
Transactions of NAMRI/SME 589 Volume 31, 2003 MODELING SCHEMES, TRANSIENCY, AND STRAIN MEASUREMENT the shock pressure and the particle velocities of the coating layer #12;Transactions of NAMRI/SME 590 Volume
RF systems for the betatron-node scheme experiment at LBNL
Lidia, Steven M.; De Santis, Stefano; Houck, Timothy
2001-01-01T23:59:59.000Z
FOR THE BETATRON-NODE SCHEME EXPERIMENT AT LBNL* S. Lidia†,S. De Santis, LBNL, Berkeley, CA USA T. Houck, LLNL,frequency BBU is under way at LBNL. Central to this study
NUMERICAL ANALYSIS OF A FINITE ELEMENT SCHEME FOR THE APPROXIMATION OF HARMONIC MAPS INTO SURFACES
Bartels, Soeren
NUMERICAL ANALYSIS OF A FINITE ELEMENT SCHEME FOR THE APPROXIMATION OF HARMONIC MAPS INTO SURFACES Geometric partial differential equations and their analysis as well as numerical simulation have recently
Controls modelling and verification for the Pacific Intertie HVDC 4 terminal scheme
Hammad, A.; Minghetti, R.; Hasler, J.; Eicher, P. (ABB Power Systems, Baden (Switzerland)); Bunch, R.; Goldsworthy, D. (Bonneville Power Administration, Portland, OR (United States))
1993-01-01T23:59:59.000Z
A detailed digital model for the actual control system of the Pacific Intertie HVDC scheme is presented. The scheme is operated as multi-terminal bipole HVDC with four terminals in parallel. Each pole comprises two separately located converter station with independent converter controls at each end of the transmission line. The control model includes bipole, pole, station and converter control systems. Special control techniques for providing safe and stable operation of the parallel converters are described. The techniques also result in fast recovery of the HVDC transmission scheme following severe ac and dc system disturbances. Verification of the completeness and accuracy of the model are made using field tests made on the actual HVDC scheme.
A cascaded laser acceleration scheme for the generation of spectrally controlled proton beams
Pfotenhauer, Sebastian Michael
We present a novel, cascaded acceleration scheme for the generation of spectrally controlled ion beams using a laser-based accelerator in a 'double-stage' setup. An MeV proton beam produced during a relativistic laser–plasma ...
The multiple-point schemes of a finite curvilinear map of ...
1910-30-30T23:59:59.000Z
?1. Nr. In this setting—in fact, in a more general setting—we prove the following statements, which show that Mr and Nr behave like reasonable schemes of ...
Scheme for a linear-optical controlled-phase gate with programmable phase shift
Karel Lemr; Karol Bartkiewicz; Antonín ?ernoch
2015-03-20T23:59:59.000Z
We propose a linear-optical scheme for a controlled-phase gate with tunable phase shift set by a program qubit. Analysis of the scheme is provided with considerations for experimental feasibility. We also discuss options for increasing the success probability up to 1/12 which is close the the optimal success probability of a non-programmable tunable controlled-phase gate.
Towards laser based improved experimental schemes for multiphoton e+ e- pair production from vacuum
I. Ploumistakis; S. D. Moustaizis; I. Tsohantjis
2009-07-15T23:59:59.000Z
Numerical estimates for pair production from vacuum in the presence of strong electromagnetic fields are derived, for two experimental schemes : the First concerns a laser based X-FEL and the other imitates the E144 experiment. The approximation adopted in this work is that of two level multiphoton on resonance. Utilizing achievable values of laser beam parameters, an enhancedproduction efficiency of up to 10^11 and 10^15 pairs can be obtained, for the two schemes respectively.
EXPLORING EFFICIENT CODING SCHEMES FOR STORING ARBITRARY TREE DATA STRUCTURES IN FLASH MEMORIES
Falck, Justin
2009-06-09T23:59:59.000Z
fulfillment of the requirements for the designation as UNDERGRADUATE RESEARCH SCHOLAR A Senior Scholars Thesis by JUSTIN ALLEN FALCK EXPLORING EFFICIENT CODING SCHEMES FOR STORING ARBITRARY TREE DATA STRUCTURES IN FLASH MEMORIES Approved by... for the designation as UNDERGRADUATE RESEARCH SCHOLAR A Senior Scholars Thesis by JUSTIN ALLEN FALCK iii ABSTRACT Exploring Efficient Coding Schemes for Storing Arbitrary Tree Data Structures in Flash Memories. (April 2009) Justin Allen Falck...
Modeling and analysis of EWMA control schemes with time varying control limits
Chandrasekaran, Sreenivasan
1991-01-01T23:59:59.000Z
of EWMA schemes that afford the desired degree of protection against shifts that lead to a potential increase in scrap. Next, a stochastic model of the EWMA control scheme with supplementary runs rules is constructed. Mean absorption time for various... be reworked constitute scrap. Depending upon the product that is being manufactured, observations falling above the USL or below the LSL will constitute scrap. Without loss of generality, let an observation falling beyond the USL constitute scrap. Clearly...
Error propagation in loss- and failure-tolerant quantum computation schemes
Peter P. Rohde; Timothy C. Ralph; William J. Munro
2007-01-14T23:59:59.000Z
Qubit loss and gate failure are significant obstacles for the implementation of scalable quantum computation. Recently there have been several proposals for overcoming these problems, including schemes based on parity and cluster states. While effective at dealing with loss and gate failure, these schemes typically lead to a blow-out in effective depolarizing noise rates. In this supplementary paper we present a detailed analysis of this problem and techniques for minimizing it.
Cornils, William Joseph
1981-01-01T23:59:59.000Z
CHEMICAL RESISTANCE DETERMINATION TEST SCHEME AND RATING SYSTEM DEVELOPMENT FOR INDUSTRIAL GLOVE EVALUATION A Thesis by WILLIAM JOSEPH CORNILS Submitted to the Graduate College of Texas A&M University in partial fulfillment... of the requirement for the degree of MASTER OF SCIENCE August 1981 Major Subject: Industrial Hygiene CHEMICAL RESISTANCE DETERMINATION TEST SCHEME AND RATING SYSTEM DEVELOPMENT FOR INDUSTRIAL GLOVE EVALUATION A Thesis by WILLIAM JOSEPH CORNILS Approved...
Continuous variable versus hybrid schemes for quantum teleportation of Gaussian states
Ioannis Kogias; Sammy Ragy; Gerardo Adesso
2014-05-28T23:59:59.000Z
In this paper, we examine and compare two fundamentally different teleportation schemes; the well-known continuous variable scheme by Vaidman, Braunstein and Kimble (VBK), and a recently proposed hybrid scheme by Andersen and Ralph (AR). We analyze the teleportation of ensembles of arbitrary pure single-mode Gaussian states using these schemes and see how they fare against the optimal measure-and-prepare strategies -- the benchmarks. In the VBK case, we allow for non-unit gain tuning and consider a class of possibly non-Gaussian resources in order to optimize performance. The results suggest that the AR scheme may likely be a more suitable candidate for beating the benchmarks in the teleportation of squeezing, capable of achieving this for moderate resources in comparison to the VBK scheme. Moreover, our quantification of resources, whereby different protocols are compared at fixed values of the entanglement entropy or the mean energy of the resource states, brings into question any advantage due to non-Gaussianity for quantum teleportation of Gaussian states.
Numerical schemes for dynamically orthogonal equations of stochastic fluid and ocean flows
Ueckermann, M.P., E-mail: mpuecker@mit.edu [Department of Mechanical Engineering, Massachusetts Institute of Technology, 77 Mass. Avenue, Cambridge, MA 02139 (United States); Lermusiaux, P.F.J., E-mail: pierrel@mit.edu [Department of Mechanical Engineering, Massachusetts Institute of Technology, 77 Mass. Avenue, Cambridge, MA 02139 (United States)] [Department of Mechanical Engineering, Massachusetts Institute of Technology, 77 Mass. Avenue, Cambridge, MA 02139 (United States); Sapsis, T.P., E-mail: sapsis@mit.edu [Department of Mechanical Engineering, Massachusetts Institute of Technology, 77 Mass. Avenue, Cambridge, MA 02139 (United States)
2013-01-15T23:59:59.000Z
The quantification of uncertainties is critical when systems are nonlinear and have uncertain terms in their governing equations or are constrained by limited knowledge of initial and boundary conditions. Such situations are common in multiscale, intermittent and non-homogeneous fluid and ocean flows. The dynamically orthogonal (DO) field equations provide an adaptive methodology to predict the probability density functions of such flows. The present work derives efficient computational schemes for the DO methodology applied to unsteady stochastic Navier-Stokes and Boussinesq equations, and illustrates and studies the numerical aspects of these schemes. Semi-implicit projection methods are developed for the mean and for the DO modes, and time-marching schemes of first to fourth order are used for the stochastic coefficients. Conservative second-order finite-volumes are employed in physical space with new advection schemes based on total variation diminishing methods. Other results include: (i) the definition of pseudo-stochastic pressures to obtain a number of pressure equations that is linear in the subspace size instead of quadratic; (ii) symmetric advection schemes for the stochastic velocities; (iii) the use of generalized inversion to deal with singular subspace covariances or deterministic modes; and (iv) schemes to maintain orthonormal modes at the numerical level. To verify our implementation and study the properties of our schemes and their variations, a set of stochastic flow benchmarks are defined including asymmetric Dirac and symmetric lock-exchange flows, lid-driven cavity flows, and flows past objects in a confined channel. Different Reynolds number and Grashof number regimes are employed to illustrate robustness. Optimal convergence under both time and space refinements is shown as well as the convergence of the probability density functions with the number of stochastic realizations.
Development and evaluation of a convection scheme for use in climate models
Emanuel, K.A. [Massachusetts Inst. of Tech., Cambridge, MA (United States). Program for Atmospheres, Oceans, and Climate] [Massachusetts Inst. of Tech., Cambridge, MA (United States). Program for Atmospheres, Oceans, and Climate; Zivkovic-Rothman, M. [Atmospheric and Environmental Research, Inc., Cambridge, MA (United States)] [Atmospheric and Environmental Research, Inc., Cambridge, MA (United States)
1999-06-01T23:59:59.000Z
Cumulus convection is a key process in controlling the water vapor content of the atmosphere, which is in turn the largest feedback mechanism for climate change in global climate models. Yet scant attention has been paid to designing convective representations that attempt to handle water vapor with fidelity, and even less to evaluating their performance. Here the authors attempt to address this deficiency by designing a representation of cumulus convection with close attention paid to convective water fluxes and by subjecting the scheme to rigorous tests using sounding array data. The authors maintain that such tests, in which a single-column model is forced by large-scale processes measured by or inferred from the sounding data, must be carried out over a period at least as long as the radiative-subsidence timescale--about 30 days--governing the water vapor adjustment time. The authors also argue that the observed forcing must be preconditioned to guarantee integral enthalpy conservation, else errors in the single-column prediction may be falsely attributed to convective schemes. Optimization of the new scheme`s parameters is performed using one month of data from the intensive flux array operating during the Tropical Ocean Global Atmosphere Coupled Ocean-Atmosphere Response Experiment, with the aid of the adjoint of the linear tangent of the single-column model. Residual root-mean-square errors, after optimization, are about 15% in relative humidity and .8 K in temperature. It is difficult to reject the hypothesis that the residual errors are due to noise in the forcing. Evaluation of the convective scheme is performed using Global Atmospheric Research Program Atlantic Tropical Experiment data. The performance of the scheme is compared to that of a few other schemes used in current climate models. It is also shown that a vertical resolution better than 50 mb in pressure is necessary for accurate prediction of atmospheric water vapor.
Linear optics schemes for entanglement distribution with realistic single-photon sources
Miko?aj Lasota; Czes?aw Radzewicz; Konrad Banaszek; Rob Thew
2014-09-24T23:59:59.000Z
We study the operation of linear optics schemes for entanglement distribution based on nonlocal photon subtraction when input states, produced by imperfect single-photon sources, exhibit both vacuum and multiphoton contributions. Two models for realistic photon statistics with radically different properties of the multiphoton "tail" are considered. The first model assumes occasional emission of double photons and linear attenuation, while the second one is motivated by heralded sources utilizing spontaneous parametric down-conversion. We find conditions for the photon statistics that guarantee generation of entanglement in the relevant qubit subspaces and compare it with classicality criteria. We also quantify the amount of entanglement that can be produced with imperfect single-photon sources, optimized over setup parameters, using as a measure entanglement of formation. Finally, we discuss verification of the generated entanglement by testing Bell's inequalities. The analysis is carried out for two schemes. The first one is the well-established one-photon scheme, which produces a photon in a delocalized superposition state between two nodes, each of them fed with one single photon at the input. As the second scheme, we introduce and analyze a linear-optics analog of the robust scheme based on interfering two Stokes photons emitted by atomic ensembles, which does not require phase stability between the nodes.
X-ray tests of a two-dimensional stigmatic imaging scheme with variable magnifications
Lu, J., E-mail: jlu@pppl.gov [Key Laboratory of Optoelectronic Technology and System of Ministry of Education, Chongqing University, Chongqing 400030 (China); Bitter, M.; Hill, K. W.; Delgado-Aparicio, L. F.; Efthimion, P. C.; Pablant, N. A. [Princeton Plasma Physics Laboratory, Princeton, New Jersey 08543 (United States); Beiersdorfer, P. [Physics Division, Lawrence Livermore National Laboratory, Livermore, California 94550 (United States); Caughey, T. A.; Brunner, J. [Inrad Optics, 181 Legrand Avenue, Northvale, New Jersey 07647 (United States)
2014-11-15T23:59:59.000Z
A two-dimensional stigmatic x-ray imaging scheme, consisting of two spherically bent crystals, one concave and one convex, was recently proposed [M. Bitter et al., Rev. Sci. Instrum. 83, 10E527 (2012)]. The Bragg angles and the radii of curvature of the two crystals of this imaging scheme are matched to eliminate the astigmatism and to satisfy the Bragg condition across both crystal surfaces for a given x-ray energy. In this paper, we consider more general configurations of this imaging scheme, which allow us to vary the magnification for a given pair of crystals and x-ray energy. The stigmatic imaging scheme has been validated for the first time by imaging x-rays generated by a micro-focus x-ray source with source size of 8.4 ?m validated by knife-edge measurements. Results are presented from imaging the tungsten L?1 emission at 8.3976 keV, using a convex Si-422 crystal and a concave Si-533 crystal with 2d-spacings of 2.21707 Å and 1.65635 Å and radii of curvature of 500 ± 1 mm and 823 ± 1 mm, respectively, showing a spatial resolution of 54.9 ?m. This imaging scheme is expected to be of interest for the two-dimensional imaging of laser produced plasmas.
Evaluation of a Modified Scheme for Shallow Convection: Implementation of CuP and Case Studies
Berg, Larry K.; Gustafson, William I.; Kassianov, Evgueni I.; Deng, Liping
2013-01-01T23:59:59.000Z
A new treatment for shallow clouds has been introduced into the Weather Research and Forecasting (WRF) model. The new scheme, called the cumulus potential (CuP) scheme, replaces the ad-hoc trigger function used in the Kain-Fritsch cumulus parameterization with a trigger function related to the distribution of temperature and humidity in the convective boundary layer via probability density functions (PDFs). An additional modification to the default version of WRF is the computation of a cumulus cloud fraction based on the time scales relevant for shallow cumuli. Results from three case studies over the U.S. Department of Energy’s Atmospheric Radiation Measurement (ARM) site in north central Oklahoma are presented. These days were selected because of the presence of shallow cumuli over the ARM site. The modified version of WRF does a much better job predicting the cloud fraction and the downwelling shortwave irradiance thancontrol simulations utilizing the default Kain-Fritsch scheme. The modified scheme includes a number of additional free parameters, including the number and size of bins used to define the PDF, the minimum frequency of a bin within the PDF before that bin is considered for shallow clouds to form, and the critical cumulative frequency of bins required to trigger deep convection. A series of tests were undertaken to evaluate the sensitivity of the simulations to these parameters. Overall, the scheme was found to be relatively insensitive to each of the parameters.
Lan, Chuwen; Zhou, Ji
2015-01-01T23:59:59.000Z
Increasing attention has been focused on the invisibility cloak due to its novel concept for manipulation of physical field. However, it is usually realized by single scheme (namely passive or active scheme) and limited in a single field. Here, we proposed a general method to achieve simultaneous manipulation of multi-physics field via combination of passive and active schemes. Experimentally, this method was demonstrated by simultaneous manipulation of electric field and thermal field. Firstly, a device was designed to simultaneously behave as electric and thermal invisibility cloak. Secondly, another device was demonstrated to simultaneously behave as electric invisibility cloak and thermal concentrator. The experimental results agree well with the simulated ones, thus confirming the feasibility of our method. Our method can also be extended to the other multi-physics fields, which would create much more freedom to design of new system and might enable new potential application in broad areas.
Hadronization Scheme Dependence of Long-Range Azimuthal Harmonics in High Energy p+A Reactions
Esposito, Angelo
2015-01-01T23:59:59.000Z
We compare the distortion effects of three popular final state hadronization schemes that modify the initial-state gluon azimuthal harmonic correlations in high energy p+A collisions. The three models considered are (1) LPH: local parton-hadron duality, (2) CPR: collinear parton-hadron resonance independent fragmenation, and (3) LUND: color string hadronization. Strong initial-state multi-gluon azimuthal correlations are generated using the non-abelian beam jet bremsstrahlung GLVB model, assuming a saturation scale Qsat = 2 GeV. Long-range final hadron pair elliptic and triangular harmonics are compared based on the three hadronization schemes. Our analysis shows that the hadron level harmonics are strongly hadronization scheme dependent in the low pT < 3 GeV domain.
Implicit-Explicit Runge-Kutta schemes for the Boltzmann-Poisson system for semiconductors
G. Dimarco; L. Pareschi; V. Rispoli
2013-05-08T23:59:59.000Z
In this paper we develop a class of Implicit-Explicit Runge-Kutta schemes for solving the multi-scale semiconductor Boltzmann equation. The relevant scale which characterizes this kind of problems is the diffusive scaling. This means that, in the limit of zero mean free path, the system is governed by a drift-diffusion equation. Our aim is to develop a method which accurately works for the different regimes encountered in general semiconductor simulations: the kinetic, the intermediate and the diffusive one. Moreover, we want to overcome the restrictive time step conditions of standard time integration techniques when applied to the solution of this kind of phenomena without any deterioration in the accuracy. As a result, we obtain high order time and space discretization schemes which do not suffer from the usual parabolic stiffness in the diffusive limit. We show different numerical results which permit to appreciate the performances of the proposed schemes.
An Adaptive Entanglement Distillation Scheme Using Quantum Low Density Parity Check Codes
K. H. Ho; H. F. Chau
2008-07-14T23:59:59.000Z
Quantum low density parity check (QLDPC) codes are useful primitives for quantum information processing because they can be encoded and decoded efficiently. Besides, the error correcting capability of a few QLDPC codes exceeds the quantum Gilbert-Varshamov bound. Here, we report a numerical performance analysis of an adaptive entanglement distillation scheme using QLDPC codes. In particular, we find that the expected yield of our adaptive distillation scheme to combat depolarization errors exceed that of Leung and Shor whenever the error probability is less than about 0.07 or greater than about 0.28. This finding illustrates the effectiveness of using QLDPC codes in entanglement distillation.
N_p N_n Scheme Based on New Empirical Formula for Excitation Energy
Jin-Hee Yoon; Eunja Ha; Dongwoo Cha
2007-09-12T23:59:59.000Z
We examine the $N_p N_n$ scheme based on a recently proposed simple empirical formula which is highly valid for the excitation energy of the first excited natural parity even multipole states in even-even nuclei. We demonstrate explicitly that the $N_p N_n$ scheme for the excitation energy emerges from the separate exponential dependence of the excitation energy on the valence nucleon numbers $N_p$ and $N_n$ together with the fact that only a limited set of numbers is allowed for the $N_p$ and $N_n$ of the existing nuclei.
Temporal Loop Multiplexing: A resource efficient scheme for multiplexed photon-pair sources
Francis-Jones, Robert J A
2015-01-01T23:59:59.000Z
Single photons are a vital resource for photonic quantum information processing. However, even state-of-the-art single photon sources based on photon-pair generation and heralding detection have only a low probability of delivering a single photon when one is requested. We analyse a scheme that uses a switched fibre delay loop to increase the delivery probability per time bin of single photons from heralded sources. We show that, for realistic experimental parameters, combining the output of up to 15 pulses can yield a performance improvement of a factor of 10. We consider the future performance of this scheme with likely component improvements.
A stochastic multi-symplectic scheme for stochastic Maxwell equations with additive noise
Hong, Jialin, E-mail: hjl@lsec.cc.ac.cn [Institute of Computational Mathematics and Scientific/Engineering Computing, Academy of Mathematics and Systems Science, Chinese Academy of Sciences, Beijing 100190 (China); Ji, Lihai, E-mail: jilihai@lsec.cc.ac.cn [Institute of Applied Physics and Computational Mathematics, Beijing 100094 (China); Zhang, Liying, E-mail: lyzhang@lsec.cc.ac.cn [Institute of Computational Mathematics and Scientific/Engineering Computing, Academy of Mathematics and Systems Science, Chinese Academy of Sciences, Beijing 100190 (China)
2014-07-01T23:59:59.000Z
In this paper we investigate a stochastic multi-symplectic method for stochastic Maxwell equations with additive noise. Based on the stochastic version of variational principle, we find a way to obtain the stochastic multi-symplectic structure of three-dimensional (3-D) stochastic Maxwell equations with additive noise. We propose a stochastic multi-symplectic scheme and show that it preserves the stochastic multi-symplectic conservation law and the local and global stochastic energy dissipative properties, which the equations themselves possess. Numerical experiments are performed to verify the numerical behaviors of the stochastic multi-symplectic scheme.
Security analysis of boolean algebra based on Zhang-Wang digital signature scheme
Zheng, Jinbin, E-mail: jbzheng518@163.com [School of Mathematics and Computer Science, Long Yan University, Longyan 364012 (China)
2014-10-06T23:59:59.000Z
In 2005, Zhang and Wang proposed an improvement signature scheme without using one-way hash function and message redundancy. In this paper, we show that this scheme exits potential safety concerns through the analysis of boolean algebra, such as bitwise exclusive-or, and point out that mapping is not one to one between assembly instructions and machine code actually by means of the analysis of the result of the assembly program segment, and which possibly causes safety problems unknown to the software.
The DIS(chi) Scheme for Heavy Quark Production at Small x.
White, C D
, Cambridge, CB3 0HE, UK, E-mail: cdw24@hep.phy.cam.ac.uk In order to successfully describe DIS data, one must take heavy quark mass ef- fects into account. This is often achieved using so called variable flavour number schemes, in which a parton distribution... for the heavy quark species is defined above a suitable matching scale. At small x, one must also potentially include high energy corrections to this framework arising from the BFKL equation. We outline the definition of a variable flavour scheme which allows...
A robust coordinated control scheme for HVDC transmission with parallel AC systems
To, K.W.V.; David, A.K. (Hong Kong Polytechnic (Hong Kong). Dept. of Electrical Engineering); Hammad, A.E. (N.E. Swiss Power Co., Baden (Switzerland))
1994-07-01T23:59:59.000Z
This paper introduces a practical control philosophy for HVDC transmission in parallel operation to an AC system with particular emphasis on coordination of both transient and dynamic stability. Systematic development of the control scheme on the basis of on-line identification, optimal control and rule-based bang-optimal coordination principles is presented. Verification tests of the scheme on a physical HVDC/AC system simulator show that the simple control computer algorithm is practical and robust. The controller can successfully distinguish between different system fault severities and adapts its output signals to provide maximum synchronizing torque and ensure optimal damping of power oscillations.
The smoothing transformer, a new concept in dc side harmonic reduction of HVdc schemes
Enright, W.; Arrillaga, J.; Wood, A.R.; Hidalgo, F.P.
1996-10-01T23:59:59.000Z
Direct connection schemes have been a subject of recent investigation, offering operational flexibility and substantial reductions in ac components. In these schemes the use of active dc filters has been suggested to replace the conventional tuned passive filter design. This paper presents the smoothing transformer as a new means for reducing dc harmonics at characteristic and non-characteristic frequencies using only passive components. A realistic smoothing transformer design is examined using the New Zealand HVdc system operating in the direct connection mode. The steady-state and transient performance of the smoothing transformer design is compared with that of the existing dc smoothing reactor and filter bank.
Analysis of second harmonic instability for the Chateauguay HVDC/SVC scheme
Hammad, A.E. (ABB Power Systems, 5401-Baden (CH))
1992-01-01T23:59:59.000Z
The Chateauguay HVDC back-to-back scheme with interconnections to the 765 kV transmission to U.S.A. and to Beauharnois generators can exhibit, under certain operating conditions, second harmonic resonance problems. This paper presents a thorough analysis of the problem using an eigenvalue and frequency domain approach. The analysis explains the mechanism of exciting the second harmonic instability by the presence of HVDC converters. The influence of changing the control parameters of the static VAR compensatory at the Chateauguay terminal is also studied. Finally, an assessment is made for the effectiveness of present countermeasure schemes, namely; the auxiliary dc stabilizing controls and the installation of second harmonic filters.
Ting Gao; Feng-Li Yan; Zhi-Xi Wang; You-Cheng Li
2006-04-18T23:59:59.000Z
We analyze the capacity of a simultaneous quantum secure direct communication scheme between the central party and other $M$ parties via $M+1$-particle GHZ states and swapping quantum entanglement. It is shown that the encoding scheme should be secret if other $M$ parties wants to transmit $M+1$ bit classical messages to the center party secretly. However when the encoding scheme is announced publicly, we prove that the capacity of the scheme in transmitting the secret messages is 2 bits, no matter how big $M$ is.
A Loss-Minimization DTC Scheme for EV Induction Motors A. Haddoun1
Paris-Sud XI, Université de
totally overcome. Indeed, EVs have a low energy density and long charging time for the present batteries distance per battery charge. Therefore, DTC should be associated to a loss- minimization strategy soA Loss-Minimization DTC Scheme for EV Induction Motors A. Haddoun1 , M.E.H. Benbouzid2 , D. Diallo3
Peirce, Anthony
Implicit level set schemes for modeling hydraulic fractures using the XFEM Elizaveta Gordeliy Copyright Ã? 2013 Published by Elsevier B.V. All rights reserved. 1. Introduction Hydraulic fractures (HF form 13 July 2013 Accepted 27 July 2013 Available online 20 August 2013 Keywords: XFEM Hydraulic
Zelikovsky, Alexander
correspond to a group of up to eight nodes in the Group #3; This work was supported by a Packard Foundation a group of up to eight virtual positions (c). The only existing approximation algorithms for the GroupA New Approximation Scheme for the Group Steiner Problem #3; C. S. Helvig Gabriel Robins Alexander
Gettelman, Andrew
and supersaturation in CAM. The new model is able to reproduce field observations of ice mass and mixed phase cloud are sensitive to the parameterization of ice clouds. These results indicate that ice clouds are potentiallyGlobal simulations of ice nucleation and ice supersaturation with an improved cloud scheme
TAME-BLIND EXTENSION OF MORPHISMS OF TRUNCATED BARSOTTI-TATE GROUP SCHEMES
TAME-BLIND EXTENSION OF MORPHISMS OF TRUNCATED BARSOTTI-TATE GROUP SCHEMES YUICHIRO HOSHI OCTOBER with perfect residue fields extend in a "tame-blind" fashion -- i.e., under a condition which is unaffected. The "tame-blindness" of our extension result al- lows one to verify the analogue of a result of Tate
Semi-blind channel estimation schemes based on a cooperative form of the cross relation criterion
Rontogiannis, Athanasios A.
Semi-blind channel estimation schemes based on a cooperative form of the cross relation criterion on the cross-relation criterion that has been extensively studied in the (semi-) blind literature. As shown. In a wireless environment, as in cooperative communications, semi-blind techniques which combine a blind
Adequate Numerical Solution of Air Pollution Problems by positive Di#erence Schemes on
Ehrhardt, Matthias
Adequate Numerical Solution of Air Pollution Problems by positive Di#erence Schemes on unbounded In this work we deal with the numerical solution of some problems of air pollution. Since the problems) pollution. The e#ciency and accuracy of our method is illustrated by an example. Key words: air pollution
Adequate Numerical Solution of Air Pollution Problems by positive Difference Schemes on
Ehrhardt, Matthias
Adequate Numerical Solution of Air Pollution Problems by positive Difference Schemes on unbounded In this work we deal with the numerical solution of some problems of air pollution. Since the problems) pollution. The efficiency and accuracy of our method is illustrated by an example. Key words: air pollution
Shihada, Basem
Energy Efficient Scheme for Cognitive Radios Utilizing Soft Sensing AbdulRahman Alabbasi , Zouheir: {abdulrahman.alabbasi, zouheir.rezki, basem.shihada}@kaust.edu.sa Abstract--In this paper we propose an energy sensing information to achieve a sub-optimum energy efficient system. The sub-optimality is achieved
Up and Down MiniBuckets: A Scheme for Approximating Combinatorial Optimization Tasks
Dechter, Rina
. Such performance improvements are crucial if we are to apply the scheme at every node in search algoÂ rithms with each unary assignment of a value to a variable in combinatorial optimization problems. This task functions that can guide search algorithms for optimal solutions. The paper presents UDÂMB, a new algorithm
A Novel Transmitter Placement Scheme based on Hierarchical Simplex Search for Indoor Wireless
, we propose an adaptive number adjustment algorithm (ANA) to speed up the search process, which adjusts the number of transmitters with variable step-sizes. A hierarchical simplex search algorithm (HSS1 A Novel Transmitter Placement Scheme based on Hierarchical Simplex Search for Indoor Wireless
Robust Networked Control Scheme for Distributed Secondary Control of Islanded MicroGrids
Vasquez, Juan Carlos
1 Robust Networked Control Scheme for Distributed Secondary Control of Islanded MicroGrids Qobad scenarios that have an increased number of distributed generators (DGs) within the MG. Due (RES) and distributed generators (DGs), microgrids (MGs) have recently attracted a significant interest
China's waste could be treasure for Kyoto scheme 01 Mar 2006 12:36:11 GMT
Columbia University
China's waste could be treasure for Kyoto scheme 01 Mar 2006 12:36:11 GMT Source: Reuters By Stuart Penson COPENHAGEN, March 1 (Reuters) - Hundreds of rubbish landfill sites across China have vast, said Lu Guoqiang, an official at China's state Environmental Protection Administration. "China has 700
Spatial model coupling -an efficient scheme to combine hydraulic and geomechanic simulations
Cirpka, Olaf Arie
Spatial model coupling - an efficient scheme to combine hydraulic and geomechanic simulations present a spatial coupling approach with two subdomains [1]: Hydro-geomechanical model full model approach-field (geomechanics are neglected) hydro-geomechanical subdomain el2p model hydraulic subdomain 2p model hydraulic
A Cheat-Proof Game Theoretic Demand Response Scheme for Smart Grids
Liu, K. J. Ray
A Cheat-Proof Game Theoretic Demand Response Scheme for Smart Grids Yan Chen, W. Sabrina Lin, Feng}@umd.edu Abstract--While demand response has achieved promising results on making the power grid more efficient and reliable, the additional dynamics and flexibility brought by demand response also increase the uncertainty
Equivalence for nonparametric drift estimation of a diffusion process and its Euler scheme.
Paris-Sud XI, Université de
Equivalence for nonparametric drift estimation of a diffusion process and its Euler scheme. V equivalence theory of Le Cam (1986) is to approx- imate general statistical models by simple ones. We develop here a global asymptotic equivalence result for nonparametric drift estimation of a discretely observed
Efficient generation of extended plasma waveguides with the axicon ignitor-heater scheme
. The plasma col- umn was produced by using an axicon to focus a long laser pulse into a line focusEfficient generation of extended plasma waveguides with the axicon ignitor-heater scheme Y.-F. Xiao for generating extended plasma waveguides is developed by using the axicon lens in conjunction with the ignitor
CoudiÃ¨re, Yves
An efficient scheme on wet/dry transitions for Shallow Water Equations with friction Christophe discrepancy between both source terms comes from their relevance in dry regions. Indeed, the friction term the friction source terms in the shallow-water model. Such additional source terms are known to be very stiff
Thomas Clerc; Alain Hébert; Hadrien Leroyer; Jean-Philippe Argaud; Bertrand Bouriquet; Agélique Ponçot
2014-05-12T23:59:59.000Z
This paper presents a computational scheme for the determination of equivalent 2D multi-group heterogeneous reflectors in a Pressurized Water Reactor (PWR). The proposed strategy is to define a full-core calculation consistent with a reference lattice code calculation such as the Method Of Characteristics (MOC) as implemented in APOLLO2 lattice code. The computational scheme presented here relies on the data assimilation module known as "Assimilation de donn\\'{e}es et Aide \\`{a} l'Optimisation (ADAO)" of the SALOME platform developed at \\'{E}lectricit\\'{e} De France (EDF), coupled with the full-core code COCAGNE and with the lattice code APOLLO2. A first validation of the computational scheme is made using the OPTEX reflector model developed at \\'{E}cole Polytechnique de Montr\\'{e}al (EPM). As a result, we obtain 2D multi-group, spatially heterogeneous 2D reflectors, using both diffusion or $\\text{SP}_{\\text{N}}$ operators. We observe important improvements of the power discrepancies distribution over the core when using reflectors computed with the proposed computational scheme, and the $\\text{SP}_{\\text{N}}$ operator enables additional improvements.
A Control Strategy Scheme for Fuel Cell-Vehicle Based on Frequency Hamza Alloui
Boyer, Edmond
but there are only 1300 billion barrels of proven reserves of oil. At the current rate of consumption, the world_khoudir@yahoo.fr Mohamed Becherif UTBM, FCLab FR CNRS 3539, Femto-ST UMR CNRS 6174, 90010 Belfort , France mohamed Cedex 03, France Mohamed.Benbouzid@univ-brest.fr Abstract This paper presents a control strategy scheme
The impact of electricity market schemes on predictability being a decision factor in the wind farm
Paris-Sud XI, Université de
The impact of electricity market schemes on predictability being a decision factor in the wind farm used criterion of capacity factor on the investment phase of a wind farm and on spatial planning, it is now recognized that accurate short-term forecasts of wind farms´ power output over the next few hours
The impact of electricity market schemes on predictability being a decision factor in the wind farm
Paris-Sud XI, Université de
The impact of electricity market schemes on predictability being a decision factor in the wind farm of capacity factor on the investment phase of a wind farm and on spatial planning in an electricity market, it is now recognized that accurate short-term forecasts of wind farms´ power output over the next few hours
Cost Model and Adaptive Scheme for Publish/Subscribe Systems on
Cloud ES ES EBS ES/ ED ES/ ED Radio tower Cellular W ireless LA N #12;Adaptive scheme Various types request and reply) cpoll(,T) (cost of periodic publish or polling) cd(,T) (cost of delaying publish) s(n
Chen, Qingyan "Yan"
. "Improvements on FFD modeling by using different numerical schemes," Numerical Heat Transfer, Part B (m) t time step (s) Greek Symbols ratio of mass flow rate to a flow domain over that out of the flow: Fundamentals, 58(1), 1-16. #12;2 Abstract Indoor environm ent design and air m anagement in buildings requires
Some comments on rigorous quantum field path integrals in the analytical regularization scheme
Botelho, Luiz C L
2009-01-01T23:59:59.000Z
Trough the systematic use of the Minlos theorem on thesupport of cylindrical measures on R infinity, we produce several mathematically rigorous path integrals in interacting euclidean quantum fields with Gaussian free measures defined by generalizeds powers ofthe laplacean operator and useful in Loop space approach for Astekar-Sen scheme for quantizing gravity
Strathclyde, University of
Extremely short relativistic-electron-bunch generation in the laser wakefield via novel bunch accelerator (LWFA) a short in- tense laser pulse, with a duration on the order of a plasma wave period July 2004; published 6 December 2004) Recently a new electron-bunch injection scheme for the laser
A power system control scheme based on security visualisation in parameter space
Guo, Yi
nonlinear and complex especially under competitive electricity market situations. A power system can with system contingencies. Electrical Power and Energy Systems 27 (2005) 488495 wwwA power system control scheme based on security visualisation in parameter space Zhao Yang Donga
A Hierarchical Classification Scheme to Derive Interprocess Communication in Process Networks
Kienhuis, Bart
% of the cases, we still relay on integer linear programming while in the remaining 95%, the tests presented, an ILP test has still to be applied. Thus, we introduce a hierarchical classification scheme. In only 5% of the cases to classify, we still relay on integer linear programming while in the remaining
A New Achievability Scheme for the Relay Channel Wei Kang Sennur Ulukus
Ulukus, Sennur
into a codeword conditioned on the codeword of the previ- ous block. The receiver performs joint decoding after and the relay to create any kind of joint distribution for the channel inputs in the next block. The shortcoming scheme is in the form of a block Markov code. The transmitter uses a superpo- sition Markov code
A BOUNDARY LAYER PROBLEM FOR AN ASYMPTOTIC PRESERVING SCHEME IN THE QUASI-NEUTRAL LIMIT FOR
Vignal, Marie-HÃ©lÃ¨ne
, see [31]. The second application is related to electric arc phenomena on satellite solar panels, see as the asymptotic pre- serving scheme developed in [9] are unstable for general Roe type solvers when the mesh does, the quasi-neutral model is not valid in non quasi-neutral zones and, we have to use different models
Load-Balanced Routing Scheme for Energy-Efficient Wireless Sensor Networks
Boutaba, Raouf
Load-Balanced Routing Scheme for Energy-Efficient Wireless Sensor Networks Fatma Bouabdallah, Nizar. In this paper, we investigate the potential energy conservation achieved by balancing the traffic throughout, load balancing, performance analysis. I. INTRODUCTION In order to minimize the energy consumption
Censor, Yair
-Averaging Projections (SAP) or Block Iterative Projection (BIP) methods). In pCT the parallel schemes are preferred on the general principle that many classes of projection methods (such as SAP and BIP) are perturbation resilient results [2,3]. These methods are used for solving a linear system of equations of the form (1) where
A mixed finite-element scheme of a semiconductor energy-transport model
Hanke-Bourgeois, Martin
A mixed finite-element scheme of a semiconductor energy-transport model using dual entropy which are able to deal with physical effects such as carrier heating and velocity overshoot. The energy that the Joule heating term vanishes if the dual entropy variables w1 = (Âµ - V )/T and w2 = -1/T are employed
A wavelet filter enhancement scheme with a fast integral B-wavelet transform and
Nelson, James
A wavelet filter enhancement scheme with a fast integral B-wavelet transform and pyramidal multi-B-wavelet OAL Abstract A construction paradigm is proposed to refine a class of wavelet bases such that the filter characteristics are enhanced. In particular, it is shown that the entire Mth order B-wavelet
WAVELET SAMPLING AND LOCALIZATION SCHEMES FOR THE RADON TRANSFORM IN TWO DIMENSIONS
Virginia Tech
WAVELET SAMPLING AND LOCALIZATION SCHEMES FOR THE RADON TRANSFORM IN TWO DIMENSIONS SHIYING ZHAO. 57, No. 6, pp. 17491762, December 1997 013 Abstract. Two theorems are presented for wavelet-norm between the Radon transform and its wavelet approximation whose coefficients at different scales
Acceptance test procedure for removal of CS1K circuit switcher block and trip schemes
HACHE, J.M.
1999-08-25T23:59:59.000Z
This supporting document provides a detailed process to test the functions of the circuit switcher, protective relays, alarms, SCADA and 125VDC control logic of 115kV and 13.8kV systems at B3S4 substation following the removal of trip and blocking schemes to Transformer No.1 Circuit Switcher B594.
Power-Efficient State Exchange Scheme for Low-Latency SMU Design of Viterbi Decoder
Hung, Shih-Hao
Power-Efficient State Exchange Scheme for Low-Latency SMU Design of Viterbi Decoder Chun-Yuan Chu and decoding latency. In this paper, we propose a new Survivor Memory Unit (SMU) algorithm, named State). Based on this enhancement, we propose two types of SE-SMU. Proposed type-I SE-SMU has lower register
University of Newcastle upon Tyne Threat Analysis of Cryptographic Election Schemes
Newcastle upon Tyne, University of
University of Newcastle upon Tyne COMPUTING SCIENCE Threat Analysis of Cryptographic Election IVERSITY OF #12;TECHNICAL REPORT SERIES No. CS-TR-971 June, 2006 Threat Analysis of Cryptographic Election Schemes P. Y. A. Ryan and T. Peacock. Abstract We discuss some vulnerabilities, threats and counter
Approximate Waveforms for Extreme-Mass-Ratio Inspirals: The Chimera Scheme
Carlos F. Sopuerta; Nicolas Yunes
2012-01-27T23:59:59.000Z
We describe a new kludge scheme to model the dynamics of generic extreme-mass-ratio inspirals (EMRIs; stellar compact objects spiraling into a spinning supermassive black hole) and their gravitational-wave emission. The Chimera scheme is a hybrid method that combines tools from different approximation techniques in General Relativity: (i) A multipolar, post-Minkowskian expansion for the far-zone metric perturbation (the gravitational waveforms) and for the local prescription of the self-force; (ii) a post-Newtonian expansion for the computation of the multipole moments in terms of the trajectories; and (iii) a BH perturbation theory expansion when treating the trajectories as a sequence of self-adjusting Kerr geodesics. The EMRI trajectory is made out of Kerr geodesic fragments joined via the method of osculating elements as dictated by the multipolar post-Minkowskian radiation-reaction prescription. We implemented the proper coordinate mapping between Boyer-Lindquist coordinates, associated with the Kerr geodesics, and harmonic coordinates, associated with the multipolar post-Minkowskian decomposition. The Chimera scheme is thus a combination of approximations that can be used to model generic inspirals of systems with extreme to intermediate mass ratios, and hence, it can provide valuable information for future space-based gravitational-wave observatories, like LISA, and even for advanced ground detectors. The local character in time of our multipolar post-Minkowskian self-force makes this scheme amenable to study the possible appearance of transient resonances in generic inspirals.
A Simple Asymptotically Optimal Joint Energy Allocation and Routing Scheme in Rechargeable
Sinha, Prasun
1 A Simple Asymptotically Optimal Joint Energy Allocation and Routing Scheme in Rechargeable Sensor problem for a sensor network with energy replenishment. Each sensor node consumes energy in its battery be replenished from renewable energy sources, the energy allocation should be carefully designed in order
Pushback: A Hidden Markov Model Based Scheme for Energy Efficient Data Transmission in Sensor
Koksal, Can Emre
1 Pushback: A Hidden Markov Model Based Scheme for Energy Efficient Data Transmission in Sensor and Engineering Department of Electrical and Computer Engineering The Ohio State University The Ohio State University Columbus, Ohio 43210 Columbus, Ohio 43210 {liusha,prasun}@cse.ohio-state.edu {srivastr
A chosen text attack on the RSA cryptosystem and some discrete logarithm schemes
Odlyzko, Andrew M.
A chosen text attack on the RSA cryptosystem and some discrete logarithm schemes Y. Desmedt. Odlyzko AT&T Bell Laboratories Murray Hill, NJ 07974, USA ABSTRACT A new attack on the RSA cryptosystem is presented. This attack assumes less than previous chosen ciphertext attacks, since the cryptanalyst has
THE UV/RADIO CORRELATION OF QUASARS AND ITS IMPLICATIONS FOR UNIFIED SCHEMES.
Falcke, Heino
THE UV/RADIO CORRELATION OF QUASARS AND ITS IMPLICATIONS FOR UNIFIED SCHEMES. HEINO FALCKE of the UV/radio correlations [4] of quasars and the difference between FR I and FR II radio galaxies [3]. 2. The UV/radio correlation for quasars If there is a closely coupled jet/disk system in AGN we would expect
Cotton Production under Traditional and Regulated Deficit Irrigation Schemes in Southwest Texas
Wen, Yujin
2012-10-19T23:59:59.000Z
phenological/physiological responses in Southwest Texas. The results showed that: 1) The threshold deficit ratio for a traditional deficit irrigation scheme falls between 0.7 and 0.8 for cotton production in Southwest Texas under a low energy precision...
An Almost Global Tracking Control Scheme for Maneuverable Autonomous Vehicles and its
Chyba, Monique
. While applications of this control scheme include autonomous aerial and underwater vehicles, we focus on an autonomous underwater vehicle (AUV) application because of its richer, more nonlinearly coupled, dynamics of unmanned vehicles are expanding as these vehicles become more maneuverable with the passage of time. Recent
Chiba, Shigeru
Difference of Degradation Schemes among Operating Systems -- Experimental analysis for web degradation is critical ability of highly avail- able middleware such as a web application server but naive graceful degradation is often unsatisfactory. If a web appli- cation server provides multiple services
On the security of some password-based key agreement schemes
on Jablon's scheme, namely the first password- based key agreement mechanism in ISO/IEC FCD 11770 further show that other password-based key agreement mechanisms, including those in ISO/IEC FCD 11770 a session key, they first compute g = pw2 mod p. Note that in the first mechanism of ISO/IEC FCD 11770-4 [19
AN ADAPTIVE MIXED SCHEME FOR ENERGY-TRANSPORT SIMULATIONS OF FIELD-EFFECT TRANSISTORS
Pietra, Paola
AN ADAPTIVE MIXED SCHEME FOR ENERGY-TRANSPORT SIMULATIONS OF FIELD-EFFECT TRANSISTORS #3; STEFAN HOLST, ANSGAR J UNGEL y AND PAOLA PIETRA z Abstract. Energy-transport models are used in semiconductor and energy of the electrons, coupled to the Poisson equation for the electrostatic potential. The movement
On the Performance of Lossy Compression Schemes for Energy Constrained Sensor Networking
Rossi, Michele
A On the Performance of Lossy Compression Schemes for Energy Constrained Sensor Networking DAVIDE of Padova Lossy temporal compression is key for energy constrained wireless sensor networks (WSN), where complexity and energy consumption. Specifically, we first carry out a performance evaluation of existing
Designing Single-and Multiple-Shell Sampling Schemes for Diffusion MRI Using Spherical Code
Paris-Sud XI, UniversitÃ© de
is the Electrostatic Energy Minimiza- tion (EEM) method introduced in dMRI by Jones et al. However, the electrostatic energy formulation in EEM is not directly related to the goal of optimal sampling- scheme design, i invariance than the generalized EEM (gEEM) method currently used in the Human Connectome Project (HCP). 1
A Low Latency MAC scheme for Event-Driven Wireless Sensor Networks
Paris-Sud XI, Université de
A Low Latency MAC scheme for Event-Driven Wireless Sensor Networks Hung-Cuong LE 1 , Hervé GUYENNET which we call LLMAC (Low Latency MAC) for event-driven wireless sensor networks (WSN). In this kind Introduction Wireless sensor network is a very hot research topic tendency in distributed systems. A WSN
An Energy-Efficient Symmetric Cryptography Based Authentication Scheme for Wireless
Paris-Sud XI, Université de
An Energy-Efficient Symmetric Cryptography Based Authentication Scheme for Wireless Sensor Networks. In Section 3 we evaluate the performance and efficiency of our proposal, both in terms of energy consumption of Engineering & Built Environment Callaghan, The University of Newcastle (AUSTRALIA) Ljiljana
An Optimal Resource Control Scheme under Fidelity and Energy Constraints in Sensor Networks
Zhang, Yanyong
1 An Optimal Resource Control Scheme under Fidelity and Energy Constraints in Sensor Networks control under the fidelity and energy constraints, we present a resource increase and decrease algorithm networks, Resource control, Fidelity, Energy efficiency I. INTRODUCTION As the technologies in MEMS
Eindhoven, Technische Universiteit
. Here u denotes the water saturation. Equation (1.6) follows by combining Darcy's law, the massNumerical schemes for a pseudo-parabolic Burgers equation: discontinuous data and long Burgers'type equation that is extended with a third-order term containing mixed derivatives in space
AIAA-86-1520 An LU Implicit Scheme for High Speed
Jameson, Antony
of the flow- field such as a boundary layer, It also cannot handle the terminal shock and the subsonic dif non- oscillatory shock caoturing technique for hiqh Mach number flows as well as for transonic flows drawback of MacCormack's implicit scheme is the difficulty in treatinq boundary conditions. During the last
CONVERGENCE ANALYSIS OF A QUADRATURE FINITE ELEMENT GALERKIN SCHEME FOR A BIHARMONIC PROBLEM
Aitbayev, Rakhim
of the quadrature problem with an orthogonal spline collocation problem. Key words: biharmonic problem, finite elements, Galerkin method, Gaussian quadrature, orthogonal spline collocation AMS subject classificationCONVERGENCE ANALYSIS OF A QUADRATURE FINITE ELEMENT GALERKIN SCHEME FOR A BIHARMONIC PROBLEM RAKHIM
A Communication-Based Appliance Scheduling Scheme for Consumer-Premise Energy Management Systems
Snyder, Larry
of electricity prices and distributed wind power uncertainty. We model the evolution of the protocol as a two is an energy management controller that incorporates prices and user preferences to providA Communication-Based Appliance Scheduling Scheme for Consumer-Premise Energy Management Systems
Bürger, Raimund
: August 25, 2011. AUniversidad Nacional de Colombia, Department of Mathematics and Statistics, Manizales as entropy solutions. It is well known that certain monotone finite difference schemes converge, Colombia. E-Mail: cdacostam@unal.edu.co. BCI2MA and Departamento de Ingenier´ia Matem´atica, Facultad de
Bürger, Raimund
: October 18, 2011. AUniversidad Nacional de Colombia, Department of Mathematics and Statistics, Manizales as entropy solutions. It is well known that certain monotone finite difference schemes converge, Colombia. E-Mail: cdacostam@unal.edu.co. BCI2MA and Departamento de Ingenier´ia Matem´atica, Facultad de
A Model-Based Impedance Control Scheme for High-Performance Hydraulic Joints
Papadopoulos, Evangelos
A Model-Based Impedance Control Scheme for High-Performance Hydraulic Joints Glen Bilodeau1, Greece Abstract Impedance control of a hydraulic servoactuator joint system is discussed in this paper individually. Due to nonlinear properties of hydraulic actuators, impedance control is difficult. The control
A wetting and drying scheme for POM Lie-Yauw Oey *
.e. hydraulic jumps and/or bores) can develop. A WAD scheme is proposed and applied to the Princeton Ocean Model that contain hydraulic jumps, including a laboratory dam-break problem. Ó 2004 Published by Elsevier Ltd et al., 2003; Oey et al., 2003; Wang et al., 2003; Fan et al., 2004; Oey and Zhang, in press; Oey et
A FIRST ORDER PROJECTION-BASED TIME-SPLITTING SCHEME FOR COMPUTING CHEMICALLY REACTING FLOWS
A FIRST ORDER PROJECTION-BASED TIME-SPLITTING SCHEME FOR COMPUTING CHEMICALLY REACTING FLOWS, surface catalytic reactors for methane to methanol conversion and chemical vapor deposition (CVD) process ANDREAS PROHL1 Abstract. The simulation of chemically reacting ows in speci#12;c situations is a basic
A FIRST ORDER PROJECTIONBASED TIMESPLITTING SCHEME FOR COMPUTING CHEMICALLY REACTING FLOWS
A FIRST ORDER PROJECTIONBASED TIMESPLITTING SCHEME FOR COMPUTING CHEMICALLY REACTING FLOWS catalytic reactors for methane to methanol conversion and chemical vapor deposition (CVD) process modeling ANDREAS PROHL 1 Abstract. The simulation of chemically reacting flows in specific situations is a basic
Hybrid PID-fuzzy control scheme for managing energy resources in buildings
Paris-Sud XI, Université de
Hybrid PID-fuzzy control scheme for managing energy resources in buildings Benjamin Paris, Julien. Keywords: energy performance of buildings, multi-energy buildings, thermal comfort, hybrid PID: both indoor temperature regulation and energy resources management in buildings require the design
A ROBUST WELL-BALANCED SCHEME FOR MULTI-LAYER SHALLOW WATER EQUATIONS
the overall property of being conservative in the total momentum. It is based on a source-centered hydro of the layers with respect to horizontal scales, small viscosity, hydrostatics, small slope for the topography-centered hydro- static reconstruction scheme for the one-layer system, a variant of the hydrostatic
Hybrid intelligent control scheme for air heating system using fuzzy logic and genetic algorithm
Thyagarajan, T.; Shanmugam, J.; Ponnavaikko, M.; Panda, R.C.
2000-01-01T23:59:59.000Z
Fuzzy logic provides a means for converting a linguistic control strategy, based on expert knowledge, into an automatic control strategy. Its performance depends on membership function and rule sets. In the traditional Fuzzy Logic Control (FLC) approach, the optimal membership is formed by trial-and-error method. In this paper, Genetic Algorithm (GA) is applied to generate the optimal membership function of FLC. The membership function thus obtained is utilized in the design of the Hybrid Intelligent Control (HIC) scheme. The investigation is carried out for an Air Heat System (AHS), an important component of drying process. The knowledge of the optimum PID controller designed, is used to develop the traditional FLC scheme. The computational difficulties in finding optimal membership function of traditional FLC is alleviated using GA In the design of HIC scheme. The qualitative performance indices are evaluated for the three control strategies, namely, PID, FLC and HIC. The comparison reveals that the HIC scheme designed based on the hybridization of FLC with GA performs better. Moreover, GA is found to be an effective tool for designing the FLC, eliminating the human interface required to generate the membership functions.
Co-ordination of Renewable Energy Support Schemes in the Stine Grenaa Jensen1
Co-ordination of Renewable Energy Support Schemes in the EU Stine Grenaa Jensen1 and Poul Erik for renewable energy are regionalised. Two theoretical examples are used to explain interactive effects on, e. In a communication from the European Commission on Support for Electricity from Renewable Energy Sources
PMI-based MIMO OFDM PHY Integrated Key Exchange (P-MOPI) Scheme
Lan, Pang-Chang; Lee, Chia-Han; Yeh, Ping-Cheng; Cheng, Chen-Mou
2011-01-01T23:59:59.000Z
In the literature, J.-P. Cheng et al. have proposed the MIMO-OFDM PHY integrated (MOPI) scheme for achieving physical-layer security in practice without using any cryptographic ciphers. The MOPI scheme uses channel sounding and physical-layer network coding (PNC) to prevent eavesdroppers from learning the channel state information (CSI). Nevertheless, due to the use of multiple antennas for PNC at transmitter and beamforming at receiver, it is not possible to have spatial multiplexing nor use space-time codes in our previous MOPI scheme. In this paper, we propose a variant of the MOPI scheme, called P-MOPI, that works with a cryptographic cipher and utilizes precoding matrix index (PMI) as an efficient key-exchange mechanism. With channel sounding, the PMI is only known between the transmitter and the legal receiver. The shared key can then be used, e.g., as the seed to generate pseudo random bit sequences for securing subsequent transmissions using a stream cipher. By applying the same techniques at independ...
PLM: Fast Convergence for Cumulative Layered Multicast Transmission Schemes (extended version)
Legout, Arnaud
PLM: Fast Convergence for Cumulative Layered Multicast Transmission Schemes (extended version) A the properties of a new multicast congestion control protocol (called PLM) for audio/video and file transfer. We evaluated PLM for a large variety of scenarios and show that it converges fast to the optimal link
Legout, Arnaud
PLM: Fast Convergence for Cumulative Layered Multicast Transmission Schemes (extended version the properties of a new multicast congestion control protocol (called PLM) for audio/video and file transfer. We evaluated PLM for a large variety of scenarios and show that it converges fast to the optimal link
SYNTAX-DIRECTED TRANSLATION SCHEMES FOR MULTI -AGENT SYSTEMS CONVERSATION MODELLING
Fred, Ana
SYNTAX-DIRECTED TRANSLATION SCHEMES FOR MULTI - AGENT SYSTEMS CONVERSATION MODELLING Ana Fred-intensive business processes based on formal conversations, i.e. partially ordered sets of communicative acts representation of agent conversations. In this paper we present a formal method for conversation representation
An Energy-Efficient Broadcasting Scheme for Unsynchronized Wireless Sensor MAC Protocols
Braun, Torsten
An Energy-Efficient Broadcasting Scheme for Unsynchronized Wireless Sensor MAC Protocols Philipp, Switzerland Abstract--In the past couple of years, many Energy-Efficient Medium Access Control (E2 -MAC of energy-efficiency in case of unicast point-to-point transmissions, they yet lack an efficient solution
Self-Encryption Scheme for Data Security in Mobile Devices Yu Chen* and
Chen, Yu
battery drain. This paper proposes a novel data encryption and storage scheme to address this challenge space, and battery lifetime, a light-weight rather than computing intensive and complex encryption information on them, such as bank account information, corporate data, passwords, and more [28
Siddharthan, Advaith
Notice to opt out of pension saving University of Aberdeen Superannuation & Life Assurance Scheme (UASLAS) Notice to opt out of pension saving This form is the notice for withdrawal from UASLAS whilst remaining in pensionable employment at University of Aberdeen. If you want to opt out of pension saving
Numerical modelling of avalanches based on Saint-Venant equations using a kinetic scheme
Paris-Sud XI, Université de
avalanches are treated here as a dry granular flow with Coulomb-type behavior. The numerical finite volume of an avalanche over simplified topography. Coulomb-type behavior with constant and variable friction angle modelling, Coulomb friction, Saint-Venant equations, finite volume kinetic scheme. 1 Introduction Granular
Overland flow modelling with the Shallow Water Equation using a well balanced numerical scheme
Paris-Sud XI, UniversitÃ© de
or kinematic waves equations, and using either finite volume or finite difference method. We compare these four show that, for relatively simple configurations, kinematic waves equations solved with finite volume; finite differ- ences scheme; kinematic wave equations; shallow water equations; comparison of numerical
Adaptive Bolus Chasing Computed Tomography Angiography: Control Scheme and Experimental Results
Wang, Ge
Adaptive Bolus Chasing Computed Tomography Angiography: Control Scheme and Experimental Results to synchronize the bolus peak in a patient's vascular system and the imaging aperture of a computed tomography standard. Keywords Adaptive bolus chasing; Computed Tomography Angiography I. Introduction With the advent
Field-reversed configuration formation scheme utilizing a spheromak and solenoid induction
Ji, Hantao
Field-reversed configuration formation scheme utilizing a spheromak and solenoid induction S. P FRC formation technique is described, where a spheromak transitions to a FRC with inductive current are suppressed; spheromaks with a lighter majority species, such as neon and helium, either display a terminal
Influence of hole shape on the performance of a turbine vane endwall film-cooling scheme
Thole, Karen A.
Rising combustor exit temperatures in gas turbine engines necessitate active cooling for the downstream industrial gas turbine engines. One means of achieving this goal is to increase the combustion temper- ature are so high in today's gas turbine engines that in the absence of complex cooling schemes the turbine
DOWNSTREAM VDSL CHANNEL TRACKING USING LIMITED FEEDBACK FOR CROSSTALK PRECOMPENSATED SCHEMES
van der Veen, Alle-Jan
DOWNSTREAM VDSL CHANNEL TRACKING USING LIMITED FEEDBACK FOR CROSSTALK PRECOMPENSATED SCHEMES J, crosstalk becomes the main impairment in VDSL systems. For downstream communication, crosstalk precompensa or downstream bit rate needs to be used to help the estimation. In this paper, we design a new algorithm to try
Rahnavard, Nazanin
Sensor Networks Nazanin Rahnavard School of Electrical and Computer Engineering Georgia Institute in reliability and energy efficiency of the broadcasting scheme for multi-hop wireless sensor networks. Our two, theory. design Keywords Wireless sensor networks, broadcasting, reliability, energy efficiency, rateless
Study of a numerical scheme for miscible two-phase flow in porous media
Boyer, Edmond
holds for CO2 storage, gas pro- duction, and other situations. For x and t [0, T], we consider Schleper November 21, 2013 Abstract We study the convergence of a finite volume scheme for a model of miscible two-phase flow in porous media. In this model, one phase can dissolve into the other one
Suciu, Nicolae
A mixed finite element discretization scheme for a concrete carbonation model with concentration/unsaturated porous media. The special features of our problem are twofold: the reaction produces water and therefore for the case of concrete carbonation Â one of the most important physico-chemical processes affecting
Wide input range DC-DC converter with digital control scheme
Harfman Todorovic, Maja
2006-04-12T23:59:59.000Z
In this thesis analysis and design of a wide input range DC-DC converter is proposed along with a robust power control scheme. The proposed converter and its control is designed to be compatible to a fuel cell power source, which exhibits 2...
Investigation of PET/MRI Image Fusion Schemes for Enhanced Breast Cancer Diagnosis
with anatomical images is well appreciated in the advent of PET/CT. There is an increasing interest in expanding. Initial experience with combined PET (functional imaging) and x-ray computed tomography (CT, anatomicalInvestigation of PET/MRI Image Fusion Schemes for Enhanced Breast Cancer Diagnosis Karl G. Baum
Capacity Optimizing Power Loading Scheme for Spatially Constrained Antenna Arrays: Channels
Abhayapala, Thushara D.
Capacity Optimizing Power Loading Scheme for Spatially Constrained Antenna Arrays: Channels and Computer Science The Australian National University Canberra ACT 0200, Australia {tharaka.lamahewa,thushara.abhayapala}@anu.edu.au Tony S. Pollock National ICT Australia Locked Bag 8001, Canberra ACT 2601, Australia tony
Robust Smart Card based Password Authentication Scheme against Smart Card Security Breach
Robust Smart Card based Password Authentication Scheme against Smart Card Security Breach Ding Wang University, Beijing 100871, China 3 Automobile Management Institute of PLA, Bengbu City 233011, China wangdingg@mail.nankai.edu.cn Abstract. As the most prevailing two-factor authentication mechanism, smart
EAGR: Energy Aware Greedy Routing Scheme for Wireless Ad hoc Networks Sachin Sharma
Dharmaraja, S.
EAGR: Energy Aware Greedy Routing Scheme for Wireless Ad hoc Networks Sachin Sharma Tejas Networks Delhi, New Delhi, India (email: dharmar@maths.iitd.ac.in) Abstract This paper presents Energy Aware distributed nodes that communicate over a wireless link. In this paper we present a scalable, Energy Aware
Secret sharing schemes on access structures with intersection number equal to one
Secret sharing schemes on access structures with intersection number equal to one Jaume Mart important problems in secret sharing. These problems are studied in this paper for access structures on the optimal information rate are provided for the non-ideal case. Keywords. Cryptography; secret sharing
A comparison of third and second order accurate finite volume schemes for the
Noelle, Sebastian
dimensional diagonalization of the system. Conservative variables (ae; m; n; e) (density, momentum and total energy) have: limiting the spatial reconstruction in these variables guarantees a nonnegative internal energy applications the third order scheme is less efficient than the second order one. AMS Classification Code: 65
Mellor-Crummey, John
Parallel Interleaver Architecture with New Scheduling Scheme for High Throughput Configurable Turbo}@rice.edu, yuanbinguo@huawei.com Abstract--Parallel architecture is required for high throughput turbo decoder to meet also shows great flexibility and scalability compared to prior work. Index Terms--VLSI, turbo decoder
PARALLEL SOLUTION-ADAPTIVE SCHEME FOR MULTI-PHASE CORE FLOWS IN ROCKET MOTORS
Groth, Clinton P. T.
PARALLEL SOLUTION-ADAPTIVE SCHEME FOR MULTI-PHASE CORE FLOWS IN ROCKET MOTORS J. S. Sachdev , C. P motors (SRM). An Eulerian formulation is used for both the gas and particle phases, which leads THE internal flow dynamics of a solid propellant rocket motor (SRM) is very complex. The com- bustion
Developing an Efficient Surveillance Scheme for Assessing Compliance with Air Quality Standards
Washington at Seattle, University of
of a component of a major pollution sources, like a power plant or oil re neries; or an increase in the level compliance with air quality standards. Since many countries maintain online surveillance of air pollution. This work proposes a three-step procedure for implementing the SR scheme to air pollution data. The rst step
A Multi-solver Scheme for Viscous Flows Using Adaptive Cartesian Grids and Meshless Grid
Jameson, Antony
A Multi-solver Scheme for Viscous Flows Using Adaptive Cartesian Grids and Meshless Grid of an adaptive multi-solver approach for CFD sim- ulation of viscous flows. Curvilinear grids are used near solid bodies to capture boundary layers, and stuctured adaptive Cartesian grids are used away from the body
Evaluation of three spatial discretization schemes with the Galewsky et al. test
Reich, Sebastian
Particle Methods (HPM) and the Nambu discretiza- tion applied to shallow-water equations on the sphere with the two conservative spatial discretization schemes. The HPM sim- ulation captures the main features-reversibility survives. The Hamiltonian particle- mesh (HPM) method has been proposed by Frank et al. (2002) for shallow
A Distributed Scheme for Efficient Pair-wise Comparison of Complete Genomes
Bansal, Arvind K.
#12;48 A Distributed Scheme for Efficient Pair-wise Comparison of Complete Genomes Valerian S}@mcs.kent.edu 1 Corresponding author Abstract The comparisons of newly sequenced genomes against a genome and a CORBA-based implementation to compare and align gene sequences in large complete genomes, using multiple
Side-Channel Resistance Evaluation of a Neural Network Based Lightweight Cryptography Scheme
Side-Channel Resistance Evaluation of a Neural Network Based Lightweight Cryptography Scheme Marc Email: koch@esa.cs.tu-darmstadt.de Abstract-- Side-channel attacks have changed the design of secure such as, e.g., AES, show the need to consider these aspects to build more resistant cryptographic systems
Lessons learnt from post EIS evaluations of national road schemes in Ireland
King, E.A., E-mail: kingea@tcd.ie [Department of Mechanical and Manufacturing Engineering, Parson's, Building, Trinity College, Dublin (Ireland); O'Malley, V.P. [National Roads Authority, St Martin's House, Waterloo Road, Dublin 4 (Ireland)
2012-01-15T23:59:59.000Z
The Irish National Roads Authority (NRA) recently completed over twenty post environmental impact assessment evaluations of noise chapters prepared as part of Environmental Impact Statements (EISs) for new national road schemes in Ireland. The study focused on a range of issues including a review of noise monitoring procedures, noise prediction methodologies and an assessment of the effectiveness of noise mitigation measures currently in use on national road schemes. This review was carried out taking cognisance of best international practices for noise assessment and methodologies used to mitigate road traffic noise. The primary focus of the study was to assess the actual noise impacts of national road scheme developments and to revise, where necessary, methodologies recommended in the current NRA guidance document describing the treatment of noise on national road schemes. This paper presents a summary of the study and identifies a number of key areas that should be considered prior to the development of future guidance documents. - Highlights: Black-Right-Pointing-Pointer Presents a post-EIS evaluation of noise assessments for national roads in Ireland. Black-Right-Pointing-Pointer The effectiveness of some noise mitigation measures is critically evaluated. Black-Right-Pointing-Pointer Issues related to the current EIS noise assessment methodologies are discussed. Black-Right-Pointing-Pointer Implications for alterations to the NRA noise guidelines.
Kheifets, Anatoli
PAGE 5 OF 9GROUP OF EIGHT AUSTRALIAÂGERMANY JOINT RESEARCH COOPERATION SCHEME Â© GROUP OF EIGHT) 6,110 Euro (year 2013) #12;PAGE 6 OF 9GROUP OF EIGHT AUSTRALIAÂGERMANY JOINT RESEARCH COOPERATION SCHEME Â© GROUP OF EIGHT FUNDING REQUESTED (BUDGET SUMMARY) Year: 2012 Airfares (economy class) AUD Per
Gesbert, David
DEGREES OF FREEDOM IN THE MISO BC WITH DELAYED-CSIT AND FINITE COHERENCE TIME: A SIMPLE OPTIMAL the multi-input single-output (MISO) Broadcast Channel (BC), the multi-user (MU) downlink in a cell scheme was proposed in [9] for the time cor- related MISO broadcast channel with 2 users. This scheme
An Optimal (d -1)-Fault-Tolerant All-to-All Broadcasting Scheme for d-Dimensional Hypercubes
Fu, Ada Waichee
An Optimal (d - 1)-Fault-Tolerant All-to-All Broadcasting Scheme for d-Dimensional Hypercubes Siu, Shatin, Hong Kong e-mail: adafucse.cuhk.edu.hk Abstract All-to-all broadcasting (Gossiping a message to transmit to all other members of the network. We proposed a k-fault- tolerant scheme
Xu, Kun
-kinetic scheme is constructed. Different from the previous high-order finite volume gas-kinetic method [Li, Xu) Preprint submitted to Elsevier April 17, 2013 #12;covers the gas evolution process from the particle free a new finite volume gas-kinetic scheme has been developed [27], which significantly reduces
Modeling of an eye-imaging system for optimizing illumination schemes in an eye-tracked head-mounted
Hua, Hong
Modeling of an eye-imaging system for optimizing illumination schemes in an eye-tracked head While the augmentation of head-mounted displays (HMDs) with eye-tracking (ET) capabilities adds of illumination schemes in an ET-HMD system, we present a simulated eye illumination and imaging system, which
Boyer, Edmond
Fourier-based schemes with modified Green operator for computing the electrical response of Fourier-based numerical schemes commonly used for computing the electrical or thermal response the discretization of Green's function, which is consistent with the pixel grid while retaining the local nature
Dimarogonas, Dimos
extensively used in the past for the autonomous operation of underwater robotic vehicles. Complex missions Robotic Vehicles Shahab Heshmati-Alamdari, Alina Eqtami, George C. Karras, Dimos V. Dimarogonas and Kostas Control (NMPC) scheme for an under- actuated underwater robotic vehicle. In this scheme, the control loop
Zukerman, Moshe
Neuron PID: A Robust AQM Scheme Jinsheng Sun, Sammy Chan, King-Tim Ko, Guanrong Chen and Moshe active queue management (AQM) scheme based on a Proportional-Integral- Derivative (PID) controller, called Neuron PID, that uses an adaptive neuron to tune its parameters. We demonstrate by simulations
Lee, Thomas H.
call the offset code spreading scheme. By employing the scheme, we can implement a direct- conversion- level design. The direct conversion receiver architecture combined with D-BPSK (differential, there are some design problems. In a direct conversion receiver, DC offset due to carrier leakage and 1/f mixer
Bielefeld, University of
Fully Dynamic Secret Sharing Schemes \\Lambda Carlo Blundo, 1 Antonella Cresti, 2 Alfredo De Santis'', 00198 Roma, Italy Abstract We consider secret sharing schemes in which the dealer is able (after the participants to reconstruct different secrets (in different time instants) by sending them the same broadcast
Applications - Science and Engineering. Basic Sciences Applications; Biomedical Applications; Chemical Engineering; Civil and Environmental Engineering ...
Approximate Waveforms for Extreme-Mass-Ratio Inspirals: The Chimera Scheme
Sopuerta, Carlos F
2012-01-01T23:59:59.000Z
We describe a new kludge scheme to model the dynamics of generic extreme-mass-ratio inspirals (EMRIs; stellar compact objects spiraling into a spinning supermassive black hole) and their gravitational-wave emission. The Chimera scheme is a hybrid method that combines tools from different approximation techniques in General Relativity: (i) A multipolar, post-Minkowskian expansion for the far-zone metric perturbation (the gravitational waveforms) and for the local prescription of the self-force; (ii) a post-Newtonian expansion for the computation of the multipole moments in terms of the trajectories; and (iii) a BH perturbation theory expansion when treating the trajectories as a sequence of self-adjusting Kerr geodesics. The EMRI trajectory is made out of Kerr geodesic fragments joined via the method of osculating elements as dictated by the multipolar post-Minkowskian radiation-reaction prescription. We implemented the proper coordinate mapping between Boyer-Lindquist coordinates, associated with the Kerr geo...
The Chimera Scheme: Approximate Waveforms for Extreme-Mass-Ratio Inspirals
Sopuerta, Carlos F
2011-01-01T23:59:59.000Z
We introduce the Chimera scheme, a new framework to model the dynamics of generic extreme mass-ratio inspirals (stellar compact objects spiraling into a spinning super-massive black hole) and to produce the gravitational waveforms that describe the gravitational wave emission of these systems. The Chimera scheme combines techniques from black hole perturbation theory and post-Minkowskian theory. The orbital evolution is approximated as a sequence of osculating geodesics that shrink due to the stellar compact object's self-acceleration. Lacking a general prescription for this self-force, we here approximate it locally in time via a post-Minkowskian expansion. The orbital evolution is thus equivalent to evolving the geodesic equations with time-dependent orbital elements, as dictated by this post-Minkowskian radiation-reaction prescription. Gravitational radiation is modeled via a multipolar expansion in post-Minkowskian theory, here taken up to mass hexadecapole and current octopole order. To complete the sche...
Discovery of 10 micron silicate emission in quasars. Evidence of the AGN unification scheme
R. Siebenmorgen; M. Haas; E. Kr"ugel; B. Schulz
2005-04-12T23:59:59.000Z
According to the unified scheme, AGN are surrounded by a dust-torus, and the observed diversity of AGN properties results from the different orientations relative to our line of sight. The strong resonance of silicate dust at 10 micron is therefore, as expected, seen in absorption towards many type-2 AGN. In type-1 AGN, it should be seen in emission because the hot inner surface of the dust torus becomes visible. However, this has not been observed so far, thus challenging the unification scheme or leading to exotic modifications of the dust-torus model. Here we report the discovery of the 10 micron silicate feature in emission in two luminous quasars with the Infrared Spectrograph of the Spitzer Space Telescope.
An improved approximation scheme for the centrifugal term and the Hulthen potential
Sameer M. Ikhdair
2009-01-07T23:59:59.000Z
We present a new approximation scheme for the centrifugal term to solve the Schrodinger equation with the Hulthen potential for any arbitrary l state by means of a mathematical Nikiforov-Uvarov (NU) method. We obtain the bound state energy eigenvalues and the normalized corresponding eigenfunctions expressed in terms of the Jacobi polynomials or hypergeometric functions for a particle exposed to this potential field. Our numerical results of the energy eigenvalues are found to be in high agreement with those results obtained by using the program based on a numerical integration procedure. The s-wave (l=0) analytic solution for the binding energies and eigenfunctions of a particle are also calculated. The physical meaning of the approximate analytical solution is discussed. The present approximation scheme is systematic and accurate.
Multiplexing scheme for simplified entanglement-based large-alphabet quantum key distribution
Dada, Adetunmise C
2015-01-01T23:59:59.000Z
We propose a practical quantum cryptographic scheme which combines high information capacity, such as provided by high-dimensional quantum entanglement, with the simplicity of a two-dimensional Clauser-Horne-Shimony-Holt (CHSH) Bell test for security verification. By applying a state combining entanglement in a two-dimensional degree of freedom, such as photon polarization, with high-dimensional correlations in another degree of freedom, such as photon orbital angular momentum (OAM) or path, the scheme provides a considerably simplified route towards security verification in quantum key distribution (QKD) aimed at exploiting high-dimensional quantum systems for increased secure key rates. It also benefits from security against collective attacks and is feasible using currently available technologies.
A new scheme for the running coupling constant in gauge theories using Wilson loops
Erek Bilgici; Antonino Flachi; Etsuko Itou; Masafumi Kurachi; C. -J David Lin; Hideo Matsufuru; Hiroshi Ohki; Tetsuya Onogi; Takeshi Yamazaki
2010-01-21T23:59:59.000Z
We propose a new renormalization scheme of the running coupling constant in general gauge theories using the Wilson loops. The renormalized coupling constant is obtained from the Creutz ratio in lattice simulations and the corresponding perturbative coefficient at the leading order. The latter can be calculated by adopting the zeta-function resummation techniques. We perform a benchmark test of our scheme in quenched QCD with the plaquette gauge action. The running of the coupling constant is determined by applying the step-scaling procedure. Using several methods to improve the statistical accuracy, we show that the running coupling constant can be determined in a wide range of energy scales with relatively small number of gauge configurations.
Schaal, Kevin; Chandrashekar, Praveen; Pakmor, Rüdiger; Klingenberg, Christian; Springel, Volker
2015-01-01T23:59:59.000Z
Solving the Euler equations of ideal hydrodynamics as accurately and efficiently as possible is a key requirement in many astrophysical simulations. It is therefore important to continuously advance the numerical methods implemented in current astrophysical codes, especially also in light of evolving computer technology, which favours certain computational approaches over others. Here we introduce the new adaptive mesh refinement (AMR) code TENET, which employs a high-order Discontinuous Galerkin (DG) scheme for hydrodynamics. The Euler equations in this method are solved in a weak formulation with a polynomial basis by means of explicit Runge-Kutta time integration and Gauss-Legendre quadrature. This approach offers significant advantages over commonly employed finite volume (FV) solvers. In particular, the higher order capability renders it computationally more efficient, in the sense that the same precision can be obtained at significantly less computational cost. Also, the DG scheme inherently conserves a...
Performance study of optimistic concurrency control schemes for distributed database systems
Kim Lee, Hyunsoon
1993-01-01T23:59:59.000Z
(Chair of Committee) yh-Cham S. Liu (Member) Michael T. Longn ker (Member) Richard A. Volz (Head of Department) May 1993 ABSTRACT Performance Study of Optimistic Concurrency Control Schemes for Distributed Database Systems. (May 1993) Hyunsoon..., To my daughter, Jihyun ACKNOWLEDGMENTS Special thanks to Dr. Junguk L. Kim, whose guidance and patience made this thesis possible. I would like to thank Drs. J. C. Liu and M. T. Longnecker for their time and useful comments in reviewing this document...
Cirrus clouds in a global climate model with a statistical cirrus cloud scheme
Wang, Minghuai; Penner, Joyce E.
2010-06-21T23:59:59.000Z
A statistical cirrus cloud scheme that accounts for mesoscale temperature perturbations is implemented in a coupled aerosol and atmospheric circulation model to better represent both subgrid-scale supersaturation and cloud formation. This new scheme treats the effects of aerosol on cloud formation and ice freezing in an improved manner, and both homogeneous freezing and heterogeneous freezing are included. The scheme is able to better simulate the observed probability distribution of relative humidity compared to the scheme that was implemented in an older version of the model. Heterogeneous ice nuclei (IN) are shown to decrease the frequency of occurrence of supersaturation, and improve the comparison with observations at 192 hPa. Homogeneous freezing alone can not reproduce observed ice crystal number concentrations at low temperatures (<205 K), but the addition of heterogeneous IN improves the comparison somewhat. Increases in heterogeneous IN affect both high level cirrus clouds and low level liquid clouds. Increases in cirrus clouds lead to a more cloudy and moist lower troposphere with less precipitation, effects which we associate with the decreased convective activity. The change in the net cloud forcing is not very sensitive to the change in ice crystal concentrations, but the change in the net radiative flux at the top of the atmosphere is still large because of changes in water vapor. Changes in the magnitude of the assumed mesoscale temperature perturbations by 25% alter the ice crystal number concentrations and the net radiative fluxes by an amount that is comparable to that from a factor of 10 change in the heterogeneous IN number concentrations. Further improvements on the representation of mesoscale temperature perturbations, heterogeneous IN and the competition between homogeneous freezing and heterogeneous freezing are needed.
Control scheme for power modulation of a free piston Stirling engine
Dhar, Manmohan (Schenectady, NY)
1989-01-01T23:59:59.000Z
The present invention relates to a control scheme for power modulation of a free-piston Stirling engine-linear alternator power generator system. The present invention includes connecting an autotransformer in series with a tuning capacitance between a linear alternator and a utility grid to maintain a constant displacement to piston stroke ratio and their relative phase angle over a wide range of operating conditions.
Ilpo Vattulainen; Mikko Karttunen; Gerhard Besold; J. M. Polson
2002-11-15T23:59:59.000Z
We examine the performance of various commonly used integration schemes in dissipative particle dynamics simulations. We consider this issue using three different model systems, which characterize a variety of different conditions often studied in simulations. Specifically we clarify the performance of integration schemes in hybrid models, which combine microscopic and meso-scale descriptions of different particles using both soft and hard interactions. We find that in all three model systems many commonly used integrators may give rise to surprisingly pronounced artifacts in physical observables such as the radial distribution function, the compressibility, and the tracer diffusion coefficient. The artifacts are found to be strongest in systems, where interparticle interactions are soft and predominated by random and dissipative forces, while in systems governed by conservative interactions the artifacts are weaker. Our results suggest that the quality of any integration scheme employed is crucial in all cases where the role of random and dissipative forces is important, including hybrid models where the solvent is described in terms of soft potentials.
Liu Yueqiang [Euratom/UKAEA Fusion Association, Culham Science Centre, Abingdon OX14 3DB (United Kingdom); Albanese, R.; Rubinacci, G. [ENEA/CREATE, Universita Federico II di Napoli, Via Claudio 21, Napoli (Italy); Portone, A. [EFDA-CSU Barcelona, C/Josep Pla 2, B3, 08019 Barcelona (Spain); Villone, F. [ENEA/CREATE, DAEIMI, Universita di Cassino, Via di Biasio 43, Cassino (Italy)
2008-07-15T23:59:59.000Z
In order to model a magnetohydrodynamic (MHD) instability that strongly couples to external conducting structures (walls and/or coils) in a fusion device, it is often necessary to combine a MHD code solving for the plasma response, with an eddy current code computing the fields and currents of conductors. We present a rigorous proof of the coupling schemes between these two types of codes. One of the coupling schemes has been introduced and implemented in the CARMA code [R. Albanese, Y. Q. Liu, A. Portone, G. Rubinacci, and F. Villone, IEEE Trans. Magn. 44, 1654 (2008); A. Portone, F. Villone, Y. Q. Liu, R. Albanese, and G. Rubinacci, Plasma Phys. Controlled Fusion 50, 085004 (2008)] that couples the MHD code MARS-F[Y. Q. Liu, A. Bondeson, C. M. Fransson, B. Lennartson, and C. Breitholtz, Phys. Plasmas 7, 3681 (2000)] and the eddy current code CARIDDI[R. Albanese and G. Rubinacci, Adv. Imaging Electron Phys. 102, 1 (1998)]. While the coupling schemes are described for a general toroidal geometry, we give the analytical proof for a cylindrical plasma.
Efficient numerical schemes for viscoplastic avalanches. Part 1: The 1D case
Fernández-Nieto, Enrique D., E-mail: edofer@us.es [Departamento de Matemática Aplicada I, Universidad de Sevilla, E.T.S. Arquitectura, Avda, Reina Mercedes, s/n, 41012 Sevilla (Spain); Gallardo, José M., E-mail: jmgallardo@uma.es [Departamento de Análisis Matemático, Universidad de Málaga, F. Ciencias, Campus Teatinos S/N (Spain); Vigneaux, Paul, E-mail: Paul.Vigneaux@math.cnrs.fr [Unitée de Mathématiques Pures et Appliquées, Ecole Normale Supérieure de Lyon, 46 allée d'Italie, 69364 Lyon Cedex 07 (France)
2014-05-01T23:59:59.000Z
This paper deals with the numerical resolution of a shallow water viscoplastic flow model. Viscoplastic materials are characterized by the existence of a yield stress: below a certain critical threshold in the imposed stress, there is no deformation and the material behaves like a rigid solid, but when that yield value is exceeded, the material flows like a fluid. In the context of avalanches, it means that after going down a slope, the material can stop and its free surface has a non-trivial shape, as opposed to the case of water (Newtonian fluid). The model involves variational inequalities associated with the yield threshold: finite-volume schemes are used together with duality methods (namely Augmented Lagrangian and Bermúdez–Moreno) to discretize the problem. To be able to accurately simulate the stopping behavior of the avalanche, new schemes need to be designed, involving the classical notion of well-balancing. In the present context, it needs to be extended to take into account the viscoplastic nature of the material as well as general bottoms with wet/dry fronts which are encountered in geophysical geometries. We derived such schemes and numerical experiments are presented to show their performances.
The stability of spectroscopic instruments: A unified Allan variance computation scheme
Volker Ossenkopf
2007-12-28T23:59:59.000Z
The Allan variance is a standard technique to characterise the stability of spectroscopic instruments used in astronomical observations. The period for switching between source and reference measurement is often derived from the Allan minimum time. We propose a new approach for the computation of the Allan variance of spectrometer data combining the advantages of the two existing methods into a unified scheme. Using the Allan variance spectrum we derive the optimum strategy for symmetric observing schemes minimising the total uncertainty of the data resulting from radiometric and drift noise. The unified Allan variance computation scheme is designed to trace total-power and spectroscopic fluctuations within the same framework. The method includes an explicit error estimate both for the individual Allan variance spectra and for the derived stability time. A new definition of the instrument stability time allows to characterise the instrument even in the case of a fluctuation spectrum shallower than 1/f, as measured for the total power fluctuations in high-electron-mobility transistors. We find a non-linear impact of the binning of spectrometer channels on the resulting noise and the Allan time deviating from the description in existing theoretical treatments.
Clerc, Thomas; Leroyer, Hadrien; Argaud, Jean-Philippe; Bouriquet, Bertrand; Ponçot, Agélique
2014-01-01T23:59:59.000Z
This paper presents a computational scheme for the determination of equivalent 2D multi-group heterogeneous reflectors in a Pressurized Water Reactor (PWR). The proposed strategy is to define a full-core calculation consistent with a reference lattice code calculation such as the Method Of Characteristics (MOC) as implemented in APOLLO2 lattice code. The computational scheme presented here relies on the data assimilation module known as "Assimilation de donn\\'{e}es et Aide \\`{a} l'Optimisation (ADAO)" of the SALOME platform developed at \\'{E}lectricit\\'{e} De France (EDF), coupled with the full-core code COCAGNE and with the lattice code APOLLO2. A first validation of the computational scheme is made using the OPTEX reflector model developed at \\'{E}cole Polytechnique de Montr\\'{e}al (EPM). As a result, we obtain 2D multi-group, spatially heterogeneous 2D reflectors, using both diffusion or $\\text{SP}_{\\text{N}}$ operators. We observe important improvements of the power discrepancies distribution over the cor...
Yaqi Wang; Jean C. Ragusa
2011-10-01T23:59:59.000Z
Diffusion synthetic acceleration (DSA) schemes compatible with adaptive mesh refinement (AMR) grids are derived for the SN transport equations discretized using high-order discontinuous finite elements. These schemes are directly obtained from the discretized transport equations by assuming a linear dependence in angle of the angular flux along with an exact Fick's law and, therefore, are categorized as partially consistent. These schemes are akin to the symmetric interior penalty technique applied to elliptic problems and are all based on a second-order discontinuous finite element discretization of a diffusion equation (as opposed to a mixed or P1 formulation). Therefore, they only have the scalar flux as unknowns. A Fourier analysis has been carried out to determine the convergence properties of the three proposed DSA schemes for various cell optical thicknesses and aspect ratios. Out of the three DSA schemes derived, the modified interior penalty (MIP) scheme is stable and effective for realistic problems, even with distorted elements, but loses effectiveness for some highly heterogeneous configurations. The MIP scheme is also symmetric positive definite and can be solved efficiently with a preconditioned conjugate gradient method. Its implementation in an AMR SN transport code has been performed for both source iteration and GMRes-based transport solves, with polynomial orders up to 4. Numerical results are provided and show good agreement with the Fourier analysis results. Results on AMR grids demonstrate that the cost of DSA can be kept low on locally refined meshes.
Paris-Sud XI, Université de
in the EU Emissions Trading Scheme Emilie Alberola1 et Julien Chevallier2 Résumé: L'article examine le prix des quotas durant la première période (2005-2007) de l'European Union Emissions Trading Scheme (EU
Jagannatham, Aditya K.
2007-01-01T23:59:59.000Z
thesis to analyze the performance of the proposed esti- mation schemes. Whitening-Rotation Based Semi-Blind
Marcella, Marc Pace
[1] Improvements in modeling mineral aerosols over southwest Asia are made to the dust scheme in a regional climate model by representing subgrid variability of both wind speed and surface roughness length. The new module ...
Ellerman, A. Denny.
This paper provides an initial analysis of the European Union Emissions Trading Scheme (EU ETS) based on the installation-level data for verified emissions and allowance allocations in the first trading year. Those data, ...
Al-Rifai, Jawad H.; Gabelish, Candace L.; Schäfer, Andrea
2007-01-01T23:59:59.000Z
to concentrate many of the compounds was demonstrated and highlights the need for continued research into monitoring wastewater treatment, concentrate disposal, improved water recycling schemes and ultimately, safer water and a cleaner environment....
Irish Astr. J., 27(1), XXXX, (2000) M. D. SMITH EVOLUTIONARY SCHEMES FOR PROTOSTARS, PROTO BROWN DWARFS AND THEIR ENVIRONMENTS M. D. SMITH Armagh Observatory, College Hill, Armagh, N. Ireland, BT61 9DG
Peter P. Rohde
2014-10-02T23:59:59.000Z
Recently, Motes, Gilchrist, Dowling & Rohde [Phys. Rev. Lett. 113, 120501 (2014)] presented a scheme for photonic boson-sampling using a fiber-loop architecture. Here we show that the same architecture can be modified to implement full, universal linear optics quantum computing, in various incarnations. The scheme employs two embedded fiber-loops, a single push-button photon source, three dynamically controlled beamsplitters, and a single time-resolved photo-detector. The architecture has only a single point of interference, and thus may be significantly easier to align than other schemes. The experimental complexity of the scheme is constant, irrespective of the size of the computation, limited only by fiber lengths and their respective loss rates.
Zhanjun Zhang
2004-02-16T23:59:59.000Z
The wrong mutual information, quantum bit error rate and secure transmission efficiency in Wojcik's eavesdropping scheme [PRL90(03)157901]on ping-pong protocol have been pointed out and corrected.
Stojanovic, Milica
ÂTime Cooperative Schemes for Underwater Acoustic Communications Madhavan Vajapeyam, Member, IEEE, Satish Vedantam of multipath, thus addressing a main characteristic of underwater acoustic channels. A time, pollution monitoring, tactical surveillance, and disaster preven- tion [1], [2]. Manuscript received
Hahn, S.J. [Stanford Linear Accelerator Center, Menlo Park, CA (United States); Fawley, W.M. [Lawrence Berkeley Lab., CA (United States)
1995-02-01T23:59:59.000Z
We analyze and present numerical simulations of the so-called electron output scheme [G. I. Erg et al., 15th Int. FEL Conf., The Hague, The Netherlands, 1993, Book of Abstracts p. 50; Preprint Budker INP 93-75] applied to the SELENE proposal of using a high power FEL to illuminate satellite solar cells. In this scheme, a first stage FEL oscillator bunches the electron beam while a second stage ``radiator`` extracts high power radiation. Our analysis suggests only in the case where the radiator employs a long, tapered undulator will the electron output scheme produce a significant increase in extraction efficiency over what is obtainable from a simple, single-stage oscillator. 1- and 2-D numerical simulations of a 1.7{mu}m FEL employing the electron output scheme show reasonably large bunching fractions ({approximately} 0.3--0.4) at the output of the oscillator stage but only {le}2% extraction efficiency from the radiator stage.
Saad, Bilal
2012-01-01T23:59:59.000Z
An industrial scheme, to simulate the two compressible phase flow in porous media, consists in a finite volume method together with a phase-by-phase upstream scheme. The implicit finite volume scheme satisfies industrial constraints of robustness. We show that the proposed scheme satisfy the maximum principle for the saturation, a discrete energy estimate on the pressures and a function of the saturation that denote capillary terms. These stabilities results allow us to derive the convergence of a subsequence to a weak solution of the continuous equations as the size of the discretization tends to zero. The proof is given for the complete system when the density of the each phase depends on the own pressure.
Popov, Pavel P., E-mail: ppopov@uci.edu; Pope, Stephen B.
2014-01-15T23:59:59.000Z
This work addresses the issue of particle mass consistency in Large Eddy Simulation/Probability Density Function (LES/PDF) methods for turbulent reactive flows. Numerical schemes for the implicit and explicit enforcement of particle mass consistency (PMC) are introduced, and their performance is examined in a representative LES/PDF application, namely the Sandia–Sydney Bluff-Body flame HM1. A new combination of interpolation schemes for velocity and scalar fields is found to better satisfy PMC than multilinear and fourth-order Lagrangian interpolation. A second-order accurate time-stepping scheme for stochastic differential equations (SDE) is found to improve PMC relative to Euler time stepping, which is the first time that a second-order scheme is found to be beneficial, when compared to a first-order scheme, in an LES/PDF application. An explicit corrective velocity scheme for PMC enforcement is introduced, and its parameters optimized to enforce a specified PMC criterion with minimal corrective velocity magnitudes.
Cheng, Juan, E-mail: cheng_juan@iapcm.ac.cn [Institute of Applied Physics and Computational Mathematics, Beijing 100094 (China); Shu, Chi-Wang, E-mail: shu@dam.brown.edu [Division of Applied Mathematics, Brown University, Providence, RI 02912 (United States)
2014-09-01T23:59:59.000Z
In applications such as astrophysics and inertial confinement fusion, there are many three-dimensional cylindrical-symmetric multi-material problems which are usually simulated by Lagrangian schemes in the two-dimensional cylindrical coordinates. For this type of simulation, a critical issue for the schemes is to keep spherical symmetry in the cylindrical coordinate system if the original physical problem has this symmetry. In the past decades, several Lagrangian schemes with such symmetry property have been developed, but all of them are only first order accurate. In this paper, we develop a second order cell-centered Lagrangian scheme for solving compressible Euler equations in cylindrical coordinates, based on the control volume discretizations, which is designed to have uniformly second order accuracy and capability to preserve one-dimensional spherical symmetry in a two-dimensional cylindrical geometry when computed on an equal-angle-zoned initial grid. The scheme maintains several good properties such as conservation for mass, momentum and total energy, and the geometric conservation law. Several two-dimensional numerical examples in cylindrical coordinates are presented to demonstrate the good performance of the scheme in terms of accuracy, symmetry, non-oscillation and robustness. The advantage of higher order accuracy is demonstrated in these examples.
Voisin, Nathalie; Pappenberger, Florian; Lettenmaier, D. P.; Buizza, Roberto; Schaake, John
2011-08-15T23:59:59.000Z
A 10-day globally applicable flood prediction scheme was evaluated using the Ohio River basin as a test site for the period 2003-2007. The Variable Infiltration Capacity (VIC) hydrology model was initialized with the European Centre for Medium Range Weather Forecasts (ECMWF) analysis temperatures and wind, and Tropical Rainfall Monitoring Mission Multi Satellite Precipitation Analysis (TMPA) precipitation up to the day of forecast. In forecast mode, the VIC model was then forced with a calibrated and statistically downscaled ECMWF ensemble prediction system (EPS) 10-day ensemble forecast. A parallel set up was used where ECMWF EPS forecasts were interpolated to the spatial scale of the hydrology model. Each set of forecasts was extended by 5 days using monthly mean climatological variables and zero precipitation in order to account for the effect of initial conditions. The 15-day spatially distributed ensemble runoff forecasts were then routed to four locations in the basin, each with different drainage areas. Surrogates for observed daily runoff and flow were provided by the reference run, specifically VIC simulation forced with ECMWF analysis fields and TMPA precipitation fields. The flood prediction scheme using the calibrated and downscaled ECMWF EPS forecasts was shown to be more accurate and reliable than interpolated forecasts for both daily distributed runoff forecasts and daily flow forecasts. Initial and antecedent conditions dominated the flow forecasts for lead times shorter than the time of concentration depending on the flow forecast amounts and the drainage area sizes. The flood prediction scheme had useful skill for the 10 following days at all sites.
Performance and Error Analysis of Knill's Postselection Scheme in a Two-Dimensional Architecture
Ching-Yi Lai; Gerardo Paz; Martin Suchara; Todd A. Brun
2013-05-31T23:59:59.000Z
Knill demonstrated a fault-tolerant quantum computation scheme based on concatenated error-detecting codes and postselection with a simulated error threshold of 3% over the depolarizing channel. %We design a two-dimensional architecture for fault-tolerant quantum computation based on Knill's postselection scheme. We show how to use Knill's postselection scheme in a practical two-dimensional quantum architecture that we designed with the goal to optimize the error correction properties, while satisfying important architectural constraints. In our 2D architecture, one logical qubit is embedded in a tile consisting of $5\\times 5$ physical qubits. The movement of these qubits is modeled as noisy SWAP gates and the only physical operations that are allowed are local one- and two-qubit gates. We evaluate the practical properties of our design, such as its error threshold, and compare it to the concatenated Bacon-Shor code and the concatenated Steane code. Assuming that all gates have the same error rates, we obtain a threshold of $3.06\\times 10^{-4}$ in a local adversarial stochastic noise model, which is the highest known error threshold for concatenated codes in 2D. We also present a Monte Carlo simulation of the 2D architecture with depolarizing noise and we calculate a pseudo-threshold of about 0.1%. With memory error rates one-tenth of the worst gate error rates, the threshold for the adversarial noise model, and the pseudo-threshold over depolarizing noise, are $4.06\\times 10^{-4}$ and 0.2%, respectively. In a hypothetical technology where memory error rates are negligible, these thresholds can be further increased by shrinking the tiles into a $4\\times 4$ layout.
A cost-benefit approach to youth vocational training schemes in Africa
Kuanyin, Emmanuel Bol
1974-01-01T23:59:59.000Z
Capital Formation 1n Africa III YOUTH VOCATIONAL TRAINING SCHEMES IV COST-BENEFIT ANALYSIS: AS A TOOL Formalae for Project Choice Net Present Value Internal Rate of Return (IRR) The IRR Versus the Present Value The Social Rate of Discount Risk... for evalu- at1ng both public and private investments. It is a tool for accessing quantitatively the economic merits of alternat1ve courses of action. The mer1ts are defined in terms of the relationship between the economic bene- fits obtained...
Resonances and excitation pathways in four-level N-scheme atomic systems
Abi-Salloum, T. Y.; Henry, B. [Physics and Astronomy Department, Widener University, Chester, Pennsylvania 19013 (United States); Davis, J. P.; Narducci, F. A. [Naval Air Systems Command, EO Sensors Division, Bldg 2187, Suite 3190 Patuxent River, Maryland 20670 (United States)
2010-07-15T23:59:59.000Z
In this work, we theoretically study the absorption and dispersion coefficients of a probe field in four-level N-scheme atomic systems driven by two additional fields. We separate the steady-state solution of the appropriate density matrix element into the sum of three resonances. The effect of each resonance on the overall absorption and dispersion experienced by the probe is studied as a function of the strengths of the two other fields. In the limit of low saturation, we reveal the physics of these resonances and associate them with atomic excitation pathways, which we explicitly explain in the bare-states picture.
Limitations on the topological BF scheme in Riemann-Cartan spacetime with torsion
Mielke, Eckehard W. [Departamento de Fisica, Universidad Autonoma Metropolitana Iztapalapa, Apartado Postal 55-534, C.P. 09340, Mexico, D.F. (Mexico)
2009-08-15T23:59:59.000Z
Cartan's structure equations in the Riemann-Cartan framework and some topological invariants of gravity are reanalyzed from the perspective of BF theories. This is related to a variational approach to Chern-Simons terms and Bianchi identities employing Lagrange multipliers. Here, it is pointed out that the BF scheme has some limitations to the effect that a coupling to matter would leave the minimal coupling prescription of gauge theories. In the case of gravity, the field equations would, generically, become higher order with a coupling to the relocalized Belinfante-Rosenfeld energy-momentum current.
A serially concatenated BCH-Turbo code scheme over an Additive White Gaussion Noise channel
Ovalekar, Sameer V.
1997-01-01T23:59:59.000Z
', ?. ) (3-1) where wr. is the weight of the k'" data word. If all the cocle-words are considered, using union bounding techniques rve get, Ps = Ps(choose any k E (I, 2, 3. . . . 2'v ? 1) ~0) (2a ? li Ps(k 0) = Z ?, . 'a(+) (3. 2) whme all non... " (Head of Department) December 1997 Major Subject: Electrical Fngineering 111 ABSTRACT A Serially Concatenated BCH-Turbo Code Scheme over an Additive White Gaussian Noise Channel. (December 1997) Sameer V. Ovalekar, I3. E. , Hniversity of Bombay...
Matching NLO QCD with parton shower in Monte Carlo scheme - the KrkNLO method
S. Jadach; W. Placzek; S. Sapeta; A. Siodmok; M. Skrzypek
2015-05-11T23:59:59.000Z
A new method of including the complete NLO QCD corrections to hard processes in the LO parton-shower Monte Carlo (PSMC) is presented. This method, called KrkNLO, requires the use of parton distribution functions in a dedicated Monte Carlo factorization scheme, which is also discussed in this paper. In the future, it may simplify introduction of the NNLO corrections to hard processes and the NLO corrections to PSMC. Details of the method and numerical examples of its practical implementation, as well as comparisons with other calculations, such as MCFM, MC@NLO, POWHEG, for single $Z/\\gamma^*$-boson production at the LHC, are presented.
An interferometric signal demodulation scheme using zero crossings and an asynchronous clock
McCain, Dennis M.
1992-01-01T23:59:59.000Z
to recover P, . In many systems such as the fiber-optic gyroscope, we desire to measure Tz ? Tr to a resolution of the level of zero crossing jitter which is typically about lns. With this resolution, we would be able to measure small magnitude signals... explicit information about the unknown phase P, that is necessary for our demodulation scheme. CHAPTER III ASYNCHRONOUS CLOCK APPROACH TO DEMODULATION For typical fiber-optic gyroscopes, shot noise causes the zero crossings shown in Fig. 4 to jitter...
Kiyoshi Tamaki; Norbert Lütkenhaus; Masato Koashi; Jamie Batuwantudawe
2009-09-03T23:59:59.000Z
We prove the unconditional security of the original Bennett 1992 protocol with strong reference pulse. We show that we may place a projection onto suitably defined qubit spaces before the receiver, which makes the analysis as simple as qubit-based protocols. Unlike the single-photon-based qubits, the qubits identified in this scheme are almost surely detected by the receiver even after a lossy channel. This leads to the key generation rate that is proportional to the channel transmission rate for proper choices of experimental parameters.
Complex absorbing potential based Lorentzian fitting scheme and time dependent quantum transport
Xie, Hang, E-mail: xiehanggm@gmail.com; Kwok, Yanho; Chen, GuanHua, E-mail: ghc@everest.hku.hk [Department of Chemistry, The University of Hong Kong, Pokfulam (Hong Kong); Jiang, Feng [Department of Physics, Shanghai University of Electric Power, Shanghai (China); Zheng, Xiao [Hefei National Laboratory for Physical Sciences at the Microscale, University of Science and Technology of China, Hefei (China)
2014-10-28T23:59:59.000Z
Based on the complex absorbing potential (CAP) method, a Lorentzian expansion scheme is developed to express the self-energy. The CAP-based Lorentzian expansion of self-energy is employed to solve efficiently the Liouville-von Neumann equation of one-electron density matrix. The resulting method is applicable for both tight-binding and first-principles models and is used to simulate the transient currents through graphene nanoribbons and a benzene molecule sandwiched between two carbon-atom chains.
Permanganate Treatment of DNAPLs in Reactive Barriers and Source Zone Flooding Schemes
Dr. Franklin Schwartz; Dr. Hubao Zhang
2003-12-23T23:59:59.000Z
Permanganate is a simple and common chemical, which has proven useful in oxidizing common chlorinated solvents. Due to the nature of oxidation, the byproducts and products are much less harmful than those from reduction-type remedial schemes, and the degradation process is rapid. The main goal of this project is to understand oxidative destruction of chlorinated solvents using potassium permanganate. The study has provided a theoretical basis for evaluating the feasibility of in-situ applications, to couple kinetic reaction with transport models, and to develop an appropriate field test for further assessing the approach.
A study of various encapsulation schemes for c-Si solar cells with EVA encapsulants
Pern, F.J.; Glick, S.H. [Center for Performance Engineering and Reliability, National Renewable Energy Laboratory (NREL), 1617 Cole Blvd., Golden, Colorado 80401 (United States)
1997-02-01T23:59:59.000Z
Several encapsulation schemes for crystalline Si (c-Si) solar cells, grouped into three categories of superstrate/encapsulant/Si-cell/encapsulant/substrate, were studied using different superstrates and substrates with extruded EVA films as the main encapsulant materials. A number of technical problems were observed and practical solutions to the problems are presented. The results are useful for designing and fabricating various samples of encapsulated c-Si cells and mini-modules for accelerated weathering tests in our future work. {copyright} {ital 1997 American Institute of Physics.}
The Conducting of a Mining Negotiation Showing the Scheme of Engineering Involved
Hansen, George T.
1911-01-01T23:59:59.000Z
and capable of lifting the heaviest piece of any one of these machines. CEAIIT BLOCKS:- One fl) 8 ton triplex chain block, complete, equip- ped with sufficient chain for a 14* lift. One (1) 3 ton triplex chain block, equipped with sufficient chain for a 22... E S I S , "The conducting of a Mining negotiation Show- ng the Scheme of Engineering Involved." Taken from Actual Practice 13 7 SEQRGE T. HAISB1 MIIIIS SALES EET5IHEBR ALLIS GHALMBBS OOMPASY ST. LOUIS, MISSOURI Presented to the College...
Causal hydrodynamics from kinetic theory by doublet scheme in renormalization-group method
Kyosuke Tsumura; Teiji Kunihiro
2014-09-10T23:59:59.000Z
We develop a general framework in the renormalization-group (RG) method for extracting a mesoscopic dynamics from an evolution equation by incorporating some excited (fast) modes as additional components to the invariant manifold spanned by zero modes. We call this framework the doublet scheme. We apply the doublet scheme to construct causal hydrodynamics as a mesoscopic dynamics of kinetic theory, i.e., the Boltzmann equation, in a systematic manner with no ad-hoc assumption. It is found that our equation has the same form as Grad's thirteen-moment causal hydrodynamic equation, but the microscopic formulae of the transport coefficients and relaxation times are different. In fact, in contrast to the Grad equation, our equation leads to the same expressions for the transport coefficients as given by the Chapman-Enskog expansion method and suggests novel formulae of the relaxation times expressed in terms of relaxation functions which allow a natural physical interpretation of the relaxation times. Furthermore, our theory nicely gives the explicit forms of the distribution function and the thirteen hydrodynamic variables in terms of the linearized collision operator, which in turn clearly suggest the proper ansatz forms of them to be adopted in the method of moments.
Converged accelerated finite difference scheme for the multigroup neutron diffusion equation
Terranova, N.; Mostacci, D. [DIENCA - Dipartimento di Ingegneria Energetica Nucleare e del Controllo Ambientale, Universita Alma Mater Studiorum, Bologna (Italy); Ganapol, B. D. [Department of Aerospace and Mechanical Engineering, University of Arizona, Tucson AZ (United States)
2013-07-01T23:59:59.000Z
Computer codes involving neutron transport theory for nuclear engineering applications always require verification to assess improvement. Generally, analytical and semi-analytical benchmarks are desirable, since they are capable of high precision solutions to provide accurate standards of comparison. However, these benchmarks often involve relatively simple problems, usually assuming a certain degree of abstract modeling. In the present work, we show how semi-analytical equivalent benchmarks can be numerically generated using convergence acceleration. Specifically, we investigate the error behavior of a 1D spatial finite difference scheme for the multigroup (MG) steady-state neutron diffusion equation in plane geometry. Since solutions depending on subsequent discretization can be envisioned as terms of an infinite sequence converging to the true solution, extrapolation methods can accelerate an iterative process to obtain the limit before numerical instability sets in. The obtained results have been compared to the analytical solution to the 1D multigroup diffusion equation when available, using FORTRAN as the computational language. Finally, a slowing down problem has been solved using a cascading source update, showing how a finite difference scheme performs for ultra-fine groups (104 groups) in a reasonable computational time using convergence acceleration. (authors)
A stochastic particle-mesh scheme for uncertainty propagation in vortical flows
Le Maitre, Olivier P. [Laboratoire de Mecanique et d'Energetique d'Evry and LIMSI-CNRS, Universite d'Evry Val d'Essonne, 40, rue du Pelvoux, CE 1455, 91020 Evry Cedex (France)], E-mail: olm@iup.univ-evry.fr; Knio, Omar M. [Department of Mechanical Engineering, Johns Hopkins University, Baltimore, MD 21218-2686 (United States)], E-mail: knio@jhu.edu
2007-09-10T23:59:59.000Z
A new mesh-particle scheme is constructed for uncertainty propagation in vortical flow. The scheme is based on the incorporation of polynomial chaos (PC) expansions into a Lagrangian particle approximation of the Navier-Stokes equations. The main idea of the method is to use a unique set of particles to transport the stochastic modes of the solution. The particles are transported by the mean velocity field, while their stochastic strengths are updated to account for diffusive and convective effects induced by the coupling between stochastic modes. An integral treatment is used for the evaluation of the coupled stochastic terms, following the framework of the particle strength exchange (PSE) methods, which yields a conservative algorithm. It is also shown that it is possible to apply solution algorithms used in deterministic setting, including particle-mesh techniques and particle remeshing. Thus, the method combines the advantages of particles discretizations with the efficiency of PC representations. Validation of the method on uncertain diffusion and convection problems is first performed. An example is then presented of natural convection of a hot patch of fluid in infinite domain, and the computations are used to illustrate the effectiveness of the approach for both large number of particles and high-order PC expansions.
A Novel Scheme to Search for Fractional Charge Particles in Low Energy Accelerator Experiments
Jianguo Bian; Jiahui Wang
2010-06-15T23:59:59.000Z
In the Standard Model of particle physics, the quarks and anti-quarks have fractional charge equal to $\\pm1/3$ or $\\pm2/3$ of the electron's charge. There has been a large number of experiments searching for fractional charge, isolatable, elementary particles using a variety of methods, including $e^+e^-$ collisions using dE/dx ionization energy loss measurements, but no evidence has been found to confirm existence of free fractional charge particles, which leads to the quark confinement theory. In this paper, a proposal to search for this kind particles is presented, which is based on the conservation law of four-momentum. Thanks to the CLEOc and BESIII detectors' large coverage, good particle identification, precision measurements of tracks' momenta and their large recorded data samples, these features make the scheme feasible in practice. The advantage of the scheme is independent of any theoretical models and sensitive for a small fraction of the quarks transitioning to the unconfinement phase from the confinement phase.
Deterministic multivalued logic scheme for information processing and routing in the brain
S. M. Bezrukov; L. B. Kish
2009-05-06T23:59:59.000Z
Driven by analogies with state vectors of quantum informatics and noise-based logic, we propose a general scheme and elements of neural circuitry for processing and addressing information in the brain. Specifically, we consider random (e.g., Poissonian) trains of finite-duration spikes, and, using the idealized concepts of excitatory and inhibitory synapses, offer a procedure for generating 2^N-1 orthogonal vectors out of N partially overlapping trains ("neuro-bits"). We then show that these vectors can be used to construct 2^(2^N-1)-1 different superpositions which represent the same number of logic values when carrying or routing information. In quantum informatics the above numbers are the same, however, the present logic scheme is more advantageous because it is deterministic in the sense that the presence of a vector in the spike train is detected by an appropriate coincidence circuit. For this reason it does not require time averaging or repeated measurements of the kind used in standard cross-correlation analysis or in quantum computing.
An Efficient Transparent Test Scheme for Embedded Word-Oriented Memories
Li, Jin-Fu; Wey, Chin-Long
2011-01-01T23:59:59.000Z
Memory cores are usually the densest portion with the smallest feature size in system-on-chip (SOC) designs. The reliability of memory cores thus has heavy impact on the reliability of SOCs. Transparent test is one of useful technique for improving the reliability of memories during life time. This paper presents a systematic algorithm used for transforming a bit-oriented march test into a transparent word-oriented march test. The transformed transparent march test has shorter test complexity compared with that proposed in the previous works [Theory of transparent BIST for RAMs, A transparent online memory test for simultaneous detection of functional faults and soft errors in memories]. For example, if a memory with 32-bit words is tested with March C-, time complexity of the transparent word-oriented test transformed by the proposed scheme is only about 56% or 19% time complexity of the transparent word-oriented test converted by the scheme reported in [Theory of transparent BIST for RAMs] or [A transparent...
Optimization of the Combined Proton Acceleration Regime with a Target Composition Scheme
Yao, W P; Zheng, C Y; Liu, Z J; Yan, X Q
2015-01-01T23:59:59.000Z
A target composition scheme to optimize the combined proton acceleration regime is presented and verified by two-dimensional particle-in-cell (2D PIC) simulations by using an ultra-intense circularly-polarized (CP) laser pulse irradiating an overdense hydrocarbon (CH) target, instead of a pure hydrogen (H) one. The combined acceleration regime is a two-stage proton acceleration scheme combining the radiation pressure dominated acceleration (RPDA) stage and the laser wakefield acceleration (LWFA) stage sequentially together. With an ultra-intense CP laser pulse irradiating an overdense CH target, followed by an underdense tritium plasma gas, protons with higher energies (from about $20$ GeV up to about $30$ GeV) and lower energy spreads (from about $18\\%$ down to about $5\\%$ in full-width at half-maximum, or FWHM) are generated, as compared to the use of a pure H target. It is because protons can be more stably pre-accelerated in the first RPDA stage when using CH targets. With the increase of the carbon-to-hy...
Community wind power ownership schemes in Europe and their relevance to the United States
Bolinger, Mark
2001-05-15T23:59:59.000Z
With varying success, the United States and Europe have followed a more or less parallel path of policies to support wind development over the past twenty years. Feed-in laws and tax incentives first popularized in California in the early 1980s and greatly expanded upon in Europe during the 1990s are gradually giving way to market-based support mechanisms such as renewable portfolio standards, which are being implemented in one form or another in ten US states and at least three European nations. At the same time, electricity markets are being liberalized in both the US and Europe, and many electricity consumers are being given the choice to support the development of renewable energy through higher tariffs, both in traditionally regulated and newly competitive markets. One notable area in which wind development in Europe and United States has not evolved in common, however, is with respect to the level of community ownership of wind turbines or clusters. While community ownership of wind projects is unheard of in the United States, in Europe, local wind cooperatives or other participatory business schemes have been responsible for a large share of total wind development. In Denmark, for example, approximately 80% of all wind turbines are either individually or cooperatively owned, and a similar pattern holds in Germany, the world leader in installed wind capacity. Sweden also has a strong wind cooperative base, and the UK has recently made forays into community wind ownership. Why is it that wind development has evolved this way in Europe, but not in the United States? What incremental effect have community-owned wind schemes had on European wind development? Have community-owned wind schemes driven development in Europe, or are they merely a vehicle through which the fundamental driving institutions have been channeled? Is there value to having community wind ownership in the US? Is there reason to believe that such schemes would succeed in the US? If so, which model seems most appropriate, and what barriers--legal, regulatory, tax, market, or investment--stand in the way of implementing such a scheme? These are the questions this report seeks to address. The report begins with a discussion of the relative advantages and disadvantages of community wind ownership, as opposed to the large commercially-owned projects that have so far dominated US wind development. Next, four detailed case studies relate community-owned wind experience in Denmark, Sweden, the UK, Germany, focusing primarily on the different participatory models employed in each country. The report then categorizes the various models into three main groupings--community-led, developer-led, and investment funds--and draws general conclusions about the success of each category in Europe, and the conditions that dictate the effective use of one approach over another. Finally, the focus shifts to the US, where the report discusses the domestic barriers facing each model category, and identifies the category offering the most value with the fewest barriers to implementation. The report concludes with a high-level introduction to potential applications for community wind ownership within the United States.
Blatter, Heinz
2014-01-01T23:59:59.000Z
The enthalpy method for the thermodynamics of polythermal glaciers and ice sheets is tested and verified by a one-dimensional problem (parallel-sided slab). The enthalpy method alone does not include explicitly the Stefan-type energy- and mass-flux matching conditions at the cold-temperate transition surface (CTS) that separates the upper cold from the lower temperate layer. However, these transition conditions are important for correctly determining the position of the CTS. For the numerical solution of the polythermal slab problem, we consider a two-layer front-tracking scheme as well as three different one-layer schemes that feature a single grid for both layers. Computed steady-state temperature and moisture profiles are verified with exact solutions, and transient solutions computed by the one-layer schemes are compared with those of the two-layer scheme, considered to be a reliable reference. While the conventional one-layer enthalpy scheme (that does not include the transition conditions at the CTS) ca...
J.K. Sekutowicz, P. Kneisel
2009-05-01T23:59:59.000Z
A coaxial coupling device located in the beam pipe of the TESLA type superconducting cavities provides for better propagation of Higher Order Modes (HOMs) and their strong damping in appropriate HOM couplers. Additionally, it also provides efficient coupling for fundamental mode RF power into the superconducting cavity. The whole coupling device can be designed as a detachable system. If appropriately dimensioned, the magnetic field can be minimized to a negligible level at the flange position. This scheme, presented previously*, provides for several advantages: strong HOM damping, flangeable solution, exchangeability of the HOM damping device on a cavity, less complexity of the superconducting cavity, possible cost advantages. This contribution will describe the results of the first cryogenic test.
Generic Schemes for Single Molecule Kinetics II: Information Content of the Poisson Indicator
Avila, Thomas
2013-01-01T23:59:59.000Z
A previously described pathway analysis technique is applied to generic schemes of enzyme kinetics. The method is employed is derive expressions for the distribution of waiting times between reaction events and the moments of this distribution. Analytical expressions for the Poisson indicator, a normalized measure of the variance that characterizes the correlation between consecutive events, are derived from the moments of the waiting time. Various important cases are treated with our methodology, including enzymatic reactions in the presence of a competitive inhibitor and in the presence of multiple substrates. The functional dependence of the Poisson indicator on substrate concentration is explored, and connections are made between the derived expressions and the topology of the enzymatic reaction.
Level scheme of /sup 148/Pm and the s-process neutron density
Lesko, K.T.; Norman, E.B.; Larimer, R.; Bacelar, J.C.; Beck, E.M.
1989-02-01T23:59:59.000Z
A level scheme of /sup 148/Pm up to 800 keV is deduced from gamma-ray coincidence data and published particle transfer data. Approximately 106 gamma-ray transitions have been placed between 36 levels. We have identified three levels below 500 keV in excitation which decay to both the ground state and to the isomeric level at 137 keV. The presence of these levels guarantees that /sup 148/Pm/sup g//sup ,//sup m/ are in thermal equilibrium during the s process. The s-process neutron density inferred from the branch point at /sup 148/Pm is deduced to be 3 x 10/sup 8//cm/sup 3/.
Underground pumped storage scheme in the Bukit Timah granite of Singapore
Wong, I.H. [Nanyang Technological Univ. (Singapore)] [Nanyang Technological Univ. (Singapore)
1996-10-01T23:59:59.000Z
Pumped storage is an energy storage method that involves the pumping of water from a lower reservoir to an upper reservoir during off-peak period using low cost power and releasing of the water from the upper reservoir to produce electricity during peak load period. Because of the very small and relatively flat land area of Singapore, a conventional surface pumped storage plant is not feasible. A pumped storage plant can be constructed here by siting the upper reservoir in one of the many abandoned granite quarries and by placing the lower reservoir and the powerhouse underground in the Bukit Timah granite, which is sound, massive and impervious. The capital costs for a pumped storage plant could be the same as those of an oil-fired plant of a comparable size. When the very high cost of land in Singapore is taken into account, an underground pumped storage scheme for peaking purposes becomes attractive. 7 refs., 4 figs., 3 tabs.
Hyperbolic reformulation of a 1D viscoelastic blood flow model and ADER finite volume schemes
Montecinos, Gino I.; Müller, Lucas O.; Toro, Eleuterio F.
2014-06-01T23:59:59.000Z
The applicability of ADER finite volume methods to solve hyperbolic balance laws with stiff source terms in the context of well-balanced and non-conservative schemes is extended to solve a one-dimensional blood flow model for viscoelastic vessels, reformulated as a hyperbolic system, via a relaxation time. A criterion for selecting relaxation times is found and an empirical convergence rate assessment is carried out to support this result. The proposed methodology is validated by applying it to a network of viscoelastic vessels for which experimental and numerical results are available. The agreement between the results obtained in the present paper and those available in the literature is satisfactory. Key features of the present formulation and numerical methodologies, such as accuracy, efficiency and robustness, are fully discussed in the paper.
A gas kinetic scheme for the Baer-Nunziato two-phase flow model
Pan, Liang, E-mail: panliangjlu@sina.com [Institute of Applied Physics and Computational Mathematics, Beijing 100088 (China) [Institute of Applied Physics and Computational Mathematics, Beijing 100088 (China); The Graduate School of China Academy of Engineering Physics, Beijing 100088 (China); Zhao, Guiping, E-mail: zhaogp@nsfc.gov.cn [National Natural Science Foundation of China, Beijing 100085 (China)] [National Natural Science Foundation of China, Beijing 100085 (China); Tian, Baolin, E-mail: tian_baolin@iapcm.ac.cn [Institute of Applied Physics and Computational Mathematics, Beijing 100088 (China) [Institute of Applied Physics and Computational Mathematics, Beijing 100088 (China); Key Laboratory of Computational Physics, Institute of Applied Physics and Computational Mathematics, Beijing 100088 (China); Wang, Shuanghu, E-mail: wang_shuanghu@iapcm.ac.cn [Institute of Applied Physics and Computational Mathematics, Beijing 100088 (China) [Institute of Applied Physics and Computational Mathematics, Beijing 100088 (China); Key Laboratory of Computational Physics, Institute of Applied Physics and Computational Mathematics, Beijing 100088 (China)
2012-09-15T23:59:59.000Z
Numerical methods for the Baer-Nunziato (BN) two-phase flow model have attracted much attention in recent years. In this paper, we present a new gas kinetic scheme for the BN two-phase flow model containing non-conservative terms in the framework of finite volume method. In the view of microscopic aspect, a generalized Bhatnagar-Gross-Krook (BGK) model which matches with the BN model is constructed. Based on the integral solution of the generalized BGK model, we construct the distribution functions at the cell interface. Then numerical fluxes can be obtained by taking moments of the distribution functions, and non-conservative terms are explicitly introduced into the construction of numerical fluxes. In this method, not only the complex iterative process of exact solutions is avoided, but also the non-conservative terms included in the equation can be handled well.