Indonesia-GTZ Mini-Hydropower Schemes for Sustainable Economic Development
AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousPlasmaP aCentrothermDepew,Independent Energy Solutions Jump to:Indiana)| Open Energy Information
Indonesia-GTZ Emissions Reductions in Urban Transport | Open Energy
AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousPlasmaP aCentrothermDepew,Independent Energy Solutions Jump to:Indiana)
Degradation Scheme graceful degradation
Chiba, Shigeru
Degradation Scheme graceful degradation degradation scheme OS OS degradation scheme OS degradation scheme 1 Java graceful degradation [8] graceful degradation degradation scheme degradation scheme degradation scheme OS degradation scheme OS Solaris Linux FreeBSD Windows Server Linux 3 OS Tomcat Solaris OS
Low Energy Distillation Schemes
Polley, G. T.
of reducing energy consumption. We look at how the better integrated distillation schemes can be quickly identified. It is found that the design of integrated schemes is quicker than that of non-integrated schemes. We then look at how the use of heat pumps...
TRINITY HALL PUBLICATION SCHEME
Lasenby, Joan
TRINITY HALL PUBLICATION SCHEME PART 1 INTRODUCTION 1. Legal requirement 1.1 Adopting a publication and whether or not charges will be made. 3. The `model' publication scheme for higher education 3.1 Trinity and is committed to publishing the information it describes. 4. Who we are 4.1 Trinity Hall is a college within
Willcock, J J; Lumsdaine, A; Quinlan, D J
2008-08-19T23:59:59.000Z
Tabled execution is a generalization of memorization developed by the logic programming community. It not only saves results from tabled predicates, but also stores the set of currently active calls to them; tabled execution can thus provide meaningful semantics for programs that seemingly contain infinite recursions with the same arguments. In logic programming, tabled execution is used for many purposes, both for improving the efficiency of programs, and making tasks simpler and more direct to express than with normal logic programs. However, tabled execution is only infrequently applied in mainstream functional languages such as Scheme. We demonstrate an elegant implementation of tabled execution in Scheme, using a mix of continuation-passing style and mutable data. We also show the use of tabled execution in Scheme for a problem in formal language and automata theory, demonstrating that tabled execution can be a valuable tool for Scheme users.
Placidi, M.; Jung, J. -Y.; Ratti, A.; Sun, C.
2014-07-25T23:59:59.000Z
This paper describes beam distribution schemes adopting a novel implementation based on low amplitude vertical deflections combined with horizontal ones generated by Lambertson-type septum magnets. This scheme offers substantial compactness in the longitudinal layouts of the beam lines and increased flexibility for beam delivery of multiple beam lines on a shot-to-shot basis. Fast kickers (FK) or transverse electric field RF Deflectors (RFD) provide the low amplitude deflections. Initially proposed at the Stanford Linear Accelerator Center (SLAC) as tools for beam diagnostics and more recently adopted for multiline beam pattern schemes, RFDs offer repetition capabilities and a likely better amplitude reproducibility when compared to FKs, which, in turn, offer more modest financial involvements both in construction and operation. Both solutions represent an ideal approach for the design of compact beam distribution systems resulting in space and cost savings while preserving flexibility and beam quality.
TRINITY HALL PUBLICATION SCHEME
Lasenby, Joan
TRINITY HALL PUBLICATION SCHEME PART 2 Main categories The main groups of classes of information Trinity Hall was founded in 1350 by William Bateman, Bishop of Norwich, as a common law corporation to the University and College Statutes. The Education (Listed Bodies) Order 1997 recognises Trinity Hall
Jet Schemes and Truncated Wedge Schemes Cornelia O. Yuen
Smith, Karen E.
Jet Schemes and Truncated Wedge Schemes by Cornelia O. Yuen A dissertation submitted in partial of jets and arcs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 1.2 A higher dimension analog of arcs and jets . . . . . . . . . . . . . . . . . . . 3 1.3 History
Foglietta, J.H.
1999-07-01T23:59:59.000Z
A new LNG cycle has been developed for base load liquefaction facilities. This new design offers a different technical and economical solution comparing in efficiency with the classical technologies. The new LNG scheme could offer attractive business opportunities to oil and gas companies that are trying to find paths to monetize gas sources more effectively; particularly for remote or offshore locations where smaller scale LNG facilities might be applicable. This design offers also an alternative route to classic LNG projects, as well as alternative fuel sources. Conceived to offer simplicity and access to industry standard equipment, This design is a hybrid result of combining a standard refrigeration system and turboexpander technology.
Landeche, D.A. [Entergy Operations, Inc., Killona, LA (United States)
1996-10-01T23:59:59.000Z
In it`s document TR-105834, Project 24414 dated November 1995 and titled {open_quotes}Zero Plastics and the Radiologically Protected Area Low Level Waste Lockout Program{close_quotes}, EPRI describes DAW lockout as a {open_quotes}very advanced{close_quotes} and {open_quotes}perhaps the most powerful of all approaches to LLW minimization.{close_quotes} The report discusses implementation of a lockout program at Kewaunee, LaSalle and Zion stations but states that {open_quotes}no quantifiable results{close_quotes} were available at time of report printing. Waterford 3 Nuclear Station began implementing a limited lockout scheme in 1993. This paper presents Waterford`s experience and results achieved through the lockout approach.
2006-03-16T23:59:59.000Z
Mar 16, 2006 ... security standards for low-cost smart-card applications in the following table,. Scheme. Signature Publ-key Priv-key. Setup Signing Verifying.
Singular Homology of Arithmetic Schemes
]. In this article we motivate and give the definition of the singular homology groups of schemes of finite type over # n k = Spec(k[t 0 , . . . , t n ]/ # t i = 1) is the ndimensional standard simplex over k, a ``standard nsimplex'' should have dimension n but # n S is a scheme of dimension (n + 1). If the Dedekind
Singular Homology of Arithmetic Schemes
]. In this article we motivate and give the definition of the singular homology groups of schemes of finite type over(k[t0, . . . , tn]/ ti = 1) is the n-dimensional standard simplex over k and a finite correspondence, a "standard n-simplex" should have dimension n but n S is a scheme of dimension (n + 1). If the Dedekind
Operational Signature Schemes Michael Backes
Operational Signature Schemes Michael Backes CISPA, Saarland University Â¨OzgÂ¨ur Dagdelen TU] transferred the idea of functional encryption to signatures. They basically say that, with knowledge
Alternative subtraction scheme using Nagy Soper dipoles
T. Robens; C. H. Chung
2010-01-15T23:59:59.000Z
We present an alternative subtraction scheme for the treatment of infrared divergences in NLO QCD calculations. In this scheme, the number of transformations is greatly reduced with respect to the standard subtraction scheme by Catani and Seymour. We discuss the general setup of the scheme as well as first applications to NLO processes at hadron and lepton colliders.
FROM NATIONAL APPROVAL SCHEME TO INTERNATIONAL CERTIFICATION SCHEME
turbines has been performed since 1979. In January 2005 a certification scheme was introduced based on IEC certification standard "IEC WT 01" [5] and the load and safety standard "IEC 61400-1" [6] and "IEC 61400-2" [7 Turbines has been developed (IEC WT01) · Some procedures and requirements in the old system did not meet
CECC'08 L. Csirmaz: Secret Sharing Schemes 1 / 35 Secret Sharing Schemes
Csirmaz, László
CECC'08 L. Csirmaz: Secret Sharing Schemes 1 / 35 Secret Sharing Schemes: Solved & Unsolved Problems Laszlo Csirmaz Central European University July 3, 2008 #12;CECC'08 L. Csirmaz: Secret Sharing Schemes 2 / 35 Secret Sharing Scheme { the beginning Contents 1 Secret Sharing Scheme { the beginning 2 De
Inoculating Multivariate Schemes Against Differential Attacks
International Association for Cryptologic Research (IACR)
Inoculating Multivariate Schemes Against Differential Attacks Jintai Ding and Jason E. Gower scheme the Perturbed Matsumoto-Imai-Plus (PMI+) cryptosystem. Keywords: multivariate, public key resources. Multivariate public key cryptography provides one alternative since computations in small finite
Regular differentials and equidimensional scheme-maps.
1910-30-30T23:59:59.000Z
Now fix a base scheme S, and restrict attention to those S-schemes Z whose ... g is smooth at f(x); and since all the relevant data are compatible with flat base.
Adaptive Resource Management Schemes for Web Services
Lee, Heung Ki
2011-02-22T23:59:59.000Z
schemes through a web prefetching scheme. For this study, we design a Double Prediction-by-Partial-Match Scheme (DPS) that can be adapted to the modern web frameworks. In addition, we present an Adaptive Rate Controller (ARC) to determine the prefetch rate... CHAPTER Page 1. Double P.P.M. Scheme (DPS) . . . . . . . . . . . . . 35 2. Adaptive Rate Controller (ARC) . . . . . . . . . . . . 37 D. Prefetch Memory Management . . . . . . . . . . . . . . . . 41 1. Insertion of Web Objects to Prefetch Memory...
Bourqui, Michel
A fast stratospheric ozone chemistry schemeA fast stratospheric ozone chemistry scheme Michel a computationally efficient chemical scheme, the FAst STratospheric Ozone Chemistry (FASTOC) scheme, which has advantages over many existing fast methods, as it does not rely on relaxation to assumed conditions, does
An Unconditionally Stable Rotational Velocity-Correction Scheme ...
The scheme of Karniadakis et al [16] is equivalent to the velocity-correction scheme in rotational form [14]. The consistent splitting scheme was introduced in [13].
Matroids and quantum-secret-sharing schemes
Sarvepalli, Pradeep; Raussendorf, Robert [Department of Physics and Astronomy, University of British Columbia, Vancouver V6T 1Z1 (Canada)
2010-05-15T23:59:59.000Z
A secret-sharing scheme is a cryptographic protocol to distribute a secret state in an encoded form among a group of players such that only authorized subsets of the players can reconstruct the secret. Classically, efficient secret-sharing schemes have been shown to be induced by matroids. Furthermore, access structures of such schemes can be characterized by an excluded minor relation. No such relations are known for quantum secret-sharing schemes. In this paper we take the first steps toward a matroidal characterization of quantum-secret-sharing schemes. In addition to providing a new perspective on quantum-secret-sharing schemes, this characterization has important benefits. While previous work has shown how to construct quantum-secret-sharing schemes for general access structures, these schemes are not claimed to be efficient. In this context the present results prove to be useful; they enable us to construct efficient quantum-secret-sharing schemes for many general access structures. More precisely, we show that an identically self-dual matroid that is representable over a finite field induces a pure-state quantum-secret-sharing scheme with information rate 1.
A NEW RELAXATION SCHEME FOR MATHEMATICAL PROGRAMS ...
2009-02-06T23:59:59.000Z
(MPEC), where the complementarity constraints are replaced by a ... The relaxation scheme is such that a strongly stationary solution of the MPEC is also a.
Year in Industry Scheme The Year in Industry Scheme allows you to spend
Haase, Markus
Year in Industry Scheme The Year in Industry Scheme allows you to spend your third year in full whether or not to transfer to this scheme during your second year. To be allowed to make the transfer, you must do sufficiently well in your year 1 and 2 examinations; a typical grade average of at least 55
Point transformations in invariant difference schemes
Francis Valiquette
2005-07-17T23:59:59.000Z
In this paper, we show that when two systems of differential equations admitting a symmetry group are related by a point transformation it is always possible to generate invariant schemes, one for each system, that are also related by the same transformation. This result is used to easily obtain new invariant schemes of some differential equations.
Finite volume renormalization scheme for fermionic operators
Monahan, Christopher; Orginos, Kostas [JLAB
2013-11-01T23:59:59.000Z
We propose a new finite volume renormalization scheme. Our scheme is based on the Gradient Flow applied to both fermion and gauge fields and, much like the Schr\\"odinger functional method, allows for a nonperturbative determination of the scale dependence of operators using a step-scaling approach. We give some preliminary results for the pseudo-scalar density in the quenched approximation.
Y AND RELIABILITY: LOGO MANUAL COLOR SCHEME
Bordenstein, Seth
AND RELIABILITY: LOGO MANUAL COLOR SCHEME TYPOGRAPHY RECOMMENDED DISPLAY SPACE PMS 131C PMS COOL GRAY 11C VERSION HORIZONTAL 1J COLOR SCHEME R=203 G=163 B=57 C=21 M=34 Y=93 K=2 20,0 @Me Nas $10M in equipment Machine shop equipped conference facility All-purpose machine shop Skilled engineering staff
Graph Decompositions and Secret Sharing Schemes 1
Stinson, Douglas
Graph Decompositions and Secret Sharing Schemes 1 C. Blundo and A. De Santis Dipartimento di In this paper, we continue a study of secret sharing schemes for access structures based on graphs. Given a graph G, we require that a subset of participants can compute a secret key if they contain an edge of G
Retirement Benefits Scheme Benefiting from membership
Mumby, Peter J.
7 Temporary absence 8 Part-time employment 8 Normal retirement 8 Late retirement 9 Early retirementRetirement Benefits Scheme Benefiting from membership: Your guide to the Scheme www 9 Incapacity retirement 10 Cash sum options 10 Pension increases 10 Paymeny of pension 10 Leaving
Strongly Secure Ramp Secret Sharing Schemes for General Access Structures
Yamamoto, Hirosuke
Strongly Secure Ramp Secret Sharing Schemes for General Access Structures Mitsugu Iwamoto 1 , Hirosuke Yamamoto 2 Abstract Ramp secret sharing (SS) schemes can be classified into strong ramp SS schemes and weak ramp SS schemes. The strong ramp SS schemes do not leak out any part of a secret explicitly even
Efficient multiparty quantum-secret-sharing schemes
Xiao Li; Deng Fuguo [Department of Physics, Tsinghua University, Beijing 100084 (China); Key Laboratory for Quantum Information and Measurements, MOE, Beijing 100084 (China); Long Guilu [Department of Physics, Tsinghua University, Beijing 100084 (China); Key Laboratory for Quantum Information and Measurements, MOE, Beijing 100084 (China); Center of Atomic and Molecular NanoSciences, Tsinghua University, Beijing 100084 (China); Center for Quantum Information, Tsinghua University, Beijing 100084 (China); Pan Jianwei [Institute for Experimental Physics University of Vienna, Boltzmanngasse 5, Vienna 9 (Austria)
2004-05-01T23:59:59.000Z
In this work, we generalize the quantum-secret-sharing scheme of Hillery, Buzek, and Berthiaume [Phys. Rev. A 59, 1829 (1999)] into arbitrary multiparties. Explicit expressions for the shared secret bit is given. It is shown that in the Hillery-Buzek-Berthiaume quantum-secret-sharing scheme the secret information is shared in the parity of binary strings formed by the measured outcomes of the participants. In addition, we have increased the efficiency of the quantum-secret-sharing scheme by generalizing two techniques from quantum key distribution. The favored-measuring-basis quantum-secret-sharing scheme is developed from the Lo-Chau-Ardehali technique [H. K. Lo, H. F. Chau, and M. Ardehali, e-print quant-ph/0011056] where all the participants choose their measuring-basis asymmetrically, and the measuring-basis-encrypted quantum-secret-sharing scheme is developed from the Hwang-Koh-Han technique [W. Y. Hwang, I. G. Koh, and Y. D. Han, Phys. Lett. A 244, 489 (1998)] where all participants choose their measuring basis according to a control key. Both schemes are asymptotically 100% in efficiency, hence nearly all the Greenberger-Horne-Zeilinger states in a quantum-secret-sharing process are used to generate shared secret information.
An efficient parallelization scheme for molecular dynamics simulations...
Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)
efficient parallelization scheme for molecular dynamics simulations with many-body, flexible, polarizable empirical An efficient parallelization scheme for molecular dynamics...
Efficient energy stable numerical schemes for a phase field moving ...
Jie Shen
2015-01-21T23:59:59.000Z
Jan 7, 2015 ... In this paper, we present two efficient energy stable schemes to solve a ... we obtain a linear coupled energy stable scheme for systems with ...
Utility Energy Efficiency Schemes: Savings Obligations and Trading...
Energy Efficiency Schemes: Savings Obligations and Trading **Subscription Required** Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Utility Energy Efficiency Schemes:...
Year in Industry Scheme The Year in Industry Scheme allows you to spend
Haase, Markus
Year in Industry Scheme The Year in Industry Scheme allows you to spend your third year in full-time paid employment, returning to the University for a final fourth year. You are awarded a BSc (Industry second year. To be allowed to make the transfer, you must do sufficiently well in your year 1 and 2
Moelders, Nicole
ii Evaluation of the Hydro-Thermodynamic Soil Vegetation Scheme and implementation of a new.S. Fairbanks, Alaska August 2005 #12;iii Abstract The Hydro-Thermodynamic Soil-Vegetation Scheme (HTSVS........................................................................................................................... 24 Evaluation of snow depth and soil temperatures predicted by the Hydro- Thermodynamic Soil
Cooling scheme for turbine hot parts
Hultgren, Kent Goran (Winter Park, FL); Owen, Brian Charles (Orlando, FL); Dowman, Steven Wayne (Orlando, FL); Nordlund, Raymond Scott (Orlando, FL); Smith, Ricky Lee (Oviedo, FL)
2000-01-01T23:59:59.000Z
A closed-loop cooling scheme for cooling stationary combustion turbine components, such as vanes, ring segments and transitions, is provided. The cooling scheme comprises: (1) an annular coolant inlet chamber, situated between the cylinder and blade ring of a turbine, for housing coolant before being distributed to the turbine components; (2) an annular coolant exhaust chamber, situated between the cylinder and the blade ring and proximate the annular coolant inlet chamber, for collecting coolant exhaust from the turbine components; (3) a coolant inlet conduit for supplying the coolant to said coolant inlet chamber; (4) a coolant exhaust conduit for directing coolant from said coolant exhaust chamber; and (5) a piping arrangement for distributing the coolant to and directing coolant exhaust from the turbine components. In preferred embodiments of the invention, the cooling scheme further comprises static seals for sealing the blade ring to the cylinder and flexible joints for attaching the blade ring to the turbine components.
Security problem on arbitrated quantum signature schemes
Jeong Woon Choi; Ku-Young Chang; Dowon Hong
2011-06-27T23:59:59.000Z
Until now, there have been developed many arbitrated quantum signature schemes implemented with a help of a trusted third party. In order to guarantee the unconditional security, most of them take advantage of the optimal quantum one-time encryption method based on Pauli operators. However, we in this paper point out that the previous schemes only provides a security against total break and actually show that there exists a simple existential forgery attack to validly modify the transmitted pair of message and signature. In addition, we also provide a simple method to recover the security against the proposed attack.
Cross-ontological analytics for alignment of different classification schemes
Posse, Christian (Seattle, WA); Sanfilippo, Antonio P (Richland, WA); Gopalan, Banu (Cleveland, OH); Riensche, Roderick M (Richland, WA); Baddeley, Robert L (Richland, WA)
2010-09-28T23:59:59.000Z
Quantification of the similarity between nodes in multiple electronic classification schemes is provided by automatically identifying relationships and similarities between nodes within and across the electronic classification schemes. Quantifying the similarity between a first node in a first electronic classification scheme and a second node in a second electronic classification scheme involves finding a third node in the first electronic classification scheme, wherein a first product value of an inter-scheme similarity value between the second and third nodes and an intra-scheme similarity value between the first and third nodes is a maximum. A fourth node in the second electronic classification scheme can be found, wherein a second product value of an inter-scheme similarity value between the first and fourth nodes and an intra-scheme similarity value between the second and fourth nodes is a maximum. The maximum between the first and second product values represents a measure of similarity between the first and second nodes.
Cross Layer Coding Schemes for Broadcasting and Relaying
John Wilson, Makesh Pravin
2011-08-08T23:59:59.000Z
) in the presence of side information about the source known only to the receiver. We introduce hybrid digital analog forms of the Costa and Wyner-Ziv cod- ing schemes. We present random coding based schemes in contrast to lattice based schemes proposed... constrained additive white Gaussian noise channels. We propose structured coding schemes using lattices for this problem. We study two decoding approaches, namely lattice decoding and minimum angle decoding. Both the decoding schemes can be shown to achieve...
Delgado-Frias, José G.
Abstract-- A mesochronous pipeline scheme is described in this paper. In a conventional pipeline scheme each pipeline stage operates on only one data set at a time. In the mesochronous scheme, pipeline stages operate on multiple data sets simultaneously. The clock period in conventional pipeline scheme
Adaptive Resource Management Schemes for Web Services
Lee, Heung Ki
2011-02-22T23:59:59.000Z
1. Distribution Policy . . . . . . . . . . . . . . . . . . . . 17 a. Group Request Distribution . . . . . . . . . . . . 17 b. Memory Aware Request Distribution (MARD) . . 19 2. Diagram of Distribution . . . . . . . . . . . . . . . . . 20 D... CHAPTER Page 1. Double P.P.M. Scheme (DPS) . . . . . . . . . . . . . 35 2. Adaptive Rate Controller (ARC) . . . . . . . . . . . . 37 D. Prefetch Memory Management . . . . . . . . . . . . . . . . 41 1. Insertion of Web Objects to Prefetch Memory...
Fluid = particles A Conservative Numerical Scheme
Al Hanbali, Ahmad
of this continuum formulation will 'directly' lead to a discrete Hamiltonian scheme: HPM. · alternative is fully Lagrangian description, which can be discretized into SPH. · both HPM and SPH require some sort of smoothing to maintain accuracy over long-time integrations. Eulerian grid in HPM allows for efficient numerical
Generalized Semi-Quantum Secret Sharing Schemes
Gheorghiu, Vlad
2012-01-01T23:59:59.000Z
We investigate quantum secret sharing schemes constructed from $[n,k,delta]_D$ non-binary stabilizer quantum error correcting codes with carrier qudits of prime dimension $D$. We provide a systematic way of determining the access structure, which completely determines the forbidden and intermediate structures. We then show that the information available to the intermediate structure can be fully described and quantified by what we call the \\emph{information group}, a subgroup of the Pauli group of $k$ qudits, and employ this group structure to construct a method for hiding the information from the intermediate structure via twirling of the information group and sharing of classical bits between the dealer and the players. Our scheme allows the transformation of a ramp (intermediate) quantum secret sharing scheme into a semi-quantum perfect secret sharing scheme with the same access structure as the ramp one but without any intermediate subsets, and is optimal in the amount of classical bits the dealer has to ...
AN ALGEBRAIC DESCRIPTION OF ITERATIVE DECODING SCHEMES
Soljanin, Emina
AN ALGEBRAIC DESCRIPTION OF ITERATIVE DECODING SCHEMES ELKE OFFER AND EMINA SOLJANIN Abstract University of Technology, D- 80290 Munich, Germany, elke@lnt.e-technik.tu-muenchen.de Mathematical Sciences Research Center, Bell Labs, Lucent Technologies, Murray Hill, NJ 07974, USA. emina@lucent.com 1 #12;2 E
Bonus points The National Access Scheme
Chen, Ying
Bonus points The National Access Scheme ANU offers bonus points for nationally strategic senior secondary subjects, and in recognition of difficult circumstances that students face in their studies. Bonus) will be awarded. Bonus points to do not apply to programs with an ATAR cut-off of 98 or higher. Bonus Points
BRAZIL VISITING FELLOWSHIP SCHEME Application Form
Birmingham, University of
BRAZIL VISITING FELLOWSHIP SCHEME Application Form APPLICATIONS SHOULD BE TYPEWRITTEN AND BOXES of attendance Qualifications awarded and class of Honours, etc. Principal Subject(s) taken #12;BRAZIL VISITING): Date(s) From To To Nature of work and Position held Name and address of employer #12;BRAZIL VISITING
Analysis of modulation scheme using GNU Radio
Yu, Chansu
1 Analysis of modulation scheme using GNU Radio By: Zeyu long Outline Introduce Project Goal QPSK CPFSK Resolute Project conclusion Project challenges Reference #12;2 Introduce (1) GNU radio: One of the most popular applications of Software Defined Radios Use C++ to write blocks Use python to connect
Exact scheme independence at two loops
Stefano Arnone; Antonio Gatti; Tim R. Morris; Oliver J. Rosten
2003-11-11T23:59:59.000Z
We further develop an algorithmic and diagrammatic computational framework for very general exact renormalization groups, where the embedded regularisation scheme, parametrised by a general cutoff function and infinitely many higher point vertices, is left unspecified. Calculations proceed iteratively,by integrating by parts with respect to the effective cutoff, thus introducing effective propagators, and differentials of vertices that can be expanded using the flow equations; many cancellations occur on using the fact that the effective propagator is the inverse of the classical Wilsonian two-point vertex. We demonstrate the power of these methods by computing the beta function up to two loops in massless four dimensional scalar field theory, obtaining the expected universal coefficients, independent of the details of the regularisation scheme.
The Scheme of Beam Synchronization in MEIC
Zhang, Yuhong; Derbenev, Yaroslav S.; Hutton, Andrew M.
2013-06-01T23:59:59.000Z
Synchronizing colliding beams at single or multiple collision points is a critical R&D issue in the design of a medium energy electron-ion collider (MEIC) at Jefferson Lab. The path-length variation due to changes in the ion energy, which varies over 20 to 100 GeV, could be more than several times the bunch spacing. The scheme adopted in the present MEIC baseline is centered on varying the number of bunches (i.e., harmonic number) stored in the collider ring. This could provide a set of discrete energies for proton or ions such that the beam synchronization condition is satisfied. To cover the ion energy between these synchronized values, we further propose to vary simultaneously the electron ring circumference and the frequency of the RF systems in both collider rings. We also present in this paper the requirement of frequency tunability of SRF cavities to support the scheme.
The Emergent Universe scheme and tunneling
Labraña, Pedro [Departamento de Física, Universidad del Bío-Bío, Avenida Collao 1202, Casilla 5-C, Concepción, Chile and Departament d'Estructura i Constituents de la Matèria and Institut de Ciències del Cosmos, Universitat (Spain)
2014-07-23T23:59:59.000Z
We present an alternative scheme for an Emergent Universe scenario, developed previously in Phys. Rev. D 86, 083524 (2012), where the universe is initially in a static state supported by a scalar field located in a false vacuum. The universe begins to evolve when, by quantum tunneling, the scalar field decays into a state of true vacuum. The Emergent Universe models are interesting since they provide specific examples of non-singular inflationary universes.
Jet schemes of rational double point singularities Hussein MOURTADA
Favre, Charles - Institut de Mathématiques de Jussieu, Université Paris 7
Jet schemes of rational double point singularities Hussein MOURTADA April 9, 2013 Abstract We prove that for m N, m big enough, the number of irreducible components of the schemes of m-jets centered of the jet schemes of an E6 singularity to its "minimal" embedded resolutions of singularities. 1
Jet schemes of rational double point singularities Hussein MOURTADA
Jet schemes of rational double point singularities Hussein MOURTADA September 30, 2012 Abstract We prove that for m N, m big enough, the number of irreducble components of the schemes of m-jets centered of the jet schemes of an E6 singularity to its "minimal" embedded resolutions of singularities. 1
Jet schemes of rational double point singularities Hussein Mourtada
Bodin, Arnaud
Jet schemes of rational double point singularities Hussein Mourtada Abstract. We prove that for m N, m big enough, the number of irreducible compo- nents of the schemes of m-jets centered at a point on the minimal reso- lution of the singularity. We also relate some irreducible components of the jet schemes
Optimal information rate of secret sharing schemes on trees
Tardos, GÃ¡bor
The information rate for an access structure is the reciprocal of the load of the optimal secret sharing scheme method. AMS classification numbers. 05B40, 05C85, 94A60, 94A62, 94A17 1 Introduction Secret sharing sharing scheme for the access structure based on a graph G a secret sharing scheme on G. The load
Performance Analysis of Bicycle Hire schemes Chris Guenther, Jeremy Bradley
Imperial College, London
Performance Analysis of Bicycle Hire schemes Chris Guenther, Jeremy Bradley Department of Computing, Imperial College London Bike hire schemes Over past few years, city bicycle hire schemes have emerged occu- pancy, i.e. Bicycle availability at starting stations Parking space availability at destinations
Perfect Secret Sharing Schemes from Room GhulamRasool Chaudhry
Seberry, Jennifer
Perfect Secret Sharing Schemes from Room Squares GhulamÂRasool Chaudhry Hossein Ghodosi Jennifer retirement Abstract Secret sharing schemes are one of the most important primitives in distributed systems. In perfect secret sharing schemes, collaboÂ ration between unauthorised participants cannot reduce
Weakly-Private Secret Sharing Schemes Amos Beimel1
Beimel, Amos
Weakly-Private Secret Sharing Schemes Amos Beimel1 and Matthew Franklin2 1 Department of Computer. Abstract. Secret-sharing schemes are an important tool in cryptogra- phy that is used in the construction of many secure protocols. However, the shares' size in the best known secret-sharing schemes realizing gen
Perfect Secret Sharing Schemes from Room Ghulam-Rasool Chaudhry
Seberry, Jennifer
Perfect Secret Sharing Schemes from Room Squares Ghulam-Rasool Chaudhry Hossein Ghodosi Jennifer retirement Abstract Secret sharing schemes are one of the most important primitives in distributed systems. In perfect secret sharing schemes, collabo- ration between unauthorised participants cannot reduce
Hardware implementation of secure Shamir's secret sharing scheme
Karpovsky, Mark
Hardware implementation of secure Shamir's secret sharing scheme Pei Luo and Andy Yu-Lun Lin Electrical and Computer Engineering Boston University Email: markkar@bu.edu Abstract--Shamir's secret sharing scheme is an effective way to distribute secret to a group of shareholders. But this scheme is vulnerable
Two Optimum Secret Sharing Schemes Revisited Zhengjun Cao Olivier Markowitch
Markowitch, Olivier
Two Optimum Secret Sharing Schemes Revisited Zhengjun Cao Olivier Markowitch Department of Computer, caoamss@gmail.com Abstract In 2006, Obana et al proposed two optimum secret shar- ing schemes secure efficient because they only extend the secret to an array of two elements. The new scheme for a single se
Anonymous Secret Sharing Schemes Dipartimento di Informatica ed Applicazioni
Stinson, Douglas
Anonymous Secret Sharing Schemes C. Blundo Dipartimento di Informatica ed Applicazioni Universit January 29, 1996 Abstract In this paper we study anonymous secret sharing schemes. Informally, in an anonyÂ mous secret sharing scheme the secret can be reconstructed without knowledge of which participants hold
Reusing Shares in Secret Sharing Schemes Yuliang Zheng
Zheng, Yuliang
Reusing Shares in Secret Sharing Schemes Yuliang Zheng Thomas Hardjono Jennifer Seberry The Centre for The Computer Journal 1 #12;Reusing Shares in Secret Sharing Schemes Abstract A (t w) threshold scheme is a method for sharing a secret among w shareholders so that the collaboration of at least t shareholders
A Subject-Delegated Decryption Scheme with "Tightly" Limited Authority
International Association for Cryptologic Research (IACR)
A Subject-Delegated Decryption Scheme with "Tightly" Limited Authority Lihua Wang1 , Takeshi@cs.tsukuba.ac.jp Abstract. In this paper, we present a new proxy cryptosystem named subject-delegated decryption scheme subjects. The advantage of our scheme is that the proxy authorities are tightly limited ("Tightly" Limited
Exact scheme independence at one loop
Stefano Arnone; Antonio Gatti; Tim R. Morris
2002-06-10T23:59:59.000Z
The requirement that the quantum partition function be invariant under a renormalization group transformation results in a wide class of exact renormalization group equations, differing in the form of the kernel. Physical quantities should not be sensitive to the particular choice of the kernel. We demonstrate this scheme independence in four dimensional scalar field theory by showing that, even with a general kernel, the one-loop beta function may be expressed only in terms of the effective action vertices, and thus, under very general conditions, the universal result is recovered.
Exact scheme independence at one loop
Arnone, S; Morris, T R; Arnone, Stefano; Gatti, Antonio; Morris, Tim R.
2002-01-01T23:59:59.000Z
The requirement that the quantum partition function be invariant under a renormalization group transformation results in a wide class of exact renormalization group equations, differing in the form of the kernel. Physical quantities should not be sensitive to the particular choice of the kernel. We demonstrate this scheme independence in four dimensional scalar field theory by showing that, even with a general kernel, the one-loop beta function may be expressed only in terms of the effective action vertices, and thus, under very general conditions, the universal result is recovered.
The gradient flow running coupling scheme
Zoltan Fodor; Kieran Holland; Julius Kuti; Daniel Nogradi; Chik Him Wong
2012-11-14T23:59:59.000Z
The Yang-Mills gradient flow in finite volume is used to define a running coupling scheme. As our main result the discrete beta-function, or step scaling function, is calculated for scale change s=3/2 at several lattice spacings for SU(3) gauge theory coupled to N_f = 4 fundamental massless fermions. The continuum extrapolation is performed and agreement is found with the continuum perturbative results for small renormalized coupling. The case of SU(2) gauge group is briefly commented on.
Coupling Schemes in Terahertz Planar Metamaterials
DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)
Roy Chowdhury, Dibakar; Singh, Ranjan; Taylor, Antoinette J.; Chen, Hou-Tong; Zhang, Weili; Azad, Abul K.
2012-01-01T23:59:59.000Z
We present a review of the different coupling schemes in a planar array of terahertz metamaterials. The gap-to-gap near-field capacitive coupling between split-ring resonators in a unit cell leads to either blue shift or red shift of the fundamental inductive-capacitive (LC) resonance, depending on the position of the split gap. The inductive coupling is enhanced by decreasing the inter resonator distance resulting in strong blue shifts of theLCresonance. We observe theLCresonance tuning only when the split-ring resonators are in close proximity of each other; otherwise, they appear to be uncoupled. Conversely, the higher-order resonances are sensitive to the smallest changemore »in the inter particle distance or split-ring resonator orientation and undergo tremendous resonance line reshaping giving rise to a sharp subradiant resonance mode which produces hot spots useful for sensing applications. Most of the coupling schemes in a metamaterial are based on a near-field effect, though there also exists a mechanism to couple the resonators through the excitation of lowest-order lattice mode which facilitates the long-range radiative or diffractive coupling in the split-ring resonator plane leading to resonance line narrowing of the fundamental as well as the higher order resonance modes.« less
Can Quantum Entanglement Detection Schemes Improve Search?
Luís Tarrataca; Andreas Wichert
2015-02-06T23:59:59.000Z
Quantum computation, in particular Grover's algorithm, has aroused a great deal of interest since it allows for a quadratic speedup to be obtained in search procedures. Classical search procedures for an $N$ element database require at most $O(N)$ time complexity. Grover's algorithm is able to find a solution with high probability in $O(\\sqrt{N})$ time through an amplitude amplification scheme. In this work we draw elements from both classical and quantum computation to develop an alternative search proposal based on quantum entanglement detection schemes. In 2002, Horodecki and Ekert proposed an efficient method for direct detection of quantum entanglement. Our proposition to quantum search combines quantum entanglement detection alongside entanglement inducing operators. Grover's quantum search relies on measuring a quantum superposition after having applied a unitary evolution. We deviate from the standard method by focusing on fine-tuning a unitary operator in order to infer the solution with certainty. Our proposal sacrifices space for speed and depends on the mathematical properties of linear positive maps $\\Lambda$ which have not been operationally characterized. Whether such a $\\Lambda$ can be easily determined remains an open question.
High Order Upwind Schemes for Multidimensional Magnetohydrodynamics
P. Londrillo; L. Del Zanna
1999-10-05T23:59:59.000Z
A general method for constructing high order upwind schemes for multidimensional magnetohydrodynamics (MHD), having as a main built-in condition the divergence-free constraint $\\divb=0$ for the magnetic field vector $\\bb$, is proposed. The suggested procedure is based on {\\em consistency} arguments, by taking into account the specific operator structure of MHD equations with respect to the reference Euler equations of gas-dynamics. This approach leads in a natural way to a staggered representation of the $\\bb$ field numerical data where the divergence-free condition in the cell-averaged form, corresponding to second order accurate numerical derivatives, is exactly fulfilled. To extend this property to higher order schemes, we then give general prescriptions to satisfy a $(r+1)^{th}$ order accurate $\\divb=0$ relation for any numerical $\\bb$ field having a $r^{th}$ order interpolation accuracy. Consistency arguments lead also to a proper formulation of the upwind procedures needed to integrate the induction equations, assuring the exact conservation in time of the divergence-free condition and the related continuity properties for the $\\bb$ vector components. As an application, a third order code to simulate multidimensional MHD flows of astrophysical interest is developed using ENO-based reconstruction algorithms. Several test problems to illustrate and validate the proposed approach are finally presented.
Recycling scheme for twin BWRs reactors
Ramirez-Sanchez, J. R.; Perry, R. T.; Gustavo Alonso, V.; Javier Palacios, H. [Instituto Nacional de Investigaciones Nucleares, La Marquesa s/n, Ocoyoacac 52750 (Mexico)
2006-07-01T23:59:59.000Z
To asses the advantages of reprocess and recycle the spent fuel from nuclear power reactors, against a once through policy, a MOX fuel design is proposed to match a generic scenario for twin BWRs and establish a fuel management scheme. Calculations for the amount of fuel that the plants will use during 40 years of operation were done, and an evaluation of costs using constant money method for each option applying current prices for uranium and services were made. Finally a comparison between the options was made, resulting that even the current high prices of uranium, still the recycling option is more expensive that the once through alternative. But reprocessing could be an alternative to reduce the amount of spent fuel stored in the reactor pools. (authors)
Invariant discretization schemes for the shallow-water equations
Alexander Bihlo; Roman O. Popovych
2013-01-03T23:59:59.000Z
Invariant discretization schemes are derived for the one- and two-dimensional shallow-water equations with periodic boundary conditions. While originally designed for constructing invariant finite difference schemes, we extend the usage of difference invariants to allow constructing of invariant finite volume methods as well. It is found that the classical invariant schemes converge to the Lagrangian formulation of the shallow-water equations. These schemes require to redistribute the grid points according to the physical fluid velocity, i.e., the mesh cannot remain fixed in the course of the numerical integration. Invariant Eulerian discretization schemes are proposed for the shallow-water equations in computational coordinates. Instead of using the fluid velocity as the grid velocity, an invariant moving mesh generator is invoked in order to determine the location of the grid points at the subsequent time level. The numerical conservation of energy, mass and momentum is evaluated for both the invariant and non-invariant schemes.
Security Schemes for Wireless Sensor Networks with Mobile Sink
Rasheed, Amar Adnan
2011-08-08T23:59:59.000Z
multi-hop approach used alone. 9 CHAPTER II KEY PRE-DISTRIBUTION SCHEMES FOR TOLERATING NODES CAPTURE IN SENSOR NETWORK WITH MS In this chapter, we propose two key pre-distribution schemes.... Taylor May 2010 Major Subject: Computer Science iii ABSTRACT Security Schemes for Wireless Sensor Networks with Mobile Sink. (May 2010) Amar Adnan Rasheed, B.S., University of Baghdad; M.S., Northeastern Illinois University Chair...
A Three-Operator Splitting Scheme and its Optimization Applications
Damek Davis
2015-03-04T23:59:59.000Z
Mar 4, 2015 ... Abstract: Operator splitting schemes have been successfully used in computational sciences to reduce complex problems into a series of ...
Energy stable schemes and numerical simulations of two phase ...
Title: Energy stable schemes and numerical simulations of two phase complex fluids by the phase-field method Abstact: We present an energetic variational ...
Efficient energy stable schemes with spectral discretization in space ...
2012-04-03T23:59:59.000Z
We develop in this paper efficient and robust numerical methods for solving anisotropic. Cahn–Hilliard systems. We construct energy stable schemes for the time ...
Forcing scheme in pseudopotential lattice Boltzmann model for multiphase flows
Q. Li; K. H. Luo; X. J. Li
2012-04-18T23:59:59.000Z
The pseudo-potential lattice Boltzmann (LB) model is a widely used multiphase model in the LB community. In this model, an interaction force, which is usually implemented via a forcing scheme, is employed to mimic the molecular interactions that cause phase segregation. The forcing scheme is therefore expected to play an important role in the pseudo-potential LB model. In this paper, we aim to address some key issues about forcing schemes in the pseudo-potential LB model. Firstly, theoretical and numerical analyses will be made for Shan-Chen's forcing scheme and the exact-difference-method (EDM) forcing scheme. The nature of these two schemes and their recovered macroscopic equations will be shown. Secondly, through a theoretical analysis, we will reveal the physics behind the phenomenon that different forcing schemes exhibit different performances in the pseudo-potential LB model. Moreover, based on the analysis, we will present an improved forcing scheme and numerically demonstrate that the improved scheme can be treated as an alternative approach for achieving thermodynamic consistency in the pseudo-potential LB model.
Discretization schemes for diffusion operators on general meshes
Herbin, Raphaèle
: Navier Stokes equations Flow in porous media, Darcy equation. discretization of -div( u)) A can Supplementary constraint from the oil reservoir simulation community: cell centred schemes transport equations
Nested punctual Hilbert schemes and commuting varieties of parabolic subalgebras
Boyer, Edmond
be an algebraically closed field of arbitrary characteristic. Let S[n] denote the Hilbert scheme parametrizing- sional schemes zk1 zk2 Â· Â· Â· zkr organised in a tower of successive inclusions [Ch1, Ch2]. Let C and commut- ing varieties. If zn S[n] is a zero dimensional subscheme, and if b1, . . . , bn is a base
Journey data based arrival forecasting for bicycle hire schemes
Imperial College, London
Journey data based arrival forecasting for bicycle hire schemes Marcel C. Guenther and Jeremy T. The global emergence of city bicycle hire schemes has re- cently received a lot of attention of future bicycle migration trends, as these assist service providers to ensure availability of bicycles
Cryptanalysis of a recent two factor authentication scheme
Centre Dublin City University Ballymun, Dublin 9, Ireland. mike.scott@certivox.com Abstract. Very recently a scheme has been proposed by Wang and Ma for a robust smart-card based password authentication scheme, which claims to be secure against a Smart Card security breach. In this short note we attempt
Job Scheduling Scheme for Pure Space Sharing among Rigid Jobs
Feitelson, Dror
Job Scheduling Scheme for Pure Space Sharing among Rigid Jobs Kento Aida1, Hironori Kasahara2. This paper evaluates the performance of job scheduling sche- mes for pure space sharing among rigid jobs. Conventional job scheduling schemes for the pure space sharing among rigid jobs have been achieved by First
A PRIORITY-BASED ADAPTIVE SCHEME FOR WIRELESS MULTIMEDIA DELIVERY
A PRIORITY-BASED ADAPTIVE SCHEME FOR WIRELESS MULTIMEDIA DELIVERY Edward Casey and Gabriel, Dublin 9, Ireland Email: {caseye, munteang}@eeng.dcu.ie ABSTRACT In wireless multimedia streaming proposes a priority-based wireless adaptive multimedia delivery scheme that enables client prioritisation
A pressure control scheme for air brakes in commercial vehicles
Bowlin, Christopher Leland
2007-04-25T23:59:59.000Z
This research is focused on developing a control scheme for regulating the pressure in the brake chamber of an air brake system found in most commercial vehicles like trucks, tractor-trailers and buses. Such a control scheme can be used...
Wireless sensor networks under the random pairwise key predistribution scheme
Yagan, Osman
Wireless sensor networks under the random pairwise key predistribution scheme: Can resiliency, College Park, MD 20742. Email: armand@isr.umd.edu Abstract--We investigate the resiliency of wireless the classical key predistribution scheme of Eschenauer and Gligor. Keywords: Wireless sensor networks, Security
On Identification Secret Sharing Schemes Departmant of Information Engineering
Bielefeld, University of
1 On Identification Secret Sharing Schemes Ning Cai Departmant of Information Engineering. #12; 2 Running head: Identification Secret Sharing Corresponding Author: Ning Cai Departmant be a set of participants sharing a secret from a set of secrets. A secret sharing scheme is a protocol
Dynamic access policies for unconditionally secure secret sharing schemes
Martin, Keith
Dynamic access policies for unconditionally secure secret sharing schemes Keith M. Martin.martin@rhul.ac.uk Abstract--- Secret sharing schemes are cryptographic primitives that can be employed in any situation where it is desirable to distribute information relating to secret data amongst a number of entities. Following a secure
A Novel Visual Secret Sharing Scheme without Image Size Expansion
Heys, Howard
A Novel Visual Secret Sharing Scheme without Image Size Expansion Nazanin Askari, Cecilia Moloney. Visual cryptography is a secure secret sharing scheme that divides secret images into shares which on their own reveal no information of the original secret image. Recovery of the secret image can be performed
The dealer's random bits in perfect secret sharing schemes
Csirmaz, László
The dealer's random bits in perfect secret sharing schemes L#19;aszl#19;o Csirmaz #3; Mathematical A secret sharing scheme permits a secret to be shared among partici- pants of an n-element group in such a way that only quali#12;ed subsets of participants can recover the secret. If any non-quali#12;ed
Quantum secret sharing schemes and reversibility of quantum operations
Ogawa, Tomohiro [Graduate School of Information Science and Technology, University of Tokyo, 7-3-1 Hongo, Bunkyo-ku, Tokyo, 113-8656 (Japan); Sasaki, Akira [Sumitomo Mitsui Banking Corporation, 1-3-2, Marunouchi, Chiyoda-ku, Tokyo 100-0005 (Japan); Iwamoto, Mitsugu [Graduate School of Information Systems, University of Electro-Communications, 1-5-1 Chofugaoka, Chofu-shi, Tokyo, 182-8585 (Japan); Yamamoto, Hirosuke [Graduate School of Frontier Sciences, University of Tokyo, 5-1-5 Kashiwanoha, Kashiwa-shi, Chiba, 277-8561 (Japan)
2005-09-15T23:59:59.000Z
Quantum secret sharing schemes encrypting a quantum state into a multipartite entangled state are treated. The lower bound on the dimension of each share given by Gottesman [Phys. Rev. A 61, 042311 (2000)] is revisited based on a relation between the reversibility of quantum operations and the Holevo information. We also propose a threshold ramp quantum secret sharing scheme and evaluate its coding efficiency.
Secret sharing schemes on graphs L aszl o Csirmaz
Csirmaz, László
Secret sharing schemes on graphs L#19;aszl#19;o Csirmaz Mathematical Institute of the Hungarian secret sharing scheme based on G is a method to distribute a secret data among the vertices of G, the participants, so that a subset of participants can recover the secret if they contain an edge of G, otherwise
Secret-Sharing Schemes: A Survey Amos Beimel
Beimel, Amos
Secret-Sharing Schemes: A Survey Amos Beimel Department of Computer Science, Ben-Gurion University, Beer-Sheva, Israel. Abstract. A secret-sharing scheme is a method by which a dealer dis- tributes shares to parties such that only authorized subsets of parties can reconstruct the secret. Secret
Ideal Secret Sharing Schemes: Yet Another Combinatorial Characterization, Certain Access
Fuji-Hara, Ryoh
Ideal Secret Sharing Schemes: Yet Another Combinatorial Characterization, Certain Access Structures secret sharing scheme is a method of sharing a secret key in some key space among a finite set of participants in such a way that only the authorized subsets of participants can reconstruct the secret key from
SETUP in Secret Sharing Schemes using Random Values
SETUP in Secret Sharing Schemes using Random Values Ruxandra F. Olimid E-mail: ruxandra.olimid@fmi.unibuc.ro Abstract. Secret sharing schemes divide a secret among multiple par- ticipants so that only authorized subsets of parties can reconstruct it. We show that SETUP (Secretly Embedded Trapdoor with Universal Pro
An active interferometer-stabilization scheme with linear phase control
Potma, Eric Olaf
An active interferometer-stabilization scheme with linear phase control Vishnu Vardhan not require modulation of the interfering beams and relies on an error signal which is linearly related scheme enables adjustable phase control with 20 ms switching times in the range from 0.02 radians to 6
Contemporary Mathematics Explicit schemes in seismic migration and isotropic
Papadakis, Manos
Multiresolution Analyses (IMRA) for L2(Rd). We develop a wave equation based poststack depth migration schemeContemporary Mathematics Explicit schemes in seismic migration and isotropic multiscale, offers the possibility of reducing the cost of computation. 1. Introduction Migration is a seismic
Toward the ultimate conservative scheme : following Mathmatiques Appliques de Bordeaux
Abgrall, Rémi
. They are a blending between a #28;rst order scheme and a second order scheme, the blending is realized from entropy; is the density, u and v are the components of the velocity, #15; the internal energy and E = #26;#15; + 1 2 #26
Coordinated Renewable Energy Support Schemes Stine Grenaa Jensen1
Coordinated Renewable Energy Support Schemes Stine Grenaa Jensen1 , and Poul Erik Morthorst2 Risø for renewable energy are regionalised. Two theoretical examples are used to explain interactive effects on, e-ordination of support schemes for renewable energy technologies plays a prominent role at the European agenda (EC, 2005
Capdeboscq, Yves
THE QUEEN'S COLLEGE RECYCLING SCHEME Under the new recycling scheme commencing at the beginning in all student rooms and offices o one for normal waste o one for co-mingled recycling1 Bins these bins. If any recycling is contaminated it will be `waste' not recycling and it would need to go
Carmona, Rene
Key words. Emissions markets, Cap-and-trade schemes, Equilibrium models, Environmental Finance. MARKET DESIGN FOR EMISSION TRADING SCHEMES REN´E CARMONA , MAX FEHR , JURI HINZ , AND ARNAUD PORCHET to help policy makers and regulators understand the pros and the cons of the emissions markets. We propose
Wang, Yongge
Efficient LDPC Code Based Secret Sharing Schemes and Private Data Storage in Cloud without in LDPC and LT codes, this paper introduces three classes of secret sharing schemes called BP-XOR secret sharing schemes, pseudo-BP-XOR secret sharing schemes, and LDPC secret sharing schemes. By establishing
effective sampling schemes for behavior discrimination in nonlinear
2013-11-08T23:59:59.000Z
Similarly, in optimal control theory, the ... oped for nonlinear ODE models. .... However, in practice, since the low-discrepancy sampling schemes try to cover the whole ...... model predictive control, Automatic Control, IEEE Transactions on,
Transformation optics scheme for two-dimensional materials
Kumar, Anshuman
Two-dimensional optical materials, such as graphene, can be characterized by surface conductivity. So far, the transformation optics schemes have focused on three-dimensional properties such as permittivity ? and permeability ...
Improving multivariate Horner schemes with Monte Carlo tree search
J. Kuipers; J. A. M. Vermaseren; A. Plaat; H. J. van den Herik
2012-07-30T23:59:59.000Z
Optimizing the cost of evaluating a polynomial is a classic problem in computer science. For polynomials in one variable, Horner's method provides a scheme for producing a computationally efficient form. For multivariate polynomials it is possible to generalize Horner's method, but this leaves freedom in the order of the variables. Traditionally, greedy schemes like most-occurring variable first are used. This simple textbook algorithm has given remarkably efficient results. Finding better algorithms has proved difficult. In trying to improve upon the greedy scheme we have implemented Monte Carlo tree search, a recent search method from the field of artificial intelligence. This results in better Horner schemes and reduces the cost of evaluating polynomials, sometimes by factors up to two.
Program Mobile Robots in Scheme1 Jonathan Rees Bruce Donald
Richardson, David
that permits a small mobile robot to be programmed us- ing the Scheme programming language 3]. The envi under grants no. IRI-8802390 and IRI-9000532and by a Presidential Young Investigator award to Bruce
Towards an Emissions Trading Scheme for Air Pollutants in India
Duflo, Esther
Emissions trading schemes have great potential to lower pollution while minimizing compliance costs for firms in many areas now subject to traditional command-and-control regulation. This paper connects experience with ...
Robust and scalable scheme to generate large-scale entanglement...
Office of Scientific and Technical Information (OSTI)
an N-qubit W state among separated quantum nodes (cavity-QED systems) by using linear optics and postselections. The present scheme inherits the robustness of the Barrett-Kok...
INDUSTRIAL ASSOCIATESHIP SCHEME Centre for Industrial Consultancy and Sponsored Research
Bhashyam, Srikrishna
this scheme: #12;(i) Energy Energy Storage (1990) Strategies for Energy Saving in Industry (1993) Pollution Control Equipment (2001) Acoustics and Noise Control for Industry (2005) Urban Air Quality
The reliability of a dialogue structure coding scheme.
Carletta, Jean; Isard, Amy; Isard, Stephen; Kowtko, Jacqueline C; Doherty-Sneddon, Gwyneth; Anderson, Anne H
1997-01-01T23:59:59.000Z
This papers describes the reliability of a dialogue structure coding scheme which is based on utterance function, game structure, and higher level transaction function, and which has been applied to a corpus of spontaneous ...
CharacteristicBased Dissipative Schemes and Characteristic Time Stepping
Pierce, Niles A.
in the boundary layer. The present work examines the development of pre conditioning techniques that approximate scheme is developed for scalar conservation laws to serve as the basis for nonoscillatory high
An unconditionally stable rotational velocity-correction scheme for ...
S. Dong
2010-07-22T23:59:59.000Z
Jun 2, 2010 ... schemes widely employed in current incompressible flow .... force; m is the fluid kinematic viscosity; w is the velocity Dirichlet boundary condition. ...... [19] L.I.G. Kovasznay, Laminar flow behind a two-dimensional grid, Proc.
Bouida, Zied
2010-01-14T23:59:59.000Z
have been used jointly in new schemes named joint adaptive modulation and diversity combining (JAMDC) schemes. Considering the problem of finding lowcomplexity, bandwidth-efficient, and processing-power efficient transmission schemes for a downlink...
Loss analysis of thermal reservoirs for electrical energy storage schemes
White, Alexander
2011-05-14T23:59:59.000Z
Loss Analysis of Thermal Reservoirs for Electrical Energy Storage Schemes Alexander J. White Hopkinson Laboratory, Cambridge University Engineering Department, Trumpington Street, Cambridge, CB2 1PZ, UK. Email: ajw36@cam.ac.uk Abstract The paper... storage schemes. Key words: Regenerators, Thermal Energy Storage, Electrical Energy Storage, Thermodynamic Loss. Preprint submitted to Elsevier Preprint 9 March 2011 1 INTRODUCTION The increasing use of renewable energy technologies for electricity...
Conformal Behavior at Four Loops and Scheme (In)Dependence
Thomas A. Ryttov
2014-10-01T23:59:59.000Z
We search for infrared zeros of the beta function and evaluate the anomalous dimension of the mass at the associated fixed point for asymptotically free vector-like fermionic gauge theories with gauge group SU(N). The fixed points of the beta function are studied at the two, three and four loop level in two different explicit schemes. These are the modified regularization invariant, RI', scheme and the minimal momentum subtraction, mMOM, scheme. The search is performed in Landau gauge where the beta function of the gauge parameter vanishes. We then compare our findings to earlier identical investigations performed in the modified minimal subtraction, $\\bar{\\text{MS}}$, scheme. It is found that the value of the anomalous dimension of the mass is smaller at three and four loops than at two loops. This seems to be a generic pattern that is observed in all three different schemes. We then estimate the value of the anomalous dimension to be $\\gamma \\sim 0.225-0.375$ for twelve fundamental flavors and three colors, $\\gamma \\sim 0.500 - 0.593$ for two adjoint flavors and two colors and finally $\\gamma \\sim 1.12-1.70$ for two two-indexed flavors and three colors with the lower and upper bound set by the minimum and maximum value respectively over all three schemes and at three and four loops. Our analysis suggests that the former two theories lie in the conformal window while the latter belongs to the chirally broken phase.
Stadler, Michael
2010-01-01T23:59:59.000Z
The Influence of a CO2 Pricing Scheme on Distributed Energy5. Regional Results for the CO2 Pricing Scheme no-invest
CX-000104: Categorical Exclusion Determination
Broader source: Energy.gov [DOE]
Pedro Bay Native Village Technical Consulting Services for Mini Hydropower Feasibility StudyCX(s) Applied: A9, A11Date: 12/04/2009Location(s): AlaskaOffice(s): Energy Efficiency and Renewable Energy
Inversion of seismic reflection traveltimes using a nonlinear optimization scheme
Pullammanappallil, S.K.; Louie, J.N. (Univ. of Nevada, Reno, NV (United States). Mackay School of Mines)
1993-11-01T23:59:59.000Z
The authors present the use of a nonlinear optimization scheme called generalized simulated annealing to invert seismic reflection times for velocities, reflector depths, and lengths. A finite-difference solution of the eikonal equation computes reflection traveltimes through the velocity model and avoids ray tracing. They test the optimization scheme on synthetic models and compare it with results from a linearized inversion. The synthetic tests illustrate that, unlike linear inversion schemes, the results obtained by the optimization scheme are independent of the initial model. The annealing method has the ability to produce a suite of models that satisfy the data equally well. They make use of this property to determine the uncertainties associated with the model parameters obtained. Synthetic examples demonstrate that allowing the reflector length to vary, along with its position, helps the optimization process obtain a better solution. The authors put this to use in imaging the Garlock fault, whose geometry at depth is poorly known. They use reflection times picked from shot gathers recorded along COCORP Mojave Line 5 to invert for the Garlock fault and velocities within the Cantil Basin below Fremont Valley, California. The velocities within the basin obtained by their optimization scheme are consistent with earlier studies, though their results suggest that the basin might extend 1--2 km further south. The reconstructed reflector seems to suggest shallowing of the dip of the Garlock fault at depth.
A bottom-up analysis of including aviation within theEU's Emissions Trading Scheme
Watson, Andrew
A bottom-up analysis of including aviation within theEU's Emissions Trading Scheme Alice Bows-up analysis of including aviation within the EU's Emissions Trading Scheme Alice Bows & Kevin Anderson Tyndall's emissions trading scheme. Results indicate that unless the scheme adopts both an early baseline year
A Multivariate based Threshold Ring Signature Scheme Albrecht Petzoldt1,2
International Association for Cryptologic Research (IACR)
A Multivariate based Threshold Ring Signature Scheme Albrecht Petzoldt1,2 , Stanislav Bulygin1.buchmann,Stanislav.Bulygin}@cased.de Abstract. In [16], Sakumoto et al. presented a new multivariate identification scheme, whose security is the first multivariate scheme of this type and generally the first multivariate signature scheme
Buffer Management Schemes for Supporting TCP in Gigabit Routers with Per-flow Queueing
Stiliadis, Dimitrios
- tection) [3] scheme to prevent lockout (where one connection monopolizes the link) and to prevent global
A New (k, n)-Threshold Secret Sharing Scheme and Its Extension
A New (k, n)-Threshold Secret Sharing Scheme and Its Extension Jun Kurihara, Shinsaku Kiyomoto)-threshold secret sharing scheme (threshold scheme), a heavy computational cost is required to make n shares and recover the secret. As a solution to this problem, several fast thresh- old schemes have been proposed
Compounding Secret Sharing Schemes E. Martinez-Moro, J. Mozo-Fernandez and C. Munuera 1
International Association for Cryptologic Research (IACR)
schemes. Key Words: Cryptography, Secret sharing schemes, Threshold schemes. Subject Classification: (MSC scheme realizing it. More generally we define the optimal information rate of the structure as () = sup in real life participants are, in a natural way, in a hierarchy and not on equal terms. Then, structures
Forward Security in Threshold Signature Schemes MICHEL ABDALLA SARA MINER y CHANATHIP NAMPREMPRE z
International Association for Cryptologic Research (IACR)
Forward Security in Threshold Signature Schemes MICHEL ABDALLA #3; SARA MINER y CHANATHIP of the BellareMiner forwardsecure signature scheme, which is FiatShamirbased. One scheme uses multiplicative secret sharing, and we prove it forwardsecure based on the security of the BellareMiner scheme. We
He, Yanping
On-line supplement: The Turbulence Parameterization Scheme The turbulence scheme used in this work-gradient turbulent transfer processes for cloud-free conditions. Throughout this supplement w denotes vertical
Implementaion and performance of checkpointing schemes in a distributed environment
Soni, Sameer
1994-01-01T23:59:59.000Z
the Parameters V. B. 1 Number of Application Messages Number of messages is controBed by changing the value of NUM JUIESG in the program. We have controlled the number of messages to 10, 100, and 200. V. B. 2 Checkpoint Interval UNIX system caD 'settimer.... D. 1 Comparison of Schemes Consider Table I. The P value column has been obtained from the ANOVA result. Then the Tukey-Kramer Comparison Test has been run on all the combinations with significant difference (P&0. 05) to know exactly which schemes...
Set Theory as the Unified Scheme for Physics
Andrey V. Novikov-Borodin
2015-01-08T23:59:59.000Z
The process of cognition is analysed to adjust the set theory to physical description. Postulates and basic definitions are revised. The specific sets of predicates, called presets, corresponding to the physical objects identified by an observer during cognition are introduced. Unlike sets, the presets are free of logical or set-theoretical paradoxes and may be consistently used in physical description. Schemes of cognition based on presets are considered. Being different logical systems, the relativistic and quantum theories, observations in modern cosmology cannot be consistently considered in one `unified physical theory', but they are in frames of introduced schemes of cognition.
CONSTRUCTING SECURE CONTENT-DEPENDENT WATERMARKING SCHEME USING HOMOMORPHIC ENCRYPTION
Sun, Qibin
CONSTRUCTING SECURE CONTENT-DEPENDENT WATERMARKING SCHEME USING HOMOMORPHIC ENCRYPTION Zhi Li.a-star.edu.sg ABSTRACT Content-dependent watermarking (CDWM) has been pro- posed as a solution to overcome the potential and cryptography. 1. INTRODUCTION Consider a simplified model of Spread-Spectrum (SS) water- marking. Let x
Scheme independence as an inherent redundancy in quantum field theory
Jose I. Latorre; Tim R. Morris
2001-02-07T23:59:59.000Z
The path integral formulation of Quantum Field Theory implies an infinite set of local, Schwinger-Dyson-like relations. Exact renormalization group equations can be cast as a particular instance of these relations. Furthermore, exact scheme independence is turned into a vector field transformation of the kernel of the exact renormalization group equation under field redefinitions.
Model Predictive Control based Real Time Power System Protection Schemes
Kumar, Ratnesh
1 Model Predictive Control based Real Time Power System Protection Schemes Licheng Jin, Member by controlling the production, absorption as well as flow of reactive power at various locations in the system predictive control, trajectory sensitivity, voltage stabilization, switching control, power system I
INFORMATION SYSTEMS MODELLING USING LOOPN++, AN OBJECT PETRI NET SCHEME
Lakos, Charles
INFORMATION SYSTEMS MODELLING USING LOOPN++, AN OBJECT PETRI NET SCHEME Chris Keen and Charles, object petri nets, information systems modelling, ontological expressiveness Abstract There have been formalisms based on petri nets. In particular, the application of objectÂbased design principles have
A new blowdown compensation scheme for boiler leak detection
Marquez, Horacio J.
A new blowdown compensation scheme for boiler leak detection A. M. Pertew ,1 X. Sun ,1 R. Kent considers the blowdown effect in industrial boiler operation. This adds to the efficiency of recent advances in identification-based leak detection techniques of boiler steam- water systems. Keywords: Industrial Boilers, Tube
LMS: A Router Assisted Scheme for Reliable Multicast Christos Papadopoulos
Papadopoulos, Christos
1 LMS: A Router Assisted Scheme for Reliable Multicast Christos Papadopoulos University of Southernweight Multicast Ser vices (LMS), which enhance the existing multicast model with simple forwarding services that do not require transport level actions. Using LMS, routers tag and steer transportlevel control
Conservativeness and translation-dependent T-schemes
Ketland, Jeffrey
2000-01-01T23:59:59.000Z
Certain translational T-schemes of the form True(“f”) « f(f), where f(f) can be almost any translation you like of f, will be a conservative extension of Peano arithmetic. I have an inkling that this means something ...
Displacement Correction Scheme for MR-Guided Interstitial Laser Therapy
van Vliet, Lucas J.
Displacement Correction Scheme for MR-Guided Interstitial Laser Therapy S. Suprijanto1 , M.W. Vogel[1,3]. In the absence of motion, MR thermometry based on phase imaging is quite accurate[12 , F.M. Vos1 , H.A. Vrooman2,3 , and A.M. Vossepoel1 1 Pattern Recognition Group, Department
Cryptanalysis of Two Dynamic IDbased Remote User Authentication Schemes for
University, Harbin City 150001, China 2 Automobile Management Institute of PLA, Bengbu City 233011, China guessing attack under their nontamper resistance assumption of the smart card; (2) It fails to provide of schemes. Keywords: Cryptanalysis, Authentication protocol, O#ine password guessing attack, Smart card
The Software Invention Cube: a Classification Scheme for Software Inventions
Klint, Paul
The Software Invention Cube: a Classification Scheme for Software Inventions Jan A. Bergstra.science.uva.nl/~janb and Paul Klint Centrum voor Wiskunde en Informatica (CWI), Software Engineering Department and Informatics system aims at protecting inventions. The requirement that a software invention should make `a technical
University of Alberta A MULTI-SPECTRAL DECIMATION SCHEME FOR
Roberts, Malcolm
University of Alberta A MULTI-SPECTRAL DECIMATION SCHEME FOR TURBULENCE SIMULATIONS by Malcolm Ian and Statistical Sciences c Malcolm Ian William Roberts Fall, 2006 Edmonton, Alberta Permission is hereby granted to the University of Alberta Libraries to reproduce single #12;copies of this thesis and to lend or sell such copies
Optimal Suspicion Functions for Tardos Traitor Tracing Schemes
International Association for Cryptologic Research (IACR)
Descriptors E.4 [Data]: Coding and Information Theory; G.1 [Mathematics of Computing]: Numerical Analysis; G.1 functions for Tardos traitor tracing schemes. In the simple decoder approach (computation of a score.6 [Numerical Analysis]: Optimization--Constrained optimization, Stochastic programming General Terms Design
DUALIZING COMPLEXES AND PERVERSE SHEAVES ON NONCOMMUTATIVE RINGED SCHEMES
Zhang, James
algebras over a base field _. In the decade since its introduction the theory of noncommutative dualizing affine theory was introduced in [Ye1]. By "affine" we mean that this theory deals with noncommutative DUALIZING COMPLEXES AND PERVERSE SHEAVES ON NONCOMMUTATIVE RINGED SCHEMES
A unified enrichment scheme for fracture Safdar Abbas
A unified enrichment scheme for fracture problems Safdar Abbas Thomas-Peter Fries AICES, RWTH XFEM in fracture mechanics Numerical examples (cohesionless cracks) Numerical examples (cohesive cracks) Conclusions Future outlook 2 #12;Motivation Outline Motivation XFEM in fracture mechanics Numerical examples
Network Coding-Based Protection Scheme for Elastic Optical Networks
Politècnica de Catalunya, Universitat
speed transmissions achieved in fiber optical networks. Traditional optical networks consist of a fixed. Recently, optical networks are undergoing significant changes with the purpose of providing a flexible grid with protection schemes for the purpose of reducing power consumption. An additional goal for network providers
Dynamic System Performance of SISO, MISO and MIMO Alamouti Schemes
Paris-Sud XI, Université de
Dynamic System Performance of SISO, MISO and MIMO Alamouti Schemes Dorra Ben Cheikh Battikh , Jean, coupecho, godlewski}@enst.fr Abstract--In this paper, the performance of a SISO system, a 2 × 1 MISO multiplexing tradeoff for a 2 × 1 MISO system. Many other techniques have been proposed to exploit antennas
A SELF SYNCHRONISED SCHEME FOR AUTOMATED COMMUNICATION IN WIRELESS
Kent, University of
attached to sensor nodes have a limited transmission range, multi-hop communication is needed to flexiblyA SELF SYNCHRONISED SCHEME FOR AUTOMATED COMMUNICATION IN WIRELESS SENSOR NETWORKS #Antonio Gonzalez-Velazquez1 , Ian W Marshall2 , Lionel Sacks1 1 Department of Electronic and electric engineering
PLM: Fast Convergence for Cumulative Layered Multicast Transmission Schemes
Legout, Arnaud
PLM: Fast Convergence for Cumulative Layered Multicast Transmission Schemes A. Legout and E. W- ticast congestion control protocol (called PLM) for audio/video and file transfer applications based PLM for a large variety of scenarios and show that it converges fast to the optimal link utilization
A Version Numbering Scheme with a Useful Lexicographical Order
Keller, Arthur M.
A Version Numbering Scheme with a Useful Lexicographical Order Arthur M. Kellery Je rey D. Ullmanz Engineering Database. This e ort is funded in part by NSF grant IRI 91 16646. yArthur Keller's e-mail address records can be obtained in little more than the time it takes to access data of this bulk. Our primary
PICBIT: A Scheme System for the PIC Microcontroller
Feeley, Marc
PICBIT: A Scheme System for the PIC Microcontroller Marc Feeley / Universit´e de Montr´eal Danny which specifically targets the PIC microcontroller family. The PIC is a popular inexpensive single for the PIC microcontroller family which has even tighter memory constraints. 2 THE PIC MICROCONTROLLER
Energy-Efficient Routing Schemes for Wireless Sensor Networks
Khan, Maleq
1 Energy-Efficient Routing Schemes for Wireless Sensor Networks Maleq Khan Gopal Pandurangan Bharat Bhargava Abstract-- Microsensors operate under severe energy constraints. Depending on the application-configuration. Data-centric routing is a new use- ful paradigm for energy-constrained sensor networks. The data coming
Energy Efficiency of Encryption Schemes Applied to Wireless Sensor Networks
Heys, Howard
Energy Efficiency of Encryption Schemes Applied to Wireless Sensor Networks Xueying Zhang, Howard M In this paper, we focus on the energy efficiency of secure communication in wireless sensor networks (WSNs). Our) of Canada and the Wireless Communications and Mobile Computing Research Centre (WCMCRC) of Memorial
On thermodynamically consistent schemes for phase field equations
Fife, Paul
and at the phase change front. A somewhat different approach of Charach and Zemel [2] combines bal- ance equationsOn thermodynamically consistent schemes for phase field equations C. Charach and P. C. Fife thermodynamics. The principal applications are to the solidification of a pure material and of a binary alloy
Image Fusion schemes using ICA bases Nikolaos Mitianoudis, Tania Stathaki
Mitianoudis, Nikolaos
Image Fusion schemes using ICA bases Nikolaos Mitianoudis, Tania Stathaki Communications and Signal Processing group, Imperial College London, Exhibition Road, SW7 2AZ London, UK Abstract Image fusion as analysis and synthesis tools for image fusion by the fusion community. Using various fusion rules, one can
FLIPS AND THE HILBERT SCHEME OVER AN EXTERIOR ALGEBRA
Peeva, Irena
FLIPS AND THE HILBERT SCHEME OVER AN EXTERIOR ALGEBRA Irena Peeva and Mike Stillman Department of Mathematics, Cornell University, Ithaca, NY 14853, USA. Abstract: We study the tangent space at a monomial an exterior algebra. 1. Introduction Throughout the paper k stands for an infinite field. Let E
AN LMIBASED CONSTRAINED MPC SCHEME WITH TIMEVARYING TERMINAL
#12; #12; AN LMIBASED CONSTRAINED MPC SCHEME WITH TIMEVARYING TERMINAL COST B. Pluymers, L in the general acceptance of a theoretical MPC stability framework introducing a terminal cost and terminal guarantees stability by use of a timevarying terminal cost and terminal constraint. The online calculation
Minimal Schemes for Large Neutrino Mixings with Inverted Hierarchy
Duane A. Dicus; Hong-Jian He; John N. Ng
2002-05-17T23:59:59.000Z
Existing oscillation data point to nonzero neutrino masses with large mixings. We analyze the generic features of the neutrino Majorana mass matrix with inverted hierarchy and construct realistic {\\it minimal schemes} for the neutrino mass matrix that can explain the large (but not maximal) \
A Directionality based Location Discovery Scheme for Wireless Sensor Networks
Ha, Dong S.
A Directionality based Location Discovery Scheme for Wireless Sensor Networks Asis Nasipuri and Kai is a large ad hoc network of densely dis- tributed sensors that are equipped with low power wireless number of such wireless sensors can be networked to coordinate amongst themselves and per- form the much
Novel coupling scheme to control dynamics of coupled discrete systems
Snehal M. Shekatkar; G. Ambika
2014-11-05T23:59:59.000Z
We present a new coupling scheme to control spatio-temporal patterns and chimeras on 1-d and 2-d lattices and random networks of discrete dynamical systems. The scheme involves coupling with an external lattice or network of damped systems. When the system network and external network are set in a feedback loop, the system network can be controlled to a homogeneous steady state or synchronized periodic state with suppression of the chaotic dynamics of the individual units. The control scheme has the advantage that its design does not require any prior information about the system dynamics or its parameters and works effectively for a range of parameters of the control network. We analyze the stability of the controlled steady state or amplitude death state of lattices using the theory of circulant matrices and Routh-Hurwitz's criterion for discrete systems and this helps to isolate regions of effective control in the relevant parameter planes. The conditions thus obtained are found to agree well with those obtained from direct numerical simulations in the specific context of lattices with logistic map and Henon map as on-site system dynamics. We show how chimera states developed in an experimentally realizable 2-d lattice can be controlled using this scheme. We propose this mechanism can provide a phenomenological model for the control of spatio-temporal patterns in coupled neurons due to non-synaptic coupling with the extra cellular medium. We extend the control scheme to regulate dynamics on random networks and adapt the master stability function method to analyze the stability of the controlled state for various topologies and coupling strengths.
Novel coupling scheme to control dynamics of coupled discrete systems
Snehal M. Shekatkar; G. Ambika
2015-08-08T23:59:59.000Z
We present a new coupling scheme to control spatio-temporal patterns and chimeras on 1-d and 2-d lattices and random networks of discrete dynamical systems. The scheme involves coupling with an external lattice or network of damped systems. When the system network and external network are set in a feedback loop, the system network can be controlled to a homogeneous steady state or synchronized periodic state with suppression of the chaotic dynamics of the individual units. The control scheme has the advantage that its design does not require any prior information about the system dynamics or its parameters and works effectively for a range of parameters of the control network. We analyze the stability of the controlled steady state or amplitude death state of lattices using the theory of circulant matrices and Routh-Hurwitz's criterion for discrete systems and this helps to isolate regions of effective control in the relevant parameter planes. The conditions thus obtained are found to agree well with those obtained from direct numerical simulations in the specific context of lattices with logistic map and Henon map as on-site system dynamics. We show how chimera states developed in an experimentally realizable 2-d lattice can be controlled using this scheme. We propose this mechanism can provide a phenomenological model for the control of spatio-temporal patterns in coupled neurons due to non-synaptic coupling with the extra cellular medium. We extend the control scheme to regulate dynamics on random networks and adapt the master stability function method to analyze the stability of the controlled state for various topologies and coupling strengths.
A New Scheme for Predicting Fair-Weather Cumulus
Berg, Larry K.; Stull, Roland B.
2007-04-01T23:59:59.000Z
A new parameterization for boundary layer cumulus clouds, called the cumulus potential (CuP) scheme, is introduced. Unlike many other parameterizations, the CuP scheme explicitly links the fair-weather clouds to the boundary-layer turbulence and accounts for the non-local nature of the turbulence. This scheme uses joint probability density functions (JPDFs) of virtual potential temperature and water-vapor mixing ratio, as well as the mean vertical profiles of virtual potential temperature, to predict the amount and size distribution of boundary layer cloud cover. This model considers the diversity of air parcels over a heterogeneous surface, and recognizes that some parcels rise above their lifting condensation level to become cumulus, while other parcels might rise as clear updrafts. This model has several unique features: 1) surface heterogeneity and boundary-layer turbulence is represented using the boundary layer JPDF of virtual potential temperature versus water-vapor mixing ratio, 2) clear and cloudy thermals are allowed to coexist at the same altitude, and 3) a range of cloud-base heights, cloud-top heights, and cloud thicknesses are predicted within any one cloud field, as observed. Using data from Boundary Layer Experiment 1996 and a model intercomparsion study using large eddy simulation (LES) based on the Barbados Oceanographic and Meteorological Experiment (BOMEX), the CuP scheme is compared to three other cumulus parameterizations: one based on relative humidity, a statistical scheme based on the saturation deficit, and a slab model. It is shown that the CuP model does a better job predicting the cloud-base height and the cloud-top height than three other parameterizations. The model also shows promise in predicting cloud cover, and is found to give better cloud-cover estimates than the three other cumulus parameterizations. In ongoing work supported by the US Department of Energy¹s Atmospheric Radiation Measurement Program, the CuP scheme is being implemented in the Weather Research and Forecasting (WRF) model, in which it replaces the ad-hoc trigger function in an existing cumulus parameterization.
A Secret Sharing Scheme Based on Group Presentations and the Word Problem
Habeeb, Maggie; Shpilrain, Vladimir
2012-01-01T23:59:59.000Z
A (t,n)-threshold secret sharing scheme is a method to distribute a secret among n participants in such a way that any t participants can recover the secret, but no t-1 participants can. In this paper, we propose two secret sharing schemes using non-abelian groups. One scheme is the special case where all the participants must get together to recover the secret. The other one is a (t,n)-threshold scheme that is a combination of Shamir's scheme and the group-theoretic scheme proposed in this paper.
Competition of different coupling schemes in atomic nuclei
Qi, C; Wyss, R
2012-01-01T23:59:59.000Z
Shell model calculations reveal that the ground and low-lying yrast states of the $N=Z$ nuclei $^{92}_{46}$Pd and $^{96}$Cd are mainly built upon isoscalar spin-aligned neutron-proton pairs each carrying the maximum angular momentum J=9 allowed by the shell $0g_{9/2}$ which is dominant in this nuclear region. This mode of excitation is unique in nuclei and indicates that the spin-aligned pair has to be considered as an essential building block in nuclear structure calculations. In this contribution we will discuss this neutron-proton pair coupling scheme in detail. In particular, we will explore the competition between the normal monopole pair coupling and the spin-aligned coupling schemes. Such a coupling may be useful in elucidating the structure properties of $N=Z$ and neighboring nuclei.
Competition of different coupling schemes in atomic nuclei
C. Qi; R. J. Liotta; R. Wyss
2012-02-17T23:59:59.000Z
Shell model calculations reveal that the ground and low-lying yrast states of the $N=Z$ nuclei $^{92}_{46}$Pd and $^{96}$Cd are mainly built upon isoscalar spin-aligned neutron-proton pairs each carrying the maximum angular momentum J=9 allowed by the shell $0g_{9/2}$ which is dominant in this nuclear region. This mode of excitation is unique in nuclei and indicates that the spin-aligned pair has to be considered as an essential building block in nuclear structure calculations. In this contribution we will discuss this neutron-proton pair coupling scheme in detail. In particular, we will explore the competition between the normal monopole pair coupling and the spin-aligned coupling schemes. Such a coupling may be useful in elucidating the structure properties of $N=Z$ and neighboring nuclei.
A Parallelizable Implicit Evolution Scheme for Regge Calculus
John W. Barrett; Mark Galassi; Warner A. Miller; Rafael D. Sorkin; Philip A. Tuckey; Ruth M. Williams
1994-11-03T23:59:59.000Z
The role of Regge calculus as a tool for numerical relativity is discussed, and a parallelizable implicit evolution scheme described. Because of the structure of the Regge equations, it is possible to advance the vertices of a triangulated spacelike hypersurface in isolation, solving at each vertex a purely local system of implicit equations for the new edge-lengths involved. (In particular, equations of global ``elliptic-type'' do not arise.) Consequently, there exists a parallel evolution scheme which divides the vertices into families of non-adjacent elements and advances all the vertices of a family simultaneously. The relation between the structure of the equations of motion and the Bianchi identities is also considered. The method is illustrated by a preliminary application to a 600--cell Friedmann cosmology. The parallelizable evolution algorithm described in this paper should enable Regge calculus to be a viable discretization technique in numerical relativity.
Intra-bodyhybrid communication scheme for healthcare systems
Alshehab, Abdullah; Kobayashi, Nao; Sok, Sikieng; Shimamoto, Shigeru
2012-01-01T23:59:59.000Z
Intra-body communication (IBC) is a type of Body Area Network (BAN)that utilizes human body as the medium for data transmission. Thelow power requirements of intra-body communication (IBC) as compared to near field electromagnetic waves showed that it can be a suitable solution for Medical Body Area Networks (MBANs) in a mobile health care system.In this paper, we investigate the transmission characteristics of the human body as a conductor of signals by considering different data transmission rates of multi-point to point network in order to reduce overall power consumption of the BAN.Furthermore, we utilize IBC and propose a new scheme to combines Slotted ALOHA, TDMA, and Reservation ALOHA together to increase the throughput and decrease the delay. By using our new hybrid scheme with the movable boundary designed for health status monitoring, we are able to increase the efficiency of data transmission by prioritizing the more critical data from the sensors.
Controlling quantum systems by embedded dynamical decoupling schemes
Oliver Kern; Gernot Alber
2005-06-05T23:59:59.000Z
A dynamical decoupling method is presented which is based on embedding a deterministic decoupling scheme into a stochastic one. This way it is possible to combine the advantages of both methods and to increase the suppression of undesired perturbations of quantum systems significantly even for long interaction times. As a first application the stabilization of a quantum memory is discussed which is perturbed by one-and two-qubit interactions.
Nonlinearly consistent schemes for coupled problems in reactor analysis
Mahadevan, Vijay Subramaniam
2007-04-25T23:59:59.000Z
the coupling strategies currently in use and put forth their deficiencies. 4 head2right Explain the basic theory for our new coupling strategy and how the deficiencies in current schemes can be overcome head2right Discuss some stable numerical... problems arising in coupled physics. Based on the consolidated work concerning the theory of nonlinear properties of numerical methods by several researchers like Hairer E, Wanner G on solving non-stiff and stiff ODEs[7,8], Dekker K, Verver J...
The impact of the European Union Emissions Trading Scheme on US aviation
Malina, Robert
We estimate the economic impacts on US airlines that may arise from the inclusion of aviation in the European Union Emissions Trading Scheme from 2012 to 2020. We find that the Scheme would only have a small impact on US ...
Fournier, John J.F.
Introduction to nuclear fusion Modelling Finite volume scheme Formal asymptotics Summary Magnetized, Committee Member November 28, 2014 Michael Lindstrom Magnetized Target Fusion #12;Introduction to nuclear Target Fusion #12;Introduction to nuclear fusion Modelling Finite volume scheme Formal asymptotics
A Distributed Power Control and Routing Scheme for Rechargeable Sensor Networks
Nasipuri, Asis
A Distributed Power Control and Routing Scheme for Rechargeable Sensor Networks Amitangshu Pal power control and quality aware routing scheme for rechargeable wireless sensor networks (WSNs consumption based on estimated energy resources. Transmission power control has been widely researched
An adaptive nonlinear MOS scheme for precipitation forecasts using neural networks
Hsieh, William
An adaptive nonlinear MOS scheme for precipitation forecasts using neural networks Yuval, William W A novel neural network (NN) based scheme performs nonlinear Model Output Statistics (MOS) for generating
Jasperse, Craig P.
in Methanol 1. Turn hot plate to 5. 2. To the flask with your product 3 from Scheme 1, attach a condener with gentle water flow. 3. Add 15 mL of methanol. · For 4-methoxy compoud 3c, you may need to add 20 mL of methanol, since the 4-methoxy substrates is probably less soluble. 4. Heat the mixture on the hot plate
PROPOSAL OF A FINANCING SCHEME FOR A THIRD NPP IN BRAZIL
Filho, Z.D.T.
2004-10-06T23:59:59.000Z
This presentation discusses a proposal of a financing scheme for a third nuclear power plant in Brazil.
TU/e -Savings schemes 2011 Personnel Department 8-12-2010
Franssen, Michael
12 TU/e - Savings schemes 2011 Personnel Department 8-12-2010 The TU/e offers you the opportunity to participate in a salary savings scheme (spaarloonregeling). There are a number of general rules for you ""course-of-life""arrangement in the same year. Salary savings scheme TU/e staff can save up to a certain
Microprocessor-based random PWM schemes for DC-AC power conversion
Hui, S.Y.R. [Univ. of Sydney, New South Wales (Australia). Dept. of Electrical Engineering] [Univ. of Sydney, New South Wales (Australia). Dept. of Electrical Engineering; [City Univ. of Hong Kong, Kowloon (Hong Kong). Dept. of Electronic Engineering; Oppermann, I.; Sathiakumar, S. [Univ. of Sydney, New South Wales (Australia). Dept. of Electrical Engineering] [Univ. of Sydney, New South Wales (Australia). Dept. of Electrical Engineering
1997-03-01T23:59:59.000Z
Two classes of microprocessor-based random PWM (RPWM) real-time schemes for dc-ac power conversion are compared and evaluated. Performance of the RPWM schemes based on the mathematical and logical approaches is examined. The proposed schemes exhibit excellent harmonic content with all low and high-order harmonics suppressed and are suitable for both MOSFET and IGBT inverters.
SECRET SHARING SCHEMES 679 Received May 13, 1997; accepted March 10, 1998.
Shieh, Shiuhpyng Winston
SECRET SHARING SCHEMES 679 Received May 13, 1997; accepted March 10, 1998. Communicated by Jean) Constructing Perfect Secret Sharing Schemes for General And Uniform Access Structures HUNG-MIN SUN AND SHIUH secret sharing scheme allows a secret K to be shared among a set of partici- pants in such a way
WeaklyPrivate Secret Sharing Schemes # Amos Beimel 1 and Matthew Franklin 2
Beimel, Amos
WeaklyÂPrivate Secret Sharing Schemes # Amos Beimel 1 and Matthew Franklin 2 1 Department. Abstract. SecretÂsharing schemes are an important tool in cryptograÂ phy that is used in the construction of many secure protocols. However, the shares' size in the best known secretÂsharing schemes realizing gen
Secret sharing schemes with three or four minimal quali ed subsets
Secret sharing schemes with three or four minimal quali#12;ed subsets #3; Jaume Mart#19;#16;-Farr@mat.upc.es Abstract In this paper we study secret sharing schemes whose access structure has three or four minimal bounds on the optimal information rate. Keywords. Cryptography; secret sharing schemes; information rate
Adaptive Energy Saving Scheme for Downlink Elastic Traffic in Wireless Networks
Bahk, Saewoong
Adaptive Energy Saving Scheme for Downlink Elastic Traffic in Wireless Networks Jongwook Lee, we propose several adaptive energy saving schemes that consider throughput and energy saving simultaneously. The proposed schemes are designed for an efficient tradeoff between throughput and energy saving
IEEE COMMUNICATIONS LETTERS, VOL. 17, NO. 1, JANUARY 2013 127 Capacity of Zero-Outage Scheme
Candan, Cagatay
IEEE COMMUNICATIONS LETTERS, VOL. 17, NO. 1, JANUARY 2013 127 Capacity of Zero-Outage Scheme Under Imprecise Channel State Information C¸ a~gatay Candan Abstract--The capacity of zero-outage scheme-to-noise-ratio fluctuates and the scheme suffers from com- munication outages. Exact analytical expressions characterizing
Energy-Efficiency of Cooperative Sensing Schemes in Ad hoc WLAN Cognitive Radios
Namboodiri, Vinod
Energy-Efficiency of Cooperative Sensing Schemes in Ad hoc WLAN Cognitive Radios Reshma Syeda, we study and analyse the energy efficiency of two generic cooperative sensing schemes in an ad hoc a comparative numerical analysis to demonstrate the amount of energy savings of the proposed cooperative schemes
Syamlal, Madhava; Benyahia, Sofiane
2013-11-20T23:59:59.000Z
When high resolution convection schemes are used for discretizing chemical species mass balance equations, the mass fractions are not guaranteed to add to one. We show that a proposed remedy called ?-scheme (Darwish and Moukalled, Comput.Methods Appl.Mech. Engrg. 192 (2003): 1711) will degrade to a diffusive first-order scheme when a chemical species vanishes from the mixture, for example, because of chemical reactions. We propose an improvement to the ?-scheme to overcome this problem. Furthermore, a computationally efficient alternative scheme is proposed and evaluated with several examples, to quantify the improvements in the accuracy and the computational time.
A demonstration of scheme independence in scalar ERGs
Arnone, S; Morris, T R; Arnone, Stefano; Gatti, Antonio; Morris, Tim R.
2002-01-01T23:59:59.000Z
The standard demand for the quantum partition function to be invariant under the renormalization group transformation results in a general class of exact renormalization group equations, different in the form of the kernel. Physical quantities should not be sensitive to the particular choice of the kernel. Such scheme independence is elegantly illustrated in the scalar case by showing that, even with a general kernel, the one-loop beta function may be expressed only in terms of the effective action vertices, and in this way the universal result is recovered.
A demonstration of scheme independence in scalar ERGs
Stefano Arnone; Antonio Gatti; Tim R. Morris
2002-05-15T23:59:59.000Z
The standard demand for the quantum partition function to be invariant under the renormalization group transformation results in a general class of exact renormalization group equations, different in the form of the kernel. Physical quantities should not be sensitive to the particular choice of the kernel. Such scheme independence is elegantly illustrated in the scalar case by showing that, even with a general kernel, the one-loop beta function may be expressed only in terms of the effective action vertices, and in this way the universal result is recovered.
Remote which-way-choice scheme: proposed foundations experiments
Artur Szczepanski
2005-09-10T23:59:59.000Z
Twin photons from spontaneous parametric down-conversion with preselected polarization are used as spatially disjoint subsystems. One photon is subject to an interference measurement, while a projective measurement of the second photon induces the way-choice of the first photon. This would be an example of way-choice free of direct action on the interfering photon. Two further applications of the proposed scheme are considered: a new method of quantum information speed measurement, and a test of commutation of space-like remote measurements.
Error-prevention scheme with two pairs of qubits
Chu, Shih-I; Yang, Chui-Ping; Han, Siyuan
2002-09-04T23:59:59.000Z
Ei jue ie j&5ue je i& , e iP$0,1% @6#!. The expressions for HS and HSB are as follows: HS5e0~s I z 1s II z !, *Email address: cpyang@floquet.chem.ku.edu †Email address: sichu@ku.edu ‡ Email address: han@ku.eduError-prevention scheme Chui-Ping Yang.... The sche two pairs of qubits and through error-prevention proc through a decoherence-free subspace for collective p pairs; leakage out of the encoding space due to amp addition, how to construct decoherence-free states for n discussed. DOI: 10.1103/Phys...
Proposal for new experimental schemes to realize the Avogadro constant
Biraben, F; Clad, P; Genevs, G; Gournay, P; Guellati-Khlifa, S; Julien, L; Juncar, P; De Mirandes, E; Nez, F
2006-01-01T23:59:59.000Z
We propose two experimental schemes to determine and so to realize the Avogadro constant $N\\_{A}$ at the level of 10$^{-7}$ or better with a watt balance experiment and a cold atom experiment measuring $h/m(X)$ (where $h$ is the Planck constant and $m(X)$ the mass of the atom $X$). We give some prospects about achievable uncertainties and we discuss the opportunity to test the existence of possible unknown correction factors for the Josephson effect and quantum Hall effect.
Simple rules help select best hydrocarbon distillation scheme
Sanchezllanes, M.T.; Perez, A.L.; Martinez, M.P.; Aguilar-Rodriguez, E.; Rosal, R. del (Inst. Mexicano del Petroleo, Mexico City (Mexico))
1993-12-06T23:59:59.000Z
Separation economics depend mainly on investment for major equipment and energy consumption. This relationship, together with the fact that, in most cases, many alternative schemes will be proposed, make it essential to find an optimum scheme that minimizes overall costs. Practical solutions are found by applying heuristics -- exploratory problem-solving techniques that eliminate alternatives without applying rigorous mathematical procedures. These techniques have been applied to a case study. In the case study, a hydrocarbon mixture will be transported through a pipeline to a fractionation plant, where it will be separated into commercial products for distribution. The fractionation will consist of a simple train of distillation columns, the sequence of which will be defined by applying heuristic rules and determining the required thermal duties for each column. The facility must separate ethane, propane and mixed butanes, natural gasoline (light straight-run, or LSR, gasoline), and condensate (heavy naphtha). The ethane will be delivered to an ethylene plant as a gaseous stream, the propane and butanes will be stored in cryogenic tanks, and the gasoline and heavy naphtha also will be stored.
New Pellet Injection Schemes on DIII-D
Anderson, P.M.; Baylor, L.R.; Combs, S.K.; Foust, C.R.; Jernigan, T.C.; Robinson, J.I.
1999-11-13T23:59:59.000Z
The pellet fueling system on DIII-D has been modified for injection of deuterium pellets from two vertical ports and two inner wall locations on the magnetic high-field side (HFS) of the tokamak. The HFS pellet injection technique was first employed on ASDEX-Upgrade with significant improvements reported in both pellet penetration and fueling efficiency. The new pellet injection schemes on DIII-D required the installation of new guide tubes. These lines are {approx_equal}12.5 m in total length and are made up of complex bends and turns (''roller coaster'' like) to route pellets from the injector to the plasma, including sections inside the torus. The pellet speed at which intact pellets can survive through the curved guide tubes is limited ({approx_equal}200-300 m/s for HFS injection schemes). Thus, one of the three gas guns on the injector was modified to provide pellets in a lower speed regime than the original guns (normal speed range {approx_equal}500 to 1000 m/s). The guide tube installations and gun modifications are described along with the injector operating parameters, and the latest test results are highlighted.
An Extended Network Coding Opportunity Discovery Scheme in Wireless Networks
Zhao, Yunlong; Iwai, Masayuki; Sezaki, Kaoru; Tobe, Yoshito; 10.5121/ijcnc.2012.4106
2012-01-01T23:59:59.000Z
Network coding is known as a promising approach to improve wireless network performance. How to discover the coding opportunity in relay nodes is really important for it. There are more coding chances, there are more times it can improve network throughput by network coding operation. In this paper, an extended network coding opportunity discovery scheme (ExCODE) is proposed, which is realized by appending the current node ID and all its 1-hop neighbors' IDs to the packet. ExCODE enables the next hop relay node to know which nodes else have already overheard the packet, so it can discover the potential coding opportunities as much as possible. ExCODE expands the region of discovering coding chance to n-hops, and have more opportunities to execute network coding operation in each relay node. At last, we implement ExCODE over the AODV protocol, and efficiency of the proposed mechanism is demonstrated with NS2 simulations, compared to the existing coding opportunity discovery scheme.
Self-consistent resummation scheme in scalar QED
Carrington, M.E. (Physics Department, University of Winnipeg, 515 Portage Avenue, Winnipeg, Manitoba, R3B 2E9 (Canada))
1993-10-15T23:59:59.000Z
In this paper we derive a resummation scheme that may be useful in the calculation of finite temperature processes that involve infrared-divergent diagrams. We discuss the inclusion of self-consistent vertices in calculations of diagrams with very soft external momenta. We work with scalar QED and show that the use of self-consistent vertices in the infrared limit of the retarded photon polarization tensor is equivalent to the resummation of dominant diagrams. To lowest order in an expansion about the parameter that is to be determined self-consistently, we find that the result is independent of this parameter and equal to the expression obtained with uncorrected lines and vertices. The motivation for this work is the hope that it will be possible to use this technique to perform self-consistent calculations beyond leading order.
Ordering schemes for parallel processing of certain mesh problems
O'Leary, D.
1984-09-01T23:59:59.000Z
In this work, some ordering schemes for mesh points are presented which enable algorithms such as the Gauss-Seidel or SOR iteration to be performed efficiently for the nine-point operator finite difference method on computers consisting of a two-dimensional grid of processors. Convergence results are presented for the discretization of u /SUB xx/ + u /SUB yy/ on a uniform mesh over a square, showing that the spectral radius of the iteration for these orderings is no worse than that for the standard row by row ordering of mesh points. Further applications of these mesh point orderings to network problems, more general finite difference operators, and picture processing problems are noted.
Iron beam acceleration using direct plasma injection scheme
Okamura, M., E-mail: okamura@bnl.gov [Brookhaven National Laboratory, Upton, New York 11973 (United States); RIKEN-BNL Research Center, Upton, New York 11973 (United States); Kanesue, T. [Brookhaven National Laboratory, Upton, New York 11973 (United States)] [Brookhaven National Laboratory, Upton, New York 11973 (United States); Yamamoto, T. [Waseda University, Shinjuku, Tokyo 169-8555 (Japan)] [Waseda University, Shinjuku, Tokyo 169-8555 (Japan); Fuwa, Y. [Kyoto University, Uji, Kyoto 611-0011 (Japan) [Kyoto University, Uji, Kyoto 611-0011 (Japan); RIKEN, Wako, Saitama 351-0198 (Japan)
2014-02-15T23:59:59.000Z
A new set of vanes of radio frequency quadrupole (RFQ) accelerator was commissioned using highly charged iron beam. To supply high intensity heavy ion beams to the RFQ, direct plasma injection scheme (DPIS) with a confinement solenoid was adopted. One of the difficulties to utilize the combination of DPIS and a solenoid field is a complexity of electro magnetic field at the beam extraction region, since biasing high static electric field for ion extraction, RFQ focusing field, and the solenoid magnetic field fill the same space simultaneously. To mitigate the complexity, a newly designed magnetic field clamps were used. The intense iron beam was observed with bunched structure and the total accelerated current reached 2.5 nC.
D-meson production in the GM-VFN scheme
B. A. Kniehl
2006-08-10T23:59:59.000Z
We study the inclusive hadrodroduction of D^0, D^+, D^{*+}, and D_s^+ mesons at next-to-leading order in the parton model of quantum chromodynamics endowed with universal non-perturbative fragmentation functions (FFs) fitted to e^+e^- annihilation data from CERN LEP1. Working in the general-mass variable-flavor-number scheme, we resum the large logarithms through the evolution of the FFs and, at the same time, retain the full dependence on the charm-quark mass without additional theoretical assumptions. In this way, the cross section distributions in transverse momentum recently measured by the CDF Collaboration in run II at the Fermilab Tevatron are described within errors.
CAISO flicks switch on nodal scheme and lights stay on
NONE
2009-06-15T23:59:59.000Z
In 2000-01, two years after introducing a competitive wholesale power auction in California - with a separate day-ahead zonal market operated by the California Power Exchange and a zonal market for ancillary services and balancing energy operated by the California Independent System Operator (CAISO) - the California market collapsed from exorbitant prices, flagrant gaming, and abuse of market power. Nine years later, CAISO introduced a nodal pricing auction for the wholesale market in April, replacing the zonal scheme, which was among many causes of the original market's demise. With nearly 3,000 nodes on the network, high prices in one region do not affect prices everywhere on the system. After investing some $200 million to upgrade the software, countless delays, and 18 months of market simulation and testing, the new auction was introduced and nothing unusual happened.
Birmingham, University of
PUBLICATION SCHEME 2009 Under the Freedom of Information Act 2000 (FOI Act), all public authorities the Information Commissioner has approved a new model publication scheme which all public authorities are required The Model Scheme Environmental Information Accessing information covered by this publication scheme
Finite-difference schemes for elastic waves based on the integration approach
Zahradnik, J. (Charles Univ., Prague (Czech Republic). Faculty of Mathematics and Physics); O'Leary, P. (Univ. of Wyoming, Laramie, WY (United States). Dept. of Mathematics); Sochacki, J. (James Madison Univ., Harrisonburg, VA (United States). Dept. of Mathematics)
1994-06-01T23:59:59.000Z
The authors present a second order explicit finite-difference scheme for elastic waves in 2-D nonhomogeneous media. These schemes are based on integrating the equations of motion and the stress-free surface conditions across the discontinuities before discretizing them on a grid. As an alternative for the free-surface treatment, a scheme using zero density above the surface is suggested. This scheme is first order and is shown to be a natural consequence of the integrated equations of motion and is called a vacuum formalism. These schemes remove instabilities encountered in earlier integration schemes. The consistency study reveals a close link between the vacuum formalism and the integrated/discretized stress-free condition, giving priority to the vacuum formalism when a material discontinuity reaches the free surface. The two presented free-surface treatments coincide in the sense of the limit (grid size [yields] 0) for lateral homogeneity at or near the free surface.
Symmetric Ternary Quantum Homomorphic Encryption Schemes Based on the Ternary Quantum One-Time Pad
Yuqi Wang; Kun She; Qingbin Luo; Fan Yang; Chao Zhao
2015-05-12T23:59:59.000Z
Aiming at a ternary quantum logic circuit, four symmetric ternary quantum homomorphic encryption schemes, based on ternary quantum one-time protocol, were presented. First, for a one-qutrit rotation gate, a homomorphic quantum encryption scheme was constructed. Second, in view of the synthesis of a 3x3 general unitary transformation, another one-qutrit quantum homomorphic encryption scheme was proposed. Third, according to the one-qutrit scheme, the two-qutrit quantum homomorphic encryption scheme about GCX(m') gate was constructed and was further generalized to the n-qutrit unitary matrix case. Finally, the security of these schemes was analyzed from two perspectives. It could be concluded that the attacker can correctly guess the encryption key with a maximum probability ${p_k} = {1 \\mathord{\\left/ {\\vphantom {1 {{3^{3n}}}}} \\right. \\kern-\
Nakano, Hidehiro; Utani, Akihide; Miyauchi, Arata; Yamamoto, Hisao [Tokyo City University (Japan)
2011-04-19T23:59:59.000Z
This paper studies chaos-based data gathering scheme in multiple sink wireless sensor networks. In the proposed scheme, each wireless sensor node has a simple chaotic oscillator. The oscillators generate spike signals with chaotic interspike intervals, and are impulsively coupled by the signals via wireless communication. Each wireless sensor node transmits and receives sensor information only in the timing of the couplings. The proposed scheme can exhibit various chaos synchronous phenomena and their breakdown phenomena, and can effectively gather sensor information with the significantly small number of transmissions and receptions compared with the conventional scheme. Also, the proposed scheme can flexibly adapt various wireless sensor networks not only with a single sink node but also with multiple sink nodes. This paper introduces our previous works. Through simulation experiments, we show effectiveness of the proposed scheme and discuss its development potential.
Hierarchical Control Scheme for Voltage Harmonics Compensation in an Islanded Droop-
Vasquez, Juan Carlos
Hierarchical Control Scheme for Voltage Harmonics Compensation in an Islanded Droop- Controlled on the resistance emulation. Furthermore, a droop characteristic based on DG harmonic reactive power has been
Prime Number-Based Hierarchical Data Labeling Scheme for Relational Databases
Morozov, Serhiy
2007-12-13T23:59:59.000Z
reusable prime number labeling (rPNL) that reduces the effects of the mentioned weaknesses. The proposed scheme advantage is discussed in detail, proven mathematically, and experimentally confirmed....
Stadler, Michael
2010-01-01T23:59:59.000Z
J.L. Edwards, (2003), “Distributed Energy Resources CustomerGas-Fired Distributed Energy Resource Characterizations,”of a CO2 Pricing Scheme on Distributed Energy Resources in
An Efficient, Energy Stable Scheme for the Cahn-Hilliard-Brinkman ...
2012-06-09T23:59:59.000Z
We present an unconditionally energy stable and uniquely solvable finite difference scheme ...... The fluids mix in complicated ways as this process occurs.
WENO schemes on arbitrary unstructured meshes for laminar, transitional and turbulent flows
Tsoutsanis, Panagiotis, E-mail: panagiotis.tsoutsanis@cranfield.ac.uk; Antoniadis, Antonios Foivos, E-mail: a.f.antoniadis@cranfield.ac.uk; Drikakis, Dimitris, E-mail: d.drikakis@cranfield.ac.uk
2014-01-01T23:59:59.000Z
This paper presents the development and implementation of weighted-essentially-non-oscillatory (WENO) schemes for viscous flows on arbitrary unstructured grids. WENO schemes up to fifth-order accurate have been implemented in conjunction with hybrid and non-hybrid unstructured grids. The schemes are investigated with reference to numerical and experimental results for the Taylor–Green vortex, as well as for laminar and turbulent flows around a sphere, and the turbulent shock-wave boundary layer interaction flow problem. The results show that the accuracy of the schemes depends on the arbitrariness of shape and orientation of the unstructured mesh elements, as well as the compactness of directional stencils. The WENO schemes provide a more accurate numerical framework compared to second-order and third-order total variation diminishing (TVD) methods, however, the fifth-order version of the schemes is computationally too expensive to make the schemes practically usable. On the other hand, the third-order variant offers an excellent numerical framework in terms of accuracy and computational cost compared to the fifth-order WENO and second-order TVD schemes. Parallelisation of the CFD code (henceforth labelled as UCNS3D), where the schemes have been implemented, shows that the present methods offer very good scalable performance.
DOPING: a New Non-parametric Deprojection Scheme
Dalia Chakrabarty; Laura Ferrarese
2008-01-23T23:59:59.000Z
We present a new non-parametric deprojection algorithm DOPING (Deprojection of Observed Photometry using and INverse Gambit), that is designed to extract the three dimensional luminosity density distribution $\\rho$, from the observed surface brightness profile of an astrophysical system such as a galaxy or a galaxy cluster, in a generalised geometry, while taking into account changes in the intrinsic shape of the system. The observable is the 2-D surface brightness distribution of the system. While the deprojection schemes presented hitherto have always worked within the limits of an assumed intrinsic geometry, in DOPING, geometry and inclination can be provided as inputs. The $\\rho$ that is most likely to project to the observed brightness data is sought; the maximisation of the likelihood is performed with the Metropolis algorithm. Unless the likelihood function is maximised, $\\rho$ is tweaked in shape and amplitude, while maintaining positivity, but otherwise the luminosity distribution is allowed to be completely free-form. Tests and applications of the algorithm are discussed.
Signal Processing 87 (2007) 12641280 A robust content-based digital image watermarking scheme
Qi, Xiaojun
2007-01-01T23:59:59.000Z
Signal Processing 87 (2007) 12641280 A robust content-based digital image watermarking scheme 30 November 2006 Abstract This paper presents a content-based digital image-watermarking scheme. The image content is represented by important feature points obtained by our image-texture-based adaptive
CPMC: An Efficient Proximity Malware Coping Scheme in Smartphone-based Mobile Networks
Wu, Jie
and controllable granularity of security, in smartphone-based mobile networks. The CPMC scheme integrates shortCPMC: An Efficient Proximity Malware Coping Scheme in Smartphone-based Mobile Networks Feng Li- cisions. Extensive real- and synthetic-trace driven simulation results are presented to to evaluate
JET SCHEMES OF TORIC SURFACES ESPACES DE JETS DES SURFACES TORIQUES
Favre, Charles - Institut de Mathématiques de Jussieu, Université Paris 7
JET SCHEMES OF TORIC SURFACES ESPACES DE JETS DES SURFACES TORIQUES HUSSEIN MOURTADA Abstract. For m N, m 1, we determine the irreducible components of the m - th jet scheme of a toric surface S irr´eductibles des m-espaces des jets d'une surface torique S. Pour m assez grand, on relie le nombre
Personnel Department 8-12-2010 TU/e -Salary savings scheme 2011 (ASN Bank)
Franssen, Michael
12 Personnel Department 8-12-2010 TU/e - Salary savings scheme 2011 (ASN Bank) Alteration from his/her salary relating to the salary savings scheme. Personal details Family name Initials male Telephone numbers TU/e Home Do you already have an employee savings account with the ASN Bank? yes
Research Summary Evaluation of the Better Woodlands for Wales Grant Scheme
. The scheme was shown to have had small, but measurable impacts on carbon sequestration, biodiversity benefits. Methods o Carbon sequestration values draw upon the UK government's approach to valuing carbon. o Benefit that planted as a consequence of the BWW scheme. Carbon sequestration values show that over a 20-year time
Fourth Order Compact Difference Scheme for 3D Convection Diffusion Equation with
Zhang, Jun
Fourth Order Compact Difference Scheme for 3D Convection Diffusion Equation with Boundary Layers University, Washington, DC 20052, USA January 13, 2000 Abstract We present a fourth order compact finite and computational efficiency of the fourth order compact dif ference scheme with that of the standard central
Secure Demand Shaping for Smart Grid On constructing probabilistic demand response schemes
Sastry, S. Shankar
Secure Demand Shaping for Smart Grid On constructing probabilistic demand response schemes. Developing novel schemes for demand response in smart electric gird is an increasingly active research area/SCADA for demand response in smart infrastructures face the following dilemma: On one hand, in order to increase
High Order Asymptotic Preserving Nodal Discontinuous Galerkin IMEX Schemes for the BGK Equation
Li, Fengyan
on the so-called micro-macro formulation of the kinetic equation which involves a natural decomposi- tion of the schemes are proposed: Scheme I is a direct formulation based on the micro-macro de- composition of the BGK hence how rarefied a gas is. In the zero limit of Knudsen number, a sufficient macroscopic model
Cryptanalysis of an IDbased Password Authentication Scheme using Smart Cards and
Cryptanalysis of an IDbased Password Authentication Scheme using Smart Cards and Fingerprints Michael Scott School of Computer Applications Dublin City University Ballymun, Dublin 9, Ireland. mike two IDbased password authen tication schemes for logging onto a remote network server using smart
Modeling the pairwise key predistribution scheme in the presence of unreliable links
Yagan, Osman
) for a detailed survey of various key predistribution schemes for WSNs. With so many schemes available, a basic), Kyoto (Japan), June 2011. O. Yagan was with the Department of Electrical and Computer Engineering is with the Department of Electrical and Computer Engineering, and the Institute for Systems Research, University
The Multivariate Probabilistic Encryption Scheme MQQENC Danilo Gligoroski and Simona Samardjiska
International Association for Cryptologic Research (IACR)
The Multivariate Probabilistic Encryption Scheme MQQENC Danilo Gligoroski and Simona Samardjiska@item.ntnu.no, simonas@item.ntnu.no Abstract. We propose a new multivariate probabilistic encryption schemeSIG, the trapdoor is constructed using quasigroup string transformations with multivariate quadratic quasi groups
International Association for Cryptologic Research (IACR)
Table of Contents A Multivariate Signature Scheme with an almost cyclic public key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 #12;A Multivariate Signature Scheme with an almost cyclic public key Albrecht Petzoldt1,buchmann}@cdc.informatik.tu-darmstadt.de Abstract. Multivariate public key cryptography is one of the main approaches to guarantee the security
International Association for Cryptologic Research (IACR)
Table of Contents A Multivariate Signature Scheme with an almost cyclic public key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 #12; A Multivariate Signature Scheme with an almost cyclic public key Albrecht Petzoldt 1,buchmann}@cdc.informatik.tudarmstadt.de Abstract. Multivariate public key cryptography is one of the main approaches to guarantee the security
The Multivariate Probabilistic Encryption Scheme MQQ-ENC Danilo Gligoroski and Simona Samardjiska
International Association for Cryptologic Research (IACR)
The Multivariate Probabilistic Encryption Scheme MQQ-ENC Danilo Gligoroski and Simona Samardjiska@item.ntnu.no, simonas@item.ntnu.no Abstract. We propose a new multivariate probabilistic encryption scheme-SIG, the trapdoor is constructed using quasigroup string transformations with multivariate quadratic quasi- groups
PUBLISHED IN: PROCEEDINGS OF THE IEEE ICC 2013 1 Towards an Error Control Scheme for a
Chatziantoniou, Damianos
evaluation of its performance. An obvious use case for our scheme is the reliable delivery of softwarePUBLISHED IN: PROCEEDINGS OF THE IEEE ICC 2013 1 Towards an Error Control Scheme for a Publish for efficient content distribution. However, the design of efficient reliable transport protocols for multicast
A stress interpretation scheme applied to lunar gravity and topography data
A stress interpretation scheme applied to lunar gravity and topography data F. Chambat1 and B. In the crust, because of topography, the strongest stress differences take place on the far side, with large), A stress interpretation scheme applied to lunar gravity and topography data, J. Geophys. Res., 113, E02009
An efficient numerical terrestrial scheme (ENTS) for fast earth system modelling
Williamson, Mark
An efficient numerical terrestrial scheme (ENTS) for fast earth system modelling Mark Williamson Working Paper 83 #12;An efficient numerical terrestrial scheme (ENTS) for fast earth system modelling Mark for long time period simulations and large ensemble studies in Earth system models of intermediate
Abgrall, RÃ©mi
Application of conservative residual distribution schemes to the solution of the shallow water. Keywords: Conservative schemes; Residual distribution; Shallow water equations; Lake at rest solution solution of the shallow water equations on unstructured grids. We focus on flows over wet areas
Controlling Quantum Systems by Embedded Dynamical Decoupling Schemes O. Kern and G. Alber
Controlling Quantum Systems by Embedded Dynamical Decoupling Schemes O. Kern and G. Alber Institut on embedding a deterministic decoupling scheme into a stochastic one. This way it is possible to combine the advantages of both methods and to increase the suppression of undesired perturbations of quantum systems
ACT: Attachment Chain Tracing Scheme for Email Virus Detection and Control
Paxson, Vern
on the smooth and safe flow of information over communication and computer net- works. Computer virusesACT: Attachment Chain Tracing Scheme for Email Virus Detection and Control Jintao Xiong School and viruses, currently adopted defense schemes are slow to react and costly to implement. This paper proposes
Energy Aware Power Allocation strategies for Multihop-Cooperative transmission schemes
Savazzi, Stefano
1 Energy Aware Power Allocation strategies for Multihop-Cooperative transmission schemes S. Savazzi scheme is known to be an energy aware strategy that allocate the power on each independent hop according allocation strategies for nodes belonging to a single primary route towards a destination. The proposed
Energy Aware Power Allocation strategies for Multihop-Cooperative transmission schemes
Spagnolini, Umberto
1 Energy Aware Power Allocation strategies for Multihop-Cooperative transmission schemes S. Savazzi nodes are able to relay their packets. Designing multihop routing strategy together with energy scheme is known to be an energy aware strategy that allocate the power on each independent hop according
An Efficient Energy Curtailment Scheme For Outage Management in Smart Grid
Durrani, Salman
An Efficient Energy Curtailment Scheme For Outage Management in Smart Grid Wayes Tushar§, Jian--In this paper an efficient energy curtailment scheme is studied, which enables the power users of a smart grid. Considering the advantages of a two-way communications infrastructure for any future smart grid, a non
A Traffic-Aware Street Lighting Scheme for Smart Cities using Autonomous Networked Sensors
1 A Traffic-Aware Street Lighting Scheme for Smart Cities using Autonomous Networked Sensors Sei of Southampton, UK. Abstract Street lighting is a ubiquitous utility, but sustaining its operation presents a heavy financial and environmental burden. Many schemes have been proposed which selectively dim lights
ERROR BOUNDS FOR MONOTONE APPROXIMATION SCHEMES FOR HAMILTON-JACOBI-BELLMAN
ERROR BOUNDS FOR MONOTONE APPROXIMATION SCHEMES FOR HAMILTON-JACOBI-BELLMAN EQUATIONS GUY BARLES AND ESPEN R. JAKOBSEN Abstract. We obtain error bounds for monotone approximation schemes of Hamilton-Jacobi, (almost) smooth supersolutions for the Hamilton-Jacobi-Bellman equation. 1. Introduction This paper
A note on a result of Buss concerning bounded theories and the collection scheme
Edmundo, MÃ¡rio Jorge
A note on a result of Buss concerning bounded theories and the collection scheme Fernando Ferreira Abstract Samuel Buss showed that, under certain circunstances, adding the collection scheme for bounded of Samuel Buss (a good reference for bounded theories is Part C of [HP93]). In [B87] Buss presents two
Extending Brickell-Davenport Theorem to Non-Perfect Secret Sharing Schemes
Extending Brickell-Davenport Theorem to Non-Perfect Secret Sharing Schemes Oriol Farr`as1 University, Singapore December 18, 2012 Abstract One important result in secret sharing is the Brickell-Davenport Theorem: every ideal perfect secret sharing scheme defines a matroid that is uniquely determined
A Tree Based Recursive Scheme for Space E#cient Secret Sharing
A Tree Based Recursive Scheme for Space E#cient Secret Sharing Abhishek Parakh and Subhash Kak a koutofn recursive secret sharing scheme based on an nary tree data structure. In recursive hiding of secrets, the user encodes additional secrets in the shares of the secret in tended
On Secret Sharing Schemes, Matroids and Polymatroids Jaume Marti-Farre, Carles Padro
On Secret Sharing Schemes, Matroids and Polymatroids Jaume Mart´i-Farr´e, Carles Padr´o Dep. de.edu June 22, 2009 Abstract The complexity of a secret sharing scheme is defined as the ratio between the maximum length of the shares and the length of the secret. The optimization of this parameter for gen
A SECRET SHARING SCHEME BASED ON GROUP PRESENTATIONS AND THE WORD PROBLEM
Shpilrain, Vladimir
A SECRET SHARING SCHEME BASED ON GROUP PRESENTATIONS AND THE WORD PROBLEM MAGGIE HABEEB, DELARAM KAHROBAEI, AND VLADIMIR SHPILRAIN Abstract. A (t, n)-threshold secret sharing scheme is a method to distribute a secret among n participants in such a way that any t participants can recover the secret
An ideal multi-secret sharing scheme based on minimal privileged coalitions
An ideal multi-secret sharing scheme based on minimal privileged coalitions Yun Song , Zhihui Li Abstract How to construct an ideal multi-secret sharing scheme for general access structures is difficult if such coalitions exist. Furthermore, in terms of privileged coalitions, we show that most of the existing multi-secret
A Secret Sharing Scheme for Preventing the Cheaters from Acquiring the Hassan Jameel, Sungyoung Lee
A Secret Sharing Scheme for Preventing the Cheaters from Acquiring the Secret Hassan Jameel { hassan, sylee }@oslab.khu.ac.kr Abstract. In this paper, we propose a secret sharing scheme which prevents the cheaters from recovering the secret when the honest participants cannot, with high probability
A Distributed Fault/Intrusion-Tolerant Sensor Data Storage Scheme Based on Network Coding and
Shen, Xuemin "Sherman"
1 A Distributed Fault/Intrusion-Tolerant Sensor Data Storage Scheme Based on Network Coding/intrusion-tolerant data storage scheme based on network coding and homomorphic fingerprinting in volatile WSNs (Sherman) Shen, Fellow, IEEE Abstract--Recently, distributed data storage has gained in- creasing
Kelvin Nanotechnology Ltd (KNT) GUIDE TO INFORMATION AVAILABLE THROUGH OUR PUBLICATION SCHEME
Glasgow, University of
Kelvin Nanotechnology Ltd (KNT) GUIDE TO INFORMATION AVAILABLE THROUGH OUR PUBLICATION SCHEME it might cost. Kelvin Nanotechnology Ltd has adopted the Model Publication Scheme 2011 produced publication and explain why. Copyright Where Kelvin Nanotechnology Ltd holds the copyright in its published
Moving-Water Equilibria Preserving Central-Upwind Schemes for the Shallow Water Equations
Kurganov, Alexander
Moving-Water Equilibria Preserving Central-Upwind Schemes for the Shallow Water Equations Yuanzhen Cheng and Alexander Kurganov Abstract We construct a new second-order moving-water equilibria preserving central-upwind scheme for the one-dimensional Saint-Venant system of shallow water equations. Special
A task-parallel scheme for the revised simplex method Julian Hall
Hall, Julian
SYNPLEX A task-parallel scheme for the revised simplex method Julian Hall School of Mathematics University of Edinburgh June 15th 2005 SYNPLEX, a task-parallel scheme for the revised simplex method #12;Overview · The (standard and revised) simplex method for linear programming #12;Overview · The (standard
A task-parallel scheme for the revised simplex method Julian Hall
Hall, Julian
SYNPLEX A task-parallel scheme for the revised simplex method Julian Hall School of Mathematics University of Edinburgh June 23rd 2005 SYNPLEX, a task-parallel scheme for the revised simplex method #12;Overview · The (standard and revised) simplex method for linear programming #12;Overview · The (standard
Feeley, Marc
Running Scheme on a PIC microcontroller Marc Feeley (Universit´e de Montr´eal) and Danny Dub´e (Universit´e Laval) · Objective: create a Scheme system for PIC that is R4 RS conformant (except for file I/O) · The PIC is an inexpensive single-chip general purpose computer with little RAM Model Pins MIPS ROM RAM
A System-level Scheme for Resistance Drift Tolerance of a Multilevel Phase Change Memory
Han, Jie
of a phase change material such as GTS tends to drift over time. The change in resistance severely degradesA System-level Scheme for Resistance Drift Tolerance of a Multilevel Phase Change Memory Pilin presents a system-level scheme to alleviate the effect of resistance drift in a multilevel phase change
O. Goecke: Collective saving schemes LUH-Kolloquium ,,Versicherungs-und Finanzmathematik"
Weber, Stefan
1 O. Goecke: Collective saving schemes LUH-Kolloquium ,,Versicherungs- und Finanzmathematik" Insurance and Demography, Hannover 19.06.2014 Collective saving schemes and return smoothing mechanism Oskar Goecke Institut für Versicherungswesen Forschungsstelle FaRis FH Köln #12;2 O. Goecke: Collective saving
Arctic Region Evaluation of the Hydro-Thermodynamic Soil Vegetation Scheme (HTSVS)
Moelders, Nicole
Arctic Region Evaluation of the Hydro-Thermodynamic Soil Vegetation Scheme (HTSVS) Pamela Spier, University of Alaska, Fairbanks, AK Abstract This paper presents an evaluation of the Hydro. Introduction and Motivation The Hydro-Thermodynamic Soil Vegetation Scheme (HTSVS, Kramm et al. 1996, Mölders
An active queue management scheme to contain high bandwidth flows at a congested router
Smitha
2001-01-01T23:59:59.000Z
be incorporated in RED, an active queue management scheme. The proposed scheme possesses all the advantages of RED. In addition, it lowers the drop rates of short-lived flows and also those high bandwidth flows that reduce their sending rate when congestion...
A Quadrature Finite Element Galerkin Scheme for a Biharmonic Problem on a Rectangular Polygon
Aitbayev, Rakhim
to the OSC method (see [3]), which uses Gaussian quadrature nodes as collocation points and a finite elementA Quadrature Finite Element Galerkin Scheme for a Biharmonic Problem on a Rectangular Polygon with an underdetermined orthogonal spline collocation scheme. © 2007 Wiley Periodicals, Inc. Numer Methods Partial
The impact of the European Union Emission Trading Scheme on electricity generation sectors
Paris-Sud XI, Université de
The impact of the European Union Emission Trading Scheme on electricity generation sectors Djamel the Kyoto Protocol, France and Germany par- ticipate to the European Union Emission Trading Scheme (EU ETS, the European market for emission allowances has increased the market power of the historical French electricity
Symmetric chains, Gelfand-Tsetlin chains, and the Terwilliger algebra of the binary Hamming scheme
Srinivasan, Murali K.
Symmetric chains, Gelfand-Tsetlin chains, and the Terwilliger algebra of the binary Hamming scheme of the Terwilliger algebra of the binary Hamming scheme. We also give a representation theoretic characterization constructive proof of the explicit block diagonalization of the Terwilliger algebra of the binary Hamming
Energy Aware Power Allocation strategies for Multihop-Cooperative transmission schemes
Savazzi, Stefano
Energy Aware Power Allocation strategies for Multihop-Cooperative transmission schemes Stefano, cooperative diversity, power allocation, energy efficient transmission techniques, ad-hoc and sensors networks is focused on the optimization of trans- mitted power in a cooperative decoded relaying scheme for nodes
A PFMIPv6 Scheme Based on Handover Failure Probability for Mobile Nodes
Jang, Ju-Wook
cost problem. This is due to Handover Initiate (HI) and/or Handover Acknowledge (HAck) message exchange a new PFMIPv6 scheme which employs the handover failure probability (to be determined by speed scheme is more efficient in choosing MAG with 47% reduction of handover latencies, 34% reduction
Beamforming-Based Broadcast Scheme for Multihop Wireless Networks with Transmission
Paris-Sud XI, Université de
Beamforming-Based Broadcast Scheme for Multihop Wireless Networks with Transmission Range transmission power for a beamforming-based broadcast scheme in multihop wireless networks? To address wireless network, and demonstrated in terms of implicated nodes'ratio, power transmission gain
Chen, Zhe
2013 China-Korea Relay Protection Forum 1 Wide Area Protection Scheme Preventing Cascading Events from short circuits. A wide area protection scheme is proposed based on this improved im- pedance relay area protection 1 Introduction In many past blackouts, zone 3 impedance relay played an important role
A Framework for Distributed Key Management Schemes in Heterogeneous Wireless Sensor Networks
Hu, Jiankun
A Framework for Distributed Key Management Schemes in Heterogeneous Wireless Sensor Networks Kejie propose a framework for key management schemes in distributed wireless sensor networks with heterogeneous, the wireless sensor network can achieve higher key connectivity and higher resilience. I. INTRODUCTION Wireless
Bounds on the information rate of quantum-secret-sharing schemes
Sarvepalli, Pradeep [Department of Physics and Astronomy, University of British Columbia, Vancouver, British Columbia, V6T 1Z1 (Canada)
2011-04-15T23:59:59.000Z
An important metric of the performance of a quantum-secret-sharing scheme is its information rate. Beyond the fact that the information rate is upper-bounded by one, very little is known in terms of bounds on the information rate of quantum-secret-sharing schemes. Furthermore, not every scheme can be realized with rate one. In this paper we derive upper bounds for the information rates of quantum-secret-sharing schemes. We show that there exist quantum access structures on n players for which the information rate cannot be better than O((log{sub 2}n)/n). These results are the quantum analogues of the bounds for classical-secret-sharing schemes proved by Csirmaz.
An Energy Efficient Semi-static Power Control and Link Adaptation Scheme in UMTS HSDPA
Huang, Yi; Qiu, Ling
2012-01-01T23:59:59.000Z
High speed downlink packet access (HSDPA) has been successfully applied in commercial systems and improves user experience significantly. However, it incurs substantial energy consumption. In this paper, we address this issue by proposing a novel energy efficient semi-static power control and link adaptation scheme in HSDPA. Through estimating the EE under different modulation and coding schemes (MCSs) and corresponding transmit power, the proposed scheme can determine the most energy efficient MCS level and transmit power at the Node B. And then the Node B configure the optimal MCS level and transmit power. In order to decrease the signaling overhead caused by the configuration, a dual trigger mechanism is employed. After that, we extend the proposed scheme to the multiple input multiple output (MIMO) scenarios. Simulation results confirm the significant EE improvement of our proposed scheme. Finally, we give a discussion on the potential EE gain and challenge of the energy efficient mode switching between s...
Prokudin, Alexei; Yuan, Feng
2015-01-01T23:59:59.000Z
Following an earlier derivation by Catani-de Florian-Grazzini (2000) on the scheme dependence in the Collins-Soper-Sterman (CSS) resummation formalism in hard scattering processes, we investigate the scheme dependence of the Transverse Momentum Distributions (TMDs) and their applications. By adopting a universal $C$-coefficient function associated with the integrated parton distributions, the difference between various TMD schemes can be attributed to a perturbative calculable function depending on the hard momentum scale. We further apply several TMD schemes to the Drell-Yan process of lepton pair production in hadronic collisions, and find that the constrained non-perturbative form factors in different schemes are remarkably consistent with each other and with that of the standard CSS formalism.
BCS theory of superconductivity: the world's largest Madoff scheme?
J. E. Hirsch
2009-01-26T23:59:59.000Z
The time-tested BCS theory of superconductivity is generally accepted to be the correct theory of conventional superconductivity by physicists and, by extension, by the world at large. In a different realm of human activity, until very recently Bernard Madoff's time-tested investment operation was generally accepted as true and legitimate in the financial world. Madoff's Ponzi scheme, where old investors were being paid off by funds contributed by new investors, was fundamentally flawed, yet was able to thrive for decades because of many vested interests. `Red flags' suggesting its illegitimacy were ignored. Here I suggest that the same is true of BCS theory. There are an increasing number of `red flags' that strongly suggest the possibility that BCS theory may be fundamentally flawed. For example, an ever-growing number of superconductors are being classified as `unconventional', not described by the conventional BCS theory and each requiring a different physical mechanism. In addition, I argue that BCS theory is unable to explain the Meissner effect, $the$ most fundamental property of superconductors. There are several other phenomena in superconductors for which BCS theory provides no explanation, and BCS theory has proven unable to predict any new superconducting compounds. From one day to the next, Madoff's edifice came crashing down and a staggering 50 billion dollars evaporated, and I suggest that this may also be the fate of BCS theory. I outline an alternative theory to conventional BCS theory proposed to apply to all superconductors, `conventional' as well as `unconventional', that offers an explanation for the Meissner effect as well as for other puzzles and provides clear guidelines in the search for new high temperature superconductors.
An exact general remeshing scheme applied to physically conservative voxelization
DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)
Powell, Devon; Abel, Tom
2015-09-01T23:59:59.000Z
We present an exact general remeshing scheme to compute analytic integrals of polynomial functions over the intersections between convex polyhedral cells of old and new meshes. In physics applications this allows one to ensure global mass, momentum, and energy conservation while applying higher-order polynomial interpolation. We elaborate on applications of our algorithm arising in the analysis of cosmological N-body data, computer graphics, and continuum mechanics problems. We focus on the particular case of remeshing tetrahedral cells onto a Cartesian grid such that the volume integral of the polynomial density function given on the input mesh is guaranteed to equal themore »corresponding integral over the output mesh. We refer to this as “physically conservative voxelization.” At the core of our method is an algorithm for intersecting two convex polyhedra by successively clipping one against the faces of the other. This algorithm is an implementation of the ideas presented abstractly by Sugihara [48], who suggests using the planar graph representations of convex polyhedra to ensure topological consistency of the output. This makes our implementation robust to geometric degeneracy in the input. We employ a simplicial decomposition to calculate moment integrals up to quadratic order over the resulting intersection domain. We also address practical issues arising in a software implementation, including numerical stability in geometric calculations, management of cancellation errors, and extension to two dimensions. In a comparison to recent work, we show substantial performance gains. We provide a C implementation intended to be a fast, accurate, and robust tool for geometric calculations on polyhedral mesh elements.« less
Davison, Brian D.
schemes are optimized to perform well in certain mobility scenarios and thus a hybrid scheme will work/disruption-tolerant networking and communications has been published (e.g., [13],[14],[15],[27]). DieselNet [14
Please note that there is an ANU maximum of five academic bonus points per student. This includes Academic bonus points from The National Access Scheme and the College Bonus Point Scheme. cecs Admissions Scheme (CECS - SAS) cecs.anu.edu.au/future_students/sas Degree Bonus points Results
Salary savings scheme 2011 (ING BANK) 11-10-2010 Personnel and Organization Department 1/1
Franssen, Michael
Salary savings scheme 2011 (ING BANK) 11-10-2010 Personnel and Organization Department 1!! The undersigned hereby declares not to participate in a "course-of-life" arrangement or a salary savings scheme-year and you can only participate in a salary savings scheme via one employer Alteration as of (enter date
Zhang, Jun
A Family of Fourth Order Difference Schemes on Rotated Grid for Two Dimensional Convection a family of fourth order finite difference schemes on the rotated grid for the two dimensional convection values of the convection coefficients. We also compare the fourth order schemes with the nine point
Zhang, Jun
A Fourth Order Compact Difference Scheme on Face Centered Cubic Grids with Multigrid Method, 2002 Abstract We present a fourth order compact finite difference scheme on the face centered cu bic the fourth order convergence rate of the derived discretization scheme and to show that the fourth order
The impact of the European Union Emissions Trading Scheme on US aviation Robert Malina a,c
The impact of the European Union Emissions Trading Scheme on US aviation Robert Malina a, Germany Keywords: European air transport policy Carbon emissions trading US airline industry a b s t r a c in the European Union Emissions Trading Scheme from 2012 to 2020. We find that the Scheme would only have a small
Calaf-Forn, Maria, E-mail: mcalaf@ent.cat [Institut de Ciència i Tecnologia Ambientals (ICTA), Universitat Autònoma de Barcelona (UAB), E-08193 Bellaterra, Barcelona (Spain); ENT Environment and Management, Carrer Sant Joan 39, First Floor, E-08800 Vilanova i la Geltrú, Barcelona (Spain); Roca, Jordi [Departament de Teoria Econòmica, Universitat de Barcelona (UB), Diagonal, 696, E-08034 Barcelona (Spain); Puig-Ventosa, Ignasi [ENT Environment and Management, Carrer Sant Joan 39, First Floor, E-08800 Vilanova i la Geltrú, Barcelona (Spain)
2014-05-01T23:59:59.000Z
Highlights: • LATS has been effective to achieve a reduction of the amount of landfilled waste. • LATS has been one of the few environmental instruments for waste management with a cap and trade methodology. • LATS has achieved to increase recycling of the biodegradable and other waste fractions. - Abstract: The Landfill Allowance Trading Scheme (LATS) is one of the main instruments used in England to enforce the landfill diversion targets established in the Directive 1999/31/EC of the European Parliament and of the Council of 26 April 1999 on the landfill of waste (Landfill Directive). Through the LATS, biodegradable municipal waste (BMW) allowances for landfilling are allocated to each local authority, otherwise known as waste disposal authorities (WDAs). The quantity of landfill allowances received is expected to decrease continuously from 2005/06 to 2019/20 so as to meet the objectives of the Landfill Directive. To achieve their commitments, WDAs can exchange, buy, sell or transfer allowances among each other, or may re-profile their own allocation through banking and/or borrowing. Despite the goals for the first seven years – which included two target years (2005/06 and 2009/10) – being widely achieved (the average allocation of allowances per WDA was 22.9% higher than those finally used), market activity among WDAs was high and prices were not very stable. Results in terms of waste reduction and recycling levels have been satisfactory. The reduction of BMW landfilled (in percentage) was higher during the first seven years of the LATS period (2005/06–2011/12) (around 7% annually) than during the previous period (2001/02–2004/05) (4.2% annually). Since 2008, the significance of the LATS diminished because of an increase in the rate of the UK Landfill Tax. The LATS was suppressed after the 2012/13 target year, before what it was initially scheduled. The purpose of this paper is to describe the particularities of the LATS, analyse its performance as a waste management policy, make a comparison with the Landfill Tax, discuss its main features as regards efficiency, effectiveness and the application of the “polluter pays” principle and finally discuss if the effect of the increase in the Landfill Tax is what made the LATS ultimately unnecessary.
NUMERICAL ANALYSIS OF A FINITE ELEMENT SCHEME FOR THE APPROXIMATION OF HARMONIC MAPS INTO SURFACES
Bartels, Soeren
NUMERICAL ANALYSIS OF A FINITE ELEMENT SCHEME FOR THE APPROXIMATION OF HARMONIC MAPS INTO SURFACES Geometric partial differential equations and their analysis as well as numerical simulation have recently
Quantum-coupled single-electron thermal to electric conversion scheme
Wu, Dennis M. (Dennis Meng-Jiao)
2008-01-01T23:59:59.000Z
A new thermal to electric conversion scheme based on an excitation transfer and tunneling mechanism is studied theoretically. Coulomb coupling dominates when the hot side and the cold side are very close. Two important ...
The EU’s Emissions Trading Scheme: A Proto-Type Global System?
Ellerman, A. Denny
2008-01-01T23:59:59.000Z
The European Union's Emission Trading Scheme (EU ETS) is the world's first multinational cap-and-trade system for greenhouse gases. As an agreement between sovereign nations with diverse historical, institutional, and ...
The EU’s Emissions Trading Scheme: A Prototype Global System?
Ellerman, A. Denny
The European Union's Emission Trading Scheme (EU ETS) is the world's first multinational cap-and-trade system for greenhouse gases. As an agreement between sovereign nations with diverse historical, institutional, and ...
Allocation and competitiveness in the EU emissions trading scheme: policy overview
Grubb, Michael; Neuhoff, Karsten
The European emissions trading scheme (EU ETS) has an efficient and effective market design that risks being undermined by three interrelated problems: the approach to allocation; the absence of a credible commitment to post-2012 continuation...
Dorsett, Kenneth Merle
1993-01-01T23:59:59.000Z
A flow visualization measurement scheme was validated in flight. Strake vortex trajectories and axial core velocities were determined using pulsed smoke and high speed video. A gothic strake, operated at an angle of attack of 220 and a Reynolds...
Economic impact of the European Union Emission Trading Scheme : evidence from the refining sector
Lacombe, Romain H
2008-01-01T23:59:59.000Z
I study the economic impact of the European Union Emission Trading Scheme (EU ETS) on the refining industry in Europe. I contrast previous ex-ante studies with the lessons from a series of interviews I conducted with ...
The multiple-point schemes of a finite curvilinear map of ...
1910-30-30T23:59:59.000Z
the schemes Mr and Nr. Of course, off Nr+1, the map Mr ? Nr is finite and flat of degree r by a standard property of the Fitting ideal. The subtlety appears when ...
High fidelity readout scheme for rare-earth solid state quantum computing
A. Walther; L. Rippe; Y. Yan; J. Karlsson; D. Serrano; A. N. Nilsson; S. Bengtsson; S. Kröll
2015-03-29T23:59:59.000Z
We propose and analyze a high fidelity readout scheme for a single instance approach to quantum computing in rare-earth-ion-doped crystals. The scheme is based on using different species of qubit and readout ions, and it is shown that by allowing the closest qubit ion to act as a readout buffer, the readout error can be reduced by more than an order of magnitude. The scheme is shown to be robust against certain experimental variations, such as varying detection efficiencies, and we use the scheme to predict the expected quantum fidelity of a CNOT gate in these solid state systems. In addition, we discuss the potential scalability of the protocol to larger qubit systems. The results are based on parameters which we believed are experimentally feasible with current technology, and which can be simultaneously realized.
A Dual-Phase Power Allocation Scheme for Multicarrier Relay Systems With Direct Link
Hua, Yingbo; Ma, Yiming; Liu, An
2013-01-01T23:59:59.000Z
POWER ALLOCATION SCHEME where is the inverse function of ,allocation algorithm to minimize a general cost function forallocation problem is for- mulated as: where Neither nor is a convex functions
Analysis of N-qubit perfectly controlled teleportation schemes from the controller's point of view
Xi-Han Li; Shohini Ghose
2014-12-30T23:59:59.000Z
We quantitatively analyze and evaluate the controller's power in $N$-qubit controlled teleportation schemes. We calculate the minimum control power required to ensure the controller's authority such that the teleportation fidelity without the controller's permission is no more than the classical bound. We revisit several typical controlled teleportation schemes from the controller's point of view and evaluate the control power in these schemes. We find that for teleporting arbitrary N-qubit states, each controller should control at least N bits of useful information to ensure his/her authority over the protocol. We also discuss the general rules that must be satisfied by controlled teleportation schemes to ensure both teleportation fidelity and control power.
A cascaded laser acceleration scheme for the generation of spectrally controlled proton beams
Pfotenhauer, Sebastian Michael
We present a novel, cascaded acceleration scheme for the generation of spectrally controlled ion beams using a laser-based accelerator in a 'double-stage' setup. An MeV proton beam produced during a relativistic laser–plasma ...
Gradient Projection Anti-windup Scheme on Constrained Planar LTI Systems
Teo, Justin
2010-03-15T23:59:59.000Z
The gradient projection anti-windup (GPAW) scheme was recently proposed as an anti-windup method for nonlinear multi-input-multi-output systems/controllers, the solution of which was recognized as a largely open problem ...
International Association for Cryptologic Research (IACR)
Entity Authentication Schemes Using Braid Word Reduction Hervâ??e SIBERT, Patrick DEHORNOY, and Marc, authentication, zero knowledge, handle reduction. 1 #12; 2 HERV â?? E SIBERT, PATRICK DEHORNOY, AND MARC GIRAULT 2
International Association for Cryptologic Research (IACR)
Entity Authentication Schemes Using Braid Word Reduction HervÂ´e SIBERT, Patrick DEHORNOY, and Marc, AND MARC GIRAULT 2. Difficult braid problems 2.1. Braid groups. For n 2, Artin's braid group Bn is defined
Cotton Production under Traditional and Regulated Deficit Irrigation Schemes in Southwest Texas
Wen, Yujin
2012-10-19T23:59:59.000Z
application (LEPA) sprinkler irrigation system. The 70 percent evapotranspiration (ET)-initialled regulated deficit irrigation scheme (70R) performed well in maintaining lint yield in most cotton varieties tested. The significant changes detected in lint...
The Green Building Scheme for a Sustainable Eco-City in Taipei
Sun, S.; Chen, Z.; Clements-Croome, D.
2006-01-01T23:59:59.000Z
Taipei City has put a significant effort toward the implementation of green design and green building schemes towards a sustainable eco-city. Although some of the environmental indicators have not indicated significant progress in environmental...
The multiple-point schemes of a finite curvilinear map of ...
1910-30-30T23:59:59.000Z
?1. Nr. In this setting—in fact, in a more general setting—we prove the following statements, which show that Mr and Nr behave like reasonable schemes of ...
Cho, Soohyun
2006-08-16T23:59:59.000Z
In this work, we focus on congestion control mechanisms in Transmission Control Protocol (TCP) for emerging very-high bandwidth-delay product networks and suggest several congestion control schemes for parallel and single-flow ...
LDPC code-based bandwidth efficient coding schemes for wireless communications
Sankar, Hari
2009-06-02T23:59:59.000Z
This dissertation deals with the design of bandwidth-efficient coding schemes with Low-Density Parity-Check (LDPC) for reliable wireless communications. Code design for wireless channels roughly falls into three categories: (1) when channel state...
Block Time Step Storage Scheme for Astrophysical N-body Simulations
Cai, Maxwell Xu; Kouwenhoven, M B N; Assmann, Paulina; Spurzem, Rainer
2015-01-01T23:59:59.000Z
Astrophysical research in recent decades has made significant progress thanks to the availability of various $N$-body simulation techniques. With the rapid development of high-performance computing technologies, modern simulations have been able to take the computing power of massively parallel clusters with more than $10^5$ GPU cores. While unprecedented accuracy and dynamical scales have been achieved, the enormous amount of data being generated continuously poses great challenges for the subsequent procedures of data analysis and archiving. As an urgent response to these challenges, in this paper we propose an adaptive storage scheme for simulation data, inspired by the block time step integration scheme found in a number of direct $N$-body integrators available nowadays. The proposed scheme, namely the block time step storage scheme, works by minimizing the data redundancy with assignments of data with individual output frequencies as required by the researcher. As demonstrated by benchmarks, the proposed...
Li, Depeng
Authentication schemes relying on per-packet signature and per-signature verification introduce heavy cost for computation and communication. Due to its constraint resources, smart grid's authentication requirement cannot ...
GreenVis: Energy-Saving Color Schemes for Sequential Data Visualization on OLED Displays
North Virginia Tech Blacksburg, VA north@cs.vt.edu ABSTRACT The organic light emitting diode (OLED, Color Scheme, Visualization 1. INTRODUCTION The organic light-emitting diode (OLED) display is an emerg
Decoupled energy stable schemes for phase-field models of two ...
2014-11-11T23:59:59.000Z
stable schemes which involve solving coupled nonlinear systems at each time step, it is extremely difficult to construct ... phase equation; and (iv) various additional difficulties introduced by the variable density, including ...... Communications.
A new landscape ecology mapping scheme for coastal environments: Galveston Island, Texas
Lynch, Karen Marie
1996-01-01T23:59:59.000Z
of landscape ecology to understand the complete picture of the changing environment of a barrier island. Mapping is fundamental to detecting and monitoring change. Currently no mapping scheme can effectively integrate geomorphological and ecological mapping...
A refined r-factor algorithm for TVD schemes on arbitrary unstructured meshes
Zhang, Di; Jiang, Chunbo; Cheng, Liang; Liang, Dongfang
2015-07-03T23:59:59.000Z
and Offshore Engineering, Dalian University of Technology, Dalian, 116024, China 4Department of Engineering, University of Cambridge, Trumpington Street, Cambridge CB2 1PZ, UK SUMMARY A refined r-factor algorithm for implementing TVD schemes...
Tsang, C.-F.
2011-01-01T23:59:59.000Z
R~fN~EC"(IONSCHEMES'F~RTHE CERRO PRIETO , GEOTHERMAL FIELD,REINJECTION SCHEMES FOR THE CERRO PRIETO GEOTHERMAL FIELD,reinjection patterns for the Cerro Prieto geothermal field,
Fully Distributed Proxy Signature Schemes Javier Herranz and Germ an S aez
International Association for Cryptologic Research (IACR)
and Stern proved in [11]). This distributed scheme is based on the joint generation of a random secret value, logistical) problem. In a more concrete (or practical) situation, we can imagine a company with many depart
The Green Building Scheme for a Sustainable Eco-City in Taipei
Sun, S.; Chen, Z.; Clements-Croome, D.
2006-01-01T23:59:59.000Z
Taipei City has put a significant effort toward the implementation of green design and green building schemes towards a sustainable eco-city. Although some of the environmental indicators have not indicated significant progress in environmental...
A new landscape ecology mapping scheme for coastal environments: Galveston Island, Texas
Lynch, Karen Marie
1996-01-01T23:59:59.000Z
of landscape ecology to understand the complete picture of the changing environment of a barrier island. Mapping is fundamental to detecting and monitoring change. Currently no mapping scheme can effectively integrate geomorphological and ecological mapping...
A serially concatenated BCH-Turbo code scheme over an Additive White Gaussion Noise channel
Ovalekar, Sameer V.
1997-01-01T23:59:59.000Z
This work deals with the implementation of a serially concatenated BCH-turbo code scheme for faster decoding over an Additive White Gaussian Noise (AWGN) channel. Turbo codes, first presented in 1993, represent the most innovative and breakthrough...
A New Indirect Adaptive Control Scheme for Time-Varying Plants
Ioannou, Petros
A New Indirect Adaptive Control Scheme for Time-Varying Plants Absrmcr of the indirectadaptiveschemewhicharemoreappropriatefortime-varying plants that for successful estimation. the oyerall plant is notrestrictedto var?slowl)withtime. The new estimatorandcontrol
Evaluation of the environmental viability of direct injection schemes for ocean carbon sequestration
Israelsson, Peter H. (Peter Hampus), 1973-
2008-01-01T23:59:59.000Z
This thesis evaluates the expected impact of several promising schemes for ocean carbon sequestration by direct injection of CO2, and serves as an update to the assessment by Auerbach et al. (1997) and Caulfield et al. ...
A Feedback-based Adaptive Broadcast Coding Scheme for Reducing In-order Delivery Delay
Medard, Muriel
We propose a new feedback-based adaptive coding scheme for a packet erasure broadcast channel. The main performance metric of interest is the delay. We consider two types of delay - decoding delay and delivery delay. ...
Cornils, William Joseph
1981-01-01T23:59:59.000Z
CHEMICAL RESISTANCE DETERMINATION TEST SCHEME AND RATING SYSTEM DEVELOPMENT FOR INDUSTRIAL GLOVE EVALUATION A Thesis by WILLIAM JOSEPH CORNILS Submitted to the Graduate College of Texas A&M University in partial fulfillment... of the requirement for the degree of MASTER OF SCIENCE August 1981 Major Subject: Industrial Hygiene CHEMICAL RESISTANCE DETERMINATION TEST SCHEME AND RATING SYSTEM DEVELOPMENT FOR INDUSTRIAL GLOVE EVALUATION A Thesis by WILLIAM JOSEPH CORNILS Approved...
A cost-benefit approach to youth vocational training schemes in Africa
Kuanyin, Emmanuel Bol
1974-01-01T23:59:59.000Z
A COST-BENEFIT APPROACH TO YOUTH VOCATIONAL TRAINING SCHEMES IN AFRICA A Thesis By EMMANUEL BOL KUANY IN Submitted to the Graduate College of Texas ASM University in partial fulfillment of the requirement for the degree of MASTER OF SCIENCE... Oecember 1974 Major Subject: Economic s A COST-BENEFIT APPROACH TO YOUTH VOCATIONAL TRAINING SCHEMES IN AFRICA A Thesis EMMANUEL BOL KUANYIN As Approved to Style and Content by: (Chairman of Committee) (Head of Department) (Member ~ ~ (Member...
Scheme for a linear-optical controlled-phase gate with programmable phase shift
Karel Lemr; Karol Bartkiewicz; Antonín ?ernoch
2015-03-20T23:59:59.000Z
We propose a linear-optical scheme for a controlled-phase gate with tunable phase shift set by a program qubit. Analysis of the scheme is provided with considerations for experimental feasibility. We also discuss options for increasing the success probability up to 1/12 which is close the the optimal success probability of a non-programmable tunable controlled-phase gate.
Towards laser based improved experimental schemes for multiphoton e+ e- pair production from vacuum
I. Ploumistakis; S. D. Moustaizis; I. Tsohantjis
2009-07-15T23:59:59.000Z
Numerical estimates for pair production from vacuum in the presence of strong electromagnetic fields are derived, for two experimental schemes : the First concerns a laser based X-FEL and the other imitates the E144 experiment. The approximation adopted in this work is that of two level multiphoton on resonance. Utilizing achievable values of laser beam parameters, an enhancedproduction efficiency of up to 10^11 and 10^15 pairs can be obtained, for the two schemes respectively.
Error propagation in loss- and failure-tolerant quantum computation schemes
Peter P. Rohde; Timothy C. Ralph; William J. Munro
2007-01-14T23:59:59.000Z
Qubit loss and gate failure are significant obstacles for the implementation of scalable quantum computation. Recently there have been several proposals for overcoming these problems, including schemes based on parity and cluster states. While effective at dealing with loss and gate failure, these schemes typically lead to a blow-out in effective depolarizing noise rates. In this supplementary paper we present a detailed analysis of this problem and techniques for minimizing it.
Efficient quantum key distribution scheme with pre-announcing the basis
Jingliang Gao; Changhua Zhu; Heling Xiao
2014-10-21T23:59:59.000Z
We devise a new quantum key distribution scheme that is more efficient than the BB84 protocol. By pre-announcing basis, Alice and Bob are more likely to use the same basis to prepare and measure the qubits, thus achieves a higher efficiency. The error analysis is revised and its security against any eavesdropping is proven briefly. Furthermore we show that, compared with the LCA scheme, our modification can be applied in more quantum channels.
Stochastic Analysis of a Churn-Tolerant Structured Peer-to-Peer Scheme
Jacobs, Tim
2010-01-01T23:59:59.000Z
We present and analyze a simple and general scheme to build a churn (fault)-tolerant structured Peer-to-Peer (P2P) network. Our scheme shows how to ``convert" a static network into a dynamic distributed hash table(DHT)-based P2P network such that all the good properties of the static network are guaranteed with high probability (w.h.p). Applying our scheme to a cube-connected cycles network, for example, yields a $O(\\log N)$ degree connected network, in which every search succeeds in $O(\\log N)$ hops w.h.p., using $O(\\log N)$ messages, where $N$ is the expected stable network size. Our scheme has an constant storage overhead (the number of nodes responsible for servicing a data item) and an $O(\\log N)$ overhead (messages and time) per insertion and essentially no overhead for deletions. All these bounds are essentially optimal. While DHT schemes with similar guarantees are already known in the literature, this work is new in the following aspects: (1) It presents a rigorous mathematical analysis of the scheme...
Continuous variable versus hybrid schemes for quantum teleportation of Gaussian states
Ioannis Kogias; Sammy Ragy; Gerardo Adesso
2014-05-28T23:59:59.000Z
In this paper, we examine and compare two fundamentally different teleportation schemes; the well-known continuous variable scheme by Vaidman, Braunstein and Kimble (VBK), and a recently proposed hybrid scheme by Andersen and Ralph (AR). We analyze the teleportation of ensembles of arbitrary pure single-mode Gaussian states using these schemes and see how they fare against the optimal measure-and-prepare strategies -- the benchmarks. In the VBK case, we allow for non-unit gain tuning and consider a class of possibly non-Gaussian resources in order to optimize performance. The results suggest that the AR scheme may likely be a more suitable candidate for beating the benchmarks in the teleportation of squeezing, capable of achieving this for moderate resources in comparison to the VBK scheme. Moreover, our quantification of resources, whereby different protocols are compared at fixed values of the entanglement entropy or the mean energy of the resource states, brings into question any advantage due to non-Gaussianity for quantum teleportation of Gaussian states.
A new chemical scheme to study carbon-rich exoplanet atmospheres
Venot, Olivia; Agúndez, Marcelino; Decin, Leen; Bounaceur, Roda
2015-01-01T23:59:59.000Z
Atmospheres with a high C/O ratio are expected to contain an important quantity of hydrocarbons, including heavy molecules (with more than 2 carbon atoms). To study correctly these C-rich atmospheres, a chemical scheme adapted to this composition is necessary. We have implemented a chemical scheme that can describe the kinetics of species with up to 6 carbon atoms. This chemical scheme has been developed with specialists of combustion and validated through experiments on a wide range of T and P. This chemical network is available on the online database KIDA. We have created a grid of 12 models to explore different thermal profiles and C/O ratios. For each of them, we have compared the chemical composition determined with a C0-C2 chemical scheme (species with up to 2 carbon atoms) and with the C0-C6 scheme. We found no difference in the results obtained with the two schemes when photolyses are not included in the model, whatever the temperature of the atmosphere. In contrast, when there is photochemistry, diff...
sustainable development in the Information and Communications Technology sector. The members of the Supply and Communications Technology (ICT) sector. There are also management systems standards such as SA8000 of ethical product labelling schemes for consumer products. These tend to communicate standards in one
Evaluation of a Modified Scheme for Shallow Convection: Implementation of CuP and Case Studies
Berg, Larry K.; Gustafson, William I.; Kassianov, Evgueni I.; Deng, Liping
2013-01-01T23:59:59.000Z
A new treatment for shallow clouds has been introduced into the Weather Research and Forecasting (WRF) model. The new scheme, called the cumulus potential (CuP) scheme, replaces the ad-hoc trigger function used in the Kain-Fritsch cumulus parameterization with a trigger function related to the distribution of temperature and humidity in the convective boundary layer via probability density functions (PDFs). An additional modification to the default version of WRF is the computation of a cumulus cloud fraction based on the time scales relevant for shallow cumuli. Results from three case studies over the U.S. Department of Energy’s Atmospheric Radiation Measurement (ARM) site in north central Oklahoma are presented. These days were selected because of the presence of shallow cumuli over the ARM site. The modified version of WRF does a much better job predicting the cloud fraction and the downwelling shortwave irradiance thancontrol simulations utilizing the default Kain-Fritsch scheme. The modified scheme includes a number of additional free parameters, including the number and size of bins used to define the PDF, the minimum frequency of a bin within the PDF before that bin is considered for shallow clouds to form, and the critical cumulative frequency of bins required to trigger deep convection. A series of tests were undertaken to evaluate the sensitivity of the simulations to these parameters. Overall, the scheme was found to be relatively insensitive to each of the parameters.
X-ray tests of a two-dimensional stigmatic imaging scheme with variable magnifications
Lu, J., E-mail: jlu@pppl.gov [Key Laboratory of Optoelectronic Technology and System of Ministry of Education, Chongqing University, Chongqing 400030 (China); Bitter, M.; Hill, K. W.; Delgado-Aparicio, L. F.; Efthimion, P. C.; Pablant, N. A. [Princeton Plasma Physics Laboratory, Princeton, New Jersey 08543 (United States); Beiersdorfer, P. [Physics Division, Lawrence Livermore National Laboratory, Livermore, California 94550 (United States); Caughey, T. A.; Brunner, J. [Inrad Optics, 181 Legrand Avenue, Northvale, New Jersey 07647 (United States)
2014-11-15T23:59:59.000Z
A two-dimensional stigmatic x-ray imaging scheme, consisting of two spherically bent crystals, one concave and one convex, was recently proposed [M. Bitter et al., Rev. Sci. Instrum. 83, 10E527 (2012)]. The Bragg angles and the radii of curvature of the two crystals of this imaging scheme are matched to eliminate the astigmatism and to satisfy the Bragg condition across both crystal surfaces for a given x-ray energy. In this paper, we consider more general configurations of this imaging scheme, which allow us to vary the magnification for a given pair of crystals and x-ray energy. The stigmatic imaging scheme has been validated for the first time by imaging x-rays generated by a micro-focus x-ray source with source size of 8.4 ?m validated by knife-edge measurements. Results are presented from imaging the tungsten L?1 emission at 8.3976 keV, using a convex Si-422 crystal and a concave Si-533 crystal with 2d-spacings of 2.21707 Å and 1.65635 Å and radii of curvature of 500 ± 1 mm and 823 ± 1 mm, respectively, showing a spatial resolution of 54.9 ?m. This imaging scheme is expected to be of interest for the two-dimensional imaging of laser produced plasmas.
Implicit-Explicit Runge-Kutta schemes for the Boltzmann-Poisson system for semiconductors
G. Dimarco; L. Pareschi; V. Rispoli
2013-05-08T23:59:59.000Z
In this paper we develop a class of Implicit-Explicit Runge-Kutta schemes for solving the multi-scale semiconductor Boltzmann equation. The relevant scale which characterizes this kind of problems is the diffusive scaling. This means that, in the limit of zero mean free path, the system is governed by a drift-diffusion equation. Our aim is to develop a method which accurately works for the different regimes encountered in general semiconductor simulations: the kinetic, the intermediate and the diffusive one. Moreover, we want to overcome the restrictive time step conditions of standard time integration techniques when applied to the solution of this kind of phenomena without any deterioration in the accuracy. As a result, we obtain high order time and space discretization schemes which do not suffer from the usual parabolic stiffness in the diffusive limit. We show different numerical results which permit to appreciate the performances of the proposed schemes.
Hadronization Scheme Dependence of Long-Range Azimuthal Harmonics in High Energy p+A Reactions
Esposito, Angelo
2015-01-01T23:59:59.000Z
We compare the distortion effects of three popular final state hadronization schemes that modify the initial-state gluon azimuthal harmonic correlations in high energy p+A collisions. The three models considered are (1) LPH: local parton-hadron duality, (2) CPR: collinear parton-hadron resonance independent fragmenation, and (3) LUND: color string hadronization. Strong initial-state multi-gluon azimuthal correlations are generated using the non-abelian beam jet bremsstrahlung GLVB model, assuming a saturation scale Qsat = 2 GeV. Long-range final hadron pair elliptic and triangular harmonics are compared based on the three hadronization schemes. Our analysis shows that the hadron level harmonics are strongly hadronization scheme dependent in the low pT < 3 GeV domain.
The DIS(chi) Scheme for Heavy Quark Production at Small x.
White, C D
, Cambridge, CB3 0HE, UK, E-mail: cdw24@hep.phy.cam.ac.uk In order to successfully describe DIS data, one must take heavy quark mass ef- fects into account. This is often achieved using so called variable flavour number schemes, in which a parton distribution... for the heavy quark species is defined above a suitable matching scale. At small x, one must also potentially include high energy corrections to this framework arising from the BFKL equation. We outline the definition of a variable flavour scheme which allows...
N_p N_n Scheme Based on New Empirical Formula for Excitation Energy
Jin-Hee Yoon; Eunja Ha; Dongwoo Cha
2007-09-12T23:59:59.000Z
We examine the $N_p N_n$ scheme based on a recently proposed simple empirical formula which is highly valid for the excitation energy of the first excited natural parity even multipole states in even-even nuclei. We demonstrate explicitly that the $N_p N_n$ scheme for the excitation energy emerges from the separate exponential dependence of the excitation energy on the valence nucleon numbers $N_p$ and $N_n$ together with the fact that only a limited set of numbers is allowed for the $N_p$ and $N_n$ of the existing nuclei.
Security analysis of boolean algebra based on Zhang-Wang digital signature scheme
Zheng, Jinbin, E-mail: jbzheng518@163.com [School of Mathematics and Computer Science, Long Yan University, Longyan 364012 (China)
2014-10-06T23:59:59.000Z
In 2005, Zhang and Wang proposed an improvement signature scheme without using one-way hash function and message redundancy. In this paper, we show that this scheme exits potential safety concerns through the analysis of boolean algebra, such as bitwise exclusive-or, and point out that mapping is not one to one between assembly instructions and machine code actually by means of the analysis of the result of the assembly program segment, and which possibly causes safety problems unknown to the software.
An Adaptive Entanglement Distillation Scheme Using Quantum Low Density Parity Check Codes
K. H. Ho; H. F. Chau
2008-07-14T23:59:59.000Z
Quantum low density parity check (QLDPC) codes are useful primitives for quantum information processing because they can be encoded and decoded efficiently. Besides, the error correcting capability of a few QLDPC codes exceeds the quantum Gilbert-Varshamov bound. Here, we report a numerical performance analysis of an adaptive entanglement distillation scheme using QLDPC codes. In particular, we find that the expected yield of our adaptive distillation scheme to combat depolarization errors exceed that of Leung and Shor whenever the error probability is less than about 0.07 or greater than about 0.28. This finding illustrates the effectiveness of using QLDPC codes in entanglement distillation.
Design and performance evaluation of RAKE finger management schemes in the soft handover region
Choi, Seyeong
2009-05-15T23:59:59.000Z
xii LIST OF FIGURES FIGURE Page 1 Average BER of BPSK versus the average SNR per path, ?, with MRC, GSC, and the proposed scheme for various values of L over i.i.d. Rayleigh fading channels when Lc = 3,La = 2, and ?T = 5 dB. . 20 2 Average BER of BPSK... versus the average SNR per path, ?, with MRC, GSC, and the proposed scheme for various values of La over i.i.d. Rayleigh fading channels when L = 4,Lc = 3, and ?T = 5 dB. . 22 3 Average BER of BPSK versus the average SNR per path, ?, with MRC, GSC...
A stochastic multi-symplectic scheme for stochastic Maxwell equations with additive noise
Hong, Jialin, E-mail: hjl@lsec.cc.ac.cn [Institute of Computational Mathematics and Scientific/Engineering Computing, Academy of Mathematics and Systems Science, Chinese Academy of Sciences, Beijing 100190 (China); Ji, Lihai, E-mail: jilihai@lsec.cc.ac.cn [Institute of Applied Physics and Computational Mathematics, Beijing 100094 (China); Zhang, Liying, E-mail: lyzhang@lsec.cc.ac.cn [Institute of Computational Mathematics and Scientific/Engineering Computing, Academy of Mathematics and Systems Science, Chinese Academy of Sciences, Beijing 100190 (China)
2014-07-01T23:59:59.000Z
In this paper we investigate a stochastic multi-symplectic method for stochastic Maxwell equations with additive noise. Based on the stochastic version of variational principle, we find a way to obtain the stochastic multi-symplectic structure of three-dimensional (3-D) stochastic Maxwell equations with additive noise. We propose a stochastic multi-symplectic scheme and show that it preserves the stochastic multi-symplectic conservation law and the local and global stochastic energy dissipative properties, which the equations themselves possess. Numerical experiments are performed to verify the numerical behaviors of the stochastic multi-symplectic scheme.
Ting Gao; Feng-Li Yan; Zhi-Xi Wang; You-Cheng Li
2006-04-18T23:59:59.000Z
We analyze the capacity of a simultaneous quantum secure direct communication scheme between the central party and other $M$ parties via $M+1$-particle GHZ states and swapping quantum entanglement. It is shown that the encoding scheme should be secret if other $M$ parties wants to transmit $M+1$ bit classical messages to the center party secretly. However when the encoding scheme is announced publicly, we prove that the capacity of the scheme in transmitting the secret messages is 2 bits, no matter how big $M$ is.
AN ADAPTIVE MIXED SCHEME FOR ENERGY-TRANSPORT SIMULATIONS OF FIELD-EFFECT TRANSISTORS
Pietra, Paola
AN ADAPTIVE MIXED SCHEME FOR ENERGY-TRANSPORT SIMULATIONS OF FIELD-EFFECT TRANSISTORS #3; STEFAN HOLST, ANSGAR J UNGEL y AND PAOLA PIETRA z Abstract. Energy-transport models are used in semiconductor simulations to account for ther- mal e#11;ects. The model consists of the continuity equations for the mass
A FIRST ORDER PROJECTION-BASED TIME-SPLITTING SCHEME FOR COMPUTING CHEMICALLY REACTING FLOWS
A FIRST ORDER PROJECTION-BASED TIME-SPLITTING SCHEME FOR COMPUTING CHEMICALLY REACTING FLOWS, surface catalytic reactors for methane to methanol conversion and chemical vapor deposition (CVD) process ANDREAS PROHL1 Abstract. The simulation of chemically reacting ows in speci#12;c situations is a basic
A FIRST ORDER PROJECTIONBASED TIMESPLITTING SCHEME FOR COMPUTING CHEMICALLY REACTING FLOWS
A FIRST ORDER PROJECTIONBASED TIMESPLITTING SCHEME FOR COMPUTING CHEMICALLY REACTING FLOWS catalytic reactors for methane to methanol conversion and chemical vapor deposition (CVD) process modeling ANDREAS PROHL 1 Abstract. The simulation of chemically reacting flows in specific situations is a basic
A Model-Based Impedance Control Scheme for High-Performance Hydraulic Joints
Papadopoulos, Evangelos
A Model-Based Impedance Control Scheme for High-Performance Hydraulic Joints Glen Bilodeau1, Greece Abstract Impedance control of a hydraulic servoactuator joint system is discussed in this paper individually. Due to nonlinear properties of hydraulic actuators, impedance control is difficult. The control
Siddharthan, Advaith
Notice to opt out of pension saving University of Aberdeen Superannuation & Life Assurance Scheme (UASLAS) Notice to opt out of pension saving This form is the notice for withdrawal from UASLAS whilst remaining in pensionable employment at University of Aberdeen. If you want to opt out of pension saving
Numerical modelling of avalanches based on Saint-Venant equations using a kinetic scheme
Paris-Sud XI, Université de
avalanches are treated here as a dry granular flow with Coulomb-type behavior. The numerical finite volume of an avalanche over simplified topography. Coulomb-type behavior with constant and variable friction angle modelling, Coulomb friction, Saint-Venant equations, finite volume kinetic scheme. 1 Introduction Granular
Self-Encryption Scheme for Data Security in Mobile Devices Yu Chen* and
Chen, Yu
Self-Encryption Scheme for Data Security in Mobile Devices Yu Chen* and Wei-Shinn Ku Dept networks and mobile devices has been changing our living style significantly. Along with great convenience. The bit stream is encrypted and the ciphertext is stored on the mobile device, whereas the keystream
EAGR: Energy Aware Greedy Routing Scheme for Wireless Ad hoc Networks Sachin Sharma
Dharmaraja, S.
EAGR: Energy Aware Greedy Routing Scheme for Wireless Ad hoc Networks Sachin Sharma Tejas Networks, throughput and energy consumption. Keywords: Rate of Energy Consumption, Greedy Routing, Wireless Ad hoc distributed nodes that communicate over a wireless link. In this paper we present a scalable, Energy Aware
Adaptive Bolus Chasing Computed Tomography Angiography: Control Scheme and Experimental Results
Wang, Ge
Adaptive Bolus Chasing Computed Tomography Angiography: Control Scheme and Experimental Results to synchronize the bolus peak in a patient's vascular system and the imaging aperture of a computed tomography standard. Keywords Adaptive bolus chasing; Computed Tomography Angiography I. Introduction With the advent
A Control Strategy Scheme for Fuel Cell-Vehicle Based on Frequency Hamza Alloui
Boyer, Edmond
but there are only 1300 billion barrels of proven reserves of oil. At the current rate of consumption, the world_khoudir@yahoo.fr Mohamed Becherif UTBM, FCLab FR CNRS 3539, Femto-ST UMR CNRS 6174, 90010 Belfort , France mohamed Cedex 03, France Mohamed.Benbouzid@univ-brest.fr Abstract This paper presents a control strategy scheme
A Quasi-continuous Interpolation Scheme for Pathways between Distant Configurations
Carr, Joanne M.; Wales, David J.
2012-08-28T23:59:59.000Z
for Pathways Between Distant Configurations David J. Wales1?and Joanne M. Carr1† University Chemical Laboratories, Lensfield Road, Cambridge CB2 1EW, UK June 11, 2012 ?dw34@cam.ac.uk †jmc49@cam.ac.uk 1 Abstract A quasi-continuous interpolation scheme...
An Automatic Hierarchical Image Classification Scheme Jing Huang S Ravi Kumar y Ramin Zabih z
Zabih, Ramin
in such a process. Image Classification. One approach to this problem is to orga- nize the digital libraryAn Automatic Hierarchical Image Classification Scheme Jing Huang S Ravi Kumar y Ramin Zabih z Department of Computer Science Cornell University Ithaca, NY 14853. Abstract Organizing images into semantic
An Efficient Transparent Test Scheme for Embedded Word-Oriented Memories
Boyer, Edmond
An Efficient Transparent Test Scheme for Embedded Word-Oriented Memories Jin-Fu Li, Tsu-Wei Tseng, and Chin-Long Wey Advanced Reliable Systems (ARES) Laboratory Department of Electrical Engineering National with the smallest feature size in system-on-chip (SOC) designs. The reliability of memory cores thus has heavy
A wetting and drying scheme for POM Lie-Yauw Oey *
that contain hydraulic jumps, including a laboratory dam-break problem. Ó 2004 Published by Elsevier Ltd.e. hydraulic jumps and/or bores) can develop. A WAD scheme is proposed and applied to the Princeton Ocean Model. Keywords: Wetting and drying; Dam-break; Flood and ebb; Princeton ocean model 1. Introduction Wetting
Cost Model and Adaptive Scheme for Publish/Subscribe Systems on
Cloud ES ES EBS ES/ ED ES/ ED Radio tower Cellular W ireless LA N #12;Adaptive scheme Various types request and reply) cpoll(,T) (cost of periodic publish or polling) cd(,T) (cost of delaying publish) s(n
A Cheat-Proof Game Theoretic Demand Response Scheme for Smart Grids
Liu, K. J. Ray
A Cheat-Proof Game Theoretic Demand Response Scheme for Smart Grids Yan Chen, W. Sabrina Lin, Feng}@umd.edu Abstract--While demand response has achieved promising results on making the power grid more efficient and reliable, the additional dynamics and flexibility brought by demand response also increase the uncertainty
A Privacy-Preserving Scheme for Incentive-Based Demand Response in the Smart Grid
Fang, Yuguang "Michael"
1 A Privacy-Preserving Scheme for Incentive-Based Demand Response in the Smart Grid Yanmin Gong to both grid operators and customers, exploiting the full potential of demand response. However to be attributable to individuals. However, this assumption does not hold in incentive-based demand response (IDR
Hybrid PID-fuzzy control scheme for managing energy resources in buildings
Paris-Sud XI, Université de
Hybrid PID-fuzzy control scheme for managing energy resources in buildings Benjamin Paris, Julien. Keywords: energy performance of buildings, multi-energy buildings, thermal comfort, hybrid PID: both indoor temperature regulation and energy resources management in buildings require the design
Bluenet a New Scatternet Formation Scheme Zhifang Wang, Robert J. Thomas, Zygmunt Haas
and facilitate supplier and customer cooperation in an integrated supply-side and demand-side management scheme for data and information flow at low cost. During recent years, there has been a substantial demand seamlessly without wires. This demand has led to a rapid development of the Bluetooth System. In July 1997
Man-in-the-Middle Secure Authentication Schemes from LPN and Weak PRFs
International Association for Cryptologic Research (IACR)
and its more efficient variants such as Toeplitz-LPN and Ring-LPN. Building a man-in-the-middle secure building a man-in-the- middle secure scheme based on any variant of the LPN problem solves the main open-cost devices, such as smart cards and RFID tags, in the real world. One of the most common cryptographic
Robust Smart Card based Password Authentication Scheme against Smart Card Security Breach
Robust Smart Card based Password Authentication Scheme against Smart Card Security Breach Ding Wang University, Beijing 100871, China 3 Automobile Management Institute of PLA, Bengbu City 233011, China wangdingg@mail.nankai.edu.cn Abstract. As the most prevailing two-factor authentication mechanism, smart
A Loss-Minimization DTC Scheme for EV Induction Motors A. Haddoun1
Paris-Sud XI, Université de
totally overcome. Indeed, EVs have a low energy density and long charging time for the present batteries distance per battery charge. Therefore, DTC should be associated to a loss- minimization strategy soA Loss-Minimization DTC Scheme for EV Induction Motors A. Haddoun1 , M.E.H. Benbouzid2 , D. Diallo3
TMSUI: A Trust Management Scheme of USB Storage Devices for Industrial Control Systems
International Association for Cryptologic Research (IACR)
TMSUI: A Trust Management Scheme of USB Storage Devices for Industrial Control Systems Bo Yang control system (ICS). However, the preva- lence of USB storage devices brings a great challenge,Feng,qin_yu,zhangyingjun,wangweijin}@tca.iscas.ac.cn Abstract. The security of sensitive data and the safety of control signal are two core issues in industrial
Zelikovsky, Alexander
correspond to a group of up to eight nodes in the Group #3; This work was supported by a Packard Foundation a group of up to eight virtual positions (c). The only existing approximation algorithms for the GroupA New Approximation Scheme for the Group Steiner Problem #3; C. S. Helvig Gabriel Robins Alexander
Some approximate Godunov schemes to compute shallow-water equations with topography
Gallouët, Thierry
Some approximate Godunov schemes to compute shallow-water equations with topography Thierry the computation of shallow-water equations with topography by Finite Volume methods, in a one are based on a discretisation of the topography by a piecewise function constant on each cell of the mesh
Central-Upwind Scheme for Shallow Water Equations with Discontinuous Bottom Topography
Chertock, Alina
Central-Upwind Scheme for Shallow Water Equations with Discontinuous Bottom Topography Andrew are achieved, in particular, by using continuous piecewise linear interpolation of the bottom topography function. However, when the bottom function is discontinuous or a model with a moving bottom topography
Developing an Efficient Surveillance Scheme for Assessing Compliance with Air Quality Standards
Washington at Seattle, University of
of a component of a major pollution sources, like a power plant or oil re neries; or an increase in the level compliance with air quality standards. Since many countries maintain online surveillance of air pollution. This work proposes a three-step procedure for implementing the SR scheme to air pollution data. The rst step
A power system control scheme based on security visualisation in parameter space
Guo, Yi
nonlinear and complex especially under competitive electricity market situations. A power system can with system contingencies. Electrical Power and Energy Systems 27 (2005) 488495 wwwA power system control scheme based on security visualisation in parameter space Zhao Yang Donga
A Hierarchical Classification Scheme to Derive Interprocess Communication in Process Networks
Kienhuis, Bart
% of the cases, we still relay on integer linear programming while in the remaining 95%, the tests presented, an ILP test has still to be applied. Thus, we introduce a hierarchical classification scheme. In only 5% of the cases to classify, we still relay on integer linear programming while in the remaining
Comparison of Price-based Static and Dynamic Job Allocation Schemes for Grid Computing Systems
Chronopoulos, Anthony T.
Comparison of Price-based Static and Dynamic Job Allocation Schemes for Grid Computing Systems Antonio San Antonio, TX 78249, USA Email: atc@cs.utsa.edu Abstract--Grid computing systems are a cost-effective al- ternative to traditional high-performance computing systems. However, the computing resources
Wide input range DC-DC converter with digital control scheme
Harfman Todorovic, Maja
2006-04-12T23:59:59.000Z
In this thesis analysis and design of a wide input range DC-DC converter is proposed along with a robust power control scheme. The proposed converter and its control is designed to be compatible to a fuel cell power source, which exhibits 2...
OFFLINE EVALUATION OF SIX SURFACE LAYER PARAMETERIZATION SCHEMES AGAINST OBSERVATIONS AT THE ARM of surface fluxes collected by the DOE (Department of Energy) ARM (Atmospheric Radiation Measurement) program to quantify the uncertainty/discrepancy between the ARM measurements based on the EC (Eddy Correlation
Acceptance test procedure for removal of CS1K circuit switcher block and trip schemes
HACHE, J.M.
1999-08-25T23:59:59.000Z
This supporting document provides a detailed process to test the functions of the circuit switcher, protective relays, alarms, SCADA and 125VDC control logic of 115kV and 13.8kV systems at B3S4 substation following the removal of trip and blocking schemes to Transformer No.1 Circuit Switcher B594.
Performance of Flocking-Based Control Schemes in Smart Grid Applications
Kundur, Deepa
Performance of Flocking-Based Control Schemes in Smart Grid Applications Abdallah K. Farraj Eman M@tamu.edu Abstract--Flocking control has recently been used in smart grid applications to stabilize power systems Interest in smart grid systems has surged recently. Smart grid systems use advanced control, communications
LOCALIZATION EFFECTS AND MEASURE SOURCE TERMS IN NUMERICAL SCHEMES FOR BALANCE LAWS
LOCALIZATION EFFECTS AND MEASURE SOURCE TERMS IN NUMERICAL SCHEMES FOR BALANCE LAWS LAURENT GOSSE corresponds to the general case of a scalar balance law (26). These two problems share the common feature) is the key point and the general balance law, where a long- time decay to some steady regime should occur
Load-Balanced Routing Scheme for Energy-Efficient Wireless Sensor Networks
Boutaba, Raouf
Load-Balanced Routing Scheme for Energy-Efficient Wireless Sensor Networks Fatma Bouabdallah, Nizar. In this paper, we investigate the potential energy conservation achieved by balancing the traffic throughout, load balancing, performance analysis. I. INTRODUCTION In order to minimize the energy consumption
Up and Down MiniBuckets: A Scheme for Approximating Combinatorial Optimization Tasks
Dechter, Rina
. Such performance improvements are crucial if we are to apply the scheme at every node in search algoÂ rithms with each unary assignment of a value to a variable in combinatorial optimization problems. This task functions that can guide search algorithms for optimal solutions. The paper presents UDÂMB, a new algorithm
A Novel Transmitter Placement Scheme based on Hierarchical Simplex Search for Indoor Wireless
, we propose an adaptive number adjustment algorithm (ANA) to speed up the search process, which adjusts the number of transmitters with variable step-sizes. A hierarchical simplex search algorithm (HSS1 A Novel Transmitter Placement Scheme based on Hierarchical Simplex Search for Indoor Wireless
A REAL-TIME ITERATION SCHEME FOR NONLINEAR OPTIMIZATION IN OPTIMAL FEEDBACK CONTROL
" and within the research project "Optimization Based Control of Chemical Processes." httpA REAL-TIME ITERATION SCHEME FOR NONLINEAR OPTIMIZATION IN OPTIMAL FEEDBACK CONTROL MORITZ DIEHL, HANS GEORG BOCK, AND JOHANNES P. SCHL¨ODER SIAM J. CONTROL OPTIM. c 2005 Society for Industrial
Lax-Friedrichs Sweeping Scheme for Static Hamilton-Jacobi Equations
Ferguson, Thomas S.
Lax-Friedrichs Sweeping Scheme for Static Hamilton-Jacobi Equations Chiu Yen Kao , Stanley Osher-Friedrichs monotone numerical Hamiltonian to approximate the viscosity solution of arbitrary static Hamilton-Jacobi the Hamilton-Jacobi equation directly without assuming convexity and/or homogeneity of the Hamiltonian. 1
Lax-Friedrichs Sweeping Scheme for Static Hamilton-Jacobi Equations
Ferguson, Thomas S.
Lax-Friedrichs Sweeping Scheme for Static Hamilton-Jacobi Equations #3; Chiu Yen Kao y , Stanley static Hamilton-Jacobi equations in any number of spatial di- mensions. By using the Lax, this is the #28;rst fast numerical method based on discretizing the Hamilton-Jacobi equation directly without
Evaluation of three spatial discretization schemes with the Galewsky et al. test
Reich, Sebastian
Particle Methods (HPM) and the Nambu discretiza- tion applied to shallow-water equations on the sphere with the two conservative spatial discretization schemes. The HPM sim- ulation captures the main features-reversibility survives. The Hamiltonian particle- mesh (HPM) method has been proposed by Frank et al. (2002) for shallow
Lessons learnt from post EIS evaluations of national road schemes in Ireland
King, E.A., E-mail: kingea@tcd.ie [Department of Mechanical and Manufacturing Engineering, Parson's, Building, Trinity College, Dublin (Ireland); O'Malley, V.P. [National Roads Authority, St Martin's House, Waterloo Road, Dublin 4 (Ireland)
2012-01-15T23:59:59.000Z
The Irish National Roads Authority (NRA) recently completed over twenty post environmental impact assessment evaluations of noise chapters prepared as part of Environmental Impact Statements (EISs) for new national road schemes in Ireland. The study focused on a range of issues including a review of noise monitoring procedures, noise prediction methodologies and an assessment of the effectiveness of noise mitigation measures currently in use on national road schemes. This review was carried out taking cognisance of best international practices for noise assessment and methodologies used to mitigate road traffic noise. The primary focus of the study was to assess the actual noise impacts of national road scheme developments and to revise, where necessary, methodologies recommended in the current NRA guidance document describing the treatment of noise on national road schemes. This paper presents a summary of the study and identifies a number of key areas that should be considered prior to the development of future guidance documents. - Highlights: Black-Right-Pointing-Pointer Presents a post-EIS evaluation of noise assessments for national roads in Ireland. Black-Right-Pointing-Pointer The effectiveness of some noise mitigation measures is critically evaluated. Black-Right-Pointing-Pointer Issues related to the current EIS noise assessment methodologies are discussed. Black-Right-Pointing-Pointer Implications for alterations to the NRA noise guidelines.
On the (in)security of some smart-card-based password authentication schemes for WSN
International Association for Cryptologic Research (IACR)
On the (in)security of some smart-card-based password authentication schemes for WSN Ding Wang1 operations and thus is suitable for the resource-constrained WSN environments where an external user wants-tamper-resistant smart cards for WSN. We hope that, by following this principle, similar mistakes repeated in the past
Wide input range DC-DC converter with digital control scheme
Harfman Todorovic, Maja
2006-04-12T23:59:59.000Z
In this thesis analysis and design of a wide input range DC-DC converter is proposed along with a robust power control scheme. The proposed converter and its control is designed to be compatible to a fuel cell power source, which exhibits 2...
China's waste could be treasure for Kyoto scheme 01 Mar 2006 12:36:11 GMT
Columbia University
China's waste could be treasure for Kyoto scheme 01 Mar 2006 12:36:11 GMT Source: Reuters By Stuart Penson COPENHAGEN, March 1 (Reuters) - Hundreds of rubbish landfill sites across China have vast, said Lu Guoqiang, an official at China's state Environmental Protection Administration. "China has 700
Capacity Optimizing Power Loading Scheme for Spatially Constrained Antenna Arrays: Channels
Abhayapala, Thushara D.
Capacity Optimizing Power Loading Scheme for Spatially Constrained Antenna Arrays: Channels and Computer Science The Australian National University Canberra ACT 0200, Australia {tharaka.lamahewa,thushara.abhayapala}@anu.edu.au Tony S. Pollock National ICT Australia Locked Bag 8001, Canberra ACT 2601, Australia tony
Secret sharing schemes on access structures with intersection number equal to one
Secret sharing schemes on access structures with intersection number equal to one Jaume Mart important problems in secret sharing. These problems are studied in this paper for access structures on the optimal information rate are provided for the non-ideal case. Keywords. Cryptography; secret sharing
A comparison of third and second order accurate finite volume schemes for the
Noelle, Sebastian
dimensional diagonalization of the system. Conservative variables (ae; m; n; e) (density, momentum and total energy) have: limiting the spatial reconstruction in these variables guarantees a nonnegative internal energy applications the third order scheme is less efficient than the second order one. AMS Classification Code: 65
PreDVS: Preemptive Dynamic Voltage Scaling for Real-time Systems using Approximation Scheme
Mishra, Prabhat
, dynamic voltage scal- ing, approximation algorithm 1. INTRODUCTION Energy conservation has been the main to save energy is that linear reduction in the supply voltage leads to approximately linear slow downPreDVS: Preemptive Dynamic Voltage Scaling for Real-time Systems using Approximation Scheme Weixun
Rahnavard, Nazanin
Sensor Networks Nazanin Rahnavard School of Electrical and Computer Engineering Georgia Institute in reliability and energy efficiency of the broadcasting scheme for multi-hop wireless sensor networks. Our two, theory. design Keywords Wireless sensor networks, broadcasting, reliability, energy efficiency, rateless
A new scheme of radiation transfer in H II regions including transient heating of grains
S. K. Ghosh; R. P. Verma
2000-09-21T23:59:59.000Z
A new scheme of radiation transfer for understanding infrared spectra of H II regions, has been developed. This scheme considers non-equilibrium processes (e. g. transient heating of the very small grains, VSG; and the polycyclic aromatic hydrocarbon, PAH) also, in addition to the equilibrium thermal emission from normal dust grains (BG). The spherically symmetric interstellar dust cloud is segmented into a large number of "onion skin" shells in order to implement the non-equilibrium processes. The scheme attempts to fit the observed SED originating from the dust component, by exploring the following parameters : (i) geometrical details of the dust cloud, (ii) PAH size and abundance, (iii) composition of normal grains (BG), (iv) radial distribution of all dust (BG, VSG & PAH). The scheme has been applied to a set of five compact H II regions (IRAS 18116- 1646, 18162-2048, 19442+2427, 22308+5812 & 18434-0242) whose spectra are available with adequate spectral resolution. The best fit models and inferences about the parameters for these sources are presented.
Study of a numerical scheme for miscible two-phase flow in porous media
Boyer, Edmond
holds for CO2 storage, gas pro- duction, and other situations. For x and t [0, T], we consider Schleper November 21, 2013 Abstract We study the convergence of a finite volume scheme for a model of miscible two-phase flow in porous media. In this model, one phase can dissolve into the other one
Adequate Numerical Solution of Air Pollution Problems by positive Di#erence Schemes on
Ehrhardt, Matthias
Adequate Numerical Solution of Air Pollution Problems by positive Di#erence Schemes on unbounded In this work we deal with the numerical solution of some problems of air pollution. Since the problems) pollution. The e#ciency and accuracy of our method is illustrated by an example. Key words: air pollution
Adequate Numerical Solution of Air Pollution Problems by positive Difference Schemes on
Ehrhardt, Matthias
Adequate Numerical Solution of Air Pollution Problems by positive Difference Schemes on unbounded In this work we deal with the numerical solution of some problems of air pollution. Since the problems) pollution. The efficiency and accuracy of our method is illustrated by an example. Key words: air pollution
Influence of hole shape on the performance of a turbine vane endwall film-cooling scheme
Thole, Karen A.
Rising combustor exit temperatures in gas turbine engines necessitate active cooling for the downstream industrial gas turbine engines. One means of achieving this goal is to increase the combustion temper- ature are so high in today's gas turbine engines that in the absence of complex cooling schemes the turbine
ForPeerReview An Efficient Adaptive Distributed Space-Time Coding Scheme for
Waterloo, University of
.cst.uwaterloo.ca) Department of Electrical and Computer Engineering, University of Waterloo Waterloo, Ontario, Canada, N2L 3G1 channel gain with the source is less than a prespecified threshold) is optimum. Monte- Carlo simulations amplify-and-forward/detect-and-forward scheme is proposed for the case that the quality of the source
PLM: Fast Convergence for Cumulative Layered Multicast Transmission Schemes (extended version)
Legout, Arnaud
PLM: Fast Convergence for Cumulative Layered Multicast Transmission Schemes (extended version) A the properties of a new multicast congestion control protocol (called PLM) for audio/video and file transfer. We evaluated PLM for a large variety of scenarios and show that it converges fast to the optimal link
Legout, Arnaud
PLM: Fast Convergence for Cumulative Layered Multicast Transmission Schemes (extended version the properties of a new multicast congestion control protocol (called PLM) for audio/video and file transfer. We evaluated PLM for a large variety of scenarios and show that it converges fast to the optimal link
A Mesochronous Pipeline Scheme for High Performance Low Power Digital Systems
Delgado-Frias, José G.
A Mesochronous Pipeline Scheme for High Performance Low Power Digital Systems Suryanarayana B University Pullman, WA 99164-2752 Email: {statapud, jdelgado}geecs.wsu.edu Abstract- A mesochronous pipeline mesochronous pipeline over conventional pipeline architecture. in size (longer wires with increased parasitic
A ROBUST WELL-BALANCED SCHEME FOR MULTI-LAYER SHALLOW WATER EQUATIONS
the overall property of being conservative in the total momentum. It is based on a source-centered hydro of the layers with respect to horizontal scales, small viscosity, hydrostatics, small slope for the topography-centered hydro- static reconstruction scheme for the one-layer system, a variant of the hydrostatic
Strathclyde, University of
Extremely short relativistic-electron-bunch generation in the laser wakefield via novel bunch accelerator (LWFA) a short in- tense laser pulse, with a duration on the order of a plasma wave period July 2004; published 6 December 2004) Recently a new electron-bunch injection scheme for the laser
A Distributed Scheme for Efficient Pair-wise Comparison of Complete Genomes
Bansal, Arvind K.
#12;48 A Distributed Scheme for Efficient Pair-wise Comparison of Complete Genomes Valerian S}@mcs.kent.edu 1 Corresponding author Abstract The comparisons of newly sequenced genomes against a genome and a CORBA-based implementation to compare and align gene sequences in large complete genomes, using multiple
A Weighted Interference Estimation Scheme for Interface Switching Wireless Mesh Networks
. Typically, a WMN is a collection of wireless mesh routers and wireless mobile mesh clients. Wireless mesh to wireless mesh routers via either wired or wireless connections. In addition, a small number of wirelessA Weighted Interference Estimation Scheme for Interface Switching Wireless Mesh Networks Yunxia
A Weighted Interference Estimation Scheme for Interface Switching Wireless Mesh Networks
. A WMN is a collection of stationary wireless mesh routers and mobile mesh clients. Wireless mesh routers mesh routers via traditional Ethernet or wireless connections. Through multi-hop wireless relay, mobileA Weighted Interference Estimation Scheme for Interface Switching Wireless Mesh Networks Yunxia
Equivalence for nonparametric drift estimation of a diffusion process and its Euler scheme.
Paris-Sud XI, Université de
Equivalence for nonparametric drift estimation of a diffusion process and its Euler scheme. V equivalence theory of Le Cam (1986) is to approx- imate general statistical models by simple ones. We develop here a global asymptotic equivalence result for nonparametric drift estimation of a discretely observed
CoudiÃ¨re, Yves
An efficient scheme on wet/dry transitions for Shallow Water Equations with friction Christophe discrepancy between both source terms comes from their relevance in dry regions. Indeed, the friction term the friction source terms in the shallow-water model. Such additional source terms are known to be very stiff
Co-ordination of Renewable Energy Support Schemes in the Stine Grenaa Jensen1
Co-ordination of Renewable Energy Support Schemes in the EU Stine Grenaa Jensen1 and Poul Erik for renewable energy are regionalised. Two theoretical examples are used to explain interactive effects on, e. In a communication from the European Commission on Support for Electricity from Renewable Energy Sources
Definition. scheme X PicX := {invertible sheaf onX}/isom, Pic0
Kaji, Hajime
( ) 16 2 9 Definition. scheme X PicX := {invertible sheaf onX}/isom, Pic0 X := {L PicX | degL = 0}, . . Fact. C nonsingular complete curve . Pic0 C abelian variety , C genus . Fact nonsingular , , singular curve). C: x3 = y2 z in P2 k Pic0 C = Ga := (k, +) . picard variety , abelian variety , Ga , arithemetic
PARALLEL SOLUTION-ADAPTIVE SCHEME FOR MULTI-PHASE CORE FLOWS IN ROCKET MOTORS
Groth, Clinton P. T.
PARALLEL SOLUTION-ADAPTIVE SCHEME FOR MULTI-PHASE CORE FLOWS IN ROCKET MOTORS J. S. Sachdev , C. P motors (SRM). An Eulerian formulation is used for both the gas and particle phases, which leads THE internal flow dynamics of a solid propellant rocket motor (SRM) is very complex. The com- bustion
Breaking a secure communication scheme based on the phase synchronization of chaotic systems
G. Alvarez; F. Montoya; G. Pastor; M. Romera
2003-11-20T23:59:59.000Z
A security analysis of a recently proposed secure communication scheme based on the phase synchronization of chaotic systems is presented. It is shown that the system parameters directly determine the ciphertext waveform, hence it can be readily broken by parameter estimation of the ciphertext signal.
A Statistical Prediction-based Scheme for Energy-aware Multimedia Data Streaming
Bhandarkar, Suchendra "Suchi" M.
A Statistical Prediction-based Scheme for Energy-aware Multimedia Data Streaming Yong Wei Surendar multimedia objects has fueled the demand of mobile streaming multimedia. A necessary criterion for the mass prediction-based client-side strategies to reduce the wireless network interface card (WNIC) energy
Analogue to information system based on PLL-based frequency synthesizers with fast locking schemes
Lin, Ming-Lang
2010-01-01T23:59:59.000Z
rate being limited in applications a novel irregular data conversion scheme called analogue-to-information system (AIS) is proposed in this thesis. The AIS is typically based upon LCSS, but an adjustable clock generator and a real time data compression...
Energy Balancing Routing Schemes for Low-Power Wireless Networks Eun-Sook Sung, Miodrag Potkonjak
Potkonjak, Miodrag
Energy Balancing Routing Schemes for Low-Power Wireless Networks Eun-Sook Sung, Miodrag Potkonjak}@cs.ucla.edu Abstract-- We address the problem of energy balancing in multi-hop wireless networks to optimize that wireless links are almost always lossy and asymmetric as a result of energy constraints and/or the low
A Cluster-based Energy Balancing Scheme in Heterogeneous Wireless Sensor Networks
Bölöni, Ladislau L
A Cluster-based Energy Balancing Scheme in Heterogeneous Wireless Sensor Networks Jing Ai, Damla Unbalanced energy consumption is an inherent problem in wireless sensor networks, and it is largely of energy reserve and wireless communication ability. We transform the flat communication in- frastructure
Censor, Yair
-Averaging Projections (SAP) or Block Iterative Projection (BIP) methods). In pCT the parallel schemes are preferred on the general principle that many classes of projection methods (such as SAP and BIP) are perturbation resilient results [2,3]. These methods are used for solving a linear system of equations of the form (1) where
A mixed finite-element scheme of a semiconductor energy-transport model
Hanke-Bourgeois, Martin
A mixed finite-element scheme of a semiconductor energy-transport model using dual entropy which are able to deal with physical effects such as carrier heating and velocity overshoot. The energy that the Joule heating term vanishes if the dual entropy variables w1 = (Âµ - V )/T and w2 = -1/T are employed
A wavelet filter enhancement scheme with a fast integral B-wavelet transform and
Nelson, James
A wavelet filter enhancement scheme with a fast integral B-wavelet transform and pyramidal multi-B-wavelet OAL Abstract A construction paradigm is proposed to refine a class of wavelet bases such that the filter characteristics are enhanced. In particular, it is shown that the entire Mth order B-wavelet
WAVELET SAMPLING AND LOCALIZATION SCHEMES FOR THE RADON TRANSFORM IN TWO DIMENSIONS
Virginia Tech
WAVELET SAMPLING AND LOCALIZATION SCHEMES FOR THE RADON TRANSFORM IN TWO DIMENSIONS SHIYING ZHAO. 57, No. 6, pp. 17491762, December 1997 013 Abstract. Two theorems are presented for wavelet-norm between the Radon transform and its wavelet approximation whose coefficients at different scales
Power-Efficient State Exchange Scheme for Low-Latency SMU Design of Viterbi Decoder
Hung, Shih-Hao
Power-Efficient State Exchange Scheme for Low-Latency SMU Design of Viterbi Decoder Chun-Yuan Chu and decoding latency. In this paper, we propose a new Survivor Memory Unit (SMU) algorithm, named State). Based on this enhancement, we propose two types of SE-SMU. Proposed type-I SE-SMU has lower register
University of Newcastle upon Tyne Threat Analysis of Cryptographic Election Schemes
Newcastle upon Tyne, University of
University of Newcastle upon Tyne COMPUTING SCIENCE Threat Analysis of Cryptographic Election IVERSITY OF #12;TECHNICAL REPORT SERIES No. CS-TR-971 June, 2006 Threat Analysis of Cryptographic Election Schemes P. Y. A. Ryan and T. Peacock. Abstract We discuss some vulnerabilities, threats and counter
J-RoC: a Joint Routing and Charging Scheme to Prolong Sensor Network Lifetime
Qiao, Daji
}@iastate.edu Abstract--The emerging wireless charging technology creates a controllable and perpetual energy source to provide wireless power over distance. Schemes have been proposed to make use of wireless charging that J- RoC significantly elongates the network lifetime compared to existing wireless charging based
A Multi-Function Provable Data Possession Scheme in Cloud Computing
International Association for Cryptologic Research (IACR)
1 A Multi-Function Provable Data Possession Scheme in Cloud Computing Xiaojun Yu, Qiaoyan Wen State the different requirements of provable data possession in cloud computing, a multi-function provable data; cloud computing; 1 Introduction With the cost and technology advantage, the cloud computing
Spatial model coupling -an efficient scheme to combine hydraulic and geomechanic simulations
Cirpka, Olaf Arie
Spatial model coupling - an efficient scheme to combine hydraulic and geomechanic simulations present a spatial coupling approach with two subdomains [1]: Hydro-geomechanical model full model approach-field (geomechanics are neglected) hydro-geomechanical subdomain el2p model hydraulic subdomain 2p model hydraulic
Graph-theoretic design and analysis of key predistribution schemes Michelle Kendall Keith M. Martin
International Association for Cryptologic Research (IACR)
Graph-theoretic design and analysis of key predistribution schemes Michelle Kendall Keith M. Martin, a general understanding of the design prin- ciples on which to base such constructions is somewhat lacking as a sound design principle. Second, we propose the use of incidence graphs and concurrence graphs as tools
An Energy-Efficient Symmetric Cryptography Based Authentication Scheme for Wireless
Paris-Sud XI, Université de
An Energy-Efficient Symmetric Cryptography Based Authentication Scheme for Wireless Sensor Networks. In Section 3 we evaluate the performance and efficiency of our proposal, both in terms of energy consumption of Engineering & Built Environment Callaghan, The University of Newcastle (AUSTRALIA) Ljiljana
An Optimal Resource Control Scheme under Fidelity and Energy Constraints in Sensor Networks
Zhang, Yanyong
1 An Optimal Resource Control Scheme under Fidelity and Energy Constraints in Sensor Networks control under the fidelity and energy constraints, we present a resource increase and decrease algorithm networks, Resource control, Fidelity, Energy efficiency I. INTRODUCTION As the technologies in MEMS
A Parallel Rolling Horizon Scheme for Large Scale Security Constrained Unit Commitment Problems
Feinberg, Eugene A.
A Parallel Rolling Horizon Scheme for Large Scale Security Constrained Unit Commitment Problems: eyuan@ams.sunysb.edu Abstract--The Unit Commitment Problem (UCP) is an im- portant category of power and how to dispatch the committed units to meet the electricity demands, ancillary services requirements
AN INNOVATIVE RTP-BASED RESIDENTIAL POWER SCHEDULING SCHEME FOR SMART GRIDS
Snyder, Larry
as demand response for residential power usage. In this scheme, the Energy Management Controller (EMC for consumers, but also reduce peak load and the variance between demand and supply, while avoiding the "rebound making veloc- ity, consumers will rely on energy management controllers (EMCs) [3], which are devices
Eindhoven, Technische Universiteit
. Here u denotes the water saturation. Equation (1.6) follows by combining Darcy's law, the massNumerical schemes for a pseudo-parabolic Burgers equation: discontinuous data and long Burgers'type equation that is extended with a third-order term containing mixed derivatives in space
AIAA-86-1520 An LU Implicit Scheme for High Speed
Jameson, Antony
of the flow- field such as a boundary layer, It also cannot handle the terminal shock and the subsonic dif non- oscillatory shock caoturing technique for hiqh Mach number flows as well as for transonic flows drawback of MacCormack's implicit scheme is the difficulty in treatinq boundary conditions. During the last
CONVERGENCE ANALYSIS OF A QUADRATURE FINITE ELEMENT GALERKIN SCHEME FOR A BIHARMONIC PROBLEM
Aitbayev, Rakhim
of the quadrature problem with an orthogonal spline collocation problem. Key words: biharmonic problem, finite elements, Galerkin method, Gaussian quadrature, orthogonal spline collocation AMS subject classificationCONVERGENCE ANALYSIS OF A QUADRATURE FINITE ELEMENT GALERKIN SCHEME FOR A BIHARMONIC PROBLEM RAKHIM
Bürger, Raimund
: August 25, 2011. AUniversidad Nacional de Colombia, Department of Mathematics and Statistics, Manizales as entropy solutions. It is well known that certain monotone finite difference schemes converge, Colombia. E-Mail: cdacostam@unal.edu.co. BCI2MA and Departamento de Ingenier´ia Matem´atica, Facultad de
Bürger, Raimund
: October 18, 2011. AUniversidad Nacional de Colombia, Department of Mathematics and Statistics, Manizales as entropy solutions. It is well known that certain monotone finite difference schemes converge, Colombia. E-Mail: cdacostam@unal.edu.co. BCI2MA and Departamento de Ingenier´ia Matem´atica, Facultad de
Outage Probability in a Multi-Cellular Network using Alamouti Scheme
Coupechoux, Marceau
Outage Probability in a Multi-Cellular Network using Alamouti Scheme Dorra Ben Cheikh , Jean to interference plus noise ratio (SINR) or equivalently the outage probability in flat Rayleigh fading. The system power from the interfering base stations. In the first case, a closed- form expression for the outage
A Simple Asymptotically Optimal Joint Energy Allocation and Routing Scheme in Rechargeable
Sinha, Prasun
1 A Simple Asymptotically Optimal Joint Energy Allocation and Routing Scheme in Rechargeable Sensor problem for a sensor network with energy replenishment. Each sensor node consumes energy in its battery be replenished from renewable energy sources, the energy allocation should be carefully designed in order
Pushback: A Hidden Markov Model Based Scheme for Energy Efficient Data Transmission in Sensor
Koksal, Can Emre
1 Pushback: A Hidden Markov Model Based Scheme for Energy Efficient Data Transmission in Sensor and Engineering Department of Electrical and Computer Engineering The Ohio State University The Ohio State University Columbus, Ohio 43210 Columbus, Ohio 43210 {liusha,prasun}@cse.ohio-state.edu {srivastr
THE UV/RADIO CORRELATION OF QUASARS AND ITS IMPLICATIONS FOR UNIFIED SCHEMES.
Falcke, Heino
THE UV/RADIO CORRELATION OF QUASARS AND ITS IMPLICATIONS FOR UNIFIED SCHEMES. HEINO FALCKE of the UV/radio correlations [4] of quasars and the difference between FR I and FR II radio galaxies [3]. 2. The UV/radio correlation for quasars If there is a closely coupled jet/disk system in AGN we would expect
A PHYSICALLY-BASED SCHEME FOR THE URBAN ENERGY BUDGET IN ATMOSPHERIC MODELS
, Urban energy balance, Urban water balance, Urban boundary layer. 1. Introduction Due to the complexityA PHYSICALLY-BASED SCHEME FOR THE URBAN ENERGY BUDGET IN ATMOSPHERIC MODELS VALÉRY MASSON Centre any city in the world, for any time or weather condition (heat island cooling by night, urban wake
A Versatile Scheme for the Validation, Testing and Debugging of High Speed Serial Interfaces
Zilic, Zeljko
A Versatile Scheme for the Validation, Testing and Debugging of High Speed Serial Interfaces, the post-silicon validation, debugging and testing of HSSIs are becoming critical. This paper presents and an FPGA-based Bit Error Rate Tester (BERT), we can validate and test HSSIs without the need of high
L. Del Zanna; N. Bucciantini; P. Londrillo
2002-10-29T23:59:59.000Z
A third order shock-capturing numerical scheme for three-dimensional special relativistic magnetohydrodynamics (3-D RMHD) is presented and validated against several numerical tests. The simple and efficient central scheme described in Paper I (Del Zanna and Bucciantini, Astron. Astrophys., 390, 1177--1186, 2002) for relativistic hydrodynamics is here extended to the magnetic case by following the strategies prescribed for classical MHD by Londrillo and Del Zanna (Astrophys. J., 530, 508--524, 2000). The scheme avoids completely spectral decomposition into characteristic waves, computationally expensive and subject to many degenerate cases in the magnetic case, while it makes use of a two-speed Riemann solver that just require the knowledge of the two local fast magnetosonic velocities. Moreover, the onset of spurious magnetic monopoles, which is a typical problem for multi-dimensional MHD upwind codes, is prevented by properly taking into account the solenoidal constraint and the specific antisymmetric nature of the induction equation. Finally, the extension to generalized orthogonal curvilinear coordinate systems is included, thus the scheme is ready to incorporate general relativistic (GRMHD) effects.
L. Del Zanna; N. Bucciantini
2002-05-17T23:59:59.000Z
Multidimensional shock-capturing numerical schemes for special relativistic hydrodynamics (RHD) are computationally more expensive than their correspondent Euler versions, due to the nonlinear relations between conservative and primitive variables and to the consequent complexity of the Jacobian matrices (needed for the spectral decomposition in most of the approximate Riemann solvers of common use). Here an efficient and easy-to-implement three-dimensional (3-D) shock-capturing scheme for ideal RHD is presented. Based on the algorithms developed by P. Londrillo and L. Del Zanna ({\\em Astrophys. J.} 530, 508-524, 2000) for the non-relativistic magnetohydrodynamic (MHD) case, and having in mind its relativistic MHD extension (to appear in a forthcoming paper), the scheme uses high order (third) Convex Essentially Non-Oscillatory (CENO) finite difference interpolation routines and central-type averaged Riemann solvers, which do not make use of time-consuming characteristic decomposition. The scheme is very efficient and robust, and it gives results comparable to those obtained with more sophisticated algorithms, even in ultrarelativistic multidimensional test problems.
Chiba, Shigeru
Difference of Degradation Schemes among Operating Systems -- Experimental analysis for web degradation is critical ability of highly avail- able middleware such as a web application server but naive graceful degradation is often unsatisfactory. If a web appli- cation server provides multiple services
On the security of some password-based key agreement schemes
on Jablon's scheme, namely the first password- based key agreement mechanism in ISO/IEC FCD 11770 further show that other password-based key agreement mechanisms, including those in ISO/IEC FCD 11770 a session key, they first compute g = pw2 mod p. Note that in the first mechanism of ISO/IEC FCD 11770-4 [19
Shihada, Basem
Energy Efficient Scheme for Cognitive Radios Utilizing Soft Sensing AbdulRahman Alabbasi , Zouheir: {abdulrahman.alabbasi, zouheir.rezki, basem.shihada}@kaust.edu.sa Abstract--In this paper we propose an energy sensing information to achieve a sub-optimum energy efficient system. The sub-optimality is achieved
Green-Frag: Energy-Efficient Frame Fragmentation Scheme for Wireless Sensor Networks
Shihada, Basem
Green-Frag: Energy-Efficient Frame Fragmentation Scheme for Wireless Sensor Networks Anas that frame fragmenta- tion also helps to reduce energy consumption. In this paper we propose Green-Frag, a new energy-efficient protocol based on efficient frame fragmentation technique. Green-Frag allows
Thomas Clerc; Alain Hébert; Hadrien Leroyer; Jean-Philippe Argaud; Bertrand Bouriquet; Agélique Ponçot
2014-05-12T23:59:59.000Z
This paper presents a computational scheme for the determination of equivalent 2D multi-group heterogeneous reflectors in a Pressurized Water Reactor (PWR). The proposed strategy is to define a full-core calculation consistent with a reference lattice code calculation such as the Method Of Characteristics (MOC) as implemented in APOLLO2 lattice code. The computational scheme presented here relies on the data assimilation module known as "Assimilation de donn\\'{e}es et Aide \\`{a} l'Optimisation (ADAO)" of the SALOME platform developed at \\'{E}lectricit\\'{e} De France (EDF), coupled with the full-core code COCAGNE and with the lattice code APOLLO2. A first validation of the computational scheme is made using the OPTEX reflector model developed at \\'{E}cole Polytechnique de Montr\\'{e}al (EPM). As a result, we obtain 2D multi-group, spatially heterogeneous 2D reflectors, using both diffusion or $\\text{SP}_{\\text{N}}$ operators. We observe important improvements of the power discrepancies distribution over the core when using reflectors computed with the proposed computational scheme, and the $\\text{SP}_{\\text{N}}$ operator enables additional improvements.
Designing Single-and Multiple-Shell Sampling Schemes for Diffusion MRI Using Spherical Code
Paris-Sud XI, UniversitÃ© de
is the Electrostatic Energy Minimiza- tion (EEM) method introduced in dMRI by Jones et al. However, the electrostatic energy formulation in EEM is not directly related to the goal of optimal sampling- scheme design, i invariance than the generalized EEM (gEEM) method currently used in the Human Connectome Project (HCP). 1
A Low Latency MAC scheme for Event-Driven Wireless Sensor Networks
Paris-Sud XI, Université de
A Low Latency MAC scheme for Event-Driven Wireless Sensor Networks Hung-Cuong LE 1 , Hervé GUYENNET which we call LLMAC (Low Latency MAC) for event-driven wireless sensor networks (WSN). In this kind Introduction Wireless sensor network is a very hot research topic tendency in distributed systems. A WSN
Kheifets, Anatoli
PAGE 5 OF 9GROUP OF EIGHT AUSTRALIAÂGERMANY JOINT RESEARCH COOPERATION SCHEME Â© GROUP OF EIGHT) 6,110 Euro (year 2013) #12;PAGE 6 OF 9GROUP OF EIGHT AUSTRALIAÂGERMANY JOINT RESEARCH COOPERATION SCHEME Â© GROUP OF EIGHT FUNDING REQUESTED (BUDGET SUMMARY) Year: 2012 Airfares (economy class) AUD Per
Bielefeld, University of
Fully Dynamic Secret Sharing Schemes \\Lambda Carlo Blundo, 1 Antonella Cresti, 2 Alfredo De Santis'', 00198 Roma, Italy Abstract We consider secret sharing schemes in which the dealer is able (after the participants to reconstruct different secrets (in different time instants) by sending them the same broadcast
Gesbert, David
DEGREES OF FREEDOM IN THE MISO BC WITH DELAYED-CSIT AND FINITE COHERENCE TIME: A SIMPLE OPTIMAL the multi-input single-output (MISO) Broadcast Channel (BC), the multi-user (MU) downlink in a cell scheme was proposed in [9] for the time cor- related MISO broadcast channel with 2 users. This scheme
Boyer, Edmond
Fourier-based schemes with modified Green operator for computing the electrical response of Fourier-based numerical schemes commonly used for computing the electrical or thermal response the discretization of Green's function, which is consistent with the pixel grid while retaining the local nature
Zhang, Jun
. A convergence theorem is obtained by the discrete energy method, implying that the scheme is un conditionally the discrete energy method, we establish a convergence theorem for the finite difference scheme, which shows stable. Numerical results for thermal analysis of a skin composed of epidermis, dermis and subcutaneous
Evans, Paul
FREEDOM OF INFORMATION ACT 2000 PUBLICATION SCHEME In implementing the Freedom of Information Act and by providing clear information about our policies and processes through our publication scheme. We deal with individual requests for information courteously and promptly and provide advice and assistance if necessary
Applications - Science and Engineering. Basic Sciences Applications; Biomedical Applications; Chemical Engineering; Civil and Environmental Engineering ...
A new scheme for the running coupling constant in gauge theories using Wilson loops
Erek Bilgici; Antonino Flachi; Etsuko Itou; Masafumi Kurachi; C. -J David Lin; Hideo Matsufuru; Hiroshi Ohki; Tetsuya Onogi; Takeshi Yamazaki
2010-01-21T23:59:59.000Z
We propose a new renormalization scheme of the running coupling constant in general gauge theories using the Wilson loops. The renormalized coupling constant is obtained from the Creutz ratio in lattice simulations and the corresponding perturbative coefficient at the leading order. The latter can be calculated by adopting the zeta-function resummation techniques. We perform a benchmark test of our scheme in quenched QCD with the plaquette gauge action. The running of the coupling constant is determined by applying the step-scaling procedure. Using several methods to improve the statistical accuracy, we show that the running coupling constant can be determined in a wide range of energy scales with relatively small number of gauge configurations.
H. Lotfipour; Z. Allameh; R. Roknizadeh; H. Heydari
2015-05-04T23:59:59.000Z
The detection and characterization of a non-classical-squeezed state of light, by using two different schemes, will be presented . In the first one, in an one-dimensional cavity with moving mirror (non-stationary Casimir effect) in the principal mode, we study the photon creation rate for two modes (squeezed and coherent state) of driving field. Since the cavity with moving mirror (similar to an optomechanical system) can be considered analogue to a Kerr-like medium, so that in the second scheme, the probability amplitude for multi-photons absorption in a nonlinear (Kerr) medium will be quantum mechanically calculated. It is shown that because of presence of nonlinear effects, the responses of these two systems to the squeezed versus coherent state are considerably distinguishable. The drastic difference between the results of these two states of light can be viewed as a proposal for detecting of non-classical states.
Schaal, Kevin; Chandrashekar, Praveen; Pakmor, Rüdiger; Klingenberg, Christian; Springel, Volker
2015-01-01T23:59:59.000Z
Solving the Euler equations of ideal hydrodynamics as accurately and efficiently as possible is a key requirement in many astrophysical simulations. It is therefore important to continuously advance the numerical methods implemented in current astrophysical codes, especially also in light of evolving computer technology, which favours certain computational approaches over others. Here we introduce the new adaptive mesh refinement (AMR) code TENET, which employs a high-order Discontinuous Galerkin (DG) scheme for hydrodynamics. The Euler equations in this method are solved in a weak formulation with a polynomial basis by means of explicit Runge-Kutta time integration and Gauss-Legendre quadrature. This approach offers significant advantages over commonly employed finite volume (FV) solvers. In particular, the higher order capability renders it computationally more efficient, in the sense that the same precision can be obtained at significantly less computational cost. Also, the DG scheme inherently conserves a...
Thin-disk laser pump schemes for large number of passes and moderate pump source quality
Schuhmann, K; Kirch, K; Knecht, A; Kottmann, F; Nez, F; Pohl, R; Taqqu, D; Antognini, A
2015-01-01T23:59:59.000Z
Novel thin-disk laser pump layouts are proposed yielding an increased number of passes for a given pump module size and pump source quality. These novel layouts result from a general scheme which bases on merging two simpler pump optics arrangements. Some peculiar examples can be realized by adapting standard commercially available pump optics simply by intro ducing an additional mirror-pair. More pump passes yield better efficiency, opening the way for usage of active materials with low absorption. In a standard multi-pass pump design, scaling of the number of beam passes brings ab out an increase of the overall size of the optical arrangement or an increase of the pump source quality requirements. Such increases are minimized in our scheme, making them eligible for industrial applications
LHC luminosity upgrade with large Piwinski angle scheme: a recent look
Bhat, C.M.; /Fermilab; Zimmermann, f.; /CERN
2011-09-01T23:59:59.000Z
Luminosity upgrade at the LHC collider using longitudinally flat bunches in combination with the large crossing angle (large Piwinski angle scheme) is being studied with renewed interest in recent years. By design, the total beam-beam tune shift at the LHC is less than 0.015 for two interaction points together. But the 2010-11 3.5 TeV collider operation and dedicated studies indicated that the beam-beam tune shift is >0.015 per interaction point. In view of this development we have revisited the requirements for the Large Piwinski Angle scheme at the LHC. In this paper we present a new set of parameters and luminosity calculations for the desired upgrade by investigating: (1) current performance of the LHC injectors, (2) e-cloud issues on nearly flat bunches and (3) realistic beam particle distributions from longitudinal beam dynamics simulations. We also make some remarks on the needed upgrades on the LHC injector accelerators.
Multiplexing scheme for simplified entanglement-based large-alphabet quantum key distribution
Dada, Adetunmise C
2015-01-01T23:59:59.000Z
We propose a practical quantum cryptographic scheme which combines high information capacity, such as provided by high-dimensional quantum entanglement, with the simplicity of a two-dimensional Clauser-Horne-Shimony-Holt (CHSH) Bell test for security verification. By applying a state combining entanglement in a two-dimensional degree of freedom, such as photon polarization, with high-dimensional correlations in another degree of freedom, such as photon orbital angular momentum (OAM) or path, the scheme provides a considerably simplified route towards security verification in quantum key distribution (QKD) aimed at exploiting high-dimensional quantum systems for increased secure key rates. It also benefits from security against collective attacks and is feasible using currently available technologies.
An improved approximation scheme for the centrifugal term and the Hulthen potential
Sameer M. Ikhdair
2009-01-07T23:59:59.000Z
We present a new approximation scheme for the centrifugal term to solve the Schrodinger equation with the Hulthen potential for any arbitrary l state by means of a mathematical Nikiforov-Uvarov (NU) method. We obtain the bound state energy eigenvalues and the normalized corresponding eigenfunctions expressed in terms of the Jacobi polynomials or hypergeometric functions for a particle exposed to this potential field. Our numerical results of the energy eigenvalues are found to be in high agreement with those results obtained by using the program based on a numerical integration procedure. The s-wave (l=0) analytic solution for the binding energies and eigenfunctions of a particle are also calculated. The physical meaning of the approximate analytical solution is discussed. The present approximation scheme is systematic and accurate.
Yan, Huiping; Qian, Yun; Lin, Guang; Leung, Lai-Yung R.; Yang, Ben; Fu, Q.
2014-03-25T23:59:59.000Z
Convective parameterizations used in weather and climate models all display sensitivity to model resolution and variable skill in different climatic regimes. Although parameters in convective schemes can be calibrated using observations to reduce model errors, it is not clear if the optimal parameters calibrated based on regional data can robustly improve model skill across different model resolutions and climatic regimes. In this study, this issue is investigated using a regional modeling framework based on the Weather Research and Forecasting (WRF) model. To quantify the response and sensitivity of model performance to model parameters, we identified five key input parameters and specified their ranges in the Kain-Fritsch (KF) convection scheme in WRF and calibrated them across different spatial resolutions, climatic regimes, and radiation schemes using observed precipitation data. Results show that the optimal values for the five input parameters in the KF scheme are close and model sensitivity and error exhibit similar dependence on the input parameters for all experiments conducted in this study despite differences in the precipitation climatology. We found that the model overall performances in simulating precipitation are more sensitive to the coefficients of downdraft (Pd) and entrainment (Pe) mass flux and starting height of downdraft (Ph). However, we found that rainfall biases, which are probably more related to structural errors, still exist over some regions in the simulation even with the optimal parameters, suggesting further studies are needed to identify the sources of uncertainties and reduce the model biases or structural errors associated with missed or misrepresented physical processes and/or potential problems with the modeling framework.
Performance study of optimistic concurrency control schemes for distributed database systems
Kim Lee, Hyunsoon
1993-01-01T23:59:59.000Z
(Chair of Committee) yh-Cham S. Liu (Member) Michael T. Longn ker (Member) Richard A. Volz (Head of Department) May 1993 ABSTRACT Performance Study of Optimistic Concurrency Control Schemes for Distributed Database Systems. (May 1993) Hyunsoon..., To my daughter, Jihyun ACKNOWLEDGMENTS Special thanks to Dr. Junguk L. Kim, whose guidance and patience made this thesis possible. I would like to thank Drs. J. C. Liu and M. T. Longnecker for their time and useful comments in reviewing this document...
Control scheme for power modulation of a free piston Stirling engine
Dhar, Manmohan (Schenectady, NY)
1989-01-01T23:59:59.000Z
The present invention relates to a control scheme for power modulation of a free-piston Stirling engine-linear alternator power generator system. The present invention includes connecting an autotransformer in series with a tuning capacitance between a linear alternator and a utility grid to maintain a constant displacement to piston stroke ratio and their relative phase angle over a wide range of operating conditions.
Cirrus clouds in a global climate model with a statistical cirrus cloud scheme
Wang, Minghuai; Penner, Joyce E.
2010-06-21T23:59:59.000Z
A statistical cirrus cloud scheme that accounts for mesoscale temperature perturbations is implemented in a coupled aerosol and atmospheric circulation model to better represent both subgrid-scale supersaturation and cloud formation. This new scheme treats the effects of aerosol on cloud formation and ice freezing in an improved manner, and both homogeneous freezing and heterogeneous freezing are included. The scheme is able to better simulate the observed probability distribution of relative humidity compared to the scheme that was implemented in an older version of the model. Heterogeneous ice nuclei (IN) are shown to decrease the frequency of occurrence of supersaturation, and improve the comparison with observations at 192 hPa. Homogeneous freezing alone can not reproduce observed ice crystal number concentrations at low temperatures (<205 K), but the addition of heterogeneous IN improves the comparison somewhat. Increases in heterogeneous IN affect both high level cirrus clouds and low level liquid clouds. Increases in cirrus clouds lead to a more cloudy and moist lower troposphere with less precipitation, effects which we associate with the decreased convective activity. The change in the net cloud forcing is not very sensitive to the change in ice crystal concentrations, but the change in the net radiative flux at the top of the atmosphere is still large because of changes in water vapor. Changes in the magnitude of the assumed mesoscale temperature perturbations by 25% alter the ice crystal number concentrations and the net radiative fluxes by an amount that is comparable to that from a factor of 10 change in the heterogeneous IN number concentrations. Further improvements on the representation of mesoscale temperature perturbations, heterogeneous IN and the competition between homogeneous freezing and heterogeneous freezing are needed.
A two-step chemical scheme for kerosene-air premixed flames
Franzelli, B.; Riber, E.; Sanjose, M. [CERFACS, CFD Team, 42 Avenue G. Coriolis, 31057 Toulouse Cedex 01 (France); Poinsot, T. [IMFT-UMR 5502, allee du Professeur Camille Soula, 31400 Toulouse (France)
2010-07-15T23:59:59.000Z
A reduced two-step scheme (called 2S-KERO-BFER) for kerosene-air premixed flames is presented in the context of Large Eddy Simulation of reacting turbulent flows in industrial applications. The chemical mechanism is composed of two reactions corresponding to the fuel oxidation into CO and H{sub 2}O, and the CO - CO{sub 2} equilibrium. To ensure the validity of the scheme for rich combustion, the pre-exponential constants of the two reactions are tabulated versus the local equivalence ratio. The fuel and oxidizer exponents are chosen to guarantee the correct dependence of laminar flame speed with pressure. Due to a lack of experimental results, the detailed mechanism of Dagaut composed of 209 species and 1673 reactions, and the skeletal mechanism of Luche composed of 91 species and 991 reactions have been used to validate the reduced scheme. Computations of one-dimensional laminar flames have been performed with the 2S{sub K}ERO{sub B}FER scheme using the CANTERA and COSILAB softwares for a wide range of pressure ([1; 12] atm), fresh gas temperature ([300; 700] K), and equivalence ratio ([0.6; 2.0]). Results show that the flame speed is correctly predicted for the whole range of parameters, showing a maximum for stoichiometric flames, a decrease for rich combustion and a satisfactory pressure dependence. The burnt gas temperature and the dilution by Exhaust Gas Recirculation are also well reproduced. Moreover, the results for ignition delay time are in good agreement with the experiments. (author)
Liu Yueqiang [Euratom/UKAEA Fusion Association, Culham Science Centre, Abingdon OX14 3DB (United Kingdom); Albanese, R.; Rubinacci, G. [ENEA/CREATE, Universita Federico II di Napoli, Via Claudio 21, Napoli (Italy); Portone, A. [EFDA-CSU Barcelona, C/Josep Pla 2, B3, 08019 Barcelona (Spain); Villone, F. [ENEA/CREATE, DAEIMI, Universita di Cassino, Via di Biasio 43, Cassino (Italy)
2008-07-15T23:59:59.000Z
In order to model a magnetohydrodynamic (MHD) instability that strongly couples to external conducting structures (walls and/or coils) in a fusion device, it is often necessary to combine a MHD code solving for the plasma response, with an eddy current code computing the fields and currents of conductors. We present a rigorous proof of the coupling schemes between these two types of codes. One of the coupling schemes has been introduced and implemented in the CARMA code [R. Albanese, Y. Q. Liu, A. Portone, G. Rubinacci, and F. Villone, IEEE Trans. Magn. 44, 1654 (2008); A. Portone, F. Villone, Y. Q. Liu, R. Albanese, and G. Rubinacci, Plasma Phys. Controlled Fusion 50, 085004 (2008)] that couples the MHD code MARS-F[Y. Q. Liu, A. Bondeson, C. M. Fransson, B. Lennartson, and C. Breitholtz, Phys. Plasmas 7, 3681 (2000)] and the eddy current code CARIDDI[R. Albanese and G. Rubinacci, Adv. Imaging Electron Phys. 102, 1 (1998)]. While the coupling schemes are described for a general toroidal geometry, we give the analytical proof for a cylindrical plasma.
The Role of Momentum Interpolation Mechanism of the Roe Scheme in the Shock Instability
Li, Xue-song
2015-01-01T23:59:59.000Z
The shock instability phenomenon is a famous problem for the shock-capturing scheme. By subdividing the numerical dissipation of the Roe scheme, the term of pressure-difference-driven modification for the cell face velocity is regarded as a version of the momentum interpolation method (MIM), which is necessary for incompressible flows to suppress the pressure checkerboard problem. Through the analysis and odd-even decoupling test, it is discovered that MIM plays the most important role on the shock instability. In fact, for non-linear flows MIM should be completely removed, but unexpected MIM is activated on the cell face nearly parallel to the flow for high Mach number flows or low Mach number flows in shock. For such conditions, two coefficients are designed based on local Mach number and a shock detector, respectively, and then the improved Roe scheme is proposed, which gives consideration to requirement of MIM for incompressible and compressible flows and is validated for good performance of avoiding odd-...
Ilpo Vattulainen; Mikko Karttunen; Gerhard Besold; J. M. Polson
2002-11-15T23:59:59.000Z
We examine the performance of various commonly used integration schemes in dissipative particle dynamics simulations. We consider this issue using three different model systems, which characterize a variety of different conditions often studied in simulations. Specifically we clarify the performance of integration schemes in hybrid models, which combine microscopic and meso-scale descriptions of different particles using both soft and hard interactions. We find that in all three model systems many commonly used integrators may give rise to surprisingly pronounced artifacts in physical observables such as the radial distribution function, the compressibility, and the tracer diffusion coefficient. The artifacts are found to be strongest in systems, where interparticle interactions are soft and predominated by random and dissipative forces, while in systems governed by conservative interactions the artifacts are weaker. Our results suggest that the quality of any integration scheme employed is crucial in all cases where the role of random and dissipative forces is important, including hybrid models where the solvent is described in terms of soft potentials.
Clerc, Thomas; Leroyer, Hadrien; Argaud, Jean-Philippe; Bouriquet, Bertrand; Ponçot, Agélique
2014-01-01T23:59:59.000Z
This paper presents a computational scheme for the determination of equivalent 2D multi-group heterogeneous reflectors in a Pressurized Water Reactor (PWR). The proposed strategy is to define a full-core calculation consistent with a reference lattice code calculation such as the Method Of Characteristics (MOC) as implemented in APOLLO2 lattice code. The computational scheme presented here relies on the data assimilation module known as "Assimilation de donn\\'{e}es et Aide \\`{a} l'Optimisation (ADAO)" of the SALOME platform developed at \\'{E}lectricit\\'{e} De France (EDF), coupled with the full-core code COCAGNE and with the lattice code APOLLO2. A first validation of the computational scheme is made using the OPTEX reflector model developed at \\'{E}cole Polytechnique de Montr\\'{e}al (EPM). As a result, we obtain 2D multi-group, spatially heterogeneous 2D reflectors, using both diffusion or $\\text{SP}_{\\text{N}}$ operators. We observe important improvements of the power discrepancies distribution over the cor...
Electronic excitations from a linear-response range-separated hybrid scheme
Rebolini, Elisa; Toulouse, Julien
2013-01-01T23:59:59.000Z
We study linear-response time-dependent density-functional theory (DFT) based on the single-determinant range-separated hybrid (RSH) scheme, i.e. combining a long-range Hartree-Fock exchange kernel with a short-range DFT exchange-correlation kernel, for calculating electronic excitation energies of molecular systems. It is an alternative to the long-range correction (LC) scheme which has a standard full-range DFT correlation kernel instead of only a short-range one. We discuss the local-density approximation (LDA) to the short-range exchange-correlation kernel, and assess the performance of the linear-response RSH scheme for singlet-singlet and singlet-triplet valence and Rydberg excitations in the N2, CO, H2CO, C2H4, and C6H6 molecules, and for the first charge-transfer excitation in the C2H4-C2F4 dimer. The introduction of long-range HF exchange corrects the underestimation of charge-transfer and high-lying Rydberg excitation energies obtained with standard (semi)local density-functional approximations, but...
Paris-Sud XI, Université de
in the EU Emissions Trading Scheme Emilie Alberola1 et Julien Chevallier2 Résumé: L'article examine le prix des quotas durant la première période (2005-2007) de l'European Union Emissions Trading Scheme (EU
Allen, Pablo G; Scoccola, Norberto N
2015-01-01T23:59:59.000Z
The influence of intense magnetic fields on the behavior of color superconducting cold quark matter is investigated using an SU(2)$_f$ NJL-type model for which a novel regulation scheme is introduced. In such a scheme the contributions which are explicitly dependent on the magnetic field turn out to be finite and, thus, do not require to be regularized. As a result of this, nonphysical oscillations that might arise in the alternative regularization schemes previously used in the literature are naturally removed. The sensitivity of our results to the model parametrization is analyzed.
La Porta, Tom
sensors should be kept to a minimum. To resolve this conflict of interest, sensor selection schemesA Survey of Sensor Selection Schemes in Wireless Sensor Networks Hosam Rowaihy1, Sharanya Eswaran1 are used. In this paper, we survey different schemes that are used to select sensors. Based on the purpose
Saad, Bilal
2012-01-01T23:59:59.000Z
An industrial scheme, to simulate the two compressible phase flow in porous media, consists in a finite volume method together with a phase-by-phase upstream scheme. The implicit finite volume scheme satisfies industrial constraints of robustness. We show that the proposed scheme satisfy the maximum principle for the saturation, a discrete energy estimate on the pressures and a function of the saturation that denote capillary terms. These stabilities results allow us to derive the convergence of a subsequence to a weak solution of the continuous equations as the size of the discretization tends to zero. The proof is given for the complete system when the density of the each phase depends on the own pressure.
Ould Ahmedou, Mohameden
estimations derived from a synthesized architecture model. I. Introduction Surveys of reconfigurable computing architecture prototypes. II. Related Work Various projects deal with the development of either domainExecution Schemes for Dynamically Reconfigurable Architectures T. Oppold, T. Schweizer, J. Oliveira
Ellerman, A. Denny.
This paper provides an initial analysis of the European Union Emissions Trading Scheme (EU ETS) based on the installation-level data for verified emissions and allowance allocations in the first trading year. Those data, ...
Al-Rifai, Jawad H.; Gabelish, Candace L.; Schäfer, Andrea
2007-01-01T23:59:59.000Z
to concentrate many of the compounds was demonstrated and highlights the need for continued research into monitoring wastewater treatment, concentrate disposal, improved water recycling schemes and ultimately, safer water and a cleaner environment....
Peter P. Rohde
2014-10-02T23:59:59.000Z
Recently, Motes, Gilchrist, Dowling & Rohde [Phys. Rev. Lett. 113, 120501 (2014)] presented a scheme for photonic boson-sampling using a fiber-loop architecture. Here we show that the same architecture can be modified to implement full, universal linear optics quantum computing, in various incarnations. The scheme employs two embedded fiber-loops, a single push-button photon source, three dynamically controlled beamsplitters, and a single time-resolved photo-detector. The architecture has only a single point of interference, and thus may be significantly easier to align than other schemes. The experimental complexity of the scheme is constant, irrespective of the size of the computation, limited only by fiber lengths and their respective loss rates.
International Association for Cryptologic Research (IACR)
Universal Padding Schemes for RSA Jean-S#19;ebastien Coron, Marc Joye, David Naccache, and Pascal-sebastien.coron, marc.joye, david.naccache, pascal.paillierg@gemplus.com Abstract. A common practice to encrypt with RSA
Funmilayo, Hamed
2010-01-14T23:59:59.000Z
Increased Distributed Generation (DG) presence on radial distribution feeders is becoming a common trend. The existing Overcurrent Protection (OCP) scheme on such feeders consists mainly of overcurrent protection devices (OCPDs) such as fuses...
Zhanjun Zhang
2004-02-16T23:59:59.000Z
The wrong mutual information, quantum bit error rate and secure transmission efficiency in Wojcik's eavesdropping scheme [PRL90(03)157901]on ping-pong protocol have been pointed out and corrected.
Popov, Pavel P., E-mail: ppopov@uci.edu; Pope, Stephen B.
2014-01-15T23:59:59.000Z
This work addresses the issue of particle mass consistency in Large Eddy Simulation/Probability Density Function (LES/PDF) methods for turbulent reactive flows. Numerical schemes for the implicit and explicit enforcement of particle mass consistency (PMC) are introduced, and their performance is examined in a representative LES/PDF application, namely the Sandia–Sydney Bluff-Body flame HM1. A new combination of interpolation schemes for velocity and scalar fields is found to better satisfy PMC than multilinear and fourth-order Lagrangian interpolation. A second-order accurate time-stepping scheme for stochastic differential equations (SDE) is found to improve PMC relative to Euler time stepping, which is the first time that a second-order scheme is found to be beneficial, when compared to a first-order scheme, in an LES/PDF application. An explicit corrective velocity scheme for PMC enforcement is introduced, and its parameters optimized to enforce a specified PMC criterion with minimal corrective velocity magnitudes.
Cheng, Juan, E-mail: cheng_juan@iapcm.ac.cn [Institute of Applied Physics and Computational Mathematics, Beijing 100094 (China); Shu, Chi-Wang, E-mail: shu@dam.brown.edu [Division of Applied Mathematics, Brown University, Providence, RI 02912 (United States)
2014-09-01T23:59:59.000Z
In applications such as astrophysics and inertial confinement fusion, there are many three-dimensional cylindrical-symmetric multi-material problems which are usually simulated by Lagrangian schemes in the two-dimensional cylindrical coordinates. For this type of simulation, a critical issue for the schemes is to keep spherical symmetry in the cylindrical coordinate system if the original physical problem has this symmetry. In the past decades, several Lagrangian schemes with such symmetry property have been developed, but all of them are only first order accurate. In this paper, we develop a second order cell-centered Lagrangian scheme for solving compressible Euler equations in cylindrical coordinates, based on the control volume discretizations, which is designed to have uniformly second order accuracy and capability to preserve one-dimensional spherical symmetry in a two-dimensional cylindrical geometry when computed on an equal-angle-zoned initial grid. The scheme maintains several good properties such as conservation for mass, momentum and total energy, and the geometric conservation law. Several two-dimensional numerical examples in cylindrical coordinates are presented to demonstrate the good performance of the scheme in terms of accuracy, symmetry, non-oscillation and robustness. The advantage of higher order accuracy is demonstrated in these examples.
Performance and Error Analysis of Knill's Postselection Scheme in a Two-Dimensional Architecture
Ching-Yi Lai; Gerardo Paz; Martin Suchara; Todd A. Brun
2013-05-31T23:59:59.000Z
Knill demonstrated a fault-tolerant quantum computation scheme based on concatenated error-detecting codes and postselection with a simulated error threshold of 3% over the depolarizing channel. %We design a two-dimensional architecture for fault-tolerant quantum computation based on Knill's postselection scheme. We show how to use Knill's postselection scheme in a practical two-dimensional quantum architecture that we designed with the goal to optimize the error correction properties, while satisfying important architectural constraints. In our 2D architecture, one logical qubit is embedded in a tile consisting of $5\\times 5$ physical qubits. The movement of these qubits is modeled as noisy SWAP gates and the only physical operations that are allowed are local one- and two-qubit gates. We evaluate the practical properties of our design, such as its error threshold, and compare it to the concatenated Bacon-Shor code and the concatenated Steane code. Assuming that all gates have the same error rates, we obtain a threshold of $3.06\\times 10^{-4}$ in a local adversarial stochastic noise model, which is the highest known error threshold for concatenated codes in 2D. We also present a Monte Carlo simulation of the 2D architecture with depolarizing noise and we calculate a pseudo-threshold of about 0.1%. With memory error rates one-tenth of the worst gate error rates, the threshold for the adversarial noise model, and the pseudo-threshold over depolarizing noise, are $4.06\\times 10^{-4}$ and 0.2%, respectively. In a hypothetical technology where memory error rates are negligible, these thresholds can be further increased by shrinking the tiles into a $4\\times 4$ layout.
An interferometric signal demodulation scheme using zero crossings and an asynchronous clock
McCain, Dennis M.
1992-01-01T23:59:59.000Z
to recover P, . In many systems such as the fiber-optic gyroscope, we desire to measure Tz ? Tr to a resolution of the level of zero crossing jitter which is typically about lns. With this resolution, we would be able to measure small magnitude signals... explicit information about the unknown phase P, that is necessary for our demodulation scheme. CHAPTER III ASYNCHRONOUS CLOCK APPROACH TO DEMODULATION For typical fiber-optic gyroscopes, shot noise causes the zero crossings shown in Fig. 4 to jitter...
Time-dependent Internal DFT formalism and Kohn-Sham scheme
J. Messud
2009-11-05T23:59:59.000Z
We generalize to the time-dependent case the stationary Internal DFT / Kohn-Sham formalism presented in Ref. [14]. We prove that, in the time-dependent case, the internal properties of a self-bound system (as an atomic nuclei) are all defined by the internal one-body density and the initial state. We set-up a time-dependent Internal Kohn-Sham scheme as a practical way to compute the internal density. The main difference with the traditional DFT / Kohn-Sham formalism is the inclusion of the center-of-mass correlations in the functional.
A cost-benefit approach to youth vocational training schemes in Africa
Kuanyin, Emmanuel Bol
1974-01-01T23:59:59.000Z
Capital Formation 1n Africa III YOUTH VOCATIONAL TRAINING SCHEMES IV COST-BENEFIT ANALYSIS: AS A TOOL Formalae for Project Choice Net Present Value Internal Rate of Return (IRR) The IRR Versus the Present Value The Social Rate of Discount Risk... for evalu- at1ng both public and private investments. It is a tool for accessing quantitatively the economic merits of alternat1ve courses of action. The mer1ts are defined in terms of the relationship between the economic bene- fits obtained...
Inclusive B-Meson Production at the LHC in the GM-VFN Scheme
B. A. Kniehl; G. Kramer; I. Schienbein; H. Spiesberger
2011-10-28T23:59:59.000Z
We calculate the next-to-leading-order cross section for the inclusive production of B mesons in pp collisions in the general-mass variable-flavor-number scheme, an approach which takes into account the finite mass of the b quarks. We use realistic evolved non-perturbative fragmentation functions obtained from fits to e+e- data and compare results for the transverse-momentum and rapidity distributions at a center-of-mass energy of 7 TeV with recent data from the CMS Collaboration. We find good agreement, in particular at large values of pT.
Complex absorbing potential based Lorentzian fitting scheme and time dependent quantum transport
Xie, Hang, E-mail: xiehanggm@gmail.com; Kwok, Yanho; Chen, GuanHua, E-mail: ghc@everest.hku.hk [Department of Chemistry, The University of Hong Kong, Pokfulam (Hong Kong); Jiang, Feng [Department of Physics, Shanghai University of Electric Power, Shanghai (China); Zheng, Xiao [Hefei National Laboratory for Physical Sciences at the Microscale, University of Science and Technology of China, Hefei (China)
2014-10-28T23:59:59.000Z
Based on the complex absorbing potential (CAP) method, a Lorentzian expansion scheme is developed to express the self-energy. The CAP-based Lorentzian expansion of self-energy is employed to solve efficiently the Liouville-von Neumann equation of one-electron density matrix. The resulting method is applicable for both tight-binding and first-principles models and is used to simulate the transient currents through graphene nanoribbons and a benzene molecule sandwiched between two carbon-atom chains.
A serially concatenated BCH-Turbo code scheme over an Additive White Gaussion Noise channel
Ovalekar, Sameer V.
1997-01-01T23:59:59.000Z
', ?. ) (3-1) where wr. is the weight of the k'" data word. If all the cocle-words are considered, using union bounding techniques rve get, Ps = Ps(choose any k E (I, 2, 3. . . . 2'v ? 1) ~0) (2a ? li Ps(k 0) = Z ?, . 'a(+) (3. 2) whme all non... " (Head of Department) December 1997 Major Subject: Electrical Fngineering 111 ABSTRACT A Serially Concatenated BCH-Turbo Code Scheme over an Additive White Gaussian Noise Channel. (December 1997) Sameer V. Ovalekar, I3. E. , Hniversity of Bombay...
Matching NLO QCD with parton shower in Monte Carlo scheme - the KrkNLO method
S. Jadach; W. Placzek; S. Sapeta; A. Siodmok; M. Skrzypek
2015-05-11T23:59:59.000Z
A new method of including the complete NLO QCD corrections to hard processes in the LO parton-shower Monte Carlo (PSMC) is presented. This method, called KrkNLO, requires the use of parton distribution functions in a dedicated Monte Carlo factorization scheme, which is also discussed in this paper. In the future, it may simplify introduction of the NNLO corrections to hard processes and the NLO corrections to PSMC. Details of the method and numerical examples of its practical implementation, as well as comparisons with other calculations, such as MCFM, MC@NLO, POWHEG, for single $Z/\\gamma^*$-boson production at the LHC, are presented.
Resonances and excitation pathways in four-level N-scheme atomic systems
Abi-Salloum, T. Y.; Henry, B. [Physics and Astronomy Department, Widener University, Chester, Pennsylvania 19013 (United States); Davis, J. P.; Narducci, F. A. [Naval Air Systems Command, EO Sensors Division, Bldg 2187, Suite 3190 Patuxent River, Maryland 20670 (United States)
2010-07-15T23:59:59.000Z
In this work, we theoretically study the absorption and dispersion coefficients of a probe field in four-level N-scheme atomic systems driven by two additional fields. We separate the steady-state solution of the appropriate density matrix element into the sum of three resonances. The effect of each resonance on the overall absorption and dispersion experienced by the probe is studied as a function of the strengths of the two other fields. In the limit of low saturation, we reveal the physics of these resonances and associate them with atomic excitation pathways, which we explicitly explain in the bare-states picture.
Application of direct pulsewidth modulation scheme to AC-DC converters: - a way to reduce ripple
Zhang, Yuemin
1993-01-01T23:59:59.000Z
the wanted output voltage. Reference [14] proposed three schemes: Sr(~t) is 9 pulses per half cycle, Ss(~t) is 7 pulses per half cycle, and Ss(wt) is just I pulse per half cycle. Then author reached the conclusion that Sr(ut) is the best choice. Reference... in Figure 4. B. ) is given as r t's Sr = J V~sin~tdt &a 1. 17 V (cos wt~ ? cos cdts) According to the principle of DPWM, Sr should be equal to Sr. Then Vm VELDT = ? (cos at~ ? cos its) 1. 18 Since we only have one equation(Eq. 1. 18) and two unknowns...
A New Hybrid Scheme for Simulations of Highly Collisional RF-Driven Plasmas
Eremin, Denis; Mussenbrock, Thomas
2015-01-01T23:59:59.000Z
This work describes a new 1D hybrid approach for modeling atmospheric pressure discharges featuring complex chemistry. In this approach electrons are described fully kinetically using Particle-In-Cell/Monte-Carlo (PIC/MCC) scheme, whereas the heavy species are modeled within a fluid description. Validity of the popular drift-diffusion approximation is verified against a "full" fluid model accounting for the ion inertia and a fully kinetic PIC/MCC code for ions as well as electrons. The fluid models require knowledge of the momentum exchange frequency and dependence of the ion mobilities on the electric field when the ions are in equilibrium with the latter. To this end an auxiliary Monte-Carlo scheme is constructed. It is demonstrated that the drift-diffusion approximation can overestimate ion transport in simulations of RF-driven discharges with heavy ion species operated in the $\\gamma$ mode at the atmospheric pressure or in all discharge simulations for lower pressures. This can lead to exaggerated plasma ...
Optimization of the Combined Proton Acceleration Regime with a Target Composition Scheme
Yao, W P; Zheng, C Y; Liu, Z J; Yan, X Q
2015-01-01T23:59:59.000Z
A target composition scheme to optimize the combined proton acceleration regime is presented and verified by two-dimensional particle-in-cell (2D PIC) simulations by using an ultra-intense circularly-polarized (CP) laser pulse irradiating an overdense hydrocarbon (CH) target, instead of a pure hydrogen (H) one. The combined acceleration regime is a two-stage proton acceleration scheme combining the radiation pressure dominated acceleration (RPDA) stage and the laser wakefield acceleration (LWFA) stage sequentially together. With an ultra-intense CP laser pulse irradiating an overdense CH target, followed by an underdense tritium plasma gas, protons with higher energies (from about $20$ GeV up to about $30$ GeV) and lower energy spreads (from about $18\\%$ down to about $5\\%$ in full-width at half-maximum, or FWHM) are generated, as compared to the use of a pure H target. It is because protons can be more stably pre-accelerated in the first RPDA stage when using CH targets. With the increase of the carbon-to-hy...
A Novel Scheme to Search for Fractional Charge Particles in Low Energy Accelerator Experiments
Jianguo Bian; Jiahui Wang
2010-06-15T23:59:59.000Z
In the Standard Model of particle physics, the quarks and anti-quarks have fractional charge equal to $\\pm1/3$ or $\\pm2/3$ of the electron's charge. There has been a large number of experiments searching for fractional charge, isolatable, elementary particles using a variety of methods, including $e^+e^-$ collisions using dE/dx ionization energy loss measurements, but no evidence has been found to confirm existence of free fractional charge particles, which leads to the quark confinement theory. In this paper, a proposal to search for this kind particles is presented, which is based on the conservation law of four-momentum. Thanks to the CLEOc and BESIII detectors' large coverage, good particle identification, precision measurements of tracks' momenta and their large recorded data samples, these features make the scheme feasible in practice. The advantage of the scheme is independent of any theoretical models and sensitive for a small fraction of the quarks transitioning to the unconfinement phase from the confinement phase.
Causal hydrodynamics from kinetic theory by doublet scheme in renormalization-group method
Kyosuke Tsumura; Teiji Kunihiro
2014-09-10T23:59:59.000Z
We develop a general framework in the renormalization-group (RG) method for extracting a mesoscopic dynamics from an evolution equation by incorporating some excited (fast) modes as additional components to the invariant manifold spanned by zero modes. We call this framework the doublet scheme. We apply the doublet scheme to construct causal hydrodynamics as a mesoscopic dynamics of kinetic theory, i.e., the Boltzmann equation, in a systematic manner with no ad-hoc assumption. It is found that our equation has the same form as Grad's thirteen-moment causal hydrodynamic equation, but the microscopic formulae of the transport coefficients and relaxation times are different. In fact, in contrast to the Grad equation, our equation leads to the same expressions for the transport coefficients as given by the Chapman-Enskog expansion method and suggests novel formulae of the relaxation times expressed in terms of relaxation functions which allow a natural physical interpretation of the relaxation times. Furthermore, our theory nicely gives the explicit forms of the distribution function and the thirteen hydrodynamic variables in terms of the linearized collision operator, which in turn clearly suggest the proper ansatz forms of them to be adopted in the method of moments.
An Efficient Transparent Test Scheme for Embedded Word-Oriented Memories
Li, Jin-Fu; Wey, Chin-Long
2011-01-01T23:59:59.000Z
Memory cores are usually the densest portion with the smallest feature size in system-on-chip (SOC) designs. The reliability of memory cores thus has heavy impact on the reliability of SOCs. Transparent test is one of useful technique for improving the reliability of memories during life time. This paper presents a systematic algorithm used for transforming a bit-oriented march test into a transparent word-oriented march test. The transformed transparent march test has shorter test complexity compared with that proposed in the previous works [Theory of transparent BIST for RAMs, A transparent online memory test for simultaneous detection of functional faults and soft errors in memories]. For example, if a memory with 32-bit words is tested with March C-, time complexity of the transparent word-oriented test transformed by the proposed scheme is only about 56% or 19% time complexity of the transparent word-oriented test converted by the scheme reported in [Theory of transparent BIST for RAMs] or [A transparent...
The terminator "toy" chemistry test: A simple tool to assess errors in transport schemes
DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)
Lauritzen, P. H.; Conley, A. J.; Lamarque, J. -F.; Vitt, F.; Taylor, M. A.
2015-05-04T23:59:59.000Z
This test extends the evaluation of transport schemes from prescribed advection of inert scalars to reactive species. The test consists of transporting two interacting chemical species in the Nair and Lauritzen 2-D idealized flow field. The sources and sinks for these two species are given by a simple, but non-linear, "toy" chemistry that represents combination (X+X ? X2) and dissociation (X2 ? X+X). This chemistry mimics photolysis-driven conditions near the solar terminator, where strong gradients in the spatial distribution of the species develop near its edge. Despite the large spatial variations in each species, the weighted sum XT = X+2X2more »should always be preserved at spatial scales at which molecular diffusion is excluded. The terminator test demonstrates how well the advection–transport scheme preserves linear correlations. Chemistry–transport (physics–dynamics) coupling can also be studied with this test. Examples of the consequences of this test are shown for illustration.« less
Deterministic multivalued logic scheme for information processing and routing in the brain
S. M. Bezrukov; L. B. Kish
2009-05-06T23:59:59.000Z
Driven by analogies with state vectors of quantum informatics and noise-based logic, we propose a general scheme and elements of neural circuitry for processing and addressing information in the brain. Specifically, we consider random (e.g., Poissonian) trains of finite-duration spikes, and, using the idealized concepts of excitatory and inhibitory synapses, offer a procedure for generating 2^N-1 orthogonal vectors out of N partially overlapping trains ("neuro-bits"). We then show that these vectors can be used to construct 2^(2^N-1)-1 different superpositions which represent the same number of logic values when carrying or routing information. In quantum informatics the above numbers are the same, however, the present logic scheme is more advantageous because it is deterministic in the sense that the presence of a vector in the spike train is detected by an appropriate coincidence circuit. For this reason it does not require time averaging or repeated measurements of the kind used in standard cross-correlation analysis or in quantum computing.
Hong Luo; Hanping Xiao; Robert Nourgaliev; Chunpei Cai
2011-06-01T23:59:59.000Z
A comparative study of different reconstruction schemes for a reconstruction-based discontinuous Galerkin, termed RDG(P1P2) method is performed for compressible flow problems on arbitrary grids. The RDG method is designed to enhance the accuracy of the discontinuous Galerkin method by increasing the order of the underlying polynomial solution via a reconstruction scheme commonly used in the finite volume method. Both Green-Gauss and least-squares reconstruction methods and a least-squares recovery method are implemented to obtain a quadratic polynomial representation of the underlying discontinuous Galerkin linear polynomial solution on each cell. These three reconstruction/recovery methods are compared for a variety of compressible flow problems on arbitrary meshes to access their accuracy and robustness. The numerical results demonstrate that all three reconstruction methods can significantly improve the accuracy of the underlying second-order DG method, although the least-squares reconstruction method provides the best performance in terms of both accuracy and robustness.
Community wind power ownership schemes in Europe and their relevance to the United States
Bolinger, Mark
2001-05-15T23:59:59.000Z
With varying success, the United States and Europe have followed a more or less parallel path of policies to support wind development over the past twenty years. Feed-in laws and tax incentives first popularized in California in the early 1980s and greatly expanded upon in Europe during the 1990s are gradually giving way to market-based support mechanisms such as renewable portfolio standards, which are being implemented in one form or another in ten US states and at least three European nations. At the same time, electricity markets are being liberalized in both the US and Europe, and many electricity consumers are being given the choice to support the development of renewable energy through higher tariffs, both in traditionally regulated and newly competitive markets. One notable area in which wind development in Europe and United States has not evolved in common, however, is with respect to the level of community ownership of wind turbines or clusters. While community ownership of wind projects is unheard of in the United States, in Europe, local wind cooperatives or other participatory business schemes have been responsible for a large share of total wind development. In Denmark, for example, approximately 80% of all wind turbines are either individually or cooperatively owned, and a similar pattern holds in Germany, the world leader in installed wind capacity. Sweden also has a strong wind cooperative base, and the UK has recently made forays into community wind ownership. Why is it that wind development has evolved this way in Europe, but not in the United States? What incremental effect have community-owned wind schemes had on European wind development? Have community-owned wind schemes driven development in Europe, or are they merely a vehicle through which the fundamental driving institutions have been channeled? Is there value to having community wind ownership in the US? Is there reason to believe that such schemes would succeed in the US? If so, which model seems most appropriate, and what barriers--legal, regulatory, tax, market, or investment--stand in the way of implementing such a scheme? These are the questions this report seeks to address. The report begins with a discussion of the relative advantages and disadvantages of community wind ownership, as opposed to the large commercially-owned projects that have so far dominated US wind development. Next, four detailed case studies relate community-owned wind experience in Denmark, Sweden, the UK, Germany, focusing primarily on the different participatory models employed in each country. The report then categorizes the various models into three main groupings--community-led, developer-led, and investment funds--and draws general conclusions about the success of each category in Europe, and the conditions that dictate the effective use of one approach over another. Finally, the focus shifts to the US, where the report discusses the domestic barriers facing each model category, and identifies the category offering the most value with the fewest barriers to implementation. The report concludes with a high-level introduction to potential applications for community wind ownership within the United States.
Blatter, Heinz
2014-01-01T23:59:59.000Z
The enthalpy method for the thermodynamics of polythermal glaciers and ice sheets is tested and verified by a one-dimensional problem (parallel-sided slab). The enthalpy method alone does not include explicitly the Stefan-type energy- and mass-flux matching conditions at the cold-temperate transition surface (CTS) that separates the upper cold from the lower temperate layer. However, these transition conditions are important for correctly determining the position of the CTS. For the numerical solution of the polythermal slab problem, we consider a two-layer front-tracking scheme as well as three different one-layer schemes that feature a single grid for both layers. Computed steady-state temperature and moisture profiles are verified with exact solutions, and transient solutions computed by the one-layer schemes are compared with those of the two-layer scheme, considered to be a reliable reference. While the conventional one-layer enthalpy scheme (that does not include the transition conditions at the CTS) ca...
Generic Schemes for Single Molecule Kinetics II: Information Content of the Poisson Indicator
Avila, Thomas
2013-01-01T23:59:59.000Z
A previously described pathway analysis technique is applied to generic schemes of enzyme kinetics. The method is employed is derive expressions for the distribution of waiting times between reaction events and the moments of this distribution. Analytical expressions for the Poisson indicator, a normalized measure of the variance that characterizes the correlation between consecutive events, are derived from the moments of the waiting time. Various important cases are treated with our methodology, including enzymatic reactions in the presence of a competitive inhibitor and in the presence of multiple substrates. The functional dependence of the Poisson indicator on substrate concentration is explored, and connections are made between the derived expressions and the topology of the enzymatic reaction.
Level scheme of /sup 148/Pm and the s-process neutron density
Lesko, K.T.; Norman, E.B.; Larimer, R.; Bacelar, J.C.; Beck, E.M.
1989-02-01T23:59:59.000Z
A level scheme of /sup 148/Pm up to 800 keV is deduced from gamma-ray coincidence data and published particle transfer data. Approximately 106 gamma-ray transitions have been placed between 36 levels. We have identified three levels below 500 keV in excitation which decay to both the ground state and to the isomeric level at 137 keV. The presence of these levels guarantees that /sup 148/Pm/sup g//sup ,//sup m/ are in thermal equilibrium during the s process. The s-process neutron density inferred from the branch point at /sup 148/Pm is deduced to be 3 x 10/sup 8//cm/sup 3/.
A new ignition scheme using hybrid indirect-direct drive for inertial confinement fusion
Fan, Zhengfeng; Dai, Zhensheng; Cai, Hong-bo; Zhu, Shao-ping; Zhang, W Y; He, X T
2013-01-01T23:59:59.000Z
A new hybrid indirect-direct-drive ignition scheme is proposed for inertial confinement fusion: a cryogenic capsule encased in a hohlraum is first compressed symmetrically by indirect-drive x-rays, and then accelerated and ignited by both direct-drive lasers and x-rays. A steady high-density plateau newly formed between the radiation and electron ablation fronts suppresses the rarefaction at the radiation ablation front and greatly enhances the drive pressure. Meanwhile, multiple shock reflections at the fuel/hot-spot interface are prevented during capsule deceleration. Thus rapid ignition and burn are realized. In comparison with the conventional indirect drive, the hybrid drive implodes the capsule with a higher velocity ($\\sim4.3\\times10^7$ cm/s) and a much lower convergence ratio ($\\sim$25), and the growth of hydrodynamic instabilities is significantly reduced, especially at the fuel/hot-spot interface.
White, C D; Thorne, Robert S
) = ?S ? ? 0 dk2 k2 hi(k2/Q2)f(N, k2, Q20)gB(N,Q 2 0), (1) where gB is the bare gluon distribution at momentum scale Q20, and the strong coupling ?S is fixed at LL order. The hi(k2/Q2) are the impact factors coupling the virtual photon to the gluon... )gB(N,Q 2 0), (2) which serves to define the impact factor h2. In a general factorisation scheme, one loses the simple inter- pretation of h2 as the coefficient function relating the gluon distribution to the structure function. Instead it represents...
J.K. Sekutowicz, P. Kneisel
2009-05-01T23:59:59.000Z
A coaxial coupling device located in the beam pipe of the TESLA type superconducting cavities provides for better propagation of Higher Order Modes (HOMs) and their strong damping in appropriate HOM couplers. Additionally, it also provides efficient coupling for fundamental mode RF power into the superconducting cavity. The whole coupling device can be designed as a detachable system. If appropriately dimensioned, the magnetic field can be minimized to a negligible level at the flange position. This scheme, presented previously*, provides for several advantages: strong HOM damping, flangeable solution, exchangeability of the HOM damping device on a cavity, less complexity of the superconducting cavity, possible cost advantages. This contribution will describe the results of the first cryogenic test.
Comparison of rainfall sampling schemes using a calibrated stochastic rainfall generator
Welles, E.
1994-12-31T23:59:59.000Z
Accurate rainfall measurements are critical to river flow predictions. Areal and gauge rainfall measurements create different descriptions of the same storms. The purpose of this study is to characterize those differences. A stochastic rainfall generator was calibrated using an automatic search algorithm. Statistics describing several rainfall characteristics of interest were used in the error function. The calibrated model was then used to generate storms which were exhaustively sampled, sparsely sampled and sampled areally with 4 x 4 km grids. The sparsely sampled rainfall was also kriged to 4 x 4 km blocks. The differences between the four schemes were characterized by comparing statistics computed from each of the sampling methods. The possibility of predicting areal statistics from gauge statistics was explored. It was found that areally measured storms appeared to move more slowly, appeared larger, appeared less intense and have shallower intensity gradients.
Extending PIC schemes for the study of physics in ultra-strong laser fields
Gonoskov, A; Efimenko, E; Ilderton, A; Marklund, M; Meyerov, I; Muraviev, A; Surmin, I; Wallin, E
2014-01-01T23:59:59.000Z
Progress in laser technology has opened up possibilities using intense light to probe fundamental physics of ultra-strong electromagnetic fields. A commensurate interest has arisen in large-scale numerical simulations of laser-matter interactions, and here we describe the extension of particle-in-cell (PIC) schemes to account for strong field phenomena. We describe here the numerical implementation of strong-field processes such as quantized emission and electron-positron pair production, and provide solutions for related methodological and algorithmic problems of radiation double counting, low-energy cutoffs in particle emission, memory overload due to cascades of particle production, control of computational costs for statistical routines, and the limitations on time steps due to the quantized nature of emission. We also present a unified technical interface for including the processes of interest in different PIC implementations. The PIC codes PICADOR and ELMIS, which support this interface, are briefly re...
Interaction region for crab waist scheme of the Future Electron-Positron Collider (CERN)
Bogomyagkov, A
2015-01-01T23:59:59.000Z
Design study in CERN of the accelerator that would fit 80-100 km tunnel called Future Circular Colliders (FCC) includes high-luminosity $e^+ e^?$ collider (FCC-ee) with center-of-mass energy from 90 to 350 GeV to study Higgs boson properties and perform precise measurements at the electroweak scale [1–3]. Crab waist interaction region provides collisions with luminosity higher than 2 × 10$^{36}$ cm$^{?2}$ sec$^{?1}$ at beam energy of 45 GeV. The small values of the beta functions at the interaction point and distant final focus lenses are the reasons for high nonlinear chromaticity limiting energy acceptance of the whole ring. The paper describes interaction region for crab waist collision scheme in the FCC-ee, principles of tuning the chromaticity correction section in order to provide large energy acceptance.
A gas kinetic scheme for the Baer-Nunziato two-phase flow model
Pan, Liang, E-mail: panliangjlu@sina.com [Institute of Applied Physics and Computational Mathematics, Beijing 100088 (China) [Institute of Applied Physics and Computational Mathematics, Beijing 100088 (China); The Graduate School of China Academy of Engineering Physics, Beijing 100088 (China); Zhao, Guiping, E-mail: zhaogp@nsfc.gov.cn [National Natural Science Foundation of China, Beijing 100085 (China)] [National Natural Science Foundation of China, Beijing 100085 (China); Tian, Baolin, E-mail: tian_baolin@iapcm.ac.cn [Institute of Applied Physics and Computational Mathematics, Beijing 100088 (China) [Institute of Applied Physics and Computational Mathematics, Beijing 100088 (China); Key Laboratory of Computational Physics, Institute of Applied Physics and Computational Mathematics, Beijing 100088 (China); Wang, Shuanghu, E-mail: wang_shuanghu@iapcm.ac.cn [Institute of Applied Physics and Computational Mathematics, Beijing 100088 (China) [Institute of Applied Physics and Computational Mathematics, Beijing 100088 (China); Key Laboratory of Computational Physics, Institute of Applied Physics and Computational Mathematics, Beijing 100088 (China)
2012-09-15T23:59:59.000Z
Numerical methods for the Baer-Nunziato (BN) two-phase flow model have attracted much attention in recent years. In this paper, we present a new gas kinetic scheme for the BN two-phase flow model containing non-conservative terms in the framework of finite volume method. In the view of microscopic aspect, a generalized Bhatnagar-Gross-Krook (BGK) model which matches with the BN model is constructed. Based on the integral solution of the generalized BGK model, we construct the distribution functions at the cell interface. Then numerical fluxes can be obtained by taking moments of the distribution functions, and non-conservative terms are explicitly introduced into the construction of numerical fluxes. In this method, not only the complex iterative process of exact solutions is avoided, but also the non-conservative terms included in the equation can be handled well.
FATAL+: A Self-Stabilizing Byzantine Fault-tolerant Clocking Scheme for SoCs
Dolev, Danny; Lenzen, Christoph; Posch, Markus; Schmid, Ulrich; Steininger, Andreas
2012-01-01T23:59:59.000Z
We present concept and implementation of a self-stabilizing Byzantine fault-tolerant distributed clock generation scheme for multi-synchronous GALS architectures in critical applications. It combines a variant of a recently introduced self-stabilizing algorithm for generating low-frequency, low-accuracy synchronized pulses with a simple non-stabilizing high-frequency, high-accuracy clock synchronization algorithm. We provide thorough correctness proofs and a performance analysis, which use methods from fault-tolerant distributed computing research but also addresses hardware-related issues like metastability. The algorithm, which consists of several concurrent communicating asynchronous state machines, has been implemented in VHDL using Petrify in conjunction with some extensions, and synthetisized for an Altera Cyclone FPGA. An experimental validation of this prototype has been carried out to confirm the skew and clock frequency bounds predicted by the theoretical analysis, as well as the very short stabiliz...
Ramis, R., E-mail: rafael.ramis@upm.es [E.T.S.I. Aeronáuticos, Universidad Politécnica de Madrid, P. Cardenal Cisneros 3, E-28040 Madrid (Spain); Temporal, M. [Centre de Mathématiques et de Leurs Applications, ENS Cachan and CNRS, 61 Av. du President Wilson, F-94235 Cachan Cedex (France); Canaud, B.; Brandon, V. [CEA, DIF, F-91297 Arpajon (France)
2014-08-15T23:59:59.000Z
The symmetry of a Direct-Drive (DD) irradiation scheme has been analyzed by means of three-dimensional (3D) simulations carried out by the code MULTI (R. Ramis et al., Comput. Phys. Commun. 49, 475 (1988)) that includes hydrodynamics, heat transport, and 3D laser ray-tracing. The implosion phase of a target irradiated by the Laser Megajoule (LMJ) facility in the context of the Shock Ignition scheme has been considered. The LMJ facility has been designed for Indirect-Drive, and by this reason that the irradiation scheme must be modified when used for DD. Thus, to improve the implosion uniformity to acceptable levels, the beam centerlines should be realigned and the beam power balance should be adjusted. Several alternatives with different levels of complexity are presented and discussed.
Study of thermosiphon cooling scheme for the production solenoid of the Mu2e experiment at Fermilab
Dhanaraj, N.; Kashikhin, V.; Peterson, T.; Pronskikh, V.; Nicol, T. [Fermi National Accelerator Laboratory, P. O. Box 500, Batavia, IL 60510 (United States)
2014-01-29T23:59:59.000Z
A thermosiphon cooling scheme is envisioned for the Production Solenoid of the Mu2e experiment at Fermi National Accelerator Laboratory. The thermosiphon cooling is achieved by indirect cooling with helium at 4.7 K. The siphon tubes are welded to the solenoid outer structure. The anticipated heat loads in the solenoid is presented as well as the cooling scheme design. A thermal model using ANSYS to simulate the temperature gradient is presented. The thermal analysis also makes provisions for including the heat load generated in the coils and structures by the secondary radiation simulated using the MARS 15 code. The impact of the heat loads from supports on the solenoid cooling is studied. The thermosiphon cooling scheme is also validated using pertinent correlations to study flow reversals and the cooling regime.
Practical scheme to share a secret key through a quantum channel with a 27.6% bit error rate
Chau, H.F. [Department of Physics, University of Hong Kong, Pokfulam Road, Hong Kong (China)
2002-12-01T23:59:59.000Z
A secret key shared through quantum key distribution between two cooperative players is secure against any eavesdropping attack allowed by the laws of physics. Yet, such a key can be established only when the quantum channel error rate due to eavesdropping or imperfect apparatus is low. Here, a practical quantum key distribution scheme by making use of an adaptive privacy amplification procedure with two-way classical communication is reported. Then, it is proven that the scheme generates a secret key whenever the bit error rate of the quantum channel is less than 0.5-0.1{radical}(5){approx_equal}27.6%, thereby making it the most error resistant scheme known to date.