931 resultados para Renormalization schemes
Resumo:
The results of 1D simulation of nanoparticle dynamics in the areas adjacent to nanostructured carbon-based films exposed to chemically active complex plasma of CH4 + H2 + Ar gas mixtures are presented. The nanoparticle-loaded near-substrate (including sheath and presheath) areas of a low-frequency (0.5 MHz) inductively coupled plasma facility for the PECVD growth of the ordered carbon-based nanotip structures are considered. The conditions allowing one to predict the size of particles that can pass through the plasma sheath and softly land onto the surface are formulated. The possibility of soft nano-cluster deposition without any additional acceleration common for some existing nano-cluster deposition schemes is demonstrated. The effect of the substrate heating power and the average atomic mass of neutral species is studied numerically and verified experimentally.
Resumo:
This paper presents the design of a dual Z-source inverter that can be used with either a single dc source or two isolated dc sources. Unlike traditional inverters, the integration of a properly designed Z-source network and semiconductor switches to the proposed dual inverter allows buck-boost power conversion to be performed over a wide modulation range with three-level output waveforms generated. The connection of an additional transformer to the inverter ac output also allows all generic wye- or delta-connected loads with three-wire or four-wire configuration to be supplied by the inverter. Modulation-wise, the dual inverter can be controlled using a carefully designed carrier-based pulse-width modulation (PWM) scheme that always will ensure balanced voltage boosting of the Z-source network, while simultaneously achieving reduced common-mode switching. Because of the omission of dead-time delays in the dual inverter PWM scheme, its switched common-mode voltage can be completely eliminated, unlike in traditional inverters where narrow common-mode spikes are still generated. Under semiconductor failure conditions, the presented PWM schemes can easily be modified to allow the inverter to operate without interruption and for cases where two isolated sources are used, zero common-mode voltage can still be ensured. These theoretical findings together with the inverter practicality have been confirmed both in simulations using PSIM with Matlab/Simulink coupler and experimentally using a laboratory implemented inverter prototype.
Resumo:
This paper presents the design of a dual Z-source inverter that can be used with either a single dc source or two isolated dc sources. Unlike traditional inverters, the integration of a properly designed Z-source network and semiconductor switches to the proposed dual inverter allows buck-boost power conversion to be performed over a wide modulation range, with three-level output waveforms generated. The connection of an additional transformer to the inverter ac output also allows all generic wye-or delta-connected loads with three-wire or four-wire configuration to be supplied by the inverter. Modulationwise, the dual inverter can be controlled using a carefully designed carrier-based pulsewidth-modulation (PWM) scheme that will always ensure balanced voltage boosting of the Z-source network while simultaneously achieving reduced common-mode switching. Because of the omission of dead-time delays in the dual-inverter PWM scheme, its switched common-mode voltage can be completely eliminated, unlike in traditional inverters, where narrow common-mode spikes are still generated. Under semiconductor failure conditions, the presented PWM schemes can easily be modified to allow the inverter to operate without interruption, and for cases where two isolated sources are used, zero common-mode voltage can still be ensured. These theoretical findings, together with the inverter practicality, have been confirmed in simulations both using PSIM with Matlab/Simulink coupler and experimentally using a laboratory-implemented inverter prototype.
Resumo:
We consider the following problem: a user stores encrypted documents on an untrusted server, and wishes to retrieve all documents containing some keywords without any loss of data confidentiality. Conjunctive keyword searches on encrypted data have been studied by numerous researchers over the past few years, and all existing schemes use keyword fields as compulsory information. This however is impractical for many applications. In this paper, we propose a scheme of keyword field-free conjunctive keyword searches on encrypted data, which affirmatively answers an open problem asked by Golle et al. at ACNS 2004. Furthermore, the proposed scheme is extended to the dynamic group setting. Security analysis of our constructions is given in the paper.
Resumo:
We study the natural problem of secure n-party computation (in the passive, computationally unbounded attack model) of the n-product function f G (x 1,...,x n ) = x 1 ·x 2 ⋯ x n in an arbitrary finite group (G,·), where the input of party P i is x i ∈ G for i = 1,...,n. For flexibility, we are interested in protocols for f G which require only black-box access to the group G (i.e. the only computations performed by players in the protocol are a group operation, a group inverse, or sampling a uniformly random group element). Our results are as follows. First, on the negative side, we show that if (G,·) is non-abelian and n ≥ 4, then no ⌈n/2⌉-private protocol for computing f G exists. Second, on the positive side, we initiate an approach for construction of black-box protocols for f G based on k-of-k threshold secret sharing schemes, which are efficiently implementable over any black-box group G. We reduce the problem of constructing such protocols to a combinatorial colouring problem in planar graphs. We then give two constructions for such graph colourings. Our first colouring construction gives a protocol with optimal collusion resistance t < n/2, but has exponential communication complexity O(n*2t+1^2/t) group elements (this construction easily extends to general adversary structures). Our second probabilistic colouring construction gives a protocol with (close to optimal) collusion resistance t < n/μ for a graph-related constant μ ≤ 2.948, and has efficient communication complexity O(n*t^2) group elements. Furthermore, we believe that our results can be improved by further study of the associated combinatorial problems.
Resumo:
Motivated by privacy issues associated with dissemination of signed digital certificates, we define a new type of signature scheme called a ‘Universal Designated-Verifier Signature’ (UDVS). A UDVS scheme can function as a standard publicly-verifiable digital signature but has additional functionality which allows any holder of a signature (not necessarily the signer) to designate the signature to any desired designated-verifier (using the verifier’s public key). Given the designated-signature, the designated-verifier can verify that the message was signed by the signer, but is unable to convince anyone else of this fact. We propose an efficient deterministic UDVS scheme constructed using any bilinear group-pair. Our UDVS scheme functions as a standard Boneh-Lynn-Shacham (BLS) signature when no verifier-designation is performed, and is therefore compatible with the key-generation, signing and verifying algorithms of the BLS scheme. We prove that our UDVS scheme is secure in the sense of our unforgeability and privacy notions for UDVS schemes, under the Bilinear Diffie-Hellman (BDH) assumption for the underlying group-pair, in the random-oracle model. We also demonstrate a general constructive equivalence between a class of unforgeable and unconditionally-private UDVS schemes having unique signatures (which includes the deterministic UDVS schemes) and a class of ID-Based Encryption (IBE) schemes which contains the Boneh-Franklin IBE scheme but not the Cocks IBE scheme.
Resumo:
Dealing with digital medical images is raising many new security problems with legal and ethical complexities for local archiving and distant medical services. These include image retention and fraud, distrust and invasion of privacy. This project was a significant step forward in developing a complete framework for systematically designing, analyzing, and applying digital watermarking, with a particular focus on medical image security. A formal generic watermarking model, three new attack models, and an efficient watermarking technique for medical images were developed. These outcomes contribute to standardizing future research in formal modeling and complete security and computational analysis of watermarking schemes.
Resumo:
While formal definitions and security proofs are well established in some fields like cryptography and steganography, they are not as evident in digital watermarking research. A systematic development of watermarking schemes is desirable, but at present their development is usually informal, ad hoc, and omits the complete realization of application scenarios. This practice not only hinders the choice and use of a suitable scheme for a watermarking application, but also leads to debate about the state-of-the-art for different watermarking applications. With a view to the systematic development of watermarking schemes, we present a formal generic model for digital image watermarking. Considering possible inputs, outputs, and component functions, the initial construction of a basic watermarking model is developed further to incorporate the use of keys. On the basis of our proposed model, fundamental watermarking properties are defined and their importance exemplified for different image applications. We also define a set of possible attacks using our model showing different winning scenarios depending on the adversary capabilities. It is envisaged that with a proper consideration of watermarking properties and adversary actions in different image applications, use of the proposed model would allow a unified treatment of all practically meaningful variants of watermarking schemes.
Resumo:
The mining industry faces concurrent pressures of reducing water use, energy consumption and greenhouse gas (GHG) emissions in coming years. However, the interactions between water and energy use, as well as GHG e missions have largely been neglected in modelling studies to date. In addition, investigations tend to focus on the unit operation scale, with little consideration of whole-of-site or regional scale effects. This paper presents an application of a hierarchical systems model (HSM) developed to represent water, energy and GHG emissions fluxes at scales ranging from the unit operation, to the site level, to the regional level. The model allows for the linkages between water use, energy use and GHG emissions to be examined in a fl exible and intuitive way, so that mine sites can predict energy and emissions impacts of water use reduction schemes and vice versa. This paper examines whether this approach can also be applied to the regional scale with multiple mine sites. The model is used to conduct a case study of several coal mines in the Bowen Basin, Australia, to compare the utility of centralised and decentralised mine water treatment schemes. The case study takes into account geographical factors (such as water pumping distances and elevations), economic factors (such as capital and operating cost curves for desalination treatment plants) and regional factors (such as regionally varying climates and associated variance in mine water volumes and quality). The case study results indicate that treatment of saline mine water incurs a trade-off between water and energy use in all cases. However, significant cost differences between centralised and decentralised schemes can be observed in a simple economic analysis. Further research will examine the possibility for deriving model up-scaling algorithms to reduce computational requirements.
Resumo:
The primary motivation for the vehicle replacement schemes that were implemented in many countries was to encourage the purchase of new cars. The basic assumption of these schemes was that these acquisitions would benefit both the economy and the environment as older and less fuel-efficient cars were scrapped and replaced with more fuel-efficient models. In this article, we present a new environmental impact assessment method for assessing the effectiveness of scrappage schemes for reducing CO2 emissions taking into account the rebound effect, driving behavior for older versus new cars and entire lifecycle emissions for during the manufacturing processes of new cars. The assessment of the Japanese scrappage scheme shows that CO2 emissions would only decrease if users of the scheme retained their new gasoline passenger vehicles for at least 4.7 years. When vehicle replacements were restricted to hybrid cars, the reduction in CO2 achieved by the scheme would be 6-8.5 times higher than the emissions resulting from a scheme involving standard, gasoline passenger vehicles. Cost-benefit analysis, based on the emission reduction potential, showed that the scheme was very costly. Sensitivity analysis showed that the Japanese government failed to determine the optimum, or target, car age for scrapping old cars in the scheme. Specifically, scrapping cars aged 13 years and over did not maximize the environmental benefits of the scheme. Consequently, modifying this policy to include a reduction in new car subsidies, focused funding for fuel-efficient cars, and modifying the target car age, would increase environmental benefits. © 2013 Elsevier Ltd.
Resumo:
Since 2000, the Government of Viet Nam has committed to provide rural communities with increased access to safe water through a variety of household water supply schemes (wells, ferrocement tanks and jars) and piped water schemes. One possible, unintended consequence of these schemes is the concomitant increase in water containers that may serve as habitats for dengue mosquito immatures, principally Aedes aegypti. To assess these possible impacts we undertook detailed household surveys of Ae. aegypti immatures, water storage containers and various socioeconomic factors in three rural communes in southern Viet Nam. Positive relationships between the numbers of household water storage containers and the prevalence and abundance of Ae. aegypti immatures were found. Overall, water storage containers accounted for 92–97% and 93–96% of the standing crops of III/IV instars and pupae, respectively. Interestingly, households with higher socioeconomic levels had significantly higher numbers of water storage containers and therefore greater risk of Ae. aegypti infestation. Even after provision of piped water to houses, householders continued to store water in containers and there was no observed decrease in water storage container abundance in these houses, compared to those that relied entirely on stored water. These findings highlight the householders’ concerns about the limited availability of water and their strong behavoural patterns associated with storage of water. We conclude that household water storage container availability is a major risk factor for infestation with Ae. aegypti immatures, and that recent investment in rural water supply infrastructure are unlikely to mitigate this risk, at least in the short term.
Resumo:
The construction industry is one of the largest sources of carbon emissions. Manufacturing of raw materials, such as cement, steel and aluminium, is energy intensive and has considerable impact on carbon emissions level. Due to the rising recognition of global climate change, the industry is under pressure to reduce carbon emissions. Carbon labelling schemes are therefore developed as meaningful yardsticks to measure and compare carbon emissions. Carbon labelling schemes can help switch consumer-purchasing habits to low-carbon alternatives. However, such switch is dependent on a transparent scheme. The principle of transparency is highlighted in all international greenhouse gas (GHG) standards, including the newly published ISO 14067: Carbon footprint of products – requirements and guidelines for quantification and communication. However, there are few studies which systematically investigate the transparency requirements in carbon labelling schemes. A comparison of five established carbon labelling schemes, namely the Singapore Green Labelling Scheme, the CarbonFree (the U.S.), the CO2 Measured Label and the Reducing CO2 Label (UK), the CarbonCounted (Canada), and the Hong Kong Carbon Labelling Scheme is therefore conducted to identify and investigate the transparency requirements. The results suggest that the design of current carbon labels have transparency issues relating but not limited to the use of a single sign to represent the comprehensiveness of the carbon footprint. These transparency issues are partially caused by the flexibility given to select system boundary in the life cycle assessment (LCA) methodology to measure GHG emissions. The primary contribution of this study to the construction industry is to reveal the transparency requirements from international GHG standards and carbon labels for construction products. The findings also offer five key strategies as practical implications for the global community to improve the performance of current carbon labelling schemes on transparency.
Resumo:
Increased awareness of environmental concerns has caused greater interest in developing power sources based on renewable technologies, such as wind. Due to the intermittent nature of the wind speed, output voltage and frequency of the direct driven permanent magnet synchronous generators (PMSG) are normally unsteady. Recently proposed Z-source inverter has been considered as a potential solution for grid interfacing wind power generators, thanks to buck-boost function that the single stage Z-source inverter can offer. Two control methodologies, namely unified controller for isolated operation and a multi-loop controller for grid interfaced operation are investigated in this paper. Theoretical analysis of these two control schemes is presented and experimental results to verify the effectiveness of the control method are also included.
Resumo:
This study quantifies the motivators and barriers to bikeshare program usage in Australia. An online survey was administered to a sample of annual members of Australia’s two bikeshare programs based in Brisbane and Melbourne, to assess motivations for joining the schemes. Non-members of the programs were also sampled in order to identify current barriers to joining bikeshare. Spatial analysis from Brisbane revealed residential and work locations of non-members were more geographically dispersed than for bikeshare members. An analysis of bikeshare usage in Melbourne showed a strong relationship between docking stations in areas with relatively less accessible public transit opportunities. The most influential barriers to bikeshare use related to motorized travel being too convenient and docking stations not being sufficiently close to home, work and other frequented destinations. The findings suggest that bikeshare programs may attract increased membership by ensuring travel times are competitive with motorized travel, for example through efficient bicycle routing and priority progression and, by expanding docking station locations, and by increasing the level of convenience associated with scheme use. Convenience considerations may include strategic location of docking stations, ease of signing up and integration with public transport.
Resumo:
Communicating the mining industry’s water use is fundamental to maintaining its social license to operate but the majority of corporate reporting schemes list indicators. The Minerals Council of Australia’s Water Accounting Framework was designed to assist the minerals industry obtain consistency in its accounting method and in the definitions of terms used in water reporting. The significance of this paper is that it shows that the framework has been designed to be sufficiently robust to describe any mining/mineral related operation. The Water Accounting Framework was applied across four operations over three countries producing four commodities. The advantages of the framework were then evident through the presentation of the reports. The contextual statement of the framework was able to explain contrasting reuse efficiencies. The Input-Output statements showed that evaporation was a significant loss for most of the operations in the study which highlights a weakness of reporting schemes that focus on discharge volumes. The framework method promotes data reconciliation which proved the presence of flows that two operations in the study had neglected to provide. Whilst there are many advantages of the framework, the major points are that the reporting statements of the framework, when presented together, can better enable the public to understand water interactions at a site-level and allows for valid comparisons between sites, regardless of locale and commodity. With mining being a global industry, these advantages are best realised if there was international adoption of the framework.