Powered by Deep Web Technologies
Note: This page contains sample records for the topic "analysis key factors" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

Abstract--Distribution factors play a key role in many system security analysis and market applications. The injection shift  

E-Print Network (OSTI)

1 Abstract-- Distribution factors play a key role in many system security analysis and market of the other distribution factors. The line outage distribution factors (LODFs) may be computed using the ISFs distribution factors, line outage distribution factors, multiple-line outages, system security. I. INTRODUCTION

2

EIA highlights key factors in new energy and financial markets ...  

U.S. Energy Information Administration (EIA)

Yesterday, EIA launched a new web-based assessment highlighting key factors that can affect crude oil prices called "Energy and Financial Markets: What Drives Crude ...

3

DVD Production Process & Key Factors for Quality Discs  

Science Conference Proceedings (OSTI)

... wide market share for DVD +/- RW; #2 World-wide market share for CD ... Key factor - deep knowledge of forming thin metal film - optimization of ...

2006-01-20T23:59:59.000Z

4

Analysis of the factors and the roles of HRD in organizational learning styles as identified by key informants at selected corporations in the Republic of Korea  

E-Print Network (OSTI)

The core competency of the most effective organizations will be their capacity to learn in an increasingly complex and unpredictable business environment and HRD should expand its role to become a partner in the transformation of the entire organization. Organizational learning style, therefore, is an important research topic for the field of HRD (human resource development). This study had four primary purposes, which were germane to the corporations in the Republic of Korea: 1) to identify what organizational learning styles exist; 2) to identify the factors that differentiate the organizations with different organizational learning styles; 3) to identify the roles of HRD to facilitate organizational learning within the organizations in each organizational learning style; and 4) to identify the differences in the roles of HRD to facilitate organizational learning among the organizations with different organizational learning styles. The population for this study was the key informants at the corporations in the three industry areas: wholesale and retail trade; manufacturing; and hotels and restaurants. The survey instrument was delivered to 353 key informants, i.e. HR persons, at 240 corporations and 237 key informants at 166 corporations returned the survey instrument for a return rate of 67.1%. The findings of this study revealed the followings: 1) there are four types of organizational learning styles and the characteristics of each type of organizational learning style is determined by the combination of the organizations?? learning orientations, i.e. Knowledge Source, Learning Content, Dissemination Mode, and Learning Scope; 2) types of organizational culture, industry classification, and the size of an organization are the factors that differentiate the organizations with different organizational learning styles; 3) all roles of HRD are necessary for facilitating organizational learning; and 4) there are not differences in the roles of HRD to facilitate organizational learning among the organizations with different organizational learning styles.

Jeong, Jinchul

2003-05-01T23:59:59.000Z

5

Extracting Key Factors to Design Applications in Ambient Intelligence Environment  

Science Conference Proceedings (OSTI)

In an ambient intelligence environment, the design of applications influences the users behavior heavily. The purpose of this paper is to provide key factors considered necessary in developing those applications. We developed four applications applied ... Keywords: ambient feedback, persuasive technology, behavior modification, emotional engagement

Hiroaki Kimura; Tatsuo Nakajima

2008-12-01T23:59:59.000Z

6

Key website factors in e-business strategy  

Science Conference Proceedings (OSTI)

The design of a quality website, as part of e-business strategy, has become a key element for success in the online market. This article analyzes the main factors that must be taken into account when designing a commercial website, concentrating on the ... Keywords: Accessibility, Content, Navigability, Speed, Web Assessment Index (WAI), Website

Blanca HernáNdez; Julio JiméNez; M. José MartíN

2009-10-01T23:59:59.000Z

7

Key Response Planning Factors for the Aftermath of Nuclear Terrorism  

Science Conference Proceedings (OSTI)

Despite hundreds of above-ground nuclear tests and data gathered from Hiroshima and Nagasaki, the effects of a ground-level, low-yield nuclear detonation in a modern urban environment are still the subject of considerable scientific debate. Extensive review of nuclear weapon effects studies and discussions with nuclear weapon effects experts from various federal agencies, national laboratories, and technical organizations have identified key issues and bounded some of the unknowns required to support response planning for a low-yield, ground-level nuclear detonation in a modern U.S. city. This study, which is focused primarily upon the hazards posed by radioactive fallout, used detailed fallout predictions from the advanced suite of three-dimensional (3-D) meteorology and plume/fallout models developed at Lawrence Livermore National Laboratory (LLNL), including extensive global Key Response Planning Factors for the Aftermath of Nuclear Terrorism geographical and real-time meteorological databases to support model calculations. This 3-D modeling system provides detailed simulations that account for complex meteorology and terrain effects. The results of initial modeling and analysis were presented to federal, state, and local working groups to obtain critical, broad-based review and feedback on strategy and messaging. This effort involved a diverse set of communities, including New York City, National Capitol Regions, Charlotte, Houston, Portland, and Los Angeles. The largest potential for reducing casualties during the post-detonation response phase comes from reducing exposure to fallout radiation. This can be accomplished through early, adequate sheltering followed by informed, delayed evacuation.B The response challenges to a nuclear detonation must be solved through multiple approaches of public education, planning, and rapid response actions. Because the successful response will require extensive coordination of a large number of organizations, supplemented by appropriate responses by local responders and the general population within the hazard zones, regional planning is essential to success. The remainder of this Executive Summary provides summary guidance for response planning in three areas: (1) Public Protection Strategy details the importance of early, adequate shelter followed by informed evacuation. (2) Responder Priorities identify how to protect response personnel, perform regional situational assessment, and support public safety. (3) Key Planning Considerations refute common myths and provide important information on planning how to respond in the aftermath of nuclear terrorism.

Buddemeier, B R; Dillon, M B

2009-01-21T23:59:59.000Z

8

Key Factors in Displacement Ventilation Systems for Better IAQ  

E-Print Network (OSTI)

This paper sets up a mathematical model of three-dimensional steady turbulence heat transfer in an air-conditioned room of multi-polluting heat sources. Numerical simulation helps identify key factors in displacement ventilation systems that affect air-quality in rooms of multi-polluting heat sources. Results show that it is very important to determine the suitable air-intemperature , air-inflow, and heat source quantity and dispersion, to obtain better displacement ventilation results.

Wang, X.; Chen, J.; Li, Y.; Wang, Z.

2006-01-01T23:59:59.000Z

9

Design and Analysis of Key Comparisons  

Science Conference Proceedings (OSTI)

... new methods, and make statistically best practices available ... to Key Comparisons such as data reporting and ... In the big picture, with the lowering ...

2010-11-18T23:59:59.000Z

10

Advanced Analysis Software Key to New, Energy-Efficient ...  

Advanced Analysis Software Key to New, Energy-Efficient Technologies Leveraging Scientific and Engineering Know-How to Advance Sources of Renewable En ...

11

Advanced Analysis Software Key to New, Energy-Efficient ...  

Advanced Analysis Software Key to New, Energy-Efficient Technologies Leveraging Scientific and Engineering Know-How to Advance Sources of Renewable Energy

12

Finite-key analysis of high-dimensional time-energy entanglement-based quantum key distribution  

E-Print Network (OSTI)

We present a security analysis against collective attacks for the recently proposed time-energy entanglement-based quantum key distribution protocol, given the practical constraints of single photon detector efficiency, channel loss, and finite-key considerations. We find a positive secure-key capacity when the key length increases beyond $10^4$ for eight-dimensional systems. The minimum key length required is reduced by the ability to post-select on coincident single-photon detection events. Including finite-key effects, we show the ability to establish a shared secret key over a 200 km fiber link.

Catherine Lee; Jacob Mower; Zheshen Zhang; Jeffrey H. Shapiro; Dirk Englund

2013-11-05T23:59:59.000Z

13

Numerical analysis of decoy state quantum key distribution protocols  

SciTech Connect

Decoy state protocols are a useful tool for many quantum key distribution systems implemented with weak coherent pulses, allowing significantly better secret bit rates and longer maximum distances. In this paper we present a method to numerically find optimal three-level protocols, and we examine how the secret bit rate and the optimized parameters are dependent on various system properties, such as session length, transmission loss, and visibility. Additionally, we show how to modify the decoy state analysis to handle partially distinguishable decoy states as well as uncertainty in the prepared intensities.

Harrington, Jim W [Los Alamos National Laboratory; Rice, Patrick R [Los Alamos National Laboratory

2008-01-01T23:59:59.000Z

14

Analysis and design of a secure key exchange scheme  

Science Conference Proceedings (OSTI)

We propose a new key exchange scheme where the secret key is obtained by multiplying the powers of block upper triangular matrices. After studying the cryptographic properties of these block matrices, the theoretical aspects of this scheme are analyzed, ... Keywords: Block matrices, Cryptography, Discrete logarithm problem, Key exchange scheme, Public key, Quick exponentiation, Security, Triangular matrices

Rafael Álvarez; Leandro Tortosa; José-Fco Vicent; Antonio Zamora

2009-05-01T23:59:59.000Z

15

Documentation of key factors for successful reconstruction of high volume roadways: two case study projects in Michigan  

E-Print Network (OSTI)

The highway system is reaching the end of its design life and requires rehabilitation due to excessive wear and age. Concrete pavement rehabilitation and reconstruction are two of the methods used to extend the service life of roadways. This study identified factors and practices that contributed to the success of highway concrete rehabilitation and reconstruction projects. The research was conducted on four specific topics related to highway projects: constructibility, contracting, scheduling and planning, and construction methods and practices. A comprehensive literature search was conducted to identify key elements that affect the success of highway rehabilitation projects on the above-mentioned areas. The search assisted in the preparation of an interview tool that included a questionnaire designed to gather information related to reconstruction projects aiming to identify and evaluate key success factors. Two highway reconstruction projects were selected for study. The evaluation of the projects was conducted through a series of personal interviews with personnel from the key parties involved in the projects, as well as visits to the construction sites to video and analyze construction operations. The information gathered was evaluated through descriptive analysis.

De Las Casas Moncloa, Rodrigo

2001-01-01T23:59:59.000Z

16

Analysis of the Past and Future Trends of Energy Use in Key Medium- and  

NLE Websites -- All DOE Office Websites (Extended Search)

the Past and Future Trends of Energy Use in Key Medium- and the Past and Future Trends of Energy Use in Key Medium- and Large-Sized Chinese Steel Enterprises, 2000-2030 Title Analysis of the Past and Future Trends of Energy Use in Key Medium- and Large-Sized Chinese Steel Enterprises, 2000-2030 Publication Type Report LBNL Report Number LBNL-6380E Year of Publication 2013 Authors Hasanbeigi, Ali, Zeyi Jiang, and Lynn K. Price Date Published 09/2013 Publisher Lawrence Berkeley National Laboratory Keywords china, decomposition, iron and steel industry, Low Emission & Efficient Industry Abstract The iron and steel industry is one of the most energy-intensive and polluting industries in China. This industry accounted for approximately 27% of China's primary energy use for the manufacturing industry in 2010. Also, China's steel production represented around 47% of the world steel production that year. Hence, reducing energy use and air pollutant emissions from the Chinese steel industry not only has significant implications for China but also for the entire world. For this reason, it is crucial and it is the aim of this study to analyze influential factors that affected the energy use of the steel industry in the past in order to try to quantify the likely effect of those factors in the future.

17

Evaluation criteria for blog design and analysis of causal relationships using factor analysis and DEMATEL  

Science Conference Proceedings (OSTI)

The purpose of this study is to find the key factors influencing blog design, and explore the causal relationships between the criteria for each factor. Since design is a multiple criteria decision-making (MCDM) problem, this study adopts a model which ... Keywords: Blog design, DEMATEL, Factor analysis, Multiple criteria decision-making (MCDM)

Chun-Cheng Hsu

2012-01-01T23:59:59.000Z

18

Time-cost analysis of a quantum key distribution system clocked at 100 MHz  

E-Print Network (OSTI)

We describe the realization of a quantum key distribution (QKD) system clocked at 100 MHz. The system includes classical postprocessing implemented via software, and is operated over a 12 km standard telecommunication dark fiber in a real-world environment. A time-cost analysis of the sifted, error-corrected, and secret key rates relative to the raw key rate is presented, and the scalability of our implementation with respect to higher secret key rates is discussed.

Xiaofan Mo; Itzel Lucio Martinez; Philip Chan; Chris Healey; Steve Hosier; Wolfgang Tittel

2011-05-18T23:59:59.000Z

19

Human Factors Engineering Program Review Model (NUREG-0711)Revision 3: Update Methodology and Key Revisions  

SciTech Connect

The U.S. Nuclear Regulatory Commission (NRC) reviews the human factors engineering (HFE) programs of applicants for nuclear power plant construction permits, operating licenses, standard design certifications, and combined operating licenses. The purpose of these safety reviews is to help ensure that personnel performance and reliability are appropriately supported. Detailed design review procedures and guidance for the evaluations is provided in three key documents: the Standard Review Plan (NUREG-0800), the HFE Program Review Model (NUREG-0711), and the Human-System Interface Design Review Guidelines (NUREG-0700). These documents were last revised in 2007, 2004 and 2002, respectively. The NRC is committed to the periodic update and improvement of the guidance to ensure that it remains a state-of-the-art design evaluation tool. To this end, the NRC is updating its guidance to stay current with recent research on human performance, advances in HFE methods and tools, and new technology being employed in plant and control room design. NUREG-0711 is the first document to be addressed. We present the methodology used to update NUREG-0711 and summarize the main changes made. Finally, we discuss the current status of the update program and the future plans.

OHara J. M.; Higgins, J.; Fleger, S.

2012-07-22T23:59:59.000Z

20

Human Factors Engineering Analysis Tool  

A new software tool enables the easy and quick selection of applicable regulatory guidelines as a starting point for human factors engineering (HFE) analyses.  Once selected, each guideline can be viewed on screen.  The software tracks and reports the ...

Note: This page contains sample records for the topic "analysis key factors" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Variational learning for rectified factor analysis  

Science Conference Proceedings (OSTI)

Linear factor models with non-negativity constraints have received a great deal of interest in a number of problem domains. In existing approaches, positivity has often been associated with sparsity. In this paper we argue that sparsity of the factors ... Keywords: Positive factor analysis, Source separation, Variational Bayes

Markus Harva; Ata Kabán

2007-03-01T23:59:59.000Z

22

Security analysis of the time-coding quantum key distribution protocols  

E-Print Network (OSTI)

We report the security analysis of time-coding quantum key distribution protocols. The protocols make use of coherent single-photon pulses. The key is encoded in the photon time-detection. The use of coherent superposition of states allows to detect eavesdropping of the key. We give a mathematical model of a first protocol from which we derive a second, simpler, protocol. We derive the security analysis of both protocols and find that the secure rates can be similar to those obtained with the BB84 protocol. We then calculate the secure distance for those protocols over standard fibre links. When using low-noise superconducting single photon detectors, secure distances over 200 km can be foreseen. Finally, we analyse the consequences of photon-number splitting attacks when faint pulses are used instead of single photon pulses. A decoy states technique can be used to prevent such attacks.

Thierry Debuisschert; Simon Fossier

2011-08-31T23:59:59.000Z

23

An Instrument for Measuring the Key Factors of Successin Software Process Improvement  

Science Conference Proceedings (OSTI)

Understanding how to implement SPI successfully is arguably the most challenging issue facing the SPI field today. The SPI literature contains many case studies of successful companies and descriptions of their SPI programs. However, there has ... Keywords: Software process improvement, measurement instrument, success factors

Tore Dyba

2000-12-01T23:59:59.000Z

24

A multi-project model of key factors affecting organizational benefits from enterprise systems  

Science Conference Proceedings (OSTI)

This paper develops a long-term, multi-project model of factors affecting organizational benefits from enterprise systems (ES), then reports a preliminary test of the model. In the shorter-term half of the model, it is hypothesized that once a system ... Keywords: IS implementation, IS project management, change management, enterprise system success, functional fit, improved access to information, integration, overcoming organizational inertia, packaged software, process optimization

Peter B. Seddon; Cheryl Calvert; Song Yang

2010-06-01T23:59:59.000Z

25

A Key Review On Exergetic Analysis And Assessment Of Renewable Energy  

Open Energy Info (EERE)

Review On Exergetic Analysis And Assessment Of Renewable Energy Review On Exergetic Analysis And Assessment Of Renewable Energy Resources For A Sustainable Future Jump to: navigation, search GEOTHERMAL ENERGYGeothermal Home Journal Article: A Key Review On Exergetic Analysis And Assessment Of Renewable Energy Resources For A Sustainable Future Details Activities (0) Areas (0) Regions (0) Abstract: Energy resources and their utilization intimately relate to sustainable development. In attaining sustainable development, increasing the energy efficiencies of processes utilizing sustainable energy resources plays an important role. The utilization of renewable energy offers a wide range of exceptional benefits. There is also a link between exergy and sustainable development. A sustainable energy system may be regarded as a

26

Geothermal: Sponsored by OSTI -- Parametric Analysis of the Factors...  

Office of Scientific and Technical Information (OSTI)

Parametric Analysis of the Factors Controlling the Costs of Sedimentary Geothermal Systems - Preliminary Results (Poster)...

27

An Analysis of Bridge Abutment Shear Key Behavior due to Embankment Modeling and Earthquake Intensity  

E-Print Network (OSTI)

Maximum and Minimum Displacement Demands .Shear Key Maximum and Minimum Displacement Demands B Max Minunder 5, the maximum displacement ductility demand specified

Wasef, Nardin Mofid

28

Fukushima Daiichi Accident -- Technical Causal Factor Analysis  

Science Conference Proceedings (OSTI)

On March 11, 2011, the Fukushima Daiichi nuclear power plant experienced a seismic event and subsequent tsunami. The accident and the ensuing mitigation and recovery activities occurred over several days, involved a number of incidents, and might provide several opportunities for lessons learned. The objective of this report is to determine the fundamental causative factors for the loss of critical systems at the Fukushima Daiichi reactors that resulted in core damage and subsequent radioactive release. ...

2012-03-27T23:59:59.000Z

29

Failure Impact Analysis of Key Management in AMI Using Cybernomic Situational Assessment (CSA)  

SciTech Connect

In earlier work, we presented a computational framework for quantifying the security of a system in terms of the average loss a stakeholder stands to sustain as a result of threats to the system. We named this system, the Cyberspace Security Econometrics System (CSES). In this paper, we refine the framework and apply it to cryptographic key management within the Advanced Metering Infrastructure (AMI) as an example. The stakeholders, requirements, components, and threats are determined. We then populate the matrices with justified values by addressing the AMI at a higher level, rather than trying to consider every piece of hardware and software involved. We accomplish this task by leveraging the recently established NISTR 7628 guideline for smart grid security. This allowed us to choose the stakeholders, requirements, components, and threats realistically. We reviewed the literature and selected an industry technical working group to select three representative threats from a collection of 29 threats. From this subset, we populate the stakes, dependency, and impact matrices, and the threat vector with realistic numbers. Each Stakeholder s Mean Failure Cost is then computed.

Abercrombie, Robert K [ORNL; Sheldon, Frederick T [ORNL; Hauser, Katie R [ORNL; Lantz, Margaret W [ORNL; Mili, Ali [New Jersey Insitute of Technology

2013-01-01T23:59:59.000Z

30

Sequence analysis of chromatin immunoprecipitation data for factors  

E-Print Network (OSTI)

Chromatin immunoprecipitation (ChIP) experiments allow the location of transcription factors to be determined across the genome. Subsequent analysis of the sequences of the identified regions allows binding to be localized ...

MacIsaac, Kenzie Daniel

31

Conditioning analysis of incomplete Cholesky factorizations with orthogonal dropping  

SciTech Connect

The analysis of preconditioners based on incomplete Cholesky factorization in which the neglected (dropped) components are orthogonal to the approximations being kept is presented. General estimate for the condition number of the preconditioned system is given which only depends on the accuracy of individual approximations. The estimate is further improved if, for instance, only the newly computed rows of the factor are modified during each approximation step. In this latter case it is further shown to be sharp. The analysis is illustrated with some existing factorizations in the context of discretized elliptic partial differential equations.

Napov, Artem

2012-03-16T23:59:59.000Z

32

Key Outcomes:  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

INDIAN COUNTRY ENERGY AND INFRASTRUCTURE WORKING GROUP ICEIWG Key Points & Action Items Inaugural Meeting Thursday, August 25, 2011 Renaissance Denver Hotel Denver, Colorado...

33

KEY PERSONNEL  

National Nuclear Security Administration (NNSA)

APPENDIX J KEY PERSONNEL 07032013 TITLE NAME President Christopher C. Gentile Vice President, Operations Robin Stubenhofer Director, Sr. Program Management Rick Lavelock...

34

Key Documents  

Science Conference Proceedings (OSTI)

AOCS by-laws, code of ethics and anti trust policy established during our 100+ legacy. Key Documents AOCS History and Governance about us aocs committees contact us division council fats governing board history oils professionals science value cen

35

Analysis of IFR driver fuel hot channel factors  

Science Conference Proceedings (OSTI)

Thermal-hydraulic uncertainty factors for Integral Fast Reactor (IFR) driver fuels have been determined based primarily on the database obtained from the predecessor fuels used in the IFR prototype, Experimental Breeder Reactor II. The uncertainty factors were applied to the channel factors (HCFs) analyses to obtain separate overall HCFs for fuel and cladding for steady-state analyses. A ``semistatistical horizontal method`` was used in the HCFs analyses. The uncertainty factor of the fuel thermal conductivity dominates the effects considered in the HCFs analysis; the uncertainty in fuel thermal conductivity will be reduced as more data are obtained to expand the currently limited database for the IFR ternary metal fuel (U-20Pu-10Zr). A set of uncertainty factors to be used for transient analyses has also been derived.

Ku, J.Y.; Chang, L.K.; Mohr, D.

1994-03-01T23:59:59.000Z

36

Key Outcomes:  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Key Points & Action Items Key Points & Action Items Inaugural Meeting Thursday, August 25, 2011 Renaissance Denver Hotel Denver, Colorado Participants Tracey LeBeau, Director, Pilar Thomas, Deputy Director, and Brandt Petrasek, Special Assistant, Department of Energy, Office of Indian Energy Policy and Programs; Vice Chairman Ronald Suppah and Jim Manion, Confederated Tribes of the Warm Springs Reservation of Oregon; William Micklin, Ewiiaapaayp Band of Kumeyaay Indians; Councilman Barney Enos, Jr., Jason Hauter, Gila River Indian Community; Mato Standing High, Rosebud Sioux Tribe; R. Allen Urban, Yocha Dehe Wintun Nation; Glen Andersen, Scott Hendrick, Brooke Oleen, Jacquelyn Pless, Jim Reed and Julia Verdi, National Conference of State Legislatures-staff

37

Analysis Of Factors Affecting Natural Source Slf Electromagnetic  

Open Energy Info (EERE)

Factors Affecting Natural Source Slf Electromagnetic Factors Affecting Natural Source Slf Electromagnetic Exploration At Geothermal Wells Jump to: navigation, search GEOTHERMAL ENERGYGeothermal Home Journal Article: Analysis Of Factors Affecting Natural Source Slf Electromagnetic Exploration At Geothermal Wells Details Activities (0) Areas (0) Regions (0) Abstract: The Super Low Frequency (SLF) electromagnetic exploration was performed by using a nature source SLF electromagnetic detector at two geothermal wells in Peking University. The data of the SLF electromagnetic exploration at well JR-119 and JR-168 were obtained with the observation of continued five days and four times per day at well JR-119 and of one day at well JR-168. Based on these data, the influencing factors of the SI-F electromagnetic exploration were analyzed, which included the relationship

38

An analysis of factors contributing to train-involved crashes  

E-Print Network (OSTI)

A railroad-highway grade crossing is a unique intersection in that two different modes of transportation (trains and vehicles) use the same physical space. Many factors can contribute to collisions between trains and vehicles at these crossings. Crashes involving trains and vehicles are a significant safety problem in Texas each year. This research attempts to identify and analyze contributing factors to train-involved accidents in Texas. Three years of accident data (1328 total accidents) were analyzed for the contributing factors. The contributing factors were classified into four categories: railroad factors, environmental factors, roadway factors, and driver/passenger factors. The accident data was analyzed using one and two-way classification tables. The frequency distributions for the accidents included in this study were compared to the corresponding frequency distributions for national or statewide accidents using a Chi-Square statistical test. Finally, research hypotheses were formulated based on a literature review of driver behavior and previous accident studies and then tested using population proportion tests. The results of the identification of contributing factors showed that tried to beat train, impaired driver, stuck, stalled, or stopped on tracks, driving around gates, and driver inattention were the five most frequent primary contributing factors. The Chi-Square comparison of frequency distributions for accidents included in this study showed that the protection type, time of day, light conditions, driver race and sex, accident severity, location type, and roadway class were statistically different compared to the corresponding national and statewide frequency distributions. The analysis of the research hypotheses showed that hypotheses 3, 8, and 10 were supported according to the population proportion testing.

Cooner, Scott Allen

1995-01-01T23:59:59.000Z

39

Performance analysis of parallel supernodal sparse LU factorization  

Science Conference Proceedings (OSTI)

We investigate performance characteristics for the LU factorization of large matrices with various sparsity patterns. We consider supernodal right-looking parallel factorization on a bi-dimensional grid of processors, making use of static pivoting. We develop a performance model and we validate it using the implementation in SuperLU-DIST, the real matrices and the IBM Power3 machine at NERSC. We use this model to obtain performance bounds on parallel computers, to perform scalability analysis and to identify performance bottlenecks. We also discuss the role of load balance and data distribution in this approach.

Grigori, Laura; Li, Xiaoye S.

2004-02-05T23:59:59.000Z

40

Method for factor analysis of GC/MS data  

Science Conference Proceedings (OSTI)

The method of the present invention provides a fast, robust, and automated multivariate statistical analysis of gas chromatography/mass spectroscopy (GC/MS) data sets. The method can involve systematic elimination of undesired, saturated peak masses to yield data that follow a linear, additive model. The cleaned data can then be subjected to a combination of PCA and orthogonal factor rotation followed by refinement with MCR-ALS to yield highly interpretable results.

Van Benthem, Mark H; Kotula, Paul G; Keenan, Michael R

2012-09-11T23:59:59.000Z

Note: This page contains sample records for the topic "analysis key factors" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Analysis and design of a high power factor, single-stage electronic dimming ballast  

SciTech Connect

This paper presents the analysis, design, and practical consideration of a single-stage electronic dimming ballast with unity power factor. The power stage of the ballast is derived from combining a buck-boost converter and a half-bridge series-resonant parallel-loaded inverter (SRPLI). With the plasma model of the lamp, the analysis of the ballast is carried out, from which the key equations used for dimming control are derived. Starting performance and dimming consideration are also addressed in the paper. In this dimming ballast, both pulsewidth modulation (PWM) and variable-frequency control strategies are employed. The discussed ballast with the controls can save a controller and a switch driver, reduce size and cost, and possibly increase system reliability over conventional two-stage systems in the applications with moderate power level. Simulated and experimental results of the ballast for an OSRAM T8 32-W lamp are used to verify the discussion.

Wu, T.F.; Yu, T.H. [National Chung Cheng Univ., Chia-Yi (Taiwan, Province of China)

1998-05-01T23:59:59.000Z

42

Real-Time Extraction and Analysis of Key Morphological Features in the Electrocardiogram, for Data Compression and Clinical Decision Support  

E-Print Network (OSTI)

Massive amounts of clinical data can now be collected by stand-alone or wearable monitors over extended periods of time. One key challenge is to convert the volumes of raw data into clinically relevant and actionable ...

Gordhandas, Ankit

43

Analysis of a rate-adaptive reconciliation protocol and the effect of the leakage on the secret key rate  

E-Print Network (OSTI)

Quantum key distribution performs the trick of growing a secret key in two distant places connected by a quantum channel. The main reason is that the legitimate users can bound the information gathered by the eavesdropper. In practical systems, whether because of finite resources or external conditions, the quantum channel is subject to fluctuations. A rate adaptive information reconciliation protocol, that adapts to the changes in the communication channel, is then required to minimize the leakage of information in the classical postprocessing. We consider here the leakage of a rate-adaptive information reconciliation protocol. The length of the exchanged messages is larger than that of an optimal protocol; however, we prove that the min-entropy reduction is limited. The simulation results, both on the asymptotic and in the finite-length regime, show that this protocol allows to increase the amount of distillable secret key.

David Elkouss; Jesus Martinez-Mateo; Vicente Martin

2013-04-11T23:59:59.000Z

44

Parametric Analysis of the Factors Controlling the Costs of Sedimentar...  

NLE Websites -- All DOE Office Websites (Extended Search)

Several additional studies were conducted to explore the sensitivity of sedimentary geothermal system costs to key assumptions in the base case model. 1. Decreased Drilling Costs...

45

Preliminary Review of Models, Assumptions, and Key Data used in Performance Assessments and Composite Analysis at the Idaho National Laboratory  

SciTech Connect

This document is in response to a request by Ming Zhu, DOE-EM to provide a preliminary review of existing models and data used in completed or soon to be completed Performance Assessments and Composite Analyses (PA/CA) documents, to identify codes, methodologies, main assumptions, and key data sets used.

Arthur S. Rood; Swen O. Magnuson

2009-07-01T23:59:59.000Z

46

A Study on the Contribution of 12 Key-Factors to the Growth Rates of the Region of the East Macedonia-Thrace EMTH by Using a Neural Network Model  

Science Conference Proceedings (OSTI)

This study gives a new methodological framework regarding the measuring of the contribution of some key-factors on the regional growth rate and forecasting the future development rates, based on Neural Network Models NN Models. It's a serious attempt ... Keywords: East Macedonia, Future Forecasting, Neural Networks NN, Regional Gross Domestic Product, Regional Growth Rate, Time Series

E. Stathakis; M. Hanias; P. Antoniades; L. Magafas; D. Bandekas

2012-01-01T23:59:59.000Z

47

Crypto Key Management Framework  

Science Conference Proceedings (OSTI)

... A Framework for Designing Cryptographic Key Management Systems ... A Framework for Designing Cryptographic Key Management Systems ...

2013-08-13T23:59:59.000Z

48

Catalogue of OSD and HID Offshore Research by Key Human Factor Elements – 2002 Revision. Prepared by AEA Technology Environment for the Health and Safety Executive  

E-Print Network (OSTI)

The catalogue of OSD and HID Offshore human factors research was conceived by HSE OSD OD6 as an aid to OSD Inspectors and the offshore Industry. It was originally published in 1999 under Project 3696. This catalogue has now been updated by AEA Technology Environment. OSD Offshore has been renamed HID Offshore and hence the catalogue contains both OSD and HID Offshore human factors research, although the majority of the projects included date from the HSE Offshore Safety Division era. The catalogue provides: • description of the human factor elements as derived by AEA Technology from the Revision

Angela Crosbie; Fiona Davies

2002-01-01T23:59:59.000Z

49

Human Factors Considerations in New Nuclear Power Plants: Detailed Analysis.  

Science Conference Proceedings (OSTI)

This Nuclear Regulatory Commission (NRC) sponsored study has identified human-performance issues in new and advanced nuclear power plants. To identify the issues, current industry developments and trends were evaluated in the areas of reactor technology, instrumentation and control technology, human-system integration technology, and human factors engineering (HFE) methods and tools. The issues were organized into seven high-level HFE topic areas: Role of Personnel and Automation, Staffing and Training, Normal Operations Management, Disturbance and Emergency Management, Maintenance and Change Management, Plant Design and Construction, and HFE Methods and Tools. The issues where then prioritized into four categories using a 'Phenomena Identification and Ranking Table' methodology based on evaluations provided by 14 independent subject matter experts. The subject matter experts were knowledgeable in a variety of disciplines. Vendors, utilities, research organizations and regulators all participated. Twenty issues were categorized into the top priority category. This Brookhaven National Laboratory (BNL) technical report provides the detailed methodology, issue analysis, and results. A summary of the results of this study can be found in NUREG/CR-6947. The research performed for this project has identified a large number of human-performance issues for new control stations and new nuclear power plant designs. The information gathered in this project can serve as input to the development of a long-term strategy and plan for addressing human performance in these areas through regulatory research. Addressing human-performance issues will provide the technical basis from which regulatory review guidance can be developed to meet these challenges. The availability of this review guidance will help set clear expectations for how the NRC staff will evaluate new designs, reduce regulatory uncertainty, and provide a well-defined path to new nuclear power plant licensing.

OHara,J.; Higgins, J.; Brown, W.; Fink, R.

2008-02-14T23:59:59.000Z

50

BUDGET KEY DATES  

Science Conference Proceedings (OSTI)

BUDGET KEY DATES. For Immediate Release: December 15, 2009. Contact: Diane Belford 301-975-8400. Budget Key Dates.

2013-06-16T23:59:59.000Z

51

Using hardware vulnerability factors to enhance AVF analysis  

Science Conference Proceedings (OSTI)

Fault tolerance is now a primary design constraint for all major microprocessors. One step in determining a processor's compliance to its failure rate target is measuring the Architectural Vulnerability Factor (AVF) of each on-chip structure. The AVF ... Keywords: architectural vulnerability factor, fault tolerance, reliability

Vilas Sridharan; David R. Kaeli

2010-06-01T23:59:59.000Z

52

NREL: Energy Analysis - Utility-Scale Energy Technology Capacity Factors  

NLE Websites -- All DOE Office Websites (Extended Search)

Utility-Scale Energy Technology Capacity Factors Utility-Scale Energy Technology Capacity Factors This chart indicates the range of recent capacity factor estimates for utility-scale renewable energy technologies. The dots indicate the average, and the vertical lines represent the range: Average +1 standard deviation and average -1 standard deviation. If you are seeking utility-scale technology cost and performance estimates, please visit the Transparent Cost Database website for NREL's information regarding vehicles, biofuels, and electricity generation. Capital Cost (September 2013 Update) Operations & Maintenance (September 2013 Update) Utility-Scale Capacity Factors Useful Life Land Use by System Technology LCOE Calculator Capacity factor for energy technologies. For more information, please download supporting data for energy technology costs.

53

Fuel Cell Technologies Office: Key Activities  

NLE Websites -- All DOE Office Websites (Extended Search)

Key Activities to Key Activities to someone by E-mail Share Fuel Cell Technologies Office: Key Activities on Facebook Tweet about Fuel Cell Technologies Office: Key Activities on Twitter Bookmark Fuel Cell Technologies Office: Key Activities on Google Bookmark Fuel Cell Technologies Office: Key Activities on Delicious Rank Fuel Cell Technologies Office: Key Activities on Digg Find More places to share Fuel Cell Technologies Office: Key Activities on AddThis.com... Key Activities Plans, Implementation, & Results Accomplishments Organization Chart & Contacts Quick Links Hydrogen Production Hydrogen Delivery Hydrogen Storage Fuel Cells Technology Validation Manufacturing Codes & Standards Education Systems Analysis Contacts Key Activities The Fuel Cell Technologies Office conducts work in several key areas to

54

On multi-column foreign key discovery  

Science Conference Proceedings (OSTI)

A foreign/primary key relationship between relational tables is one of the most important constraints in a database. From a data analysis perspective, discovering foreign keys is a crucial step in understanding and working with the data. Nevertheless, ...

Meihui Zhang; Marios Hadjieleftheriou; Beng Chin Ooi; Cecilia M. Procopiuc; Divesh Srivastava

2010-09-01T23:59:59.000Z

55

Analysis, design, and experiments of a high-power-factor electronic ballast  

SciTech Connect

A charge pump power-factor-correction (CPPFC) converter is first derived, and its unity power factor condition is then reviewed. A single-stage power-factor-correction electronic ballast using the charge pump concept is analyzed. The design criteria are derived to optimize the electronic ballast based on the steady-state analysis. Constant lamp power operations associated with its control are also discussed. Large signal simulation and experimental results verify the theoretical analysis. It is shown that the designed electronic ballast has 0.995 power factor and 5% total harmonic distortion (THD) with lamp power variation within {+-}15% when the line input voltage changes {+-}10%.

Qian, J.; Lee, F.C. [Virginia Polytechnic Inst. and State Univ., Blacksburg, VA (United States); Yamauchi, T. [Matsushita Electric Works, Inc., Woburn, MA (United States)

1998-05-01T23:59:59.000Z

56

Cognitive factors in perspective-based reading (PBR): A protocol analysis study  

Science Conference Proceedings (OSTI)

The following study investigated cognitive factors involved in applying the Perspective-Based Reading (PBR) technique for defect detection in software inspections. Using the protocol analysis technique from cognitive science, the authors coded concurrent ...

Bryan Robbins; Jeff Carver

2009-10-01T23:59:59.000Z

57

Human Reliability Analysis for Design: Using Reliability Methods for Human Factors Issues  

SciTech Connect

This paper reviews the application of human reliability analysis methods to human factors design issues. An application framework is sketched in which aspects of modeling typically found in human reliability analysis are used in a complementary fashion to the existing human factors phases of design and testing. The paper provides best achievable practices for design, testing, and modeling. Such best achievable practices may be used to evaluate and human system interface in the context of design safety certifications.

Ronald Laurids Boring

2010-11-01T23:59:59.000Z

58

System analysis approach for the identification of factors driving crude oil prices  

Science Conference Proceedings (OSTI)

A system analysis approach is proposed to identify the main factors driving international crude oil prices by integrating a partial least squares model, an vector error correction model and the directed acyclic graph method. The different mechanisms ... Keywords: Crude oil price, DAG, Driving factors, Financial crisis, VECM

Qiang Ji

2012-11-01T23:59:59.000Z

59

Group key management  

SciTech Connect

This report describes an architecture and implementation for doing group key management over a data communications network. The architecture describes a protocol for establishing a shared encryption key among an authenticated and authorized collection of network entities. Group access requires one or more authorization certificates. The implementation includes a simple public key and certificate infrastructure. Multicast is used for some of the key management messages. An application programming interface multiplexes key management and user application messages. An implementation using the new IP security protocols is postulated. The architecture is compared with other group key management proposals, and the performance and the limitations of the implementation are described.

Dunigan, T.; Cao, C.

1997-08-01T23:59:59.000Z

60

The monitoring and control of TRUEX processes. Volume 1, The use of sensitivity analysis to determine key process variables and their control bounds  

SciTech Connect

The Generic TRUEX Model (GTM) was used to design a flowsheet for the TRUEX solvent extraction process that would be used to determine its instrumentation and control requirements. Sensitivity analyses of the key process variables, namely, the aqueous and organic flow rates, feed compositions, and the number of contactor stages, were carried out to assess their impact on the operation of the TRUEX process. Results of these analyses provide a basis for the selection of an instrument and control system and the eventual implementation of a control algorithm. Volume Two of this report is an evaluation of the instruments available for measuring many of the physical parameters. Equations that model the dynamic behavior of the TRUEX process have been generated. These equations can be used to describe the transient or dynamic behavior of the process for a given flowsheet in accordance with the TRUEX model. Further work will be done with the dynamic model to determine how and how quickly the system responds to various perturbations. The use of perturbation analysis early in the design stage will lead to a robust flowsheet, namely, one that will meet all process goals and allow for wide control bounds. The process time delay, that is, the speed with which the system reaches a new steady state, is an important parameter in monitoring and controlling a process. In the future, instrument selection and point-of-variable measurement, now done using the steady-state results reported here, will be reviewed and modified as necessary based on this dynamic method of analysis.

Regalbuto, M.C.; Misra, B.; Chamberlain, D.B.; Leonard, R.A.; Vandegrift, G.F.

1992-04-01T23:59:59.000Z

Note: This page contains sample records for the topic "analysis key factors" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

KIDS: keyed intrusion detection system  

Science Conference Proceedings (OSTI)

Since most current network attacks happen at the application layer, analysis of packet payload is necessary for their detection. Unfortunately malicious packets may be crafted to mimic normal payload, and so avoid detection if the anomaly detection method ... Keywords: Kerckhoffs' principle, anomaly detection, keyed IDS, network intrusion detection, word model

Sasa Mrdovic; Branislava Drazenovic

2010-07-01T23:59:59.000Z

62

Using Factor Analysis to Attribute Health Impacts to Particulate Pollution Sources1  

NLE Websites -- All DOE Office Websites (Extended Search)

Factor Analysis to Attribute Health Impacts to Particulate Factor Analysis to Attribute Health Impacts to Particulate Pollution Sources 1 Thomas Grahame U. S. Department of Energy Washington, DC George Hidy Envair/Aerochem Placitas, NM ABSTRACT Laden et al. (2000) recently reported results of applying factor analysis to data taken in six cities from1979 to1988, identifying airborne particle sources potentially affecting daily mortality. These authors sought relationships between source groups and risk measures using source tracer elements, Se (coal combustion), Pb (light duty motor vehicle sources), and Si (crustal--soil dispersion). Combined data analyses of this kind may overlook the complexity of source contributions, which have common tracer elements. In one of the cities, Boston for example, the authors found coal combustion

63

Crypto Key Management Framework  

Science Conference Proceedings (OSTI)

... responsible to executive-level management (eg, the Chief Information Officer) for the ... entity information, keys, and metadata into a database used by ...

2013-08-15T23:59:59.000Z

64

The Key Agreement Schemes  

Science Conference Proceedings (OSTI)

... The three key derivation functions include KDF in Counter Mode, KDF in Feedback Mode, and KDF in Double-Pipeline Iteration Mode. ...

2013-04-23T23:59:59.000Z

65

Cryptographic Key Management Workshop 2010  

Science Conference Proceedings (OSTI)

Cryptographic Key Management Workshop 2010. Purpose: ... Related Project(s): Cryptographic Key Management Project. Details: ...

2013-08-01T23:59:59.000Z

66

Human factors evaluation of teletherapy: Training and organizational analysis. Volume 4  

Science Conference Proceedings (OSTI)

A series of human factors evaluations were undertaken to better understand the contributing factors to human error in the teletherapy environment. Teletherapy is a multidisciplinary methodology for treating cancerous tissue through selective exposure to an external beam of ionizing radiation. A team of human factors specialists, assisted by a panel of radiation oncologists, medical physicists, and radiation therapists, conducted site visits to radiation oncology departments at community hospitals, university centers, and free-standing clinics. A function and task analysis was initially performed to guide subsequent evaluations in the areas of system-user interfaces, procedures, training and qualifications, and organizational policies and practices. The present work focuses solely on training and qualifications of personnel (e.g., training received before and during employment), and the potential impact of organizational factors on the performance of teletherapy. Organizational factors include such topics as adequacy of staffing, performance evaluations, commonly occurring errors, implementation of quality assurance programs, and organizational climate.

Henriksen, K.; Kaye, R.D.; Jones, R. [Hughes Training, Inc., Falls Church, VA (United States); Morisseau, D.S.; Serig, D.I. [Nuclear Regulatory Commission, Washington, DC (United States). Div. of Systems Technology

1995-07-01T23:59:59.000Z

67

Parametric Analysis of the Factors Controlling the Costs of Sedimentary Geothermal Systems - Preliminary Results (Poster)  

SciTech Connect

Parametric analysis of the factors controlling the costs of sedimentary geothermal systems was carried out using a modified version of the Geothermal Electricity Technology Evaluation Model (GETEM). The sedimentary system modeled assumed production from and injection into a single sedimentary formation.

Augustine, C.

2013-10-01T23:59:59.000Z

68

Energy Price Indices and Discount Factors for Life-Cycle Cost Analysis- 2012  

Energy.gov (U.S. Department of Energy (DOE))

Report provides tables of present-value factors for use in the life-cycle cost analysis of capital investment projects for federal facilities. It also provides energy price indices based on the U.S. Department of Energy (DOE) forecasts from 2012 to 2042.

69

Optical key system  

Science Conference Proceedings (OSTI)

An optical key system comprises a battery-operated optical key and an isolated lock that derives both its operating power and unlock signals from the correct optical key. A light emitting diode or laser diode is included within the optical key and is connected to transmit a bit-serial password. The key user physically enters either the code-to-transmit directly, or an index to a pseudorandom number code, in the key. Such person identification numbers can be retained permanently, or ephemeral. When a send button is pressed, the key transmits a beam of light modulated with the password information. The modulated beam of light is received by a corresponding optical lock with a photovoltaic cell that produces enough power from the beam of light to operate a password-screen digital logic. In one application, an acceptable password allows a two watt power laser diode to pump ignition and timing information over a fiberoptic cable into a sealed engine compartment. The receipt of a good password allows the fuel pump, spark, and starter systems to each operate. Therefore, bypassing the lock mechanism as is now routine with automobile thieves is pointless because the engine is so thoroughly disabled.

Hagans, K.G.; Clough, R.E.

2000-04-25T23:59:59.000Z

70

Optical key system  

DOE Patents (OSTI)

An optical key system comprises a battery-operated optical key and an isolated lock that derives both its operating power and unlock signals from the correct optical key. A light emitting diode or laser diode is included within the optical key and is connected to transmit a bit-serial password. The key user physically enters either the code-to-transmit directly, or an index to a pseudorandom number code, in the key. Such person identification numbers can be retained permanently, or ephemeral. When a send button is pressed, the key transmits a beam of light modulated with the password information. The modulated beam of light is received by a corresponding optical lock with a photovoltaic cell that produces enough power from the beam of light to operate a password-screen digital logic. In one application, an acceptable password allows a two watt power laser diode to pump ignition and timing information over a fiberoptic cable into a sealed engine compartment. The receipt of a good password allows the fuel pump, spark, and starter systems to each operate. Therefore, bypassing the lock mechanism as is now routine with automobile thieves is pointless because the engine is so thoroughly disabled.

Hagans, Karla G. (Livermore, CA); Clough, Robert E. (Danville, CA)

2000-01-01T23:59:59.000Z

71

Method for exploiting bias in factor analysis using constrained alternating least squares algorithms  

DOE Patents (OSTI)

Bias plays an important role in factor analysis and is often implicitly made use of, for example, to constrain solutions to factors that conform to physical reality. However, when components are collinear, a large range of solutions may exist that satisfy the basic constraints and fit the data equally well. In such cases, the introduction of mathematical bias through the application of constraints may select solutions that are less than optimal. The biased alternating least squares algorithm of the present invention can offset mathematical bias introduced by constraints in the standard alternating least squares analysis to achieve factor solutions that are most consistent with physical reality. In addition, these methods can be used to explicitly exploit bias to provide alternative views and provide additional insights into spectral data sets.

Keenan, Michael R. (Albuquerque, NM)

2008-12-30T23:59:59.000Z

72

Energy Price Indices and Discount Factors for Life-Cycle Cost Analysis - 2010  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5 5 (Rev. 5/10) Energy Price Indices and Discount Factors for Life-Cycle Cost Analysis - 2010 Annual Supplement to Amy S. Rushing NIST Handbook 135 and Joshua D. Kneifel NBS Special Publication 709 Barbara C. Lippiatt U.S. DEPARTMENT OF COMMERCE Technology Administration National Institute of Standards and Technology Prepared for United States Department of Energy Federal Energy Management Program April 2005 May 2010 ENERGY PRICE INDICES AND DISCOUNT FACTORS FOR LIFE-CYCLE COST ANALYSIS Annual Supplement to NIST Handbook 135 and NBS Special Publication 709 April 1, 2010 to March 31, 2011 Data for the Federal Methodology for Life-Cycle Cost Analysis, Title 10, CFR, Part 436, Subpart A; and for the Energy Conservation Mandatory Performance Standards for New Federal Residential Buildings,

73

Energy Price Indices and Discount Factors for Life-Cycle Cost Analysis - 2011  

NLE Websites -- All DOE Office Websites (Extended Search)

April 2005 April 2005 NISTIR 85-3273-26 (Rev. 9/11) Energy Price Indices and Discount Factors for Life-Cycle Cost Analysis - 2011 Annual Supplement to Amy S. Rushing NIST Handbook 135 and Joshua D. Kneifel NBS Special Publication 709 Barbara C. Lippiatt U.S. DEPARTMENT OF COMMERCE Technology Administration National Institute of Standards and Technology Prepared for United States Department of Energy Federal Energy Management Program September 2011 NISTIR 85-3273-26 ENERGY PRICE INDICES AND DISCOUNT FACTORS FOR LIFE-CYCLE COST ANALYSIS Annual Supplement to NIST Handbook 135 and NBS Special Publication 709 April 1, 2011 to March 31, 2012 Data for the Federal Methodology for Life-Cycle Cost Analysis, Title 10, CFR, Part 436, Subpart A; and for the Energy Conservation Mandatory Performance Standards for New Federal Residential Buildings,

74

SR Key Facts  

NLE Websites -- All DOE Office Websites (Extended Search)

Key Facts Savannah River Site Budget FY 2011 Budget Summary FY 2011 SRS EM Program Budget Summary FY 2012 Presidential Budget Request for SRS FY 2014 SRS EM Budget Presentation...

75

Key masking using biometry  

Science Conference Proceedings (OSTI)

We construct an abstract model based on a fundamental similarity property, which takes into account parametric dependencies and reflects a specific collection of requirements. We consider a method for masking a cryptographic key using biometry, which ...

A. L. Chmora

2011-06-01T23:59:59.000Z

76

Key Emergency Information  

NLE Websites -- All DOE Office Websites (Extended Search)

Key Emergency Information What to Do if an Emergency Arises DOE is committed to public safety in the event an emergency arises. You will likely be made aware that an emergency is...

77

ARM - Key Science Questions  

NLE Websites -- All DOE Office Websites (Extended Search)

govScienceKey Science Questions govScienceKey Science Questions Science Research Themes Research Highlights Journal Articles Collaborations Atmospheric System Research (ASR) ARM Science Team Meetings User Meetings Annual Meetings of the Atmospheric System Research (ASR) Science Team and Fall Working Groups Accomplishments Read about the 20 years of accomplishments (PDF, 696KB) from the ARM Program and user facility. Performance Metrics ASR Metrics 2009 2008 2007 2006 Key Science Questions The role of clouds and water vapor in climate change is not well understood; yet water vapor is the largest greenhouse gas and directly affects cloud cover and the propagation of radiant energy. In fact, there may be positive feedback between water vapor and other greenhouse gases. Carbon dioxide and other gases from human activities slightly warm the

78

Energy Price Indices and Discount Factors for Life-Cycle Cost Analysis-2013  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8 8 Energy Price Indices and Discount Factors for Life-Cycle Cost Analysis - 2013 Annual Supplement to NIST Handbook 135 and NBS Special Publication 709 Amy S. Rushing Joshua D. Kneifel Barbara C. Lippiatt http://dx.doi.org/10.6028/NIST.IR.85-3273-28 U.S. DEPARTMENT OF COMMERCE Technology Administration National Institute of Standards and Technology Prepared for United States Department of Energy Federal Energy Management Program April 2005 NISTIR 85-3273-28 Energy Price Indices and Discount Factors for Life-Cycle Cost Analysis - 2013 Annual Supplement to NIST Handbook 135 and NBS Special Publication 709 Amy S. Rushing Joshua D. Kneifel Barbara C. Lippiatt Applied Economics Office Engineering Laboratory http://dx.doi.org/10.6028/NIST.IR.85-3273-28

79

Energy Price Indices and Discount Factors for Life-Cycle Cost Analysis - 2012  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7 7 Energy Price Indices and Discount Factors for Life-Cycle Cost Analysis - 2012 Annual Supplement to NIST Handbook 135 and NBS Special Publication 709 Amy S. Rushing Joshua D. Kneifel Barbara C. Lippiatt http://dx.doi.org/10.6028/NIST.IR.85-3273-27 U.S. DEPARTMENT OF COMMERCE Technology Administration National Institute of Standards and Technology Prepared for United States Department of Energy Federal Energy Management Program April 2005 NISTIR 85-3273-27 Energy Price Indices and Discount Factors for Life-Cycle Cost Analysis - 2012 Annual Supplement to NIST Handbook 135 and NBS Special Publication 709 Amy S. Rushing Joshua D. Kneifel Barbara C. Lippiatt Applied Economics Office Engineering Laboratory http://dx.doi.org/10.6028/NIST.IR.85-3273-27

80

Key Research Results Achievement  

E-Print Network (OSTI)

daylighting options for specific spaces with sample design layouts · Various HVAC system types that achieve%energysavingsovercode.NREL developedthesimulationtoolsandledthe committeethatproducedtheguides. Key Result TheAdvanced school in Greensburg, Kansas, used many of the energy efficiency measures outlined in the Advanced Energy

Note: This page contains sample records for the topic "analysis key factors" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Quantum Key Distribution  

Science Conference Proceedings (OSTI)

... resulting in a pattern of light and dark lines ... whether the time is in seconds or days: factoring was ... decrypts to 'CAT', or 'TPW', which decrypts to 'DOG'. ...

2007-10-26T23:59:59.000Z

82

Analysis of Instabilities and Their Impact on Friction Factor in Hole-Pattern Seals  

E-Print Network (OSTI)

The determination of the leakage and consequently the friction factor is an important part of analyzing the flow through a seal. This is done experimentally by means of a flat plate tester, which allows for the simplified representation of the seal pattern on a flat plate surface tested under a range of clearances and pressure drops. The setup mounts a smooth plate opposite a second plate which may be smooth or have a roughened surface while the separation between plates is held constant. The present study analyzes the phenomenon of friction factor 'upset' ? wherein it was seen that as the pressure drop across the parallel plates is increased, there is a sudden increase in the friction factor (i.e. a decrease in flow rate) at a certain Reynolds number and for any further increase in the pressure differential, the friction factor shows the expected trend and decreases slowly. This phenomenon was initially believed to be an anomaly in the rig and was attributed to choking at an upstream flow control valve. The present author differs from that view and hypothesized that the reason for the abrupt change is linked to the flow mechanics of the system and the current study analyzes the same. Preliminary analysis of available data has established that the cause for the 'upset' was not related to the switch from a normal mode resonance driven by the Helmholtz frequency of the cavities on the stator to a shear layer instability, as was seen earlier by Ha. The friction factor jump for this case is therefore proposed to be due to a change of the instability modes as the fluid passes over the cavities in the plate. A detailed analysis of the physics of the flow will be carried out via a numerical simulation using a Large Eddy Simulation (LES) model from ANSYS Fluent. Results will be validated through comparisons with experimental data from the flat plate test rig.

Sekaran, Aarthi 1985-

2012-12-01T23:59:59.000Z

83

Evaluation of factors affecting the analysis of metals using laser-induced breakdown spectroscopy  

SciTech Connect

Some of the main factors affecting the analysis of solid steel using laser-induced break-down spectroscopy (LIBS) have been investigated and are reported here. Pulses from an electro-optically Q-switched Nd:YAG laser were focused on steel samples to generate a high temperature plasma. The spectrally resolved plasma light was time resolved and detected using a photodiode array. The effects that changes in the lens-to-sample distance, laser pulse energy, and position of the imaging lens had on the LIBS analysis are described. These effects were minimized by ratioing the absolute element signals to adjacent Fe-lines. Calibration curves for Mn, Si, and Cr are presented and the accuracy and precision of LIBS analysis listed for several elements. 12 refs.

Cremers, D.A.; Romero, D.J.

1986-01-01T23:59:59.000Z

84

AP Key Accomplishments  

NLE Websites -- All DOE Office Websites (Extended Search)

Recent Key Accomplishments Recent Key Accomplishments Reduction of Carbon Dioxide Mechanistic insight into CO2 hydrogenation Rapid Transfer of Hydride Ion from a Ruthenium Complex to C1 Species in Water Reversible Hydrogen Storage using CO2 and a Proton-Switchable Iridium Catalyst in Aqueous Media Nickel(II) Macrocycles: Highly Efficient Electrocatalysts for the Selective Reduction of CO2 to CO Calculation of Thermodynamic Hydricities and the Design of Hydride Donors for CO2 Reduction Mechanisms for CO Production from CO2 Using Re(bpy)(CO)3X Catalysts Hydrogen Production Biomass-derived electrocatalytic composites for hydrogen evolution Hydrogen-Evolution Catalysts Based on NiMo Nitride Nanosheets Water Oxidation Enabling light-driven water oxidation via a low-energy RuIV=O intermediate

85

Assessing State Nuclear Weapons Proliferation: Using Bayesian Network Analysis of Social Factors  

Science Conference Proceedings (OSTI)

A Bayesian network (BN) model of social factors can support proliferation assessments by estimating the likelihood that a state will pursue a nuclear weapon. Social factors including political, economic, nuclear capability, security, and national identity and psychology factors may play as important a role in whether a State pursues nuclear weapons as more physical factors. This paper will show how using Bayesian reasoning on a generic case of a would-be proliferator State can be used to combine evidence that supports proliferation assessment. Theories and analysis by political scientists can be leveraged in a quantitative and transparent way to indicate proliferation risk. BN models facilitate diagnosis and inference in a probabilistic environment by using a network of nodes and acyclic directed arcs between the nodes whose connections, or absence of, indicate probabilistic relevance, or independence. We propose a BN model that would use information from both traditional safeguards and the strengthened safeguards associated with the Additional Protocol to indicate countries with a high risk of proliferating nuclear weapons. This model could be used in a variety of applications such a prioritization tool and as a component of state safeguards evaluations. This paper will discuss the benefits of BN reasoning, the development of Pacific Northwest National Laboratory’s (PNNL) BN state proliferation model and how it could be employed as an analytical tool.

Coles, Garill A.; Brothers, Alan J.; Olson, Jarrod; Whitney, Paul D.

2010-04-16T23:59:59.000Z

86

Key condenser failure mechanisms  

Science Conference Proceedings (OSTI)

Eight practical lessons highlight many of the factors that can influence condenser tube corrosion at coal-fired utilities and the effects contaminant in-leakage can have on steam generating units. 1 ref., 4 figs.

Buecker, B.

2009-04-15T23:59:59.000Z

87

241-SY-101 strain concentration factor development via nonlinear analysis. Volume 1 of 1  

DOE Green Energy (OSTI)

The 241-SY-101 waste storage tank at the Hanford-Site has been known to accumulate and release significant quantities of hydrogen gas. An analysis was performed to assess the tank`s structural integrity when subjected to postulated hydrogen deflagration loads. The analysis addressed many nonlinearities and appealed to a strain-based failure criteria. The model used to predict the global response of the tank was not refined enough to confidently predict local peak strains. Strain concentration factors were applied at structural discontinuities that were based on steel-lined reinforced-concrete containment studies. The discontinuities included large penetrations, small penetrations, springline geometries, stud/liner connections, and the {1/2} inch to 3/8 inch liner thickness transition. The only tank specific strain concentration factor applied in the evaluation was for the {1/2} inch to 3/8 inch liner thickness change in the dome. Review of the tank drawings reveals the possibility that a 4 inches Sch. 40 pipe penetrates the dome thickness transition region. It is not obvious how to combine the strain concentration factors for a small penetration with that of a thickness transition to arrive at a composite strain concentration factor. It is the goal of this effort to make an approximate determination of the relative significance of the 4 inch penetration and the {1/2} inch to 3/8 inch thickness transition in the 241-SY-101 dome geometry. This is accomplished by performing a parametric study with three general finite-element models. The first represents the thickness transition only, the second represents a 4 inch penetration only, and the third combines the thickness transition with a penetration model.

NONE

1997-03-01T23:59:59.000Z

88

Cryptographic Key Management Workshop 2012  

Science Conference Proceedings (OSTI)

Cryptographic Key Management Workshop 2012. Purpose: NIST is conducting a two-day Key Management Workshop on September 10-11. ...

2013-08-01T23:59:59.000Z

89

Dynamic Simulation and Analysis of Factors Impacting the Energy Consumption of Residential Buildings  

E-Print Network (OSTI)

Buildings have a close relationship with climate. There are a lot of important factors that influence building energy consumption such as building shape coefficient, insulation work of building envelope, covered area, and the area ratio of window to wall. The integrated influence result will be different when the building is in different climate zone. This paper studies the variation rule of some aggregative indicators and building energy efficiency rates by simulation and analysis of the same building in different climate zones by eQuest, in order to determine how building energy efficiency works in different climate zones.

Lian, Y.; Hao, Y.

2006-01-01T23:59:59.000Z

90

Global analysis of proton elastic form factor data with two-photon exchange corrections  

SciTech Connect

We use the world's data on elastic electron-proton scattering and calculations of two-photon exchange effects to extract corrected values of the proton's electric and magnetic form factors over the full Q^2 range of the existing data. Our analysis combines the corrected Rosenbluth cross section and polarization transfer data, and is the first extraction of G_Ep and G_Mp including explicit two-photon exchange corrections and their associated uncertainties. In addition, we examine the angular dependence of the corrected cross sections, and discuss the possible nonlinearities of the cross section as a function of epsilon.

J. Arrington; W. Melnitchouk; J. A. Tjon

2007-09-01T23:59:59.000Z

91

Analysis of silicon carbide based semiconductor power devices and their application in power factor correction  

E-Print Network (OSTI)

Recent technological advances have allowed silicon (Si) semiconductor technology to approach the theoretical limits of the Si material; however, power device requirements for many applications are at a stage that the present Si-based power devices cannot handle. The requirements include higher blocking voltages, switching frequencies, efficiency, and reliability. Material technologies superior to Si are needed for future power device developments. Silicon Carbide (SiC) based semiconductor devices offer one such alternative. SiC based power devices exhibit superior properties such as very low switching losses, fast switching behavior, improved reliability and high temperature operation capabilities. Power factor correction stage of power supplies is identified as an area where application of these devices would prove advantageous. In this thesis a high performance, high efficiency, SiC based power factor correction stage is discussed. The proposed topology takes advantage of the superior properties of SiC semiconductor based devices and the reduced number of devices that the dual boost power factor correction topology requires to achieve high efficiency, small size and better performance at high temperature. In addition to this analysis of SiC based power devices is carried out to study their characteristics and performance.

Durrani, Yamin Qaisar

2005-08-01T23:59:59.000Z

92

Analysis of thermally-stable electron transport factors from the hyperthermophilic archaebacterium Pyrodictium brockii. Progress report  

DOE Green Energy (OSTI)

The mechanisms by which hyperthermophilic archaebacteria grow and carry out metabolic functions at elevated temperatures have yet to be determined. The objective of this work is to develop an understanding of the metabolic characteristics of, and the electron transport enzymes involved in, hydrogen/sulfur transformation by hyperthermophilic archaebacteria. Efforts focus on the autotrophic H{sub 2}-oxidizing bacterium, Pyrodictium brockii which has an optimum growth temperature of 105{degrees}C. Biochemical and genetic characterization of enzymes involved in hydrogen oxidizing electron transport pathway. These including investigating the role of the membrane lipids in protecting the hydrogenase enzyme from thermal inactivation, characterization of a quinone and a c-type cytochrome, and analysis of the topology in the membrane in the net energy generating components are reported. The long-term goal is to understand some of the factors contributing to the biochemical basis of extreme thermophily.

Not Available

1992-09-01T23:59:59.000Z

93

Analysis of thermally-stable electron transport factors from the hyperthermophilic archaebacterium Pyrodictium brockii  

DOE Green Energy (OSTI)

The mechanisms by which hyperthermophilic archaebacteria grow and carry out metabolic functions at elevated temperatures have yet to be determined. The objective of this work is to develop an understanding of the metabolic characteristics of, and the electron transport enzymes involved in, hydrogen/sulfur transformation by hyperthermophilic archaebacteria. Efforts focus on the autotrophic H{sub 2}-oxidizing bacterium, Pyrodictium brockii which has an optimum growth temperature of 105{degrees}C. Biochemical and genetic characterization of enzymes involved in hydrogen oxidizing electron transport pathway. These including investigating the role of the membrane lipids in protecting the hydrogenase enzyme from thermal inactivation, characterization of a quinone and a c-type cytochrome, and analysis of the topology in the membrane in the net energy generating components are reported. The long-term goal is to understand some of the factors contributing to the biochemical basis of extreme thermophily.

Not Available

1992-09-01T23:59:59.000Z

94

How Many Performance Shaping Factors are Necessary for Human Reliability Analysis?  

SciTech Connect

It has been argued that human reliability analysis (HRA) has expended considerable energy on creating detailed representations of human performance through an increasingly long list of performance shaping factors (PSFs). It is not clear, however, to what extent this refinement and expansion of PSFs has enhanced the quality of HRA. Indeed, there is considerable range in the number of PSFs provided by individual HRA methods, ranging from single factor models such as time-reliability curves, up to 50 or more PSFs in some current HRA models. The US Nuclear Regulatory Commission advocates 15 PSFs in its HRA Good Practices (NUREG-1792), while its SPAR-H method (NUREG/CR-6883) espouses the use of eight PSFs and its ATHEANA method (NUREG-1624) features an open-ended number of PSFs. The apparent differences in the optimal number of PSFs can be explained in terms of the diverse functions of PSFs in HRA. The purpose of this paper is to explore the role of PSFs across different stages of HRA, including identification of potential human errors, modeling of these errors into an overall probabilistic risk assessment, quantifying errors, and preventing errors.

Ronald L. Boring

2010-06-01T23:59:59.000Z

95

Natural Gas Markets: Recent Changes and Key Drivers  

U.S. Energy Information Administration (EIA)

U.S. Energy Information Administration Independent Statistics & Analysis www.eia.gov Natural Gas Markets: Recent Changes and Key Drivers for

96

An analysis of factors that influence community college students' attitudes toward technology  

E-Print Network (OSTI)

This study investigated the factors that influence community college students' attitudes toward technology, particularly in teaching and learning experiences. Studies on post-secondary students' attitudes reported in the literature are limited. Factors cited previously as having an effect on attitudes towards technology and toward computers included: gender; age; presence of a computer in the home; completion of a formal technology course; and comfort with technology. The subjects in this study were 372 students in freshman level credit English classes in the five colleges of the North Harris Montgomery Community College District located in the greater metropolitan Houston area. Previous research instruments and studies to measure students' attitudes toward technology were reviewed. A modified version of the Secondary Students Attitudes' Toward Technology (SSATT) was developed for this study because of the content, reliability, and applicability to the postsecondary population. The instrument was administered in the spring of 2005. The fact that 95.4% of the participants reported having a computer at home and that 70.2% reported having had a formal technology class provided insight into the integration of technology in the lives of this community college sample. A correlation matrix of all variables and analysis of variance were performed. Factor analyses were performed to identify subcomponents of the instrument. Eight factors were identified: (1) need for technology competence, (2) technology benefits, (3) negative aspects of technology, (4) technology and the workplace, (5) impact of increased use of technology, (6) video games, (7) technology and job creation, and (8) technology and safety. A conclusion of the study was that neither age nor gender had a significant effect on the post-secondary students' attitudes toward technology, which differs from the findings in some of the previous studies. Females reported being as comfortable, if not more so, with technology in teaching and learning experiences as the males in the study. Exposure to technology, completion of a formal technology class, and the use of computers appeared to positively affect community college students' attitudes toward technology.

Fleming, Kathleen Literski

2005-12-01T23:59:59.000Z

97

Fuzzy Comprehensive Evaluation Model and Influence Factors Analysis on Comprehensive Performance of Green Buildings  

E-Print Network (OSTI)

A green building involves complex system engineering including energy efficiency and energy utilization, water-saving and water utilization, material-saving and material utilization, and land-saving and indoor environment quality and operation management. In order to solve problems of subjectivity, uncertainty and impossibility of quantitative analysis when evaluating green building, this study establishes a multi-level fuzzy evaluation model by means of fuzzy mathematics method to analyze the comprehensive performance of green building according to the index system of “Evaluation Standard for Green Building”. Combined with the technique scheme of the first China green building demonstration project, the result proves to be in accordance with the pre-evaluation of experts. It shows that the fuzzy comprehensive evaluation method is reasonable and feasible to evaluate the comprehensive performance of green building. The evaluation result is the same as the pre-evaluation result. Factors with high weights have larger effects on the results. This proves that the guideline should be the first reference mode in the future engineering practice so as to realize optimization of green building performance.

Sun, J.; Wu, Y.; Dai, Z.; Hao, Y.

2006-01-01T23:59:59.000Z

98

Background on Quantum Key Distribution  

Science Conference Proceedings (OSTI)

... Background on Quantum Key Distribution. ... If someone, referred to by cryptographers as Eve, tries to eavesdrop on the transmission, she will not ...

2011-08-02T23:59:59.000Z

99

Security proof of practical quantum key distribution schemes  

E-Print Network (OSTI)

This paper provides a security proof of the Bennett-Brassard (BB84) quantum key distribution protocol in practical implementation. To prove the security, it is not assumed that defects in the devices are absorbed into an adversary's attack. In fact, the only assumption in the proof is that the source is characterized. The proof is performed by lower-bounding adversary's Renyi entropy about the key before privacy amplification. The bound reveals the leading factors reducing the key generation rate.

Yodai Watanabe

2005-06-29T23:59:59.000Z

100

Partnership in key exchange protocols  

Science Conference Proceedings (OSTI)

In this paper, we investigate the notion of partnership as found in security models for key exchange protocols. Several different approaches have been pursued to define partnership, with varying degrees of success. We aim to provide an overview and criticism ... Keywords: key exchange, partnership, session identifier

Kazukuni Kobara; Seonghan Shin; Mario Strefler

2009-03-01T23:59:59.000Z

Note: This page contains sample records for the topic "analysis key factors" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

A hazard analysis of human factors in safety-critical systems engineering  

Science Conference Proceedings (OSTI)

Safety incident studies often cite human factors as a major cause of accidents. At Bhopal in 1984 human error - the failure to follow safe operating procedures - instigated the deaths of thousands of people from cyanide poisoning. In this case, human ... Keywords: EN50128, IEC 61508, human factors, safety-critical systems engineering

Les Chambers

2006-04-01T23:59:59.000Z

102

A New Hybrid Approach for Analysis of Factors Affecting Crude Oil Price  

Science Conference Proceedings (OSTI)

In this paper, a new hybrid approach is presented to analyze factors affecting crude oil price using rough set and wavelet neural network. Related factors that affect crude oil price are found using text mining technique and Brent oil price is chosen ... Keywords: crude oil price, prediction, rough set, wavelet neural network

Wei Xu; Jue Wang; Xun Zhang; Wen Zhang; Shouyang Wang

2007-05-01T23:59:59.000Z

103

Key Activities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Key Activities Key Activities Key Activities The Water Power Program conducts work in four key areas at the forefront of water power research. The Program is structured to help the United States meet its growing energy demands sustainably and cost-effectively by developing innovative renewable water power technologies, breaking down market barriers to deployment, building the infrastructure to test new technologies, and assessing water power resources for integration into our nation's grid. Research and Development Introduce and advance new marine and hydrokinetic technologies to provide sustainable and cost-effective renewable energy from the nation's waves, tides, currents, and ocean thermal gradients. Research and develop innovative hydropower technologies to sustainably tap our country's diverse water resources including rivers,

104

Key China Energy Statistics 2011  

NLE Websites -- All DOE Office Websites (Extended Search)

1 Title Key China Energy Statistics 2011 Publication Type Chart Year of Publication 2012 Authors Levine, Mark D., David Fridley, Hongyou Lu, and Cecilia Fino-Chen Date Published...

105

Key China Energy Statistics 2012  

NLE Websites -- All DOE Office Websites (Extended Search)

2 Title Key China Energy Statistics 2012 Publication Type Chart Year of Publication 2012 Authors Levine, Mark D., David Fridley, Hongyou Lu, and Cecilia Fino-Chen Date Published...

106

High-resolution DNA-binding specificity analysis of yeast transcription factors  

E-Print Network (OSTI)

Transcription factors (TFs) regulate the expression of genes through sequence-specific interactions with DNA-binding sites. However, despite recent progress in identifying in vivo TF binding sites by microarray readout of ...

Zhu, Cong

107

Analysis of variation at transcription factor binding sites in Drosophila and humans  

E-Print Network (OSTI)

Background: Advances in sequencing technology have boosted population genomics and made it possible to map the positions of transcription factor binding sites (TFBSs) with high precision. Here we investigate TFBS variability ...

Spivakov, Mikhail

108

Energy Price Indices and Discount Factors for Life-Cycle Cost Analysis- 2010  

Energy.gov (U.S. Department of Energy (DOE))

Report describes the 2010 edition of energy price indices and discount factors for performing life-cycle cost analyses of energy and water conservation and renewable energy projects in federal facilities.

109

Linear regression analysis of emissions factors when firing fossil fuels and biofuels in a commercial water-tube boiler  

Science Conference Proceedings (OSTI)

This paper compares the emissions factors for a suite of liquid biofuels (three animal fats, waste restaurant grease, pressed soybean oil, and a biodiesel produced from soybean oil) and four fossil fuels (i.e., natural gas, No. 2 fuel oil, No. 6 fuel oil, and pulverized coal) in Penn State's commercial water-tube boiler to assess their viability as fuels for green heat applications. The data were broken into two subsets, i.e., fossil fuels and biofuels. The regression model for the liquid biofuels (as a subset) did not perform well for all of the gases. In addition, the coefficient in the models showed the EPA method underestimating CO and NOx emissions. No relation could be studied for SO{sub 2} for the liquid biofuels as they contain no sulfur; however, the model showed a good relationship between the two methods for SO{sub 2} in the fossil fuels. AP-42 emissions factors for the fossil fuels were also compared to the mass balance emissions factors and EPA CFR Title 40 emissions factors. Overall, the AP-42 emissions factors for the fossil fuels did not compare well with the mass balance emissions factors or the EPA CFR Title 40 emissions factors. Regression analysis of the AP-42, EPA, and mass balance emissions factors for the fossil fuels showed a significant relationship only for CO{sub 2} and SO{sub 2}. However, the regression models underestimate the SO{sub 2} emissions by 33%. These tests illustrate the importance in performing material balances around boilers to obtain the most accurate emissions levels, especially when dealing with biofuels. The EPA emissions factors were very good at predicting the mass balance emissions factors for the fossil fuels and to a lesser degree the biofuels. While the AP-42 emissions factors and EPA CFR Title 40 emissions factors are easier to perform, especially in large, full-scale systems, this study illustrated the shortcomings of estimation techniques. 23 refs., 3 figs., 8 tabs.

Sharon Falcone Miller; Bruce G. Miller [Pennsylvania State University, University Park, PA (United States). Energy Institute

2007-12-15T23:59:59.000Z

110

EPAct Transportation Regulatory Activities: Key Terms  

NLE Websites -- All DOE Office Websites (Extended Search)

Key Terms Key Terms to someone by E-mail Share EPAct Transportation Regulatory Activities: Key Terms on Facebook Tweet about EPAct Transportation Regulatory Activities: Key Terms on Twitter Bookmark EPAct Transportation Regulatory Activities: Key Terms on Google Bookmark EPAct Transportation Regulatory Activities: Key Terms on Delicious Rank EPAct Transportation Regulatory Activities: Key Terms on Digg Find More places to share EPAct Transportation Regulatory Activities: Key Terms on AddThis.com... Home About Covered Fleets Compliance Methods Alternative Fuel Petitions Resources Guidance Documents Statutes & Regulations Program Annual Reports Fact Sheets Newsletter Case Studies Workshops Tools Key Terms FAQs Key Terms The Energy Policy Act (EPAct) includes specific terminology related to

111

EPAct Transportation Regulatory Activities: Key Federal Statutes  

NLE Websites -- All DOE Office Websites (Extended Search)

Key Key Federal Statutes to someone by E-mail Share EPAct Transportation Regulatory Activities: Key Federal Statutes on Facebook Tweet about EPAct Transportation Regulatory Activities: Key Federal Statutes on Twitter Bookmark EPAct Transportation Regulatory Activities: Key Federal Statutes on Google Bookmark EPAct Transportation Regulatory Activities: Key Federal Statutes on Delicious Rank EPAct Transportation Regulatory Activities: Key Federal Statutes on Digg Find More places to share EPAct Transportation Regulatory Activities: Key Federal Statutes on AddThis.com... Home About Contacts Covered Fleets Compliance Methods Alternative Fuel Petitions Resources Key Federal Statutes These are excerpts from federal statutes that established key Energy Policy Act (EPAct) transportation regulatory activities.

112

Worldwide Trends in Energy Use and Efficiency: Key Insights from...  

Open Energy Info (EERE)

Worldwide Trends in Energy Use and Efficiency: Key Insights from International Energy Agency (IEA) Indicator Analysis in Support of the Group of Eight (G8) Plan of Action Jump to:...

113

Key Workplace Documents Federal Publications  

E-Print Network (OSTI)

, the Administration in 2007 concluded agreements with China on toys, food and feed, drugs and medical devicesKey Workplace Documents Federal Publications Cornell University ILR School Year 2008 China/498 #12;Order Code RL33536 China-U.S. Trade Issues Updated March 7, 2008 Wayne M. Morrison Specialist

114

Key technology trends - Satellite systems  

Science Conference Proceedings (OSTI)

This paper is based on material extracted from the WTEC Panel Report Global Satellite Communications Technology and Systems, December 1998. It presents an overview of key technology trends in communications satellites in the last few years. After the ... Keywords: Communications satellites, Satellite communications, Satellite technology overview

Charles W. Bostian; William T. Brandon; Alfred U. Mac Rae; Christoph E. Mahle; Stephen A. Townes

2000-08-01T23:59:59.000Z

115

Factor Structure in Groups Selected on Observed Scores  

E-Print Network (OSTI)

corresponding to item format ('minor' answer key and 'other' answer key). There are two quantitative factors,into the full sample answer key factors (2 and 3). The five

Muthen, Bengt O.

1989-01-01T23:59:59.000Z

116

Security Notions for Quantum Public-Key Cryptography  

E-Print Network (OSTI)

It is well known that Shor's quantum algorithm for integer factorization can break down the RSA public-key cryptosystem, which is widely used in many cryptographic applications. Thus, public-key cryptosystems in the quantum computational setting are longed for cryptology. In order to define the security notions of public-key cryptosystems, we have to model the power of the sender, receiver, adversary and channel. While we may consider a setting where quantum computers are available only to adversaries, we generally discuss what are the right security notions for (quantum) public-key cryptosystems in the quantum computational setting. Moreover, we consider the security of quantum public-key cryptosystems known so far.

Takeshi Koshiba

2007-02-19T23:59:59.000Z

117

Cogeneration Project Analysis Update  

E-Print Network (OSTI)

Not long ago, to evaluate the feasibility of a cogeneration project, a simple economic analysis, that considered capital required, operations and maintenance savings, was sufficient. However, under present economic uncertainties (and highly competitive business environment) the situation has changed dramatically. It is now essential to do an in-depth evaluation to insure that very diverse and applicable factors are determined and properly evaluated. This paper will go beyond the "nuts and bolts" analysis of cogeneration economics. It will enumerate and discuss diverse factors, such as, but not limited to: Fuel Considerations, Heat System Analysis, Electric Power Considerations, Key Technical Project Considerations, and Economic Analysis.

Robinson, A. M.; Garcia, L. N.

1987-09-01T23:59:59.000Z

118

Human factors simulation tools for the course of action analysis in COIN  

Science Conference Proceedings (OSTI)

Analyzing and modeling of insurgency behavior and decisions is a complex task that can only be conducted by systematic as well as system-view methods. Different approaches like Human Behavior Representation (HBR), Organization Behavior Representation ... Keywords: Human Behavior Representation (HBR), Mass Behavior Representation (MBR), Organization Behavior Representation (OBR), cognitive modeling, decision support tool, mission analysis

Markus Bresinsky; Harald Schaub

2008-06-01T23:59:59.000Z

119

Can Environmental Factors Affect Half-Life in Beta-Decay? An Analysis  

E-Print Network (OSTI)

Early in the history of the field of nuclear science, experiments were performed to ascertain whether the half-lives of the radioactive substances being studied – isotopes then called the “radium emanation” [222Rn], “radium A” [218Po], “radium B” [214Pb], and “radium C” [214Bi] - were dependent upon any external factors. At that time, the external factors deemed most likely to affect half-life were temperature and pressure. After several experiments, designed to pick up any change in half-life in the course of changing temperature or pressure, had failed to find any significant changes, it was concluded that half-life does not depend on the physical properties of external environment. And that was the state of the field for a long time - for almost 100 years, in fact. Fairly recently, however, half-life measurements were recorded, and published, that seemed to show a change in half-life at the few percent level for certain radioactive nuclides which were exposed to extremes of temperature - thus challenging the long-held belief in the unchangeability of half-lives. In addition to half-life changes caused by temperature change, other experiments seemed to find half-life changes caused by other external influences, including the chemical environment of the decaying radioactive nuclide, and even the distance between Earth and the Sun at the time of the half-life measurement. In this study we present evidence that the initial beliefs in the immutability of radioactive half-life (with the exception of a few nuclides decaying by electron capture whose orbital electrons are involved in both the decay and also in the chemical bonding of those nuclides) is indeed correct; we have done this by performing precise half-life measurements on the ?? emitter 198Au, the EC emitter 97Ru, and on the ?? emitter 198Au when sited in gold(III) oxide, Au2O3, (an insulator for practical purposes). We have performed various experiments designed to detect any half-life change at the level of a few parts in 10^4 due to change in temperature, physical environment, or the Earth-Sun distance. In these experiments, we have found no significant half-life change due to any of these external factors. These results represent the most accurate demonstrations of the immutability of radioactive half-life change ever made.

Goodwin, John 1953-

2012-12-01T23:59:59.000Z

120

Rotating Plasma Finding is Key for ITER  

NLE Websites -- All DOE Office Websites (Extended Search)

Plasma Finding is Key for ITER Rotating Plasma Finding is Key for ITER PlasmaTurbulenceCSChang.png Tokamak turbulence showing inward-propagating streamers from normalized...

Note: This page contains sample records for the topic "analysis key factors" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Vehicle Technologies Office: Key Activities in Vehicles  

NLE Websites -- All DOE Office Websites (Extended Search)

Activities in Vehicles Activities in Vehicles We conduct work in four key areas to develop and deploy vehicle technologies that reduce the use of petroleum while maintaining or improving performance, power, and comfort. Research and development (R&D); testing and analysis; government and community stakeholder support; and education help people access and use efficient, clean vehicles that meet their transportation needs. Researcher loads a sample mount of battery cathode materials for X-ray diffraction, an analysis tool for obtaining information on the crystallographic structure and composition of materials. Research and Development of New Technologies Develop durable and affordable advanced batteries as well as other forms of energy storage. Improve the efficiency of combustion engines.

122

Vehicle Technologies Office: Key Activities in Vehicles  

NLE Websites -- All DOE Office Websites (Extended Search)

Key Activities in Key Activities in Vehicles to someone by E-mail Share Vehicle Technologies Office: Key Activities in Vehicles on Facebook Tweet about Vehicle Technologies Office: Key Activities in Vehicles on Twitter Bookmark Vehicle Technologies Office: Key Activities in Vehicles on Google Bookmark Vehicle Technologies Office: Key Activities in Vehicles on Delicious Rank Vehicle Technologies Office: Key Activities in Vehicles on Digg Find More places to share Vehicle Technologies Office: Key Activities in Vehicles on AddThis.com... Key Activities Mission, Vision, & Goals Plans, Implementation, & Results Organization & Contacts National Laboratories Budget Partnerships Key Activities in Vehicles We conduct work in four key areas to develop and deploy vehicle technologies that reduce the use of petroleum while maintaining or

123

Algorithms for dynamic multicast key distribution  

Science Conference Proceedings (OSTI)

We study the problem of multicast key distribution for group security. Secure group communication systems typically rely on a group key, which is a secret shared among the members of the group. This key is used to provide privacy by encrypting all group ... Keywords: Dynamic key distribution, experimental algorithms, multicast

Justin Goshi; Richard E. Ladner

2007-02-01T23:59:59.000Z

124

Multiparty quantum key agreement with single particles  

Science Conference Proceedings (OSTI)

Two conditions must be satisfied in a secure quantum key agreement (QKA) protocol: (1) outside eavesdroppers cannot gain the generated key without introducing any error; (2) the generated key cannot be determined by any non-trivial subset of the participants. ... Keywords: Quantum cryptography, Quantum information, Quantum key agreement

Bin Liu; Fei Gao; Wei Huang; Qiao-Yan Wen

2013-04-01T23:59:59.000Z

125

SunShot Initiative: Key Activities  

NLE Websites -- All DOE Office Websites (Extended Search)

Key Activities Key Activities Printable Version Share this resource Send a link to SunShot Initiative: Key Activities to someone by E-mail Share SunShot Initiative: Key Activities on Facebook Tweet about SunShot Initiative: Key Activities on Twitter Bookmark SunShot Initiative: Key Activities on Google Bookmark SunShot Initiative: Key Activities on Delicious Rank SunShot Initiative: Key Activities on Digg Find More places to share SunShot Initiative: Key Activities on AddThis.com... Concentrating Solar Power Photovoltaics Systems Integration Balance of Systems Key Activities Under the SunShot Initiative, the DOE Solar Office issues competitive solicitations that fund selective research projects aimed at transforming the ways the United States generates, stores, and utilizes solar energy.

126

Alternative Fuels Data Center: Key Federal Legislation  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Key Federal Key Federal Legislation to someone by E-mail Share Alternative Fuels Data Center: Key Federal Legislation on Facebook Tweet about Alternative Fuels Data Center: Key Federal Legislation on Twitter Bookmark Alternative Fuels Data Center: Key Federal Legislation on Google Bookmark Alternative Fuels Data Center: Key Federal Legislation on Delicious Rank Alternative Fuels Data Center: Key Federal Legislation on Digg Find More places to share Alternative Fuels Data Center: Key Federal Legislation on AddThis.com... More in this section... Federal State Advanced Search All Laws & Incentives Sorted by Type Key Federal Legislation The information below includes a brief chronology and summaries of key federal legislation related to alternative fuels and vehicles, air quality,

127

Renewable Energy Community: Key Elements  

NLE Websites -- All DOE Office Websites (Extended Search)

of Energy of Energy Office of Energy Efficiency & Renewable Energy National Renewable Energy Laboratory Innovation for Our Energy Future A Renewable Energy Community: Key Elements A reinvented community to meet untapped customer needs for shelter and transportation with minimal environmental impacts, stable energy costs, and a sense of belonging N. Carlisle, J. Elling, and T. Penney Technical Report NREL/TP-540-42774 January 2008 NREL is operated by Midwest Research Institute ● Battelle Contract No. DE-AC36-99-GO10337 National Renewable Energy Laboratory 1617 Cole Boulevard, Golden, Colorado 80401-3393 303-275-3000 * www.nrel.gov Operated for the U.S. Department of Energy Office of Energy Efficiency and Renewable Energy by Midwest Research Institute * Battelle

128

Analysis of a Splice Array Experiment Elucidates Roles of Chromatin Elongation Factor Spt4-5 in Splicing  

E-Print Network (OSTI)

Elucidates Roles of Chromatin Elongation Factor Spt4-5 incapping enzyme, and the chromatin elongation factors Spt4-5,found evidence that the chromatin elongation factors, Spt4

Xiao, Yuanyuan; Yang, Yee Hwa; Burckin, Todd A; Shiue, Lily; Hartzog, Grant A; Segal, Mark R

2005-01-01T23:59:59.000Z

129

Primeless factoring-based cryptography  

Science Conference Proceedings (OSTI)

Factoring-based public-key cryptosystems have an overall complexity which is dominated by the key-production algorithm, which requires the generation of prime numbers. This is most inconvenient in settings where the key-generation is not an one-off process, ...

Sonia Bogos, Ioana Boureanu, Serge Vaudenay

2013-06-01T23:59:59.000Z

130

Answering Key Fuel Cycle Questions  

Science Conference Proceedings (OSTI)

The Advanced Fuel Cycle Initiative (AFCI) program has both “outcome” and “process” goals because it must address both waste already accumulating as well as completing the fuel cycle in connection with advanced nuclear power plant concepts. The outcome objectives are waste geological repository capacity and cost, energy security and sustainability, proliferation resistance, fuel cycle economics, and safety. The process objectives are readiness to proceed and adaptability and robustness in the face of uncertainties. A classic decision-making approach to such a multi-attribute problem would be to weight individual quantified criteria and calculate an overall figure of merit. This is inappropriate for several reasons. First, the goals are not independent. Second, the importance of different goals varies among stakeholders. Third, the importance of different goals is likely to vary with time, especially the “energy future.” Fourth, some key considerations are not easily or meaningfully quantifiable at present. Instead, at this point, we have developed 16 questions the AFCI program should answer and suggest an approach of determining for each whether relevant options improve meeting each of the program goals. We find that it is not always clear which option is best for a specific question and specific goal; this helps identify key issues for future work. In general, we suggest attempting to create as many win-win decisions (options that are attractive or neutral to most goals) as possible. Thus, to help clarify why the program is exploring the options it is, and to set the stage for future narrowing of options, we have developed 16 questions, as follows: · What are the AFCI program goals? · Which potential waste disposition approaches do we plan for? · What are the major separations, transmutation, and fuel options? · How do we address proliferation resistance? · Which potential energy futures do we plan for? · What potential external triggers do we plan for? · Should we separate uranium? · If we separate uranium, should we recycle it, store it or dispose of it? · Is it practical to plan to fabricate and handle “hot” fuel? · Which transuranic elements (TRU) should be separated and transmuted? · Of those TRU separated, which should be transmuted together? · Should we separate and/or transmute Cs and Sr isotopes that dominate near-term repository heating? · Should we separate and/or transmute very long-lived Tc and I isotopes? · Which separation technology? · What mix of transmutation technologies? · What fuel technology best supports the above decisions?

Steven J. Piet; Brent W. Dixon; J. Stephen Herring; David E. Shropshire; Mary Lou Dunzik-Gougar

2003-10-01T23:59:59.000Z

131

Key Elements of and Materials Performance Targets for Highly Insulating  

NLE Websites -- All DOE Office Websites (Extended Search)

Key Elements of and Materials Performance Targets for Highly Insulating Key Elements of and Materials Performance Targets for Highly Insulating Window Frames Title Key Elements of and Materials Performance Targets for Highly Insulating Window Frames Publication Type Journal Article LBNL Report Number LBNL-5099E Year of Publication 2011 Authors Gustavsen, Arlid, Steinar Grynning, Dariush K. Arasteh, Bjørn Petter Jelle, and Howdy Goudey Journal Energy and Buildings Volume 43 Issue 10 Pagination 2583-2594 Date Published 10/2011 Keywords Fenestration, heat transfer modeling, thermal performance, thermal transmittance, u-factor, window frames Abstract The thermal performance of windows is important for energy efficient buildings. Windows typically account for about 30-50 percent of the transmission losses though the building envelope, even if their area fraction of the envelope is far less. The reason for this can be found by comparing the thermal transmittance (U-factor) of windows to the U-factor of their opaque counterparts (wall, roof and floor constructions). In well insulated buildings the U-factor of walls, roofs an floors can be between 0.1-0.2 W/(m2K). The best windows have U-values of about 0.7-1.0. It is therefore obvious that the U-factor of windows needs to be reduced, even though looking at the whole energy balance for windows (i.e. solar gains minus transmission losses) makes the picture more complex.

132

Proactive key management protocol for multicast services  

Science Conference Proceedings (OSTI)

A group key management is essential scheme guaranteeing data confidentiality in multicast. To provide the strict secrecy in group communication, the rekeying delay has to be minimized. In this paper, we propose a new group key management protocol, called ...

Dong-Hyun Je; Seung-Woo Seo

2009-06-01T23:59:59.000Z

133

The Outlook for Electricity Supply and Demand to 2035: Key Drivers  

U.S. Energy Information Administration (EIA)

U.S. Energy Information Administration Independent Statistics & Analysis www.eia.gov The Outlook for Electricity Supply and Demand to 2035: Key Drivers

134

Cryptographic Key Managment Workshop 2012-A Draft ...  

Science Conference Proceedings (OSTI)

... Specify the key generation methods used • Specify the random number generators used • Specify ... primary and backup facilities ...

2012-09-11T23:59:59.000Z

135

Group-Based Authentication and Key Agreement  

Science Conference Proceedings (OSTI)

This paper presents an authentication and key agreement protocol to streamline communication activities for a group of mobile stations (MSs) roaming from the same home network (HN) to a serving network (SN). In such a roaming scenario, conventional schemes ... Keywords: Authentication and key agreement, Group key, Roaming, Security, Wireless network

Yu-Wen Chen; Jui-Tang Wang; Kuang-Hui Chi; Chien-Chao Tseng

2012-02-01T23:59:59.000Z

136

Significant factors in rail freight accidents: A statistical analysis of predictive and severity indices in the FRA accident/incident data base  

Science Conference Proceedings (OSTI)

The Federal Railroad Association maintains a file of carrier-reported accidents and incidents that meet threshold criteria for damage cost and/or casualties. Using a five year period from this data base, an investigation was conducted into the relationship between quantifiable risk factors and accident frequency and severity. Specific objectives were to identify key variables in accidents, formulate a model to predict future accidents, and assess the relative importance of these variables from the perspective of routing and shipping decision making. The temporal factors YEAR and MONTH were found to be significant predictors of risk; accident severity was greatest for accidents caused by track and roadbed defects. Train speed was an indicator of accident severity; track class and training tonnage were inversely proportional to accident severity. Investigation of the data base is continuing, with a final report expected by late summer. 15 refs., 1 fig., 10 tabs.

Lee, Tze-San; Saricks, C.L.

1991-01-01T23:59:59.000Z

137

Worldwide Trends in Energy Use and Efficiency: Key Insights from  

Open Energy Info (EERE)

Worldwide Trends in Energy Use and Efficiency: Key Insights from Worldwide Trends in Energy Use and Efficiency: Key Insights from International Energy Agency (IEA) Indicator Analysis in Support of the Group of Eight (G8) Plan of Action Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Worldwide Trends in Energy Use and Efficiency: Key Insights from International Energy Agency (IEA) Indicator Analysis in Support of the Group of Eight (G8) Plan of Action Focus Area: Power Plant Efficiency Topics: Potentials & Scenarios Website: www.iea.org/papers/2008/indicators_2008.pdf Equivalent URI: cleanenergysolutions.org/content/worldwide-trends-energy-use-and-effic Language: English Policies: "Regulations,Deployment Programs" is not in the list of possible values (Deployment Programs, Financial Incentives, Regulations) for this property.

138

DOE M 200.1-1 Chapter 9, Public Key Cryptography and Key Management  

Directives, Delegations, and Requirements

The use and management of certificate-based public key cryptography for the Department of Energy (DOE) requires the establishment of a public key ...

2000-02-15T23:59:59.000Z

139

Renewable: A key component of our global energy future  

DOE Green Energy (OSTI)

Inclusion of renewable energy sources in national and international energy strategies is a key component of a viable global energy future. The global energy balance is going to shift radically in the near future brought about by significant increases in population in China and India, and increases in the energy intensity of developing countries. To better understand the consequences of such global shifts in energy requirements and to develop appropriate energy strategies to respond to these shifts, we need to look at the factors driving choices among supply options by geopolitical consumers and the impact these factors can have on the future energy mix.

Hartley, D.

1995-12-31T23:59:59.000Z

140

Quantum Key Distribution Protocol with User Authentication  

E-Print Network (OSTI)

We propose a quantum key distribution protocol with quantum based user authentication. User authentication is executed by validating the correlation of GHZ states. Alice and Bob can distribute a secure key using the remaining GHZ states after authentication. This secret key does not leak even to the arbitrator by the properties of the entanglement. We will show that our protocol is secure against the cloning attack.

Lee, H; Lee, D; Lim, J; Yang, H J; Lee, Hwayean; Lee, Sangjin; Lee, Donghoon; Lim, Jongin; Yang, HyungJin

2005-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "analysis key factors" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Unifying classical and quantum key distillation  

E-Print Network (OSTI)

Assume that two distant parties, Alice and Bob, as well as an adversary, Eve, have access to (quantum) systems prepared jointly according to a tripartite state ?ABE. In addition, Alice and Bob can use local operations and authenticated public classical communication. Their goal is to establish a key which is unknown to Eve. We initiate the study of this scenario as a unification of two standard scenarios: (i) key distillation (agreement) from classical correlations and (ii) key distillation from pure tripartite quantum states. Firstly, we obtain generalisations of fundamental results related to scenarios (i) and (ii), including upper bounds on the key rate, i.e., the number of key bits that can be extracted per copy of ?ABE. Moreover, based on an embedding of classical distributions into quantum states, we are able to find new connections between protocols and quantities in the standard scenarios (i) and (ii). Secondly, we study specific properties of key distillation protocols. In particular, we show that every protocol that makes use of pre-shared key can be transformed into an equally efficient protocol which needs no pre-shared key. This result is of practical significance as it applies to quantum key distribution (QKD) protocols, but it also implies that the key rate cannot be locked with information on Eve’s side. Finally, we exhibit an arbitrarily large separation between the key rate in the standard setting where Eve is equipped with quantum memory and the key rate in a setting where Eve is only given classical memory. This shows that assumptions on the nature of Eve’s memory are important in order to determine the correct security threshold in QKD. 1

Matthias Christ; Renato Renner

2008-01-01T23:59:59.000Z

142

Comment on "Quantum dense key distribution"  

E-Print Network (OSTI)

In this Comment we question the security of recently proposed by Degiovanni et al. [Phys. Rev. A 69 (2004) 032310] scheme of quantum dense key distribution.

Antoni Wojcik

2004-05-07T23:59:59.000Z

143

Cryptographic Key Management Workshop 2009 - A Holistic ...  

Science Conference Proceedings (OSTI)

... policies Board of Directors CEO Protect critical data CSO/CISO CIO We aren't ... Encrypted Database Management Encrypted Tape Key Management ...

2012-05-07T23:59:59.000Z

144

CODATA Key Values for Thermodynamics - TMS  

Science Conference Proceedings (OSTI)

Feb 8, 2007 ... This site includes internationally agreed upon values for thermodynamic properties of key chemical substances established by the Committee ...

145

Nanomechanics: New Test Measures Key Properties of ...  

Science Conference Proceedings (OSTI)

Nanomechanics: New Test Measures Key Properties of ... Tests using the wrinkle-crack method, however, show ... to the longest duration tested, 10 days ...

2012-10-18T23:59:59.000Z

146

Quantum key distribution network with wavelength addressing  

E-Print Network (OSTI)

Most traditional applications of quantum cryptography are point-to-point communications, in which only two users can exchange keys. In this letter, we present a network scheme that enable quantum key distribution between multi-user with wavelength addressing. Considering the current state of wavelength division multiplexing technique, dozens or hundreds of users can be connected to such a network and directly exchange keys with each other. With the scheme, a 4-user demonstration network was built up and key exchanges were performed.

Mo, X F; Han, Z F; Xu, F X; Zhang, T; Guo, Guang-Can; Han, Zheng-Fu; Mo, Xiao-Fan; Xu, Fang-Xing; Zhang, Tao

2006-01-01T23:59:59.000Z

147

New Quantum Key System Combines Speed, Distance  

Science Conference Proceedings (OSTI)

... a prototype high-speed quantum key distribution (QKD) system ... a theoretically unbreakable “one-time pad” encryption, transmission and decryption ...

2013-07-08T23:59:59.000Z

148

Two key questions about color superconductivity.  

E-Print Network (OSTI)

??We pose two key questions about color superconductivity: What are the effects of the large strange quark mass, and what are the observable consequences of… (more)

Kundu, Joydip, 1977-

2004-01-01T23:59:59.000Z

149

Schedules of Key Environmental Impact Statements  

Energy.gov (U.S. Department of Energy (DOE))

This document graphically displays the milestone dates and projected schedules of key Environmental Impact Statements (updated monthly). This chart represents anticipated activity and is not a...

150

BIASED RANDOM-KEY GENETIC ALGORITHMS WITH ...  

E-Print Network (OSTI)

Handbook of Metaheuristics. Kluwer. Academic Publishers, 2003. J.F. Gonçalves and M.G.C. Resende. Biased random-key genetic algorithms for combinatorial ...

151

Identity-based authenticated asymmetric group key agreement protocol  

Science Conference Proceedings (OSTI)

In identity-based public-key cryptography, an entity's public key can be easily derived from its identity. The direct derivation of public keys in identity-based public-key cryptography eliminates the need for certificates and solves certain public key ... Keywords: asymmetric group key agreement, bilinear map, group key agreement, identity-based public-key cryptography

Lei Zhang; Qianhong Wu; Bo Qin; Josep Domingo-Ferrer

2010-07-01T23:59:59.000Z

152

Unifying classical and quantum key distillation  

E-Print Network (OSTI)

Assume that two distant parties, Alice and Bob, as well as an adversary, Eve, have access to (quantum) systems prepared jointly according to a tripartite state. In addition, Alice and Bob can use local operations and authenticated public classical communication. Their goal is to establish a key which is unknown to Eve. We initiate the study of this scenario as a unification of two standard scenarios: (i) key distillation (agreement) from classical correlations and (ii) key distillation from pure tripartite quantum states. Firstly, we obtain generalisations of fundamental results related to scenarios (i) and (ii), including upper bounds on the key rate. Moreover, based on an embedding of classical distributions into quantum states, we are able to find new connections between protocols and quantities in the standard scenarios (i) and (ii). Secondly, we study specific properties of key distillation protocols. In particular, we show that every protocol that makes use of pre-shared key can be transformed into an equally efficient protocol which needs no pre-shared key. This result is of practical significance as it applies to quantum key distribution (QKD) protocols, but it also implies that the key rate cannot be locked with information on Eve's side. Finally, we exhibit an arbitrarily large separation between the key rate in the standard setting where Eve is equipped with quantum memory and the key rate in a setting where Eve is only given classical memory. This shows that assumptions on the nature of Eve's memory are important in order to determine the correct security threshold in QKD.

Matthias Christandl; Artur Ekert; Michal Horodecki; Pawel Horodecki; Jonathan Oppenheim; Renato Renner

2006-08-25T23:59:59.000Z

153

General model of quantum key distribution  

E-Print Network (OSTI)

A general mathematical framework for quantum key distribution based on the concepts of quantum channel and Turing machine is suggested. The security for its special case is proved. The assumption is that the adversary can perform only individual (in essence, classical) attacks. For this case an advantage of quantum key distribution over classical one is shown.

A. S. Trushechkin; I. V. Volovich

2005-04-20T23:59:59.000Z

154

General quantum key distribution in higher dimension  

E-Print Network (OSTI)

We study a general quantum key distribution protocol in higher dimension. In this protocol, quantum states in arbitrary g+1 (1?g?d) out of all d+1 mutually unbiased bases in a d-dimensional system can be used for the key ...

Shi, Han-Duo

155

Robust key extraction from physical uncloneable functions  

Science Conference Proceedings (OSTI)

Physical Uncloneable Functions (PUFs) can be used as a cost-effective means to store key material in an uncloneable way. Due to the fact that the key material is obtained by performing measurements on a physical system, noise is inevitably present in ... Keywords: authentication, challenge-response pair, error correction, noise, physical uncloneable function, speckle pattern

B. Škori?; P. Tuyls; W. Ophey

2005-06-01T23:59:59.000Z

156

residential sector key indicators | OpenEI  

Open Energy Info (EERE)

residential sector key indicators residential sector key indicators Dataset Summary Description This dataset is the 2009 United States Residential Sector Key Indicators and Consumption, part of the Source EIA Date Released March 01st, 2009 (5 years ago) Date Updated Unknown Keywords AEO consumption EIA energy residential sector key indicators Data application/vnd.ms-excel icon 2009 Residential Sector Key Indicators and Consumption (xls, 55.3 KiB) Quality Metrics Level of Review Peer Reviewed Comment Temporal and Spatial Coverage Frequency Annually Time Period License License Open Data Commons Public Domain Dedication and Licence (PDDL) Comment http://www.eia.gov/abouteia/copyrights_reuse.cfm Rate this dataset Usefulness of the metadata Average vote Your vote Usefulness of the dataset Average vote Your vote

157

Fuel Cell Technologies Office: Key Activities  

NLE Websites -- All DOE Office Websites (Extended Search)

Key Activities Key Activities The Fuel Cell Technologies Office conducts work in several key areas to advance the development and commercialization of hydrogen and fuel cell technologies. Research, Development, and Demonstration Key areas of research, development, and demonstration (RD&D) include the following: Fuel Cell R&D, which seeks to improve the durability, reduce the cost, and improve the performance of fuel cell systems, through advances in fuel cell stack and balance of plant components Hydrogen Fuel R&D, which focuses on enabling the production of low-cost hydrogen fuel from diverse renewable pathways and addressing key challenges to hydrogen delivery and storage Manufacturing R&D, which works to develop and demonstrate advanced manufacturing technologies and processes that will reduce the cost of fuel cell systems and hydrogen technologies

158

Critical factors influencing employment of disabled persons in Malaysia.  

E-Print Network (OSTI)

??This study examines key factors that affect opportunities for employment of disabled people in Malaysia. Four factors are covered by the study; these are namely,… (more)

Ramakrishnan, Prabha.

2007-01-01T23:59:59.000Z

159

Analysis and experimental results of a single-stage high-power-factor electronic ballast based on flyback converter  

SciTech Connect

A new single-stage high-power-factor electronic ballast based on a flyback converter is presented in this paper. The ballast is able to supply a fluorescent lamp assuring a high-input power factor for the utility line. Other features are lamp power regulation against line voltage variations and low lamp current crest factor, both assuring long lamp life. The ballast is analyzed at steady-state operation, and design equations and characteristics are obtained. Also, a procedure for the ballast design is presented. Finally, simulation and experimental results from a laboratory prototype are shown.

Calleja, A.J.; Alonso, J.M.; Lopez, E.; Ribas, J.; Martinez, J.A.; Rico-Secades, M.

1999-11-01T23:59:59.000Z

160

Ensemble-Based Analysis of Factors Leading to the Development of a Multiday Warm-Season Heavy Rain Event  

Science Conference Proceedings (OSTI)

This study makes use of operational global ensemble forecasts from the European Centre for Medium-Range Weather Forecasts (ECMWF) to examine the factors contributing to, or inhibiting, the development of a long-lived continental vortex and its ...

Russ S. Schumacher

2011-09-01T23:59:59.000Z

Note: This page contains sample records for the topic "analysis key factors" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Integrative analysis of the zinc finger transcription factor Lame duck in the Drosophila myogenic gene regulatory network  

E-Print Network (OSTI)

Contemporary high-throughput technologies permit the rapid identification of transcription factor (TF) target genes on a genome-wide scale, yet the functional significance of TFs requires knowledge of target gene expression ...

Busser, Brian W.

162

Statistical Analysis of Precipitation Chemistry Measurements over the Eastern United States. Part IV: The Influences of Meteorological Factors  

Science Conference Proceedings (OSTI)

The influences of meteorological factors on precipitation acidity and constituent concentrations were investigated statistically using selected portions of a new archive of daily precipitation chemistry measurements for the eastern United States. ...

C. Maxwell; B. P. Eynon; R. M. Endlich

1988-12-01T23:59:59.000Z

163

Captured key electrical safety lockout system  

DOE Patents (OSTI)

A safety lockout apparatus for an electrical circuit includes an electrical switch, a key, a lock and a blocking mechanism. The electrical switch is movable between an ON position at which the electrical circuit is energized and an OFF position at which the electrical circuit is deactivated. The lock is adapted to receive the key and is rotatable among a plurality of positions by the key. The key is only insertable and removable when the lock is at a preselected position. The lock is maintained in the preselected position when the key is removed from the lock. The blocking mechanism physically maintains the switch in its OFF position when the key is removed from the lock. The blocking mechanism preferably includes a member driven by the lock between a first position at which the electrical switch is movable between its ON and OFF positions and a second position at which the member physically maintains the electrical switch in its OFF position. Advantageously, the driven member's second position corresponds to the preselected position at which the key can be removed from and inserted into the lock.

Darimont, Daniel E. (Aurora, IL)

1995-01-01T23:59:59.000Z

164

Using lattice of class and method dependence for change impact analysis of object oriented programs  

Science Conference Proceedings (OSTI)

Software change impact analysis (CIA) is a key technique to identify unpredicted and potential effects caused by software changes. In this paper, we propose a new CIA technique based on a compact and effective representation for object oriented programs, ... Keywords: change impact analysis, formal concept analysis, impact factor, lattice of class and method dependence

Xiaobing Sun; Bixin Li; Sai Zhang; Chuanqi Tao; Xiang Chen; Wanzhi Wen

2011-03-01T23:59:59.000Z

165

Anti-counterfeiting, key distribution, and key storage in an ambient world via physical unclonable functions  

Science Conference Proceedings (OSTI)

Virtually all applications which provide or require a security service need a secret key. In an ambient world, where (potentially) sensitive information is continually being gathered about us, it is critical that those keys be both securely deployed ... Keywords: Fuzzy extractor, Helper data algorithm, Intrinsic PUF, Key distribution, LC-PUFs, Physical unclonable functions, SRAMs, Sensor nodes

Jorge Guajardo; Boris Škori?; Pim Tuyls; Sandeep S. Kumar; Thijs Bel; Antoon H. Blom; Geert-Jan Schrijen

2009-03-01T23:59:59.000Z

166

Composite keys? | OpenEI Community  

Open Energy Info (EERE)

Composite keys? Composite keys? Home > Groups > Databus Does DataBus support using composite keys in a Table definition? If not, is there a way to automatically generate a unique value for each entry that is uploaded? Submitted by Hopcroft on 5 September, 2013 - 17:13 1 answer Points: 0 At this time, no, and no way to generate unique key either right now. You can submit a feature request for this though on github. thanks, Dean Deanhiller on 6 September, 2013 - 06:58 Groups Menu You must login in order to post into this group. Recent content Go to My Databus->Data Streams... yes, it is done the same way y... Update rows? How to use streaming chart? if you are an administrator, s... more Group members (6) Managers: Deanhiller Recent members: Hopcroft Vikasgoyal Ksearight NickL

167

Two key questions about color superconductivity  

E-Print Network (OSTI)

We pose two key questions about color superconductivity: What are the effects of the large strange quark mass, and what are the observable consequences of color superconductivity? Motivated by the first question, we study ...

Kundu, Joydip, 1977-

2004-01-01T23:59:59.000Z

168

Password based key exchange with mutual authentication  

Science Conference Proceedings (OSTI)

A reasonably efficient password based key exchange (KE) protocol with provable security without random oracle was recently proposed by Katz, et al. [17] and later by Gennaro and Lindell [13]. However, these protocols do not support mutual authentication ...

Shaoquan Jiang; Guang Gong

2004-08-01T23:59:59.000Z

169

Cryptographic Key Management Project - Comments on the ...  

Science Conference Proceedings (OSTI)

... planned digital signature lifetime (based on the key strength ... Will the CAVP provide a standalone DH test that ... for about an eighth of the cost of 2.5 ...

2012-05-07T23:59:59.000Z

170

Jurisdiction Members Contact Info Key Staffers  

E-Print Network (OSTI)

Relevant Jurisdiction Members Contact Info Key Staffers House Science, Space, and Technology, aeronautics, civil aviation, environment, and marine science · America COMPETES · Energy labs · National Science Foundation, including NCAR · National Aeronautics and Space Administration · National Weather

171

Some key Y-12 General Foremen remembered  

NLE Websites -- All DOE Office Websites (Extended Search)

expanded from K-25 to Y-12 and X-10, they brought their management style with them. Clark Center was a key individual. Clark Center Park, still known by old timers as "Carbide...

172

Analysis of automated highway system risks and uncertainties. Volume 5  

SciTech Connect

This volume describes a risk analysis performed to help identify important Automated Highway System (AHS) deployment uncertainties and quantify their effect on costs and benefits for a range of AHS deployment scenarios. The analysis identified a suite of key factors affecting vehicle and roadway costs, capacities and market penetrations for alternative AHS deployment scenarios. A systematic protocol was utilized for obtaining expert judgments of key factor uncertainties in the form of subjective probability percentile assessments. Based on these assessments, probability distributions on vehicle and roadway costs, capacity and market penetration were developed for the different scenarios. The cost/benefit risk methodology and analysis provide insights by showing how uncertainties in key factors translate into uncertainties in summary cost/benefit indices.

Sicherman, A.

1994-10-01T23:59:59.000Z

173

Quantum Key Distribution Using Quantum Faraday Rotators  

E-Print Network (OSTI)

We propose a new quantum key distribution (QKD) protocol based on the fully quantum mechanical states of the Faraday rotators. The protocol is unconditionally secure against eavesdropping for single-photon source on a noisy environment and robust against impersonation attacks. It also allows for unconditionally secure key distribution for multiphoton source up to two photons. The protocol could be implemented experimentally with the current spintronics technology on semiconductors.

Choi, T; Choi, Mahn-Soo; Choi, Taeseung

2006-01-01T23:59:59.000Z

174

Multipartite secret key distillation and bound entanglement  

Science Conference Proceedings (OSTI)

Recently it has been shown that quantum cryptography beyond pure entanglement distillation is possible and a paradigm for the associated protocols has been established. Here we systematically generalize the whole paradigm to the multipartite scenario. We provide constructions of new classes of multipartite bound entangled states, i.e., those with underlying twisted Greenberger-Horne-Zeilinger (GHZ) structure and nonzero distillable cryptographic key. We quantitatively estimate the key from below with the help of the privacy squeezing technique.

Augusiak, Remigiusz; Horodecki, Pawel [Faculty of Applied Physics and Mathematics, Gdansk University of Technology, Narutowicza 11/12, 80-952 Gdansk (Poland) and ICFO-Institute Ciencies Fotoniques, Mediterranean Technology Park, 08860 Castelldefels (Barcelona) (Spain); Faculty of Applied Physics and Mathematics, Gdansk University of Technology, Narutowicza 11/12, 80-952 Gdansk (Poland)

2009-10-15T23:59:59.000Z

175

High Efficient Secret Key Distillation for Long Distance Continuous Variable Quantum Key Distribution  

E-Print Network (OSTI)

The continuous variable quantum key distribution is expected to provide high secret key rate without single photon source and detector, but the lack of the secure and effective key distillation method makes it unpractical. Here, we present a secure single-bit-reverse-reconciliation protocol combined with secret information concentration and post-selection, which can distill the secret key with high efficiency and low computational complexity. The simulation results show that this protocol can provide high secret key rate even when the transmission fiber is longer than 150km, which may make the continuous variable scheme to outvie the single photon one.

Yi-bo Zhao; Zheng-fu Han; Jin-jian Chen; You-zhen Gui; Guang-can Guo

2006-03-08T23:59:59.000Z

176

Analysis and calibration of social factors in a consumer acceptance and adoption model for diffusion of diesel vehicle in Europe  

E-Print Network (OSTI)

While large scale diffusion of alternative fuel vehicles (AFVs) is widely anticipated, the mechanisms that determine their success or failure are ill understood. Analysis of an AFV transition model developed at MIT has ...

Zhang, Qi, S.M. Massachusetts Institute of Technology

2008-01-01T23:59:59.000Z

177

ROOT CAUSE ANALYSIS PROGRAM MANUAL  

E-Print Network (OSTI)

the problem is obscure. Analysis, Events and Causal Factor:Good Better Best Change Analysis Event and Causal FactorsEvents and Causal Factors Charting and Analysis Identifying

Gravois, Melanie C.

2007-01-01T23:59:59.000Z

178

Essential lack of security proof in quantum key distribution  

E-Print Network (OSTI)

All the currently available unconditional security proofs on quantum key distribution, in particular for the BB84 protocol and its variants including continuous-variable ones, are invalid or incomplete at many points. In this paper we discuss some of the main known problems, particularly those on operational security guarantee and error correction. Most basic are the points that there is no security parameter in such protocols and it is not the case the generated key is perfect with probability $\\geq 1-\\epsilon$ under the trace distance criterion $d\\leq\\epsilon$, which is widely claimed in the technical and popular literature. The many serious security consequences of this error about the QKD generated key would be explained, including practical ramification on achievable security levels. It will be shown how the error correction problem alone may already defy rigorous quantitative analysis. Various other problems would be touched upon. It is pointed out that rigorous security guarantee of much more efficient quantum cryptosystems may be obtained by abandoning the disturbance-information tradeoff principle and utilizing instead the known KCQ (keyed communication in quantum noise) principle in conjunction with a new DBM (decoy bits method) principle that will be detailed elsewhere.

Horace P. Yuen

2013-10-02T23:59:59.000Z

179

NIST Special Publication 800-57, Recommendation for Key ...  

Science Conference Proceedings (OSTI)

... keying material from key backup or archive. ... term “random number generator” (RNG) is ... Deterministic Random Bit Generators (DRBGs), sometimes ...

2012-07-10T23:59:59.000Z

180

ITL Bulletin Generating Secure Cryptographic Keys: A Critical ...  

Science Conference Proceedings (OSTI)

... KEYS: A CRITICAL COMPONENT OF CRYPTOGRAPHIC ... relies upon two basic components: an algorithm (or ... and of keys for symmetric algorithms. ...

2013-04-16T23:59:59.000Z

Note: This page contains sample records for the topic "analysis key factors" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

A secure multiple-agent cryptographic key recovery system  

Science Conference Proceedings (OSTI)

Symmetric cryptography uses the same session key for message encryption and decryption. Without having it, the encrypted message will never be revealed. In case the session key is unavailable or government authorities need to inspect suspect messages, ... Keywords: key recovery, key recovery agent, key recovery center, secret sharing, session key

Kanokwan Kanyamee; Chanboon Sathitwiriyawong

2009-08-01T23:59:59.000Z

182

A Coarse to Fine Facial Key Landmark Points Locating Algorithm Based on Active Shape Model  

Science Conference Proceedings (OSTI)

In this paper, we proposed an improved coarse to fine improved algorithm to enhance the accuracy of facial key landmark points locating. Based on the analysis of PCA, the proposed algorithm redesigns the parameter update rule through adding a monotonically ... Keywords: ASM, facial key landmarks point locating

Bo Fan; Xiaokang Yang; Xi Zhou; Weiyao Lin; Changjian Chen

2012-12-01T23:59:59.000Z

183

Hydrogen Fuel Cell Performance in the Key Early Markets of Material Handling Equipment and Backup Power (Presentation)  

DOE Green Energy (OSTI)

This presentation summarizes the results of NREL's analysis of hydrogen fuel cell performance in the key early markets of material handling equipment (MHE) and backup power.

Kurtz, J.; Sprik, S.; Ramsden, T.; Saur, G.; Ainscough, C.; Post, M.; Peters, M.

2013-10-01T23:59:59.000Z

184

STGWG Key Outcomes for May 3, 2010  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Key Outcomes-Nashville 2010 Page 1 Key Outcomes-Nashville 2010 Page 1 State and Tribal Government Working Group (STGWG) Nashville, Tennessee - May 3, 2010 KEY OUTCOMES OVERVIEW Members appreciated the participation of all DOE officials at the STGWG meeting in Nashville, and are especially appreciative of the participation of high-level DOE management, such as Sky Gallegos, Deputy Assistant Secretary of the Office of Congressional and Intergovernmental Affairs, and Frank Marcinowski, Acting Chief Technical Officer and Deputy Assistant Secretary for Technical and Regulatory Support. Such participation demonstrates a continuing commitment to improve interaction with tribes and states. STGWG looks forward to our next Intergovernmental meeting with DOE in the fall. FULL STGWG ISSUES

185

Composite keys? | OpenEI Community  

Open Energy Info (EERE)

Composite keys? Home > Groups > Databus Does DataBus support using composite keys in a Table definition? If not, is there a way to automatically generate a unique value for each entry that is uploaded? Submitted by Hopcroft on 5 September, 2013 - 17:13 1 answer Points: 0 At this time, no, and no way to generate unique key either right now. You can submit a feature request for this though on github. thanks, Dean Deanhiller on 6 September, 2013 - 06:58 Groups Menu You must login in order to post into this group. Recent content Go to My Databus->Data Streams... yes, it is done the same way y... Update rows? How to use streaming chart? if you are an administrator, s... more Group members (7) Managers: Deanhiller Recent members: Bradmin Hopcroft Vikasgoyal Ksearight

186

Public key infrastructure for DOE security research  

SciTech Connect

This document summarizes the Department of Energy`s Second Joint Energy Research/Defence Programs Security Research Workshop. The workshop, built on the results of the first Joint Workshop which reviewed security requirements represented in a range of mission-critical ER and DP applications, discussed commonalties and differences in ER/DP requirements and approaches, and identified an integrated common set of security research priorities. One significant conclusion of the first workshop was that progress in a broad spectrum of DOE-relevant security problems and applications could best be addressed through public-key cryptography based systems, and therefore depended upon the existence of a robust, broadly deployed public-key infrastructure. Hence, public-key infrastructure ({open_quotes}PKI{close_quotes}) was adopted as a primary focus for the second workshop. The Second Joint Workshop covered a range of DOE security research and deployment efforts, as well as summaries of the state of the art in various areas relating to public-key technologies. Key findings were that a broad range of DOE applications can benefit from security architectures and technologies built on a robust, flexible, widely deployed public-key infrastructure; that there exists a collection of specific requirements for missing or undeveloped PKI functionality, together with a preliminary assessment of how these requirements can be met; that, while commercial developments can be expected to provide many relevant security technologies, there are important capabilities that commercial developments will not address, due to the unique scale, performance, diversity, distributed nature, and sensitivity of DOE applications; that DOE should encourage and support research activities intended to increase understanding of security technology requirements, and to develop critical components not forthcoming from other sources in a timely manner.

Aiken, R.; Foster, I.; Johnston, W.E. [and others

1997-06-01T23:59:59.000Z

187

A Key Review On Exergetic Analysis And Assessment Of Renewable...  

Open Energy Info (EERE)

applications such as solar water heating systems, solar space heating and cooling, solar refrigeration, solar cookers, industrial process heat, solar desalination systems and...

188

Impact analysis of MBTA 2009 Key Bus Route Initiative program  

E-Print Network (OSTI)

The Massachusetts Bay Transit Agency (MBTA) has the stated service objectives of customer service excellence, accessibility, reliability, and state-of-the-art technology. Over the last few years, the MBTA has been concerned ...

Krysinski, Yann

2010-01-01T23:59:59.000Z

189

Comparative Analysis of US Metal Flow and Recycling for Key ...  

Science Conference Proceedings (OSTI)

Conference Tools for 2014 TMS Annual Meeting & Exhibition ... Symposium, Energy Technologies and Carbon Dioxide Management ... based on the existing life cycle studies are critically reviewed and compared: (a) ... J3: Corrosion Behavior of Differently Heat Treated Steels in CCS Environment with Supercritical CO2.

190

Nonorthogonal decoy-state Quantum Key Distribution  

E-Print Network (OSTI)

In practical quantum key distribution (QKD), weak coherent states as the photon sources have a limit in secure key rate and transmission distance because of the existence of multiphoton pulses and heavy loss in transmission line. Decoy states method and nonorthogonal encoding protocol are two important weapons to combat these effects. Here, we combine these two methods and propose a efficient method that can substantially improve the performance of QKD. We find a 79 km increase in transmission distance over the prior record using decoy states method.

Li, J B; Li, Jing-Bo; Fang, Xi-Ming

2005-01-01T23:59:59.000Z

191

Complementarity, distillable secret key, and distillable entanglement  

E-Print Network (OSTI)

We consider controllability of two conjugate observables Z and X by two parties with classical communication. The ability is specified by two alternative tasks, (i) agreement on Z and (ii) preparation of an eigenstate of X with use of an extra communication channel. We prove that their feasibility is equivalent to that of key distillation if the extra channel is quantum, and to that of entanglement distillation if it is classical. This clarifies the distinction between two entanglement measures, distillable key and distillable entanglement.

Masato Koashi

2007-04-27T23:59:59.000Z

192

Quantum repeaters and quantum key distribution: the impact of entanglement distillation on the secret key rate  

E-Print Network (OSTI)

We investigate quantum repeaters in the context of quantum key distribution. We optimize the secret key rate per memory per second with respect to different distillation protocols and distillation strategies. For this purpose, we also derive an analytical expression for the average number of entangled pairs created by the quantum repeater, including classical communication times for entanglement swapping and entanglement distillation. We investigate the impact of this classical communication time on the secret key rate. We finally study the effect of the detector efficiency on the secret key rate.

Sylvia Bratzik; Silvestre Abruzzo; Hermann Kampermann; Dagmar Bruß

2013-03-14T23:59:59.000Z

193

Thailand-Key Results and Policy Recommendations for Future Bioenergy  

Open Energy Info (EERE)

and Policy Recommendations for Future Bioenergy and Policy Recommendations for Future Bioenergy Development Jump to: navigation, search Name Thailand-Key Results and Policy Recommendations for Future Bioenergy Development Agency/Company /Organization Food and Agriculture Organization of the United Nations Sector Land Focus Area Biomass, Agriculture Topics Co-benefits assessment, Policies/deployment programs, Background analysis Resource Type Lessons learned/best practices Website http://www.fao.org/docrep/013/ Country Thailand UN Region South-Eastern Asia References Thailand-Key Results and Policy Recommendations for Future Bioenergy Development[1] Abstract "The Government of Thailand, through its Alternative Energy Development Plan, has set a target to increase biofuel production to five billion

194

Basics about CIM technology and key  

E-Print Network (OSTI)

Basics about CIM® technology and key applications Ales Strancar March, 2011 #12;Leaders in Monolith monolithic technology (CIM®). 4 USA patents granted including their foreign equivalents, more pending. #12;Important Milestones · 2002: First Drug Master File (DMF) for CIM® DEAE supports. · 2002: Pass first FDA

Lebendiker, Mario

195

Key issues of RFID reader network system  

Science Conference Proceedings (OSTI)

RFID system is used widely in different applications and comes in a myriad of forms today. It is doomed to be concerned by people and still be the hot spot of research in the next few years. In this paper, Key issues of RFID reader network system are ... Keywords: RFID, WSN, anti-collision algorithm, taxonomy

Leian Liu; Dashun yan; Jiapei Wu; Hongjiang Wang

2009-09-01T23:59:59.000Z

196

Key Management Challenges in Smart Grid  

Science Conference Proceedings (OSTI)

Agenda Awarded in February 2011 Team of industry and research organizations Project Objectives Address difficult issues Complexity Diversity of systems Scale Longevity of solution Participate in standards efforts and working groups Develop innovative key management solutions Modeling and simulation ORNL Cyber Security Econometric Enterprise System Demonstrate effectiveness of solution Demonstrate scalability

Sheldon, Frederick T [ORNL; Duren, Mike [Sypris Electronics, LLC

2012-01-01T23:59:59.000Z

197

Key Findings and Recommendations for Improvement NIST ...  

Science Conference Proceedings (OSTI)

... heat detection/fire alarm system was installed in the ... b) increasing the capacity of the ... eliminating trade-offs between sprinkler installation and factors ...

2011-08-15T23:59:59.000Z

198

Accountable key infrastructure (AKI): a proposal for a public-key validation infrastructure  

Science Conference Proceedings (OSTI)

Recent trends in public-key infrastructure research explore the tradeoff between decreased trust in Certificate Authorities (CAs), resilience against attacks, communication overhead (bandwidth and latency) for setting up an SSL/TLS connection, and availability ... Keywords: accountability, certificate validation, public log servers, public-key infrastructure, ssl, tls

Tiffany Hyun-Jin Kim, Lin-Shung Huang, Adrian Perring, Collin Jackson, Virgil Gligor

2013-05-01T23:59:59.000Z

199

Compilation of Diversity Factors and Schedules for Energy and Cooling Load Calculations, Phase II Report - Identified Relevant Data Sets, Methods, and Variability Analysis  

E-Print Network (OSTI)

This is the second report of the ASHRAE 1093-RP project that reports on the progress during the scheduled Phase II effort. In this report, we present: (1) the data sets identified and acquired required for the analysis; (2) the method adopted for classifying the Office building categories; (3) the relevant methods for daytyping necessary for creating the typical load shapes for energy and cooling load calculation; (4) the relevant robust variability (uncertainty) analysis; (5) typical load shapes reported in the literature; (6) a test to assure the non-weather dependency (seasonal variation) of the lighting and equipment data sets; and (7) a proposed occupancy surrogate variable. The results obtained during Phase II will enable us to proceed with Phase III, as planned. Phase III will cover: (1) developing the typical load shapes for the acquired data sets, using the proposed method, for both energy and cooling load calculations; (2) developing the tool-kit for deriving the new diversity factors and general guidelines for their use; and (3) developing illustrative examples of the use of the diversity factors in the DOE-2 and BLAST simulation programs.

Abushakra, B.; Haberl, J. S.; Claridge, D. E.

1999-01-01T23:59:59.000Z

200

Leakage resilient strong key-insulated signatures in public channel  

Science Conference Proceedings (OSTI)

Key-insulation aims at minimizing (i.e., compartmentalizing) the damage of users from key exposures, and traditionally requires a private channel of communication between a user and a semi-trusted party called a helper to refresh the private keys. The ... Keywords: continual key leakage, key-insulation, public channel, signatures

Le Trieu Phong; Shin'ichiro Matsuo; Moti Yung

2010-12-01T23:59:59.000Z

Note: This page contains sample records for the topic "analysis key factors" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Key Facts: Solyndra Solar | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

You are here You are here Home » Key Facts: Solyndra Solar Key Facts: Solyndra Solar On September 1, 2011, Solyndra, a solar energy start-up and recipient of an Energy Department loan guarantee, declared bankruptcy. While this event is deeply disappointing, at the time the loan guarantee was issued, Solyndra was widely seen as a promising and innovative company: Solyndra was named one of the world's "50 Most Innovative Companies" in 2010 by MIT's Technology Review and included in the Wall Street Journal's "The Next Big Thing: Top 50 Venture Backed Companies." Private investors, after conducting their own careful review of Solyndra, put $1 billion of their own private capital behind the company. Solyndra reported sales growth of 40% from 2009 to 2010, from $100

202

Practical Decoy State for Quantum Key Distribution  

E-Print Network (OSTI)

Decoy states have recently been proposed as a useful method for substantially improving the performance of quantum key distribution. Here, we present a general theory of the decoy state protocol based on only two decoy states and one signal state. We perform optimization on the choice of intensities of the two decoy states and the signal state. Our result shows that a decoy state protocol with only two types of decoy states--the vacuum and a weak decoy state--asymptotically approaches the theoretical limit of the most general type of decoy state protocols (with an infinite number of decoy states). We also present a one-decoy-state protocol. Moreover, we provide estimations on the effects of statistical fluctuations and suggest that, even for long distance (larger than 100km) QKD, our two-decoy-state protocol can be implemented with only a few hours of experimental data. In conclusion, decoy state quantum key distribution is highly practical.

X. Ma; B. Qi; Y. Zhao; H. -K. Lo

2005-03-01T23:59:59.000Z

203

Key Physical Mechanisms in Nanostructured Solar Cells  

DOE Green Energy (OSTI)

The objective of the project was to study both theoretically and experimentally the excitation, recombination and transport properties required for nanostructured solar cells to deliver energy conversion efficiencies well in excess of conventional limits. These objectives were met by concentrating on three key areas, namely, investigation of physical mechanisms present in nanostructured solar cells, characterization of loss mechanisms in nanostructured solar cells and determining the properties required of nanostructured solar cells in order to achieve high efficiency and the design implications.

Dr Stephan Bremner

2010-07-21T23:59:59.000Z

204

Numerical Simulation of a Displacement Ventilation System with Multi-heat Sources and Analysis of Influential Factors  

E-Print Network (OSTI)

Displacement ventilation (DV) is a promising ventilation concept due to its high ventilation efficiency. In this paper, the application of the CFD method, the velocity and temperature fields of three-dimensional displacement ventilation systems with double heat sources are numerically simulated. The model is verified by experimental data. The results of the study show that thermal stratification characteristics exist in indoor temperature fields. The paper also analyzes the influence of different influential factors, e.g., the distance between heat sources, temperature of heat source, heat characteristics of the wall and outdoor temperature. It was found that the human requirement for comfort is satisfied easily when the distance between heat sources is long. Under the conditions simulated in this paper, when the distance was more than 0.8m, the temperature distribution tended to be average and steady, and it did not change as the distance changed. Second, the temperature change of the thermal current has a large influence on the indoor temperature. The rise in thermal current temperature makes the vertical temperature gradient in the room increase. The upper temperature of the room becomes higher, as does the height of the high temperature air level that lies in the upper part of the room. Finally, both the heat loss of the surrounding structure and the change in outdoor temperature have a large influence on indoor temperature. However, it does not influence the thermal stratification characteristics of DV. The only thing that has changed is the thermal stratification height.

Wu, X.; Gao, J.; Wu, W.

2006-01-01T23:59:59.000Z

205

NREL: Energy Analysis - Hydrogen and Fuel Cells Technology Analysis  

NLE Websites -- All DOE Office Websites (Extended Search)

Sciences Geothermal Hydrogen and Fuel Cells Solar Vehicles and Fuels Research Wind Market Analysis Policy Analysis Sustainability Analysis Key Activities Models & Tools Data &...

206

Method for encryption and transmission of digital keying data  

DOE Patents (OSTI)

A method for the encryption, transmission, and subsequent decryption of digital keying data. The method utilizes the Data Encryption Standard and is implemented by means of a pair of apparatus, each of which is selectable to operate as either a master unit or remote unit. Each unit contains a set of key encryption keys which are indexed by a common indexing system. The master unit operates upon command from the remote unit to generate a data encryption key and encrypt the data encryption key using a preselected key encryption key. The encrypted data encryption key and an index designator are then downloaded to the remote unit, where the data encryption key is decrypted for subsequent use in the encryption and transmission data. Downloading of the encrypted data encryption key enables frequent change of keys without requiring manual entry or storage of keys at the remote unit.

Mniszewski, Susan M. (Los Alamos, NM); Springer, Edward A. (Los Alamos, NM); Brenner, David P. (North Collins, NY)

1988-01-01T23:59:59.000Z

207

PKM: a pairwise key management scheme for wireless sensor networks  

Science Conference Proceedings (OSTI)

Sensor networks are characterized by strict resource limitations and large scalability. Many sensor network applications require secure communication, a crucial component, especially in harsh environments. Symmetric key cryptography is very attractive ... Keywords: key distribution, key management, security, sensor networks

F. An; X. Cheng; J. M. Rivera; J. Li; Z. Cheng

2005-08-01T23:59:59.000Z

208

Key Renewable Energy Opportunities for Oklahoma Tribes | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Key Renewable Energy Opportunities for Oklahoma Tribes Key Renewable Energy Opportunities for Oklahoma Tribes August 13, 2012 Oklahoma City, Oklahoma Cox Convention Center The...

209

Single, Key Gene Discovery Could Streamline Production of Biofuels...  

NLE Websites -- All DOE Office Websites (Extended Search)

Single, Key Gene Discovery Could Streamline Production of Biofuels Single, Key Gene Discovery Could Streamline Production of Biofuels August 11, 2011 - 3:51pm Addthis WASHINGTON,...

210

Vehicle Electrification is Key to Reducing Petroleum Dependency...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Vehicle Electrification is Key to Reducing Petroleum Dependency and Greenhouse Gas Emission Vehicle Electrification is Key to Reducing Petroleum Dependency and Greenhouse Gas...

211

Building Technologies Office: Key Activities in Energy Efficiency  

NLE Websites -- All DOE Office Websites (Extended Search)

Energy Efficiency to someone by E-mail Share Building Technologies Office: Key Activities in Energy Efficiency on Facebook Tweet about Building Technologies Office: Key Activities...

212

Energy: Critical Infrastructure and Key Resources Sector-Specific...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Energy: Critical Infrastructure and Key Resources Sector-Specific Plan as input to the National Infrastructure Protection Plan (Redacted) Energy: Critical Infrastructure and Key...

213

Energy Critical Infrastructure and Key Resources Sector-Specific...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Energy Critical Infrastructure and Key Resources Sector-Specific Plan as input to the National Infrastructure Protection Plan (Redacted) Energy Critical Infrastructure and Key...

214

Technology Key to Harnessing Natural Gas Potential | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Key to Harnessing Natural Gas Potential Technology Key to Harnessing Natural Gas Potential July 18, 2012 - 3:52pm Addthis Deputy Secretary Daniel Poneman tours Proinlosa Energy...

215

NIST SP 800-57, Recommendation for Key Management ...  

Science Conference Proceedings (OSTI)

... service use a hash function as a component of the ... mitigated by splitting the key into components that are ... a. When a symmetric key is used only for ...

2012-12-12T23:59:59.000Z

216

NERSC Played Key Role in Nobel Laureate's Discovery  

NLE Websites -- All DOE Office Websites (Extended Search)

Played Key Role in Nobel Laureate's Discovery NERSC Played Key Role in Nobel Laureate's Discovery NERSC, Berkeley Lab Now Centers for Computational Cosmology Community October 4,...

217

TEC Working Group Topic Groups Rail Key Documents Planning Subgroup...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Rail Key Documents Planning Subgroup TEC Working Group Topic Groups Rail Key Documents Planning Subgroup Planning Subgroup Rail Planning Timeline Benchmarking Project: AREVA Trip...

218

Many-core key-value store  

Science Conference Proceedings (OSTI)

Scaling data centers to handle task-parallel work-loads requires balancing the cost of hardware, operations, and power. Low-power, low-core-count servers reduce costs in one of these dimensions, but may require additional nodes to provide the required ... Keywords: 64-core Tilera TILEPro64, many-core key-value store, data centers, task-parallel workloads, low-core-count servers, low-power servers, under-utilizing memory, power consumption, high-core-count processor, clock rate, 4-core Intel Xeon L5520, 8-core AMD Opteron 6128 HE

M. Berezecki; E. Frachtenberg; M. Paleczny; K. Steele

2011-07-01T23:59:59.000Z

219

Quantum Key Distribution Highly Sensitive to Eavesdropping  

E-Print Network (OSTI)

We introduce a new quantum key distribution protocol that uses d-level quantum systems to encode an alphabet with c letters. It has the property that the error rate introduced by an intercept-and-resend attack tends to one as the numbers c and d increase. In dimension d=2, when the legitimate parties use a complete set of three mutually unbiased bases, the protocol achieves a quantum bit error rate of 57.1%. This represents a significant improvement over the 25% quantum bit error rate achieved in the BB84 protocol or 33% in the six-state protocol.

Brierley, Stephen

2009-01-01T23:59:59.000Z

220

Quantum Key Distribution Highly Sensitive to Eavesdropping  

E-Print Network (OSTI)

We introduce a new quantum key distribution protocol that uses d-level quantum systems to encode an alphabet with c letters. It has the property that the error rate introduced by an intercept-and-resend attack tends to one as the numbers c and d increase. In dimension d=2, when the legitimate parties use a complete set of three mutually unbiased bases, the protocol achieves a quantum bit error rate of 57.1%. This represents a significant improvement over the 25% quantum bit error rate achieved in the BB84 protocol or 33% in the six-state protocol.

Stephen Brierley

2009-10-14T23:59:59.000Z

Note: This page contains sample records for the topic "analysis key factors" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

A verifiable random function with short proofs and keys  

E-Print Network (OSTI)

Abstract. We give a simple and efficient construction of a verifiable random function (VRF) on bilinear groups. Our construction is direct. In contrast to prior VRF constructions [14, 15], it avoids using an inefficient Goldreich-Levin transformation, thereby saving several factors in security. Our proofs of security are based on a decisional bilinear Diffie-Hellman inversion assumption, which seems reasonable given current state of knowledge. For small message spaces, our VRF’s proofs and keys have constant size. By utilizing a collision-resistant hash function, our VRF can also be used with arbitrary message spaces. We show that our scheme can be instantiated with an elliptic group of very reasonable size. Furthermore, it can be made distributed and proactive. 1

Yevgeniy Dodis; R Yampolskiy

2005-01-01T23:59:59.000Z

222

HOPF BIFURCATION AS AN INTERMEDIATE-SCALE INSTABILITY IN SINGLE-STAGE POWER-FACTOR-CORRECTION POWER SUPPLIES: ANALYSIS, SIMULATIONS AND EXPERIMENTAL VERIFICATION  

E-Print Network (OSTI)

This paper reports intermediate-scale instability in a single-stage power-factor-correction (PFC) power supply that employs a cascade configuration of a boost stage operating in discontinuous conduction mode (DCM) and a forward stage operating in continuous conduction mode (CCM). The two stages combine into a single stage by sharing one main switch and one control loop to achieve input PFC and tight output regulation. The main results are given by “exact ” cycle-bycycle circuit simulations. The effect of the intermediate-scale instability on the attainable power factor is illustrated in terms of total harmonic distortion (THD) which is found by taking the Fast Fourier Transform (FFT) of the input current. The intermediate-scale instability usually manifests itself as local oscillations within a line cycle. Based on the stability analysis of a buck converter operating in CCM, the underlying mechanism of such instability can be attributed to the Hopf bifurcation that occurred in CCM forward stage. Finally, experimental results are presented for verification purposes.

Dong Dai; Chik. Tse; Bo Zhang; Xikui Ma

2007-01-01T23:59:59.000Z

223

Toolpusher is key to efficient rig operation  

Science Conference Proceedings (OSTI)

Toolpushers earn a higher salary, control more personnel, and are responsible for a more expensive operation than many graduate MBAs. As a result, toolpushers are key to improved rig efficiencies and reduced crew turnover. For example, by having its toolpushers in Libya implement a new managerial approach, Santa Fe Drilling Co. reduced labor turnover 30%, reduced the number of lost-time accidents 58%, and increased average rig inspection scores 6%. During the boom years of drilling, toolpushers complained often about the poor quality of roustabouts and roughnecks assigned to them. Many toolpushers held poor screening of personnel responsible, and felt justified in firing those who were slow to adapt. Few of them considered that they were directly responsible. Today's toolpusher must realize that he is responsible not only for the rig, its maintenance, and its drilling performance, but for training and development of the rig's personnel as well.

Fortney, K.

1983-09-01T23:59:59.000Z

224

Key decisions near for Chad pipeline proposal  

Science Conference Proceedings (OSTI)

The World Bank is expected to play a key role in a proposed $3 billion development of oil fields in Chad and an export pipeline through Cameroon to the Atlantic Ocean. The project, which has been at least 4 years in the making, could see a breakthrough later this year. Esso Exploration and production Chad Inc. is operator for the consortium proposing the project. It holds a 40% interest, Ste. Shell Tchadienne de Recherches et d`Exploitation has 40%, and Elf Hydrocarbures Tchad has a 20% share it purchased from Chevron Corp. in 1993 (OGJ, February 1, 1993, p 25). The governments of Chad and Cameroon, which had approved a framework agreement for the pipeline in 1995, now are studying an assessment of the pipeline`s environmental impact. If they approve the plans, they are expected to apply to the World Bank for financing. The paper describes the Chad fields, the export pipeline, background information, and the Banks role.

Crow, P.

1997-05-12T23:59:59.000Z

225

Key Renewable Energy Opportunities for Oklahoma Tribes  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

TRIBAL LEADER FORUM SERIES TRIBAL LEADER FORUM SERIES KEY RENEWABLE ENERGY OPPORTUNITIES FOR OKLAHOMA TRIBES August 13, 2012 COX CONVENTION CENTER 100 West Sheridan Avenue, Oklahoma City, OK 73102 (405) 602-8500 The fifth in a series of planned U.S. DOE Office of Indian Energy-sponsored strategic energy development & investment forums, this forum is designed to give Oklahoma tribal leaders the opportunity to receive the latest updates on DOE's energy development efforts in Indian Country. The Forum will provide a venue for tribal leaders to discuss best practices in renewable energy development, including project development and finance, issues related to Oklahoma land ownership, and energy planning and energy markets. Tribal leaders will also have the opportunity to directly converse with each other by participating in a roundtable

226

Industry-Wide Transformer Database: Key Findings and Case Studies  

Science Conference Proceedings (OSTI)

This report summarizes the development and application of the Electric Power Research Institute’s (EPRI’s) Industry-Wide Database (IDB) for power transformers. The IDB is a repository of detailed transformer performance data. Analysis of these data can provide information about the past performance of power transformers and the factors that influence that performance. With enough data, projections can be made about future performance, such as expected service life. Both past and ...

2013-12-19T23:59:59.000Z

227

Problems of Security Proofs and Fundamental Limit on Key Generation Rate in Quantum Key Distribution  

E-Print Network (OSTI)

It is pointed out that treatments of the error correcting code in current quantum key distribution protocols of the BB84 type are not correct under joint attack, and the general interpretation of the trace distance security criterion is also incorrect. With correct interpretation of the criterion as well as a correct treatment of the error correcting code and privacy amplification code, it is shown that even for an ideal system under just collective attack, the maximum tolerable quantum bit error rate is about 1.5% and a net key cannot actually be generated with practical error correcting codes even at such low rates, contrary to claims in the literature.

Horace P. Yuen

2012-05-16T23:59:59.000Z

228

Compression station key to Texas pipeline project  

SciTech Connect

This was probably the largest pipeline project in the US last year, and the largest in Texas in the last decade. The new compressor station is a key element in this project. TECO, its servicing dealer, and compression packager worked closely throughout the planning and installation stages of the project. To handle the amount of gas required, TECO selected the GEMINI F604-1 compressor, a four-throw, single-stage unit with a six-inch stroke manufactured by Weatherford Enterra Compression Co. (WECC) in Corpus Christi, TX. TECO also chose WECC to package the compressors. Responsibility for ongoing support of the units will be shared among TECO, the service dealer and the packager. TECO is sending people to be trained by WECC, and because the G3600 family of engines is still relatively new, both the Caterpillar dealer and WECC sent people for advanced training at Caterpillar facilities in Peoria, IL. As part of its service commitment to TECO, the servicing dealer drew up a detailed product support plan, encompassing these five concerns: Training, tooling; parts support; service support; and commissioning.

NONE

1996-10-01T23:59:59.000Z

229

Is ICT the Key to Development?  

Science Conference Proceedings (OSTI)

Using panel data for 52 developed and developing countries over the period 1998-2006, this article examines the links between information and communication technology diffusion and human development. We conducted a panel regression analysis of the investments ... Keywords: Human Development Index, Information and Communication Technology, Panel Data, Quantile Regression

Roya Gholami; Dolores Añón Higón; Payam Hanafizadeh; Ali Emrouznejad

2010-01-01T23:59:59.000Z

230

Physical factors controlling the ductility of bulk metallic glasses  

SciTech Connect

In order to identify key physical factor controlling the deformation and fracture behavior of bulk metallic glasses (BMGs), we compiled and analyzed the elastic moduli and compressive ductility for BMGs. In addition, new modulus data were generated in the critical ranges in order to facilitate the analysis. We have found that the intrinsic ductility of BMGs can be correlated with the bulk-to-shear modulus ratio B/G according to Pugh's [Philos. Mag. 45, 823 (1954) ] rule. In some individual BMG systems, for example, Fe based, the relationship seems to be very clear. The physical meaning of this correlation is discussed in terms of atomic bonding and connectivity.

Liu, Y. [Central South University, China; Liu, Chain T [ORNL; Zhang, Z. [University of Tennessee, Knoxville (UTK); Keppens, V. [University of Tennessee, Knoxville (UTK)

2008-01-01T23:59:59.000Z

231

Efficient password-based authenticated key exchange without public information  

Science Conference Proceedings (OSTI)

Since the first password-based authenticated key exchange (PAKE) was proposed, it has enjoyed a considerable amount of interest from the cryptographic research community. To our best knowledge, most of proposed PAKEs based on Diffie-Hellman key exchange ...

Jun Shao; Zhenfu Cao; Licheng Wang; Rongxing Lu

2007-09-01T23:59:59.000Z

232

Implementation of Distributed Key Generation Algorithms using Secure Sockets  

Science Conference Proceedings (OSTI)

Distributed Key Generation (DKG) protocols are indispensable in the design of any cryptosystem used in communication networks. DKG is needed to generate public/private keys for signatures or more generally for encrypting/decrypting messages. One such ...

A. T. Chronopoulos; F. Balbi; D. Veljkovic; N. Kolani

2004-08-01T23:59:59.000Z

233

Exploring the context : a small hotel in Key West  

E-Print Network (OSTI)

This thesis develops a personal method and approach for designing in a delicate context such as the Key West Historic District. This thesis is composed of two parts. The first part presents observations of Key West, focusing ...

VanBeuzekom, Edrick

1984-01-01T23:59:59.000Z

234

Key Ingredient: Change in Material Boosts Prospects of ...  

Science Conference Proceedings (OSTI)

Key Ingredient: Change in Material Boosts Prospects of Ultrafast Single-photon Detector. From NIST Tech Beat: June 30, 2011. ...

2011-10-14T23:59:59.000Z

235

Nano Changes Rise to Macro Importance in a Key Electronics ...  

Science Conference Proceedings (OSTI)

Nano Changes Rise to Macro Importance in a Key Electronics Material. From NIST Tech Beat: April 7, 2009. ...

2012-10-01T23:59:59.000Z

236

Better 'Photon Loops' May Be Key to Computer and Physics ...  

Science Conference Proceedings (OSTI)

Better 'Photon Loops' May Be Key to Computer and Physics Advances. From NIST Tech Beat: August 22, 2011. ...

2012-08-23T23:59:59.000Z

237

Energy Usage Data Standard for US Smart Grid Passes Key ...  

Science Conference Proceedings (OSTI)

Energy Usage Data Standard for US Smart Grid Passes Key Advisory Panel Vote. From NIST Tech Beat: March 1, 2011. ...

2011-03-01T23:59:59.000Z

238

ITL Bulletin - ITL Updates Glossary of Key Information Security ...  

Science Conference Proceedings (OSTI)

... ITL UPDATES GLOSSARY OF KEY INFORMATION SECURITY TERMS ... ITL plans to keep the glossary current by providing updates online. ...

2013-06-12T23:59:59.000Z

239

Quantum key distribution system clocked at 2 GHz  

E-Print Network (OSTI)

Quantum key distribution system clocked at 2 GHz Karen J. Gordon, Veronica Fernandez, Gerald S, Ireland http://www.phy.hw.ac.uk/resrev/photoncounting/index.html Abstract: An improved quantum key-based quantum key distribution test system performance in terms of transmission distance and quantum bit error

Buller, Gerald S.

240

Conversion Factor  

Gasoline and Diesel Fuel Update (EIA)

Conversion Factor (Btu per cubic foot) Production Marketed... 1,110 1,106 1,105 1,106 1,109 Extraction Loss ......

Note: This page contains sample records for the topic "analysis key factors" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

President Obama Announces More Key Administration Posts | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

President Obama Announces More Key Administration Posts President Obama Announces More Key Administration Posts President Obama Announces More Key Administration Posts November 29, 2011 - 4:34pm Addthis THE WHITE HOUSE Office of the Press Secretary FOR IMMEDIATE RELEASENovember 29, 2011 President Obama Announces More Key Administration Posts WASHINGTON, DC - Today, President Barack Obama announced his intent to nominate the following individuals to key Administration posts: Frederick "Rick" Barton - Assistant Secretary for Conflict and Stabilization Operations and Coordinator for Reconstruction and Stabilization, Department of State Arun Majumdar - Under Secretary of Energy, Department of Energy Marie F. Smith - Member, Social Security Advisory Board The President also announced his intent to appoint the following

242

Community Discovery via Metagraph Factorization  

Science Conference Proceedings (OSTI)

This work aims at discovering community structure in rich media social networks through analysis of time-varying, multirelational data. Community structure represents the latent social context of user actions. It has important applications such as search ... Keywords: MetaFac, community discovery, dynamic social network analysis, metagraph factorization, nonnegative tensor factorization, relational hypergraph

Yu-Ru Lin; Jimeng Sun; Hari Sundaram; Aisling Kelliher; Paul Castro; Ravi Konuru

2011-08-01T23:59:59.000Z

243

Strategic Energy Analysis at NREL (Presentation)  

3. Some Key Themes for Analysis. Core Areas: Market, Technology and Policy Analysis. Energy Modeling Analysis. Renewables, Hydrogen, Alt. Fuels. Risk, ...

244

Spot coal price trends vary across key basins during 2013 ...  

U.S. Energy Information Administration (EIA)

Analysis & Projections. Monthly and yearly energy forecasts, analysis of energy topics, financial analysis, Congressional reports. Markets & ...

245

Secret key distillation from shielded two-qubit states  

Science Conference Proceedings (OSTI)

The quantum states corresponding to a secret key are characterized using the so-called private states, where the key part consisting of a secret key is shielded by the additional systems. Based on the construction, it was shown that a secret key can be distilled from bound entangled states. In this work, I consider the shielded two-qubit states in a key-distillation scenario and derive the conditions under which a secret key can be distilled using the recurrence protocol or the two-way classical distillation, advantage distillation together with one-way postprocessing. From the security conditions, it is shown that a secret key can be distilled from bound entangled states in a much wider range. In addition, I consider the case that in which white noise is added to quantum states and show that the classical distillation protocol still works despite a certain amount of noise although the recurrence protocol does not.

Bae, Joonwoo [School of Computational Sciences, Korea Institute for Advanced Study, Seoul 130-722 (Korea, Republic of)

2010-05-15T23:59:59.000Z

246

Secret key distillation from shielded two-qubit states  

E-Print Network (OSTI)

The quantum states corresponding to a secret key are characterized using the so-called private states, where the key part consisting of a secret key is shielded by the additional systems. Based on the construction, it was shown that a secret key can be distilled from bound entangled states. In this work, I consider the shielded two-qubit states in a key-distillation scenario and derive the conditions under which a secret key can be distilled using the recurrence protocol or the two-way classical distillation, advantage distillation together with one-way postprocessing. From the security conditions, it is shown that a secret key can be distilled from bound entangled states in a much wider range. In addition, I consider the case that in which white noise is added to quantum states and show that the classical distillation protocol still works despite a certain amount of noise although the recurrence protocol does not.

Joonwoo Bae

2008-03-03T23:59:59.000Z

247

Douglas Factors  

Energy.gov (U.S. Department of Energy (DOE))

The Merit Systems Protection Board in its landmark decision, Douglas vs. Veterans Administration, 5 MSPR 280, established criteria that supervisors must consider in determining an appropriate penalty to impose for an act of employee misconduct. These twelve factors are commonly referred to as “Douglas Factors” and have been incorporated into the Federal Aviation Administration (FAA) Personnel Management System and various FAA Labor Agreements.

248

Key parameters influencing the performance of photocatalytic oxidation  

NLE Websites -- All DOE Office Websites (Extended Search)

Key parameters influencing the performance of photocatalytic oxidation Key parameters influencing the performance of photocatalytic oxidation (PCO) air purification under realistic indoor conditions Title Key parameters influencing the performance of photocatalytic oxidation (PCO) air purification under realistic indoor conditions Publication Type Journal Article Year of Publication 2012 Authors Destaillats, Hugo, Mohamad Sleiman, Douglas P. Sullivan, Catherine Jacquiod, Jean Sablayrolles, and Laurent Molins Journal Applied Catalysis B: Environmental Volume 128 Pagination 159-170 Date Published 11/30/2012 Abstract Photocatalytic oxidation (PCO) air cleaning is a promising technology suitable for the elimination of a broad range of volatile organic compounds (VOCs). However, performance of poorly designed PCO systems may be affected by the formation of volatile aldehydes and other partially oxidized byproducts. This study explored the role of key design and dimensioning parameters that influence the effective removal of primary pollutants and can help reduce or eliminate the formation of secondary byproducts. A model pollutant mixture containing benzene, toluene, o-xylene, undecane, 1-butanol, formaldehyde and acetaldehyde was introduced at a constant rate in a 20-m3 environmental chamber operating at an air exchange rate of 1 h-1. Individual pollutant concentrations were kept at realistically low levels, between 2 and 40 μg m-3. A prototype air cleaner provided with flat or pleated PCO filtering media was operated in an external ductwork loop that recirculated chamber air at flow rates in the range 178-878 m3 h-1, corresponding to recycle ratios between 8.5 and 38. Air samples were collected upstream and downstream of the air cleaner and analyzed off-line to determine single-pass removal efficiency. The final-to-initial chamber concentration ratio was used to determine the global chamber removal efficiency for each pollutant. In the flat filter configuration, longer dwelling times of compounds on the TiO2 surface were attained by reducing the recirculation airflow by a factor of ∼5, leading to increasing total pollutant removal efficiency from 5% to 44%. Net acetaldehyde and formaldehyde removal was achieved, the later at airflow rates below 300 m3 h-1, illustrating the critical importance of controlling the contact time of primary and secondary pollutants with the TiO2 surface. The use of pleated media was shown to increase significantly the system performance by extending the dwelling time of pollutants on the irradiated surface of the PCO media, with a 70% degradation of target pollutants. With the pleated media, formaldehyde removal efficiency increased to 60%. Irradiation using either a UVC or a UVA lamp under identical flow conditions produced similar pollutant elimination. A simple correlation between the steady-state single pass removal efficiency and the global chamber removal efficiency was used to rationalize these experimental results and identify optimal operating conditions.

249

Optimising waste management performance - The key to successful decommissioning  

SciTech Connect

Available in abstract form only. Full text of publication follows: On the 1. of April 2005 the United Kingdom's Nuclear Decommissioning Authority became responsible for the enormous task of decommissioning the UK's civilian nuclear liabilities. The success of the NDA in delivering its key objectives of safer, cheaper and faster decommissioning depends on a wide range factors. It is self-evident, however, that the development of robust waste management practices by those charged with decommissioning liability will be at the heart of the NDA's business. In addition, the implementation of rigorous waste minimisation techniques throughout decommissioning will deliver tangible environmental benefits as well as better value for money and release funds to accelerate the decommissioning program. There are mixed views as to whether waste minimisation can be achieved during decommissioning. There are those that argue that the radioactive inventory already exists, that the amount of radioactivity cannot be minimised and that the focus of activities should be focused on waste management rather than waste minimisation. Others argue that the management and decommissioning of the UK's civilian nuclear liability will generate significant volumes of additional radioactive waste and it is in this area where the opportunities for waste minimisation can be realised. (author)

Keep, Matthew [Entec UK Limited. 17 Angel Gate. City Road. London EC1V 2SH (United Kingdom)

2007-07-01T23:59:59.000Z

250

Transportation fuel use is a key factor in the outlook for U.S ...  

U.S. Energy Information Administration (EIA)

Tools; Glossary › All Reports ... weather; gasoline; capacity; nuclear; exports; forecast; View All Tags ...

251

A finite element model for hygro-thermo-mechanical analysis of masonry walls with FRP reinforcement  

Science Conference Proceedings (OSTI)

Modeling the effects of humidity and temperature gradients on the structural behavior of masonry walls reinforced with fiber reinforced polymer (FRP) composite is of great importance. Study of interfacial stresses, in particular, is a key factor in predicting ... Keywords: FRP reinforced masonry, Moisture and temperature, Multi-layered permeable structure, Structural analysis

Mehran Khoshbakht; Mark W. Lin

2010-10-01T23:59:59.000Z

252

EIA Data: 2011 United States Residential Sector Key Indicators and  

Open Energy Info (EERE)

Residential Sector Key Indicators and Residential Sector Key Indicators and Consumption Dataset Summary Description This dataset is the 2011 United States Residential Sector Key Indicators and Consumption, part of the Annual Energy Outlook that highlights changes in the AEO Reference case projections for key energy topics. Source EIA Date Released December 16th, 2010 (4 years ago) Date Updated Unknown Keywords consumption EIA energy residential sector key indicators Data application/vnd.ms-excel icon Residential Sector Key Indicators and Consumption (xls, 62.5 KiB) Quality Metrics Level of Review Peer Reviewed Comment Temporal and Spatial Coverage Frequency Annually Time Period License License Open Data Commons Public Domain Dedication and Licence (PDDL) Comment http://www.eia.gov/abouteia/copyrights_reuse.cfm

253

Population Status and Evaluation of Landscape Change for the Lower Keys Marsh Rabbit  

E-Print Network (OSTI)

Wildlife biologists and land managers tasked with the recovery of the endangered Lower Keys marsh rabbit (LKMR; Sylvilagus palustris hefneri) were in need of a current population estimate as well as a method to estimate the LKMR population annually. Habitat loss and fragmentation from population growth and development have threatened the existence of the LKMR. Establishing and understanding long-term habitat availability for the LKMR is important for determining causes of historical population declines as well as designing and implementing successful recovery plans. I conducted a range-wide pellet survey and a mark-recapture study to estimate the LKMR population. I evaluated the fit of 5 models and considered the variation in behavioral response model the best model. I correlated (r2 = 0.913) this model's rabbit abundance estimates to pellet density in 11 patches and generated a range-wide population estimate of 317, a western clade population of 257, an eastern clade population of 25, and translocated LKMR populations of 35 and 0 on Little Pine and Water keys, respectively. This prediction equation provides managers a quick, efficient, and non-invasive method to estimate LKMR abundance from pellet counts. To quantify the amount of habitat loss and fragmentation that occurred over the last 50 years, I systematically delineated and compared potential LKMR habitat using 1959 and 2006 aerial photographs. Additionally, I investigated if other factors could have reduced the amount of suitable habitat available for the LKMR with a comparison of habitat loss and fragmentation on a developed island and an undeveloped island. Range-wide, I found that number of habitat patches increased by 38, total class area decreased by 49.0%, and mean patch size decreased by 44.3%. Mean shape index increased by 4.2% and mean proximity index decreased by 13%. Both the 1959 and 2006 connectance indices were low while the 2006 set decreased 12.1%. I observed the same patterns of habitat loss and fragmentation on both the developed and undeveloped islands as I did in the range-wide landscape analysis. I found that LKMR habitat has declined in area and become more fragmented over the last 50 years. Habitat loss and fragmentation by development have directly endangered the LKMR; however, sea level rise and woody encroachment also could have historically caused habitat loss and fragmentation. Although development in LKMR habitat was halted, sea-level rise and woody encroachment could continue to alter LKMR habitat.

Schmidt, Jason Alan

2009-12-01T23:59:59.000Z

254

President Obama Announces More Key Administration Posts | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

President Obama Announces More Key Administration Posts President Obama Announces More Key Administration Posts President Obama Announces More Key Administration Posts May 28, 2009 - 12:00am Addthis WASHINGTON, DC - Today, President Barack Obama announced his intent to nominate the following individuals for key administration posts: Gordon Heddell, Inspector General, Department of Defense; Ellen Murray, Assistant Secretary for Resources and Technology, Department of Health and Human Services; Polly Trottenberg, Assistant Secretary for Transportation Policy, Department of Transportation; and James J. Markowsky, Assistant Secretary for Fossil Energy, Department of Energy. President Obama said, "Each of these individuals brings extensive expertise in their chosen fields, and they are joining my administration at a time

255

President Obama Announces More Key Administration Posts | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

President Obama Announces More Key Administration Posts President Obama Announces More Key Administration Posts President Obama Announces More Key Administration Posts April 17, 2009 - 12:00am Addthis WASHINGTON, DC - Today, President Barack Obama announced his intent to nominate the following individuals for key administration posts: Christine M. Griffin, Deputy Director of Office of Personnel Management; Kevin Concannon, Under Secretary for Food, Nutrition and Consumer Services, United States Department of Agriculture; Rajiv Shah, Under Secretary for Research, Education, and Economics, United States Department of Agriculture; Michael Nacht, Assistant Secretary of Defense (Global Strategic Affairs), Department of Defense; Mercedes Márquez, Assistant Secretary for Community Planning and Development, Department of Housing and

256

Florida Keys Electric Cooperative - Residential Rebate Program | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Florida Keys Electric Cooperative - Residential Rebate Program Florida Keys Electric Cooperative - Residential Rebate Program Florida Keys Electric Cooperative - Residential Rebate Program < Back Eligibility Residential Savings Category Home Weatherization Commercial Weatherization Sealing Your Home Heating & Cooling Commercial Heating & Cooling Cooling Insulation Design & Remodeling Windows, Doors, & Skylights Program Info State Florida Program Type Utility Rebate Program Rebate Amount Rebates $25 - $500, max $1000 per member Florida Keys Electric Cooperative offers residential members rebates for installing energy efficient measures. To qualify for rebates, members must first call FKEC and make an appointment for a free home energy audit. An FKEC trained auditor will assess the home and make recommendations for

257

NREL: News - NREL Fills Key Leadership Role for Energy Systems...  

NLE Websites -- All DOE Office Websites (Extended Search)

513 NREL Fills Key Leadership Role for Energy Systems Integration June 17, 2013 Bryan J. Hannegan will join the Energy Department's National Renewable Energy Laboratory on June 24...

258

Overview of Indian Hydrogen Program and Key Safety Issues of...  

NLE Websites -- All DOE Office Websites (Extended Search)

Hydrogen Energy Road Map - Initiatives - Target 2020 : GIFT - Programme in India - CNG - H 2 Programme - Partnership - Technology Development - Concerns & Challenges * Key...

259

Report Identifies Three Key R&D Priorities for Future ...  

Science Conference Proceedings (OSTI)

... Networking and Information Technology Research and Development Program. For more details, see “Report Identifies Three Key R&D Priorities for ...

2011-07-18T23:59:59.000Z

260

A Key Enzyme to the Potency of an Anticancer Agent  

NLE Websites -- All DOE Office Websites (Extended Search)

A Key Enzyme to the Potency of an Anticancer Agent Print Incorporation of halogen atoms into drug molecules often increases biological activity. This is the case with...

Note: This page contains sample records for the topic "analysis key factors" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Thailand-Key Results and Policy Recommendations for Future Bioenergy...  

Open Energy Info (EERE)

013 Country Thailand UN Region South-Eastern Asia References Thailand-Key Results and Policy Recommendations for Future Bioenergy Development1 Abstract "The Government of...

262

TEC Working Group Topic Groups Rail Key Documents Radiation Monitoring...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Radiation Monitoring Subgroup TEC Working Group Topic Groups Rail Key Documents Radiation Monitoring Subgroup Radiation Monitoring Subgroup Draft Work Plan - February 4, 2008 More...

263

Knowledge, Skills, and Abilities for Key Radiation Protection...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Notice No. 1 November 2007 DOE STANDARD KNOWLEDGE, SKILLS, AND ABILITIES FOR KEY RADIATION PROTECTION POSITIONS AT DOE FACILITIES U.S. Department of Energy FSC 6910...

264

Key Facts about the Mathematics and Computer Science Division...  

NLE Websites -- All DOE Office Websites (Extended Search)

Publications Documents Key Facts about the Mathematics and Computer Science Division Researchers in the Mathematics and Computer Science Division attack complex problems in four...

265

Fossil Energy Announces Addition of Three Key Staff Members ...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

appointment of three key senior staff members to the Office of Fossil Energy - James F. Wood, Deputy Assistant Secretary for Clean Coal; Christopher A. Smith, Deputy Assistant...

266

TEC Working Group Topic Groups Rail Key Documents Intermodal...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Intermodal Subgroup TEC Working Group Topic Groups Rail Key Documents Intermodal Subgroup Intermodal Subgroup Draft Work Plan More Documents & Publications TEC Working Group Topic...

267

Big Coppitt Key, Florida: Energy Resources | Open Energy Information  

Open Energy Info (EERE)

Bureau 2005 Place to 2006 CBSA Retrieved from "http:en.openei.orgwindex.php?titleBigCoppittKey,Florida&oldid227749" Categories: Places Stubs Cities What links here...

268

Big Pine Key, Florida: Energy Resources | Open Energy Information  

Open Energy Info (EERE)

Bureau 2005 Place to 2006 CBSA Retrieved from "http:en.openei.orgwindex.php?titleBigPineKey,Florida&oldid227765" Categories: Places Stubs Cities What links here...

269

Building Technologies Office: Key Activities in Energy Efficiency  

NLE Websites -- All DOE Office Websites (Extended Search)

work in three key areas in order to continually develop innovative, cost-effective energy saving solutions. research and development (R&D), market stimulation, and building...

270

Simple and efficient quantum key distribution with parametric down-conversion  

E-Print Network (OSTI)

We propose an efficient quantum key distribution protocol based on the photon-pair generation from parametric down-conversion (PDC). It uses the same experimental setup as the conventional protocol, but a refined data analysis enables detection of photon-number splitting attacks by utilizing information from a built-in decoy state. Assuming the use of practical detectors, we analyze the unconditional security of the new scheme and show that it improves the secure key generation rate by several orders of magnitude at long distances, using a high intensity PDC source.

Yoritoshi Adachi; Takashi Yamamoto; Masato Koashi; Nobuyuki Imoto

2006-10-15T23:59:59.000Z

271

Strange Quark Contribution to the Vector and Axial Form Factors of the Nucleon: Combined Analysis of G0, HAPPEx, and Brookhaven E734 Data  

E-Print Network (OSTI)

The strange quark contribution to the vector and axial form factors of the nucleon has been determined for momentum transfers in the range $0.45Lab, and elastic $\

S. F. Pate; D. W. McKee; V. Papavassiliou

2008-05-19T23:59:59.000Z

272

Analysis  

NLE Websites -- All DOE Office Websites (Extended Search)

Analysis Analysis of Short-Bunch Production with the APS Booster and a Bunch Compressor Michael Borland, AOD/OAG ∗ August 8, 2003 1 Abstract There is significant interest among x-ray scientists in short-pulse x-rays. The x-rays from the APS ring, although very bright, are produced by an electron bunch with an rms length of more than 30 ps. Typically, it is only a linear accelerator that can produce a very short bunch. An idea was brought to my attention by Glenn Decker that might allow us to produce a short bunch using the APS booster. This idea involves extracting the beam from the booster at 3 to 4 GeV, while it is still relatively short, then compressing it with a magnetic bunch compressor. In this note, we present a preliminary analysis of this idea, along with the related idea of using a nonequilibrium beam from the APS photoinjector. 2 Background We will begin with an examination of the ideal result

273

Robust data sharing with key-value stores  

Science Conference Proceedings (OSTI)

A key-value store (KVS) offers functions for storing and retrieving values associated with unique keys. KVSs have become widely used as shared storage solutions for Internet-scale distributed applications. We present a fault-tolerant wait-free efficient ... Keywords: cloud storage, distributed storage

Cristina Basescu; Christian Cachin; Ittay Eyal; Robert Haas; Marko Vukolic

2011-06-01T23:59:59.000Z

274

Robust data sharing with key-value stores  

Science Conference Proceedings (OSTI)

A key-value store (KVS) offers functions for storing and retrieving values associated with unique keys. KVSs have become the most popular way to access Internet-scale “cloud” storage systems. We present an efficient wait-free algorithm that ...

Cristina Basescu; Christian Cachin; Ittay Eyal; Robert Haas; Alessandro Sorniotti; Marko Vukolic; Ido Zachevsky

2012-06-01T23:59:59.000Z

275

A framework for password-based authenticated key exchange1  

Science Conference Proceedings (OSTI)

In this paper, we present a general framework for password-based authenticated key exchange protocols, in the common reference string model. Our protocol is actually an abstraction of the key exchange protocol of Katz et al. and is based on the recently ... Keywords: Passwords, authentication, dictionary attack, projective hash functions

Rosario Gennaro; Yehuda Lindell

2006-05-01T23:59:59.000Z

276

Efficient decoy-state quantum key distribution with quantified security  

E-Print Network (OSTI)

We analyse the finite-size security of the efficient Bennett-Brassard 1984 protocol implemented with decoy states and apply the results to a gigahertz-clocked quantum key distribution system. Despite the enhanced security level, the obtained secure key rates are the highest reported so far at all fibre distances.

M. Lucamarini; K. A. Patel; J. F. Dynes; B. Fröhlich; A. W. Sharpe; A. R. Dixon; Z. L. Yuan; R. V. Penty; A. J. Shields

2013-10-01T23:59:59.000Z

277

An extension of secure group communication using key graph  

Science Conference Proceedings (OSTI)

With the continuously emerging of Internet applications based on secure group communication, the design of secure group communication becomes an important Internet design topic. Group key management is important for secure group communication. Previous ... Keywords: Batch rekey, Group security, Key graph, Rekey

Zhang Jun; Zhou Yu; Ma Fanyuan; Gu Dawu; Bai Yingcai

2006-10-01T23:59:59.000Z

278

Electricity and Development: Global Trends and Key Challenges  

E-Print Network (OSTI)

Electricity and Development: Global Trends and Key Challenges Romeo Pacudan, PhD Risoe National · Prospects for electricity development · Investment requirements · Key challenges · Final remarks #12 and the transport burden in Tanzania. Source: Modi, 2004 #12;2. Energy and Human Development Access to electricity

279

Cryptanalysis of two three-party encrypted key exchange protocols  

Science Conference Proceedings (OSTI)

Due to the simplicity of maintaining human memorable passwords without any assistant storage device, password-based three-party encrypted key exchange (3PEKE) protocol has become one of the most promising research fields on user authentication and secure ... Keywords: Authentication, Cryptanalysis, Security, Three-party encrypted key exchange (3PEKE) protocol, Undetectable on-line password guessing attacks

N. W. Lo; Kuo-Hui Yeh

2009-11-01T23:59:59.000Z

280

Energy Security: A Key Requirement forSustainable Development  

E-Print Network (OSTI)

1 Energy Security: A Key Requirement forSustainable Development Perspective and Action Plan Robert Card Under Secretary US Department of Energy August 30, 2002 Session One: Maintaining Energy Security WSSD Side Event Energy for Sustainable Development IEA/UNEP/Eskom #12;2 Energy Security is a Key

Note: This page contains sample records for the topic "analysis key factors" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

MeerKAT Key Project Science, Specifications, and Proposals  

E-Print Network (OSTI)

We present the specifications of the MeerKAT Karoo Array Telescope, the South African Square Kilometre Array Precursor. Some of the key science for MeerKAT is described in this document. We invite the community to submit proposals for Large Key Projects.

Booth, R S; Jonas, J L; Fanaroff, B

2009-01-01T23:59:59.000Z

282

A matricial public key cryptosystem with digital signature  

Science Conference Proceedings (OSTI)

We describe a new public key cryptosystem using block upper triangular matrices with elements in Zp, based on a generalization of the discrete logarithm problem over a finite group. The proposed cryptosystem is very efficient, requiring ... Keywords: DLP, Diffie-Hellman, ElGamal, cryptography, digital signature, finite fields, polynomial matrices, public-key, security

Rafael Alvarez; Francisco-Miguel Martinez; Jose-Francisco Vicent; Antonio Zamora

2008-04-01T23:59:59.000Z

283

President Obama Announces More Key Administration Posts | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

More Key Administration Posts More Key Administration Posts President Obama Announces More Key Administration Posts July 8, 2011 - 12:00am Addthis THE WHITE HOUSE Office of the Press Secretary WASHINGTON - Today, President Barack Obama announced his intent to nominate the following individuals to key Administration posts: Michael A. Hammer, Assistant Secretary for Public Affairs, Department of State Charles McConnell, Assistant Secretary for Fossil Energy, Department of Energy The President also announced his intent to appoint the following individuals to key Administration posts: Terry Guen, Member, Advisory Council on Historic Preservation Dorothy T. Lippert, Member, Advisory Council on Historic Preservation Rosemary A. Joyce, Member, Cultural Property Advisory Committee President Obama said, "Our nation will be greatly served by the talent and

284

Key Dates | U.S. DOE Office of Science (SC)  

Office of Science (SC) Website

Key Dates Key Dates Albert Einstein Distinguished Educator Fellowship (AEF) Program Einstein Fellowship Home Eligibility Benefits Obligations How to Apply Key Dates Frequently Asked Questions Contact WDTS Home Key Dates Print Text Size: A A A RSS Feeds FeedbackShare Page Key Dates for the 2014-2015 Einstein Fellowship Application process. On-line Application Opens September 24, 2013 Application Deadline 5:00pm EST December 4, 2013 Application Review 7-8 weeks Notification to Semi-Finalists [Travel Arrangements made for Interviews in Washington, DC] Late January 2014 Interviews in Washington, DC February 23-25, 2014 Finalists Notifications March 2014 Congressional Fellows Placement Interviews June - July 2014 Fellows Arrive in Washington, DC August 2014 Orientation meeting for the 2014-2015 Einstein Fellows

285

Security of high speed quantum key distribution with finite detector dead time  

E-Print Network (OSTI)

The security of a high speed quantum key distribution system with finite detector dead time \\tau is analyzed. When the transmission rate becomes higher than the maximum count rate of the individual detectors (1/\\tau ), security issues affect the algorithm for sifting bits. Analytical calculations and numerical simulations of the Bennett-Brassard BB84 protocol are performed. We study Rogers et al.'s protocol (introduced in "Detector dead-time effects and paralyzability in high-speed quantum key distribution," New J. Phys. 9 (2007) 319) in the presence of an active eavesdropper Eve who has the power to perform an intercept-resend attack. It is shown that Rogers et al.'s protocol is no longer secure. More specifically, Eve can induce a basis-dependent detection efficiency at the receiver's end. Modified key sifting schemes that are secure in the presence of dead time and an active eavesdropper are then introduced. We analyze and compare these secure sifting schemes for this active Eve scenario, and calculate and simulate their key generation rate. It is shown that the maximum key generation rate is 1/(2\\tau ) for passive basis selection, and 1/\\tau for active basis selection. The security analysis for finite detector dead time is also extended to the decoy state BB84 protocol.

Viacheslav Burenkov; Bing Qi; Ben Fortescue; Hoi-Kwong Lo

2010-05-03T23:59:59.000Z

286

Authenticated group Diffie-Hellman key exchange: theory and practice  

SciTech Connect

Authenticated two-party Diffie-Hellman key exchange allows two principals A and B, communicating over a public network, and each holding a pair of matching public/private keys to agree on a session key. Protocols designed to deal with this problem ensure A (B resp.)that no other principals aside from B (A resp.) can learn any information about this value. These protocols additionally often ensure A and B that their respective partner has actually computed the shared secret value. A natural extension to the above cryptographic protocol problem is to consider a pool of principals agreeing on a session key. Over the years several papers have extended the two-party Diffie-Hellman key exchange to the multi-party setting but no formal treatments were carried out till recently. In light of recent developments in the formalization of the authenticated two-party Diffie-Hellman key exchange we have in this thesis laid out the authenticated group Diffie-Hellman key exchange on firmer foundations.

Chevassut, Olivier

2002-10-03T23:59:59.000Z

287

A Key-Distribution Scheme for Wireless Home Automation Networks  

E-Print Network (OSTI)

Wireless home automation networks are one example of how wireless technologies may soon become part of our daily life, yet security in existing products is woefully inadequate. An important problem in this area is the question of secure key distribution. In this paper we present a key-distribution scheme geared towards home automation networks, but applicable to other networks with related properties as well. Our approach uses a decentralized scheme that is designed to work on resource-poor devices, allows easy addition and removal of devices and limits the workload on the end user while guaranteeing the secrecy of the exchanged keys even in the presence of subverted nodes.

Arno Wacker; Timo Heiber; Holger Cermann

2004-01-01T23:59:59.000Z

288

The Electricity Transmission System Opportunities to Overcome Key Challenges  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Opportunities to Overcome Key Challenges Opportunities to Overcome Key Challenges Summary Results of Breakout Group Discussions Electricity Transmission Workshop Double Tree Crystal City, Arlington, Virginia November 2, 2012 Breakout Group Discussion Overview Opportunities to Overcome Key Challenges Each of the four breakout groups prioritized the critical issues facing the grid from the list of synthesized challenges identified in the first breakout session of the workshop. Focusing on these top priorities, each group proposed specific R&D activities and initiatives that DOE can pursue to overcome these challenges and address existing gaps. Summary of Synthesized Challenges A. Need improved understanding of the availability, utility, maintenance, exchange, and security of data and associated requirements.

289

Key Dates | U.S. DOE Office of Science (SC)  

Office of Science (SC) Website

Key Dates Key Dates Science Undergraduate Laboratory Internships (SULI) SULI Home Eligibility Benefits Participant Obligations How to Apply Key Dates Frequently Asked Questions Contact WDTS Home Key Dates Print Text Size: A A A RSS Feeds FeedbackShare Page At the submission deadline (shown in red) the application system will close, and no materials will be accepted after the submission deadline has passed. The Application System closes at 5:00 PM Eastern Time. SULI Internship Term: Spring 2014 Summer 2014* Fall 2013 On-line Application Opens August 6, 2013 October 18, 2013 May 1, 2013 Applications Due October, 1, 2013 5:00 PM ET January 10, 2014 5:00 PM ET June 12, 2013 5:00 PM ET Offer Notification Period Begins on or around October, 15, 2013 January 20, 2014 June 24, 2013

290

Key Dates | U.S. DOE Office of Science (SC)  

Office of Science (SC) Website

Key Dates Key Dates Visiting Faculty Program (VFP) VFP Home Eligibility Benefits Participant Obligations How to Apply Key Dates Frequently Asked Questions Contact WDTS Home Key Dates Print Text Size: A A A RSS Feeds FeedbackShare Page At the submission deadline (shown in red) the application system will close, and no materials will be accepted after the submission deadline has passed. The Application System closes at 5:00 PM Eastern Time. VFP Term: Summer 2014 On-line Application Opens October 18, 2013 Applications Due January 10, 2014 5:00 PM ET* Offer Notification Period Begins January 20, 2014 All DOE Offers and Notifications Complete April 1, 2014 *A research proposal co-developed with a DOE laboratory researcher must be electronically submitted by all faculty applicants as part of their

291

U-268: Oracle Database Authentication Protocol Discloses Session Key  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Oracle Database Authentication Protocol Discloses Session 8: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users U-268: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users September 26, 2012 - 6:00am Addthis PROBLEM: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users PLATFORM: Oracle Database 11g Releases 1 and 2 ABSTRACT: A vulnerability was reported in Oracle Database. reference LINKS: Darkreading Threatpost Arstechnica Oracle Security Alerts SecurityTracker Alert ID: 1027558 CVE-2012-3137 IMPACT ASSESSMENT: Medium Discussion: The authentication protocol in Oracle Database 11g 1 and 2 allows remote attackers to obtain the session key and salt for arbitrary users, which leaks information about the cryptographic hash and makes it easier to

292

Energy Secretary Bodman Commends Key Milestone In MOX Program | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Commends Key Milestone In MOX Program Commends Key Milestone In MOX Program Energy Secretary Bodman Commends Key Milestone In MOX Program April 1, 2005 - 11:28am Addthis WASHINGTON, DC - In response to the Nuclear Regulatory Commission's (NRC) authorization of the construction of a U.S. Mixed-Oxide (MOX) Fuel Fabrication Facility at the Department of Energy's Savannah River Site in South Carolina, Secretary of Energy Samuel W. Bodman today released the following statement: "Issuing the permit for construction of a MOX facility in South Carolina is the crucial next step in the MOX program. It is a key milestone in our efforts to dispose of surplus weapons grade plutonium in the U.S. and Russia," Secretary Bodman said. "We look forward to proceeding with this nonproliferation program that will ultimately eliminate enough

293

President Obama Announces More Key Administration Posts | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

President Obama Announces More Key Administration Posts President Obama Announces More Key Administration Posts President Obama Announces More Key Administration Posts December 9, 2009 - 12:00am Addthis WASHINGTON - Today, President Barack Obama announced his intent to nominate the following individuals to key administration posts: Patricia A. Hoffman, Assistant Secretary for Electricity Delivery and Energy Reliability, Department of Energy Mari Del Carmen Aponte, Ambassador to the Republic of El Salvador, Department of State Donald E. Booth, Ambassador to the Federal Democratic Republic of Ethiopia, Department of State Larry Persily, Federal Coordinator for Alaska Natural Gas Transportation Projects President Obama said, "The depth of experience these individuals bring to their roles will be valuable to my administration as we work to bring about

294

Department of Energy Announces Key Additions to Public Affairs Staff |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Announces Key Additions to Public Affairs Announces Key Additions to Public Affairs Staff Department of Energy Announces Key Additions to Public Affairs Staff February 26, 2009 - 12:00am Addthis WASHINGTON, DC - Today, the Department of Energy announced key staff additions to the Office Public Affairs: Dan Leistikow, Director of Public Affairs; Tom Reynolds, Deputy Director of Public Affairs; Stephanie Mueller, Press Secretary; and Tiffany Edwards, Deputy Press Secretary. "I am pleased to have these talented individuals join the Department of Energy", said Secretary Steven Chu. "Having worked on President Obama's presidential campaign Dan, Tom, Stephanie and Tiffany bring knowledge about the President's commitment to end our addiction to foreign oil, invest in alternative and renewable energy, address the global climate crisis and

295

U-268: Oracle Database Authentication Protocol Discloses Session Key  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Oracle Database Authentication Protocol Discloses Session 8: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users U-268: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users September 26, 2012 - 6:00am Addthis PROBLEM: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users PLATFORM: Oracle Database 11g Releases 1 and 2 ABSTRACT: A vulnerability was reported in Oracle Database. reference LINKS: Darkreading Threatpost Arstechnica Oracle Security Alerts SecurityTracker Alert ID: 1027558 CVE-2012-3137 IMPACT ASSESSMENT: Medium Discussion: The authentication protocol in Oracle Database 11g 1 and 2 allows remote attackers to obtain the session key and salt for arbitrary users, which leaks information about the cryptographic hash and makes it easier to

296

Table A4. Residential sector key indicators and consumption  

Gasoline and Diesel Fuel Update (EIA)

3 3 U.S. Energy Information Administration | Annual Energy Outlook 2013 Reference case Table A4. Residential sector key indicators and consumption (quadrillion Btu per year, unless otherwise noted) Energy Information Administration / Annual Energy Outlook 2013 Table A4. Residential sector key indicators and consumption (quadrillion Btu per year, unless otherwise noted) Key indicators and consumption Reference case Annual growth 2011-2040 (percent) 2010 2011 2020 2025 2030 2035 2040 Key indicators Households (millions) Single-family ....................................................... 82.85 83.56 91.25 95.37 99.34 103.03 106.77 0.8% Multifamily ........................................................... 25.78 26.07 29.82 32.05 34.54 37.05 39.53 1.4%

297

DOE Announces More Key Administration Posts | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

More Key Administration Posts More Key Administration Posts DOE Announces More Key Administration Posts March 27, 2009 - 12:00am Addthis WASHINGTON, DC - Today, President Barack Obama announced his intent to nominate the following individuals to key administration posts: Ray Mabus, Secretary of the Navy, Department of Defense; Donald Remy, General Counsel of the Army, Department of Defense; J. Randolph Babbitt, Administrator, Federal Aviation Administration; Jose D. Riojas, Assistant Secretary for Operations, Security and Preparedness, Department of Veterans Affairs; John Trasviña, Assistant Secretary for Fair Housing and Equal Opportunity, Department of Housing and Urban Development; Lawrence E. Strickling, Assistant Secretary for Communications and Information, Department of Commerce; and Cathy Zoi, Assistant Secretary for Energy Efficiency and

298

LEDSGP/Transportation Toolkit/Key Actions | Open Energy Information  

Open Energy Info (EERE)

source source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search Page Edit History Facebook icon Twitter icon » LEDSGP/Transportation Toolkit/Key Actions < LEDSGP‎ | Transportation Toolkit(Redirected from Transportation Toolkit/Key Actions) Jump to: navigation, search LEDSGP Logo.png Transportation Toolkit Home Tools Training Contacts Key Actions for Low-Emission Development in Transportation Although no single approach or fixed process exists for low emission development strategies (LEDS), the following key actions are necessary steps for implementing LEDS in the transportation sector. Undertaking these actions requires flexibility to adapt to dynamic societal conditions in a

299

President Obama Announces More Key Administration Posts | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

President Obama Announces More Key Administration Posts President Obama Announces More Key Administration Posts President Obama Announces More Key Administration Posts June 10, 2009 - 12:00am Addthis WASHINGTON, DC - Today, President Barack Obama announced his intent to nominate the following individuals for key administration posts: Joan Evans, Assistant Secretary for Congressional and Legislative Affairs, Department of Veterans Affairs; Warren F. "Pete" Miller, Jr., PhD, Assistant Secretary for Nuclear Energy, Department of Energy; and John R. Norris, Commissioner, Federal Energy Regulatory Commission. President Obama said, "I am grateful that these three impressive individuals will be working with me in these important roles. The commitment of these experienced public servants has made an impression on

300

Key Science and Engineering Indicators: Digest 2012 | Data.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Key Science and Engineering Indicators: Digest 2012 Key Science and Engineering Indicators: Digest 2012 BusinessUSA Data/Tools Apps Challenges Let's Talk BusinessUSA You are here Data.gov » Communities » BusinessUSA » Data Key Science and Engineering Indicators: Digest 2012 Dataset Summary Description This 2012 digest of key S&E indicators is an interactive tool that draws from the National Science Board's (NSB's) Science and Engineering Indicators report. The digest serves to draw attention to important trends and data points from across Indicators and to introduce readers to the data resources available in the report. Tags {science,engineering,indicators,statistics,nsf,nsb,srs,federal,government,education,labor,employment,workforce,research,development,industry,international,global,r&d,technology,patents,"research citations"}

Note: This page contains sample records for the topic "analysis key factors" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Recommendation for Pair-Wise Key Establishment Schemes ...  

Science Conference Proceedings (OSTI)

... with unilateral key-confirmation from party V to party ... may be a component of a protocol, which in ... Note that protocols, per se, are not specified in this ...

2013-06-05T23:59:59.000Z

302

A linux kernel cryptographic framework: decoupling cryptographic keys from applications  

Science Conference Proceedings (OSTI)

This paper describes a cryptographic service framework for the Linux kernel. The framework enables user-space applications to perform operations with cryptographic keys, while at the same time ensuring that applications cannot directly access or extract ...

Nikos Mavrogiannopoulos; Miloslav Trma?; Bart Preneel

2012-03-01T23:59:59.000Z

303

SLAC National Accelerator Laboratory - LCLS-II Passes Key Milestone...  

NLE Websites -- All DOE Office Websites (Extended Search)

LCLS-II Passes Key Milestone in DOE Approval Process By Glennda Chui November 1, 2011 The Department of Energy has approved a preliminary budget, schedule and design plans for the...

304

First look at cellulose's early production could hold keys to...  

NLE Websites -- All DOE Office Websites (Extended Search)

cellulose's early production could hold keys to bacteria-free medical devices, better biofuel By Jared Sagoff * May 14, 2013 Tweet EmailPrint Produced by plants as well as algae...

305

THIS GUIDE IS INTENDED TO PROVIDE KEY INFORMATION to  

NLE Websites -- All DOE Office Websites (Extended Search)

THIS GUIDE IS INTENDED TO PROVIDE KEY INFORMATION to policy makers on energy codes and to offer guidance on how policy makers can support the creation of statewide energy...

306

The use of a logistic map for key generation  

E-Print Network (OSTI)

A key generation scheme is proposed and its performance analyzed. The method, the logistic map scheme (LMS), is applicable for use on wireless networks because it does not require devices to engage in computationally ...

Ando, Megumi, M. Eng. Massachusetts Institute of Technology

2010-01-01T23:59:59.000Z

307

EIA Data: 2011 United States Residential Sector Key Indicators...  

Open Energy Info (EERE)

Residential Sector Key Indicators and Consumption This dataset is the 2011 United...

308

An Implementation of Key-Based Digital Signal Steganography  

Science Conference Proceedings (OSTI)

A real-life requirement motivated this case study of secure covert communication. An independently researched process is described in detail with an emphasis on implementation issues regarding digital images. A scheme using stego keys to create pseudo-random ...

Toby Sharp

2001-04-01T23:59:59.000Z

309

Nano Lect 1 Questions and Keypoints Key Points  

E-Print Network (OSTI)

Nano Lect 1 ­ Questions and Keypoints Key Points 1. What is nano technology: a. Very small technology with device in the 1nm to 100nm lots of useful properties Questions 1. Define nanotechnology. Is an nano

Smy, Tom

310

DOE Announces More Key Administration Posts | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

More Key Administration Posts More Key Administration Posts DOE Announces More Key Administration Posts March 20, 2009 - 12:00am Addthis WASHINGTON, DC - Today, President Barack Obama announced his intent to nominate the following individuals to key administration posts: Dr. Steven E. Koonin, Under Secretary for Science, Department of Energy; David Sandalow, Assistant Secretary for Policy and International Affairs, Department of Energy; Ambassador Johnnie Carson, Assistant Secretary for African Affairs, State Department; Kathy Martinez, Assistant Secretary for Disability Employment Policy (ODEP), Department of Labor; Jonathan S. Adelstein, Administrator for the Rural Utilities Service, United States Department of Agriculture; Timothy W. Manning, Deputy Administrator for National Preparedness, FEMA, Department of Homeland Security; and Priscilla

311

Key Activities in Energy Efficiency | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

About » Key Activities in Energy Efficiency About » Key Activities in Energy Efficiency Key Activities in Energy Efficiency The Building Technologies Office conducts work in three key areas in order to continually develop innovative, cost-effective energy saving solutions: research and development (R&D), market stimulation, and building codes and equipment standards. Working with our partners on these activities results in better products, better new homes, better ways to improve older homes, and better buildings in which to work, shop, and lead our everyday lives. Research and Development Spearhead the development of new, energy efficient technologies. Lead R&D activities that reduce home energy use through Building America. Collaborate with industry to improve the energy efficiency of new

312

Interest/Users Group Meeting Proceedings and Key Findings, 2011  

Science Conference Proceedings (OSTI)

This technical update is the summary of the meeting proceedings and key findings for the Fossil Operations and Maintenance Program Area Interest/Users Groups meetings held during 2011. The report represents a culmination of numerous meetings, conferences, users groups, and workshops conducted throughout the year. The document incorporates the meeting logistics and objectives; names of keynote speaker, attendees, and host utility; presentation location, and key findings and recommendations from each meeti...

2011-12-21T23:59:59.000Z

313

Security of quantum key distribution with arbitrary individual imperfections  

E-Print Network (OSTI)

We consider the security of the Bennett-Brassard 1984 (BB84) protocol for Quantum Key Distribution (QKD), with arbitrary individual imperfections simultaneously in the source and detectors. We provide the secure key generation rate, and show that only two parameters must be bounded to ensure security; the basis dependence of the source and a detector blinding parameter. The system may otherwise be completely uncharacterized and contain large losses.

Øystein Marøy; Lars Lydersen; Johannes Skaar

2009-03-20T23:59:59.000Z

314

Key-and-keyway coupling for transmitting torque  

DOE Patents (OSTI)

The design of an improved key-and-keyway coupling for the transmission of torque is given. The coupling provides significant reductions in stress concentrations in the vicinity of the key and keyway. The keyway is designed with a flat-bottomed u-shaped portion whose inboard end terminates in a ramp which is dished transversely, so that the surface of the ramp as viewed in transverse section defines an outwardly concave arc.

Blue, S.C.; Curtis, M.T.; Orthwein, W.C.; Stitt, D.H.

1975-11-18T23:59:59.000Z

315

Quantum Public-Key Encryption with Information Theoretic Security  

E-Print Network (OSTI)

We propose a definition for the information theoretic security of a quantum public-key encryption scheme, and present bit-oriented and two-bit-oriented encryption schemes satisfying our security definition via the introduction of a new public-key algorithm structure. We extend the scheme to a multi-bitoriented one, and conjecture that it is also information theoretically secure, depending directly on the structure of our new algorithm.

Jiangyou Pan; Li Yang

2010-06-02T23:59:59.000Z

316

W-like bound entangled states and secure key distillation  

E-Print Network (OSTI)

We construct multipartite entangled states with underlying W-type structure satisfying positive partial transpose (PPT) condition under any (N-1)|1 partition. Then we show how to distill N-partite secure key form the states using two different methods: direct application of local filtering and novel random key distillation scheme in which we adopt the idea form recent results on entanglement distillation. Open problems and possible implications are also discussed.

Remigiusz Augusiak; Pawel Horodecki

2008-11-21T23:59:59.000Z

317

Key distillation from Gaussian states by Gaussian operations  

E-Print Network (OSTI)

We study the secrecy properties of Gaussian states under Gaussian operations. Although such operations are useless for quantum distillation, we prove that it is possible to distill a secret key secure against any attack from sufficiently entangled Gaussian states with non-positive partial transposition. Moreover, all such states allow for key distillation, when Eve is assumed to perform finite-size coherent attacks before the reconciliation process.

M. Navascues; J. Bae; J. I. Cirac; M. Lewenstein; A. Sanpera; A. Acin

2004-05-11T23:59:59.000Z

318

A robust on-demand path-key establishment framework via random key predistribution for wireless sensor networks  

Science Conference Proceedings (OSTI)

Secure communication is a necessity for some wireless sensor network (WSN) applications. However, the resource constraints of a sensor render existing cryptographic systems for traditional network systems impractical for a WSN. Random key predistribution ...

Guanfeng Li; Hui Ling; Taieb Znati; Weili Wu

2006-04-01T23:59:59.000Z

319

Unconditional Security of Time-energy Entanglement Quantum Key Distribution using Dual-basis Interferometry  

E-Print Network (OSTI)

High-dimensional quantum key distribution (HDQKD) offers the possibility of high secure-key rate (SKR) with high photon-information efficiency (PIE). We consider HDQKD based on the time-energy entanglement (TEE) produced by spontaneous parametric downconversion (SPDC), and show that it is secure against collective attacks. Its security rests upon visibility data---obtained from Franson and conjugate-Franson interferometers---that probe photon-pair frequency correlations and arrival-time correlations. From these measurements an upper bound can be established on the eavesdropper's Holevo information by translating the Gaussian-state security analysis for continuous-variable QKD so that it applies to our HDQKD protocol. We show that visibility data from just the Franson interferometer provides a weaker, but nonetheless useful, SKR lower bound. To handle multiple-pair emissions, we incorporate the decoy-state approach into our protocol. Our results suggest that TEE-based HDQKD could permit a 650 bit/sec SKR over 200 km transmission distance in optical fiber with a PIE of 1.9 secure-key bits per photon coincidence in the key-generation phase using receivers with 15% system efficiency.

Zheshen Zhang; Jacob Mower; Dirk Englund; Franco N. C. Wong; Jeffrey H. Shapiro

2013-11-04T23:59:59.000Z

320

Application of spatial and non-spatial data analysis in determination of the factors that impact municipal solid waste generation rates in Turkey  

SciTech Connect

Highlights: Black-Right-Pointing-Pointer Spatial autocorrelation exists in municipal solid waste generation rates for different provinces in Turkey. Black-Right-Pointing-Pointer Traditional non-spatial regression models may not provide sufficient information for better solid waste management. Black-Right-Pointing-Pointer Unemployment rate is a global variable that significantly impacts the waste generation rates in Turkey. Black-Right-Pointing-Pointer Significances of global parameters may diminish at local scale for some provinces. Black-Right-Pointing-Pointer GWR model can be used to create clusters of cities for solid waste management. - Abstract: In studies focusing on the factors that impact solid waste generation habits and rates, the potential spatial dependency in solid waste generation data is not considered in relating the waste generation rates to its determinants. In this study, spatial dependency is taken into account in determination of the significant socio-economic and climatic factors that may be of importance for the municipal solid waste (MSW) generation rates in different provinces of Turkey. Simultaneous spatial autoregression (SAR) and geographically weighted regression (GWR) models are used for the spatial data analyses. Similar to ordinary least squares regression (OLSR), regression coefficients are global in SAR model. In other words, the effect of a given independent variable on a dependent variable is valid for the whole country. Unlike OLSR or SAR, GWR reveals the local impact of a given factor (or independent variable) on the waste generation rates of different provinces. Results show that provinces within closer neighborhoods have similar MSW generation rates. On the other hand, this spatial autocorrelation is not very high for the exploratory variables considered in the study. OLSR and SAR models have similar regression coefficients. GWR is useful to indicate the local determinants of MSW generation rates. GWR model can be utilized to plan waste management activities at local scale including waste minimization, collection, treatment, and disposal. At global scale, the MSW generation rates in Turkey are significantly related to unemployment rate and asphalt-paved roads ratio. Yet, significances of these variables may diminish at local scale for some provinces. At local scale, different factors may be important in affecting MSW generation rates.

Keser, Saniye [Department of Environmental Engineering, Middle East Technical University, 06800 Ankara (Turkey); Duzgun, Sebnem [Department of Mining Engineering, Middle East Technical University, 06800 Ankara (Turkey); Department of Geodetic and Geographic Information Technologies, Middle East Technical University, 06800 Ankara (Turkey); Aksoy, Aysegul, E-mail: aaksoy@metu.edu.tr [Department of Environmental Engineering, Middle East Technical University, 06800 Ankara (Turkey)

2012-03-15T23:59:59.000Z

Note: This page contains sample records for the topic "analysis key factors" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Large-Alphabet Time-Frequency Entangled Quantum Key Distribution by means of Time-to-Frequency Conversion  

E-Print Network (OSTI)

We introduce a novel time-frequency quantum key distribution (TFQKD) scheme based on photon pairs entangled in these two conjugate degrees of freedom. The scheme uses spectral detection and phase modulation to enable measurements in the temporal basis by means of time-to-frequency conversion. This allows large-alphabet encoding to be implemented with realistic components. A general security analysis for TFQKD with binned measurements reveals a close connection with finite-dimensional QKD protocols and enables analysis of the effects of dark counts on the secure key size.

J. Nunn; L. Wright; C. Söller; L. Zhang; I. A. Walmsley; B. J. Smith

2013-05-04T23:59:59.000Z

322

Factors associated with participation restriction in community ...  

Science Conference Proceedings (OSTI)

May 26, 2007 ... restriction, after adjusting for age and gender in a logistic regression analysis. Health and disability factors most strongly and independently ...

323

Factors influencing German private equity investment in US real estate  

E-Print Network (OSTI)

This thesis identifies and ranks in order of importance the key factors influencing high net-worth German investors' decisions about US real estate private equity investments. Through research and in-depth interviews with ...

Paelmo, Kay L. (Kay Lee), 1977-

2003-01-01T23:59:59.000Z

324

Quantum key distribution using gaussian-modulated coherent states  

E-Print Network (OSTI)

Quantum continuous variables are being explored as an alternative means to implement quantum key distribution, which is usually based on single photon counting. The former approach is potentially advantageous because it should enable higher key distribution rates. Here we propose and experimentally demonstrate a quantum key distribution protocol based on the transmission of gaussian-modulated coherent states (consisting of laser pulses containing a few hundred photons) and shot-noise-limited homodyne detection; squeezed or entangled beams are not required. Complete secret key extraction is achieved using a reverse reconciliation technique followed by privacy amplification. The reverse reconciliation technique is in principle secure for any value of the line transmission, against gaussian individual attacks based on entanglement and quantum memories. Our table-top experiment yields a net key transmission rate of about 1.7 megabits per second for a loss-free line, and 75 kilobits per second for a line with losses of 3.1 dB. We anticipate that the scheme should remain effective for lines with higher losses, particularly because the present limitations are essentially technical, so that significant margin for improvement is available on both the hardware and software.

F. Grosshans; G. Van Assche; J. Wenger; R. Brouri; N. J. Cerf; Ph. Grangier

2003-12-02T23:59:59.000Z

325

Non-MT Determination of X-Ray Absorption Cross-Section's Factorized Atomic Part in the Near-Edge Region. Application to Si K-Edge XANES Analysis in Beta-Zeolites  

SciTech Connect

An algorithm and code for the determination of the factorized atomic part of the absorption cross-section from experimental spectra in the XANES region were generated and tested on Al and Si K-edge XANES in reference compounds and applied to zeolite Beta with various Si/Al ratios. However, replacement of the theoretically determined background with the experimental absorption cross-section significantly improved the agreement with experiment. The spectral analysis showed that the XANES region can be used to extract detailed structural information when the Muffin-tin approximation can be avoided. Asymmetry in the silicon oxide tetrahedron was observed when increasing the aluminum content of the zeolite.

Bugaev, L. A.; Avakyan, L. A.; Latokha, Ya. V. [Physical Department of Rostov State University, Zorge str., 5, Rostov-on-Don, 344090 (Russian Federation); Bokhoven, J. A. van [Institute for Chemical and Bioengineering, ETH Zurich, 8093 Zurich (Switzerland)

2007-02-02T23:59:59.000Z

326

NREL: Energy Analysis - Graham Hill  

NLE Websites -- All DOE Office Websites (Extended Search)

(Krakauer, Bryson, Kerouac) and non-fiction about environment, adventureexploration, history, and science. Printable Version Energy Analysis Home Capabilities & Expertise Key...

327

Energy Storage: The Key to a Reliable, Clean Electricity Supply |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Storage: The Key to a Reliable, Clean Electricity Supply Storage: The Key to a Reliable, Clean Electricity Supply Energy Storage: The Key to a Reliable, Clean Electricity Supply February 22, 2012 - 4:52pm Addthis Improved energy storage technology offers a number of economic and environmental benefits. Improved energy storage technology offers a number of economic and environmental benefits. Matthew Loveless Matthew Loveless Data Integration Specialist, Office of Public Affairs What does this project do? ARPA-E's GRIDS program is investing in new technologies that make storing energy cheaper and more efficient. Energy storage isn't just for AA batteries any more. Thanks to investments from the Department's Advanced Research Projects Agency-Energy (ARPA-E), energy storage may soon play a bigger part in our electricity

328

Technology Key to Harnessing Natural Gas Potential | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Technology Key to Harnessing Natural Gas Potential Technology Key to Harnessing Natural Gas Potential Technology Key to Harnessing Natural Gas Potential July 18, 2012 - 3:52pm Addthis Deputy Secretary Daniel Poneman tours Proinlosa Energy Corp. in Houston, Texas. Proinlosa is a company in the wind turbine manufacturing supply chain that develops tower parts and has benefitted from the Production Tax Credit (PTC). | Photo courtesy of Keri Fulton. Deputy Secretary Daniel Poneman tours Proinlosa Energy Corp. in Houston, Texas. Proinlosa is a company in the wind turbine manufacturing supply chain that develops tower parts and has benefitted from the Production Tax Credit (PTC). | Photo courtesy of Keri Fulton. Daniel B. Poneman Daniel B. Poneman Deputy Secretary of Energy What does this project do? Builds on President Obama's call for a new era for American energy

329

Sierra Geothermal's Key Find in Southern Nevada | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Sierra Geothermal's Key Find in Southern Nevada Sierra Geothermal's Key Find in Southern Nevada Sierra Geothermal's Key Find in Southern Nevada July 13, 2010 - 5:17pm Addthis Sierra Geothermal discovered temperatures hot enough for large-scale geothermal energy production at one of its wells near Silver Peak, Nev. | Photo courtesy of Sierra Geothermal Sierra Geothermal discovered temperatures hot enough for large-scale geothermal energy production at one of its wells near Silver Peak, Nev. | Photo courtesy of Sierra Geothermal Paul Lester Communications Specialist for the Office of Energy Efficiency and Renewable Energy In May 2010, Sierra Geothermal determined temperature at the bottom of a well drilled at the company's Alum project near Silver Peak, Nev., was hot enough for commercial-sized geothermal energy production - measured as 147

330

Transportation Energy Futures Study: The Key Results and Conclusions  

Open Energy Info (EERE)

Transportation Energy Futures Study: The Key Results and Conclusions Transportation Energy Futures Study: The Key Results and Conclusions Webinar Home > Groups > OpenEI Community Central Graham7781's picture Submitted by Graham7781(1992) Super contributor 1 May, 2013 - 11:38 This webinar will outline the key results and conclusions from EERE's Transportation Energy Futures study, which highlights underexplored opportunities to reduce petroleum use and greenhouse gas emissions from the U.S. transportation sector. There will be time for questions from attendees at the end of the webinar. Principal Deputy Assistant Secretary Mike Carr will introduce the study and provide context on EERE's transportation energy strategy. In his role with EERE, Mike provides leadership direction on cross-cutting activities in EERE's portfolio. In particular, he is using his experience in policy

331

Sierra Geothermal's Key Find in Southern Nevada | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Sierra Geothermal's Key Find in Southern Nevada Sierra Geothermal's Key Find in Southern Nevada Sierra Geothermal's Key Find in Southern Nevada July 13, 2010 - 5:17pm Addthis Sierra Geothermal discovered temperatures hot enough for large-scale geothermal energy production at one of its wells near Silver Peak, Nev. | Photo courtesy of Sierra Geothermal Sierra Geothermal discovered temperatures hot enough for large-scale geothermal energy production at one of its wells near Silver Peak, Nev. | Photo courtesy of Sierra Geothermal Paul Lester Communications Specialist, Office of Energy Efficiency and Renewable Energy In May 2010, Sierra Geothermal determined temperature at the bottom of a well drilled at the company's Alum project near Silver Peak, Nev., was hot enough for commercial-sized geothermal energy production - measured as 147

332

Florida Keys El Coop Assn, Inc | Open Energy Information  

Open Energy Info (EERE)

Keys El Coop Assn, Inc Keys El Coop Assn, Inc Jump to: navigation, search Name Florida Keys El Coop Assn, Inc Place Florida Utility Id 6443 Utility Location Yes Ownership C NERC Location FRCC NERC FRCC Yes Operates Generating Plant Yes Activity Generation Yes Activity Transmission Yes References EIA Form EIA-861 Final Data File for 2010 - File1_a[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. Utility Rate Schedules Grid-background.png Rate Code 1 - Residential Service Residential Rate Code 2 - Commercial Service (General Service Non-Demand) Commercial Rate Code 3 - Commercial Service (General Service Demand) Commercial Average Rates Residential: $0.1210/kWh Commercial: $0.1220/kWh Industrial: $0.1140/kWh

333

Turn Your Key, Be Idle Free | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Turn Your Key, Be Idle Free Turn Your Key, Be Idle Free Turn Your Key, Be Idle Free April 13, 2010 - 7:30am Addthis Shannon Brescher Shea Communications Manager, Clean Cities Program What activity wastes gasoline, costs money, produces pollutants, and yet doesn't get you anywhere? Idling! And yet, every year, Americans waste 3 billion gallons of fuel by idling their vehicles. Idling is running a vehicle any time that it's not moving. In this condition, the car's fuel economy is exactly zero miles per gallon. Although many people think that restarting the engine too often will wear out the starter, that idea is just an "old husband's tale." In fact, idling places unnecessary wear-and-tear on the engine, and many manufacturers discourage it. Although drivers can't avoid some amount of idling, such as being stuck in

334

Ariz. Rooftops Key to Unlocking the Potential of Distributed Solar |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Ariz. Rooftops Key to Unlocking the Potential of Distributed Solar Ariz. Rooftops Key to Unlocking the Potential of Distributed Solar Ariz. Rooftops Key to Unlocking the Potential of Distributed Solar July 12, 2010 - 3:51pm Addthis APS will install solar photovoltaic panels like these in Castro Valley, Calif. for a pilot project studying distributed energy in Flagstaff, Ariz. | Photo courtesy of APS APS will install solar photovoltaic panels like these in Castro Valley, Calif. for a pilot project studying distributed energy in Flagstaff, Ariz. | Photo courtesy of APS Nestled in the mountains of northern Arizona and just 75 miles from Grand Canyon National Park, the city of Flagstaff, Ariz. is an ideal city for the Arizona Public Service (APS) to pilot a high concentration of solar photovoltaic energy systems. "Flagstaff is unique electrically," says Eran Mahrer, Director of Renewable

335

A Key Enzyme to the Potency of an Anticancer Agent  

NLE Websites -- All DOE Office Websites (Extended Search)

A Key Enzyme to the Potency of A Key Enzyme to the Potency of an Anticancer Agent A Key Enzyme to the Potency of an Anticancer Agent Print Wednesday, 28 May 2008 00:00 Incorporation of halogen atoms into drug molecules often increases biological activity. This is the case with salinosporamide A (sal A), a natural product from the marine bacterium Salinispora tropica that is 500 times more active than sal B, its nonchlorinated analog. Sal A is in phase I human clinical trials for the treatment of multiple myeloma and solid tumors. A group of researchers, using diffraction data collected at ALS Beamline 8.2.2, discovered and characterized the chlorinating SalL enzyme, a crucial component in sal A biosynthesis that uses a unique chlorine-activating mechanism. Chlorine-Loving Enzyme Speeds Things Up

336

Property:Specializations, Capabilities, and Key Facility Attributes Not  

Open Energy Info (EERE)

Property Property Edit with form History Facebook icon Twitter icon » Property:Specializations, Capabilities, and Key Facility Attributes Not Covered Elsewhere Jump to: navigation, search Property Name Specializations, Capabilities, and Key Facility Attributes Not Covered Elsewhere Property Type Text Pages using the property "Specializations, Capabilities, and Key Facility Attributes Not Covered Elsewhere" Showing 25 pages using this property. 1 11-ft Wave Flume Facility + Glass window 6 6-ft Wave Flume Facility + Glass window A Alden Large Flume + This is a recirculating flume facility, so a constant velocity can be maintained indefinitely. This allows collection of a much greater amount of data than possible in tow tanks. Alden's biologists are highly experienced in assessing the impacts of generation devices on fish and the facilities allow for accurate testing with fish in a highly controlled environment.

337

SECOQC White Paper on Quantum Key Distribution and Cryptography  

E-Print Network (OSTI)

The SECOQC White Paper on Quantum Key Distribution and Cryptography is the outcome on a thorough consultation and discussion among the participants of the European project SECOQC (www.secoqc.net). This paper is a review article that attempts to position Quantum Key Distribution (QKD) in terms of cryptographic applications. A detailed comparison of QKD with the solutions currently in use to solve the key distribution problem, based on classical cryptography, is provided. We also detail how the work on QKD networks lead within SECOQC will allow the deployment of long-distance secure communication infrastructures based on quantum cryptography. The purpose of the White Paper is finally to promote closer collaboration between classical and quantum cryptographers. We believe that very fruitful research, involving both communities, could emerge in the future years and try to sketch what may be the next challenges in this direction.

Romain Alleaume; Jan Bouda; Cyril Branciard; Thierry Debuisschert; Mehrdad Dianati; Nicolas Gisin; Mark Godfrey; Philippe Grangier; Thomas Langer; Anthony Leverrier; Norbert Lutkenhaus; Philippe Painchault; Momtchil Peev; Andreas Poppe; Thomas Pornin; John Rarity; Renato Renner; Gregoire Ribordy; Michel Riguidel; Louis Salvail; Andrew Shields; Harald Weinfurter; Anton Zeilinger

2007-01-23T23:59:59.000Z

338

Physical key-protected one-time pad  

E-Print Network (OSTI)

We describe an encrypted communication principle that can form a perfectly secure link between two parties without electronically saving either of their keys. Instead, cryptographic key bits are kept safe within the unique mesoscopic randomness of two volumetric scattering materials. We demonstrate how a shared set of patterned optical probes can generate 10 gigabits of statistically verified randomness between a pair of unique 2 cubic millimeter scattering objects. This shared randomness is used to facilitate information-theoretically secure communication following a modified one-time pad protocol. Benefits of volumetric physical storage over electronic memory include the inability to probe, duplicate or selectively reset any random bits without fundamentally altering the entire key space. Beyond the demonstrated communication scheme, our ability to securely couple the randomness contained within two unique physical objects may help strengthen the hardware for a large class of cryptographic protocols, which ...

Horstmeyer, Roarke; Vellekoop, Ivo; Yang, Changhuei

2013-01-01T23:59:59.000Z

339

Managing Supply Chain Key for Hawaii Appliance Rebate Program | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Managing Supply Chain Key for Hawaii Appliance Rebate Program Managing Supply Chain Key for Hawaii Appliance Rebate Program Managing Supply Chain Key for Hawaii Appliance Rebate Program August 24, 2010 - 10:00am Addthis Lindsay Gsell Hawaii's appliance rebate program delivered 4,300 rebates to Hawaiians in just three days. And on just the first day of program, almost 4,000 ENERGY STAR qualified refrigerators were sold. Funded by $1.2 million from the American Recovery and Reinvestment Act, the program delivered a proportionate number of $250 ENERGY STAR refrigerator rebates to six of Hawaii's islands: Oahu, Hawaii, Maui, Kauai, Lanai, and Molokai. "It takes a lot of help from manufacturers, distributors, retailers, hauling company, recyclers, advertisers, printers, new reporters, radio stations and television station to create a success story," said Derrick

340

Managing Supply Chain Key for Hawaii Appliance Rebate Program | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Managing Supply Chain Key for Hawaii Appliance Rebate Program Managing Supply Chain Key for Hawaii Appliance Rebate Program Managing Supply Chain Key for Hawaii Appliance Rebate Program August 24, 2010 - 10:00am Addthis Lindsay Gsell Hawaii's appliance rebate program delivered 4,300 rebates to Hawaiians in just three days. And on just the first day of program, almost 4,000 ENERGY STAR qualified refrigerators were sold. Funded by $1.2 million from the American Recovery and Reinvestment Act, the program delivered a proportionate number of $250 ENERGY STAR refrigerator rebates to six of Hawaii's islands: Oahu, Hawaii, Maui, Kauai, Lanai, and Molokai. "It takes a lot of help from manufacturers, distributors, retailers, hauling company, recyclers, advertisers, printers, new reporters, radio stations and television station to create a success story," said Derrick

Note: This page contains sample records for the topic "analysis key factors" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Energy Storage: The Key to a Reliable, Clean Electricity Supply |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Energy Storage: The Key to a Reliable, Clean Electricity Supply Energy Storage: The Key to a Reliable, Clean Electricity Supply Energy Storage: The Key to a Reliable, Clean Electricity Supply February 22, 2012 - 4:52pm Addthis Improved energy storage technology offers a number of economic and environmental benefits. Improved energy storage technology offers a number of economic and environmental benefits. Matthew Loveless Matthew Loveless Data Integration Specialist, Office of Public Affairs What does this project do? ARPA-E's GRIDS program is investing in new technologies that make storing energy cheaper and more efficient. Energy storage isn't just for AA batteries any more. Thanks to investments from the Department's Advanced Research Projects Agency-Energy (ARPA-E), energy storage may soon play a bigger part in our electricity

342

Single, Key Gene Discovery Could Streamline Production of Biofuels |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Single, Key Gene Discovery Could Streamline Production of Biofuels Single, Key Gene Discovery Could Streamline Production of Biofuels Single, Key Gene Discovery Could Streamline Production of Biofuels August 11, 2011 - 3:51pm Addthis WASHINGTON, DC -- A team of researchers at the Department of Energy's BioEnergy Science Center (BESC) have pinpointed the exact, single gene that controls ethanol production capacity in a microorganism. This discovery could be the missing link in developing biomass crops that produce higher concentrations of ethanol at lower costs. "The Department of Energy relies on the scientific discoveries of its labs and research centers to improve the production of clean energy sources," said Energy Secretary Steven Chu. "This discovery is an important step in developing biomass crops that could increase yield of

343

Building MRV Standards and Capacity in Key Countries | Open Energy  

Open Energy Info (EERE)

MRV Standards and Capacity in Key Countries MRV Standards and Capacity in Key Countries Jump to: navigation, search Name Building MRV Standards and Capacity in Key Countries Agency/Company /Organization World Resources Institute (WRI) Sector Climate Focus Area Renewable Energy Topics Implementation Website http://www.wri.org/topics/mrv Program Start 2011 Program End 2014 Country Brazil, Colombia, Ethiopia, India, South Africa, Thailand South America, South America, Eastern Africa, Southern Asia, Southern Africa, South-Eastern Asia References World Resources Institute (WRI)[1] Program Overview Developing countries will be required to measure, report, and verify (MRV) mitigation actions according to international guidelines, but few have the capacity to do so. The goal of this project is to build the capacity of a

344

Special Presentation: Key Findings from the Barrier Immune Radio  

NLE Websites -- All DOE Office Websites (Extended Search)

Special Presentation: Key Findings from the Barrier Immune Radio Special Presentation: Key Findings from the Barrier Immune Radio Communications Project Speaker(s): Francis Rubinstein Girish Ghatikar Peter Haugen Date: November 29, 2007 - 12:00pm Location: 90-3122 The Barrier Immune Radio Communications (BIRC) Project was established in January 2007 by the Demand Response Emerging Technologies Program (DRETD) to identify radio frequency technologies that could enable the widespread deployment of Demand Response strategies in buildings. Researchers from Lawrence Berkeley National Laboratory and Lawrence Livermore National Laboratory will present the key findings from this project in a one-hour presentation. Researchers found that several of the RF technologies tested at LBNL's Molecular Foundry building were able to provide sufficiently

345

Small Businesses Key in Hydropower Tech Advancement | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Businesses Key in Hydropower Tech Advancement Businesses Key in Hydropower Tech Advancement Small Businesses Key in Hydropower Tech Advancement September 6, 2011 - 2:59pm Addthis Earlier today, the Department of Energy and the Department of Interior announced nearly $17 million in funding over the next three years to advance hydropower technology. The funding announced today will go to sixteen innovative projects around the country, including sustainable small hydro projects, like the ones from Hydro Green Energy, a small business that handles hydroelectric power generation and power and communication line construction. The company, which has eight employees currently, has been awarded funding for two projects. Near Space Systems, a Colorado Springs-based company, is a service-disabled veteran-owned business with a manufacturing focus that's

346

Energy Critical Infrastructure and Key Resources Sector-Specific  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Energy Energy Critical Infrastructure and Key Resources Sector-Specific Plan as input to the National Infrastructure Protection Plan (Redacted) May 2007 Department of Energy Energy Sector Government Coordinating Council Letter of Support i ii Energy Sector-Specific Plan (Redacted) Energy Sector Coordinating Councils Letter of Concurrence The National Infrastructure Protection Plan (NIPP) provides the unifying structure for the integration of federal critical infrastructures and key resources (CI/KR) protection efforts into a single national program. The NIPP includes an overall framework integrating federal programs and activities that are currently underway in the various sectors, as well as new and developing CI/KR protection efforts. The Energy

347

LEDSGP/Transportation Toolkit/Key Actions | Open Energy Information  

Open Energy Info (EERE)

Actions Actions < LEDSGP‎ | Transportation Toolkit Jump to: navigation, search LEDSGP Logo.png Transportation Toolkit Home Tools Training Contacts Key Actions for Low-Emission Development in Transportation Although no single approach or fixed process exists for low-emission development strategies (LEDS), the following key actions are necessary steps for implementing LEDS in the transportation sector. Undertaking these actions requires flexibility to adapt to dynamic societal conditions in a way that complements existing climate and development goals in other sectors. Planners, researchers, and decision-makers should customize this LEDS implementation framework for the specific conditions of their transport sector, choosing from relevant resources to achieve a comprehensive action

348

Security bounds for continuous variables quantum key distribution  

E-Print Network (OSTI)

Security bounds for key distribution protocols using coherent and squeezed states and homodyne measurements are presented. These bounds refer to (i) general attacks and (ii) collective attacks where Eve interacts individually with the sent states, but delays her measurement until the end of the reconciliation process. For the case of a lossy line and coherent states, it is first proven that a secure key distribution is possible up to 1.9 dB of losses. For the second scenario, the security bounds are the same as for the completely incoherent attack.

Miguel Navascues; Antonio Acin

2004-07-19T23:59:59.000Z

349

Tomographic Quantum Cryptography: Equivalence of Quantum and Classical Key Distillation  

E-Print Network (OSTI)

The security of a cryptographic key that is generated by communication through a noisy quantum channel relies on the ability to distill a shorter secure key sequence from a longer insecure one. For an important class of protocols, which exploit tomographically complete measurements on entangled pairs of any dimension, we show that the noise threshold for classical advantage distillation is identical with the threshold for quantum entanglement distillation. As a consequence, the two distillation procedures are equivalent: neither offers a security advantage over the other.

Dagmar Bruss; Matthias Christandl; Artur Ekert; Berthold-Georg Englert; Dagomir Kaszlikowski; Chiara Macchiavello

2003-03-31T23:59:59.000Z

350

Technique for information retrieval using enhanced latent semantic analysis generating rank approximation matrix by factorizing the weighted morpheme-by-document matrix  

SciTech Connect

A technique for information retrieval includes parsing a corpus to identify a number of wordform instances within each document of the corpus. A weighted morpheme-by-document matrix is generated based at least in part on the number of wordform instances within each document of the corpus and based at least in part on a weighting function. The weighted morpheme-by-document matrix separately enumerates instances of stems and affixes. Additionally or alternatively, a term-by-term alignment matrix may be generated based at least in part on the number of wordform instances within each document of the corpus. At least one lower rank approximation matrix is generated by factorizing the weighted morpheme-by-document matrix and/or the term-by-term alignment matrix.

Chew, Peter A; Bader, Brett W

2012-10-16T23:59:59.000Z

351

Grid Parity for Residential Photovoltaics in the United States: Key Drivers and Sensitivities; Preprint  

DOE Green Energy (OSTI)

In this report, we analyze PV break-even costs for U.S. residential customers. We evaluate some key drivers of grid parity both regionally and over time. We also examine the impact of moving from flat to time-of-use (TOU) rates, and we evaluate individual components of the break-even cost, including effect of rate structure and various incentives. Finally, we examine how PV markets might evolve on a regional basis considering the sensitivity of the break-even cost to four major drivers: technical performance, financing parameters, electricity prices and rates, and policies. We find that electricity price rather than technical parameters are in general the key drivers of the break-even cost of PV. Additionally, this analysis provides insight about the potential viability of PV markets.

Ong, S.; Denholm, P.; Clark, N.

2012-08-01T23:59:59.000Z

352

Factors affecting the permanence of livestock projects undertaken by Heifer International-Mexico  

E-Print Network (OSTI)

Heifer International-Mexico (HI-M), a hunger-relieving non-profit organization, collaborates with the Direccin? General de Educacin? Tecnolg?ica Agropecuaria-Durango (DGETA) to establish livestock projects involving resource-poor families in the state of Durango, Mexico. This study identified and analyzed the factors affecting the permanence of hog and dairy cow projects in four communities in the state of Durango, Mexico. The researcher interviewed seven project managers and 35 beneficiaries to identify the factors affecting the permanence of livestock projects. From their responses, the researcher developed a list of 22 factors that promoted the permanence of the livestock projects. Key points included personal interaction between beneficiaries in the group(s) and project manager(s), knowledge and skills obtained from workshops, and household economics. The researcher developed a separate list of 20 factors that inhibited the permanence of the livestock projects. Key points included difficulties in livestock production and poor personal interaction and communication between beneficiaries and project managers. Two diagrams illustrate the commonalities and differences advocated by the two groups for both lists. Beneficiaries and project managers shared eight of the 14 factors advocated to promote the permanence of livestock projects. Beneficiaries had four factors unique to their group and the project managers had two factors unique to their group. Beneficiaries and project managers shared seven of the 13 factors advocated to inhibit the permanence of livestock projects. Four factors were unique to beneficiaries while two factors were unique to project managers. The researcher used a force field analysis based concept labeled the "line of permanence," to illustrate the factors affecting the permanence of HI-M's livestock projects in the communities. Community A was the only location where the interviewees identified more factors inhibiting the permanence of a livestock project. Community A was also the only community that no longer had animals HI-M donated to the community. In contrast to Community A, project managers and beneficiaries in Communities A, B, and C each identified more factors that promoted the permanence of the livestock projects. The author made recommendations based on the findings of the study for HI-M and DGETA to improve the manner by which they undertake livestock projects.

Arispe, Sergio Adrian

2003-01-01T23:59:59.000Z

353

KeyTex Energy LLC | Open Energy Information  

Open Energy Info (EERE)

KeyTex Energy LLC KeyTex Energy LLC Jump to: navigation, search Name KeyTex Energy LLC Place Greensburg, Pennsylvania Zip 15601 Product KeyTex Energy is a full service energy and consulting company, helping businesses implement both wholesale and retail strategies to control and reduce energy costs as well as manage the risks and complexities associated with the energy markets. Coordinates 40.299245°, -79.543159° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":40.299245,"lon":-79.543159,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

354

The S/KEY One-Time Password System  

Science Conference Proceedings (OSTI)

This document describes the S/KEY* One-Time Password system as released for public use by Bellcore and as described in reference [3]. A reference implementation and documentation are available by anonymous ftp from ftp.bellcore.com in the directories ...

N. Haller

1995-02-01T23:59:59.000Z

355

Quantum Key Distribution and String Oblivious Transfer in Noisy Channels  

Science Conference Proceedings (OSTI)

We prove the unconditional security of a quantum key distribution (QKD) protocol on a noisy channel against the most general attack allowed by quantum physics. We use the fact that in a previous paper we have reduced the proof of the unconditionally ...

Dominic Mayers

1996-08-01T23:59:59.000Z

356

The Key Renewal Theorem for a Transient Markov Chain  

E-Print Network (OSTI)

We consider a time-homogeneous Markov chain $X_n$, $n\\ge0$, valued in ${\\bf R}$. Suppose that this chain is transient, that is, $X_n$ generates a $\\sigma$-finite renewal measure. We prove the key renewal theorem under condition that this chain has asymptotically homogeneous at infinity jumps and asymptotically positive drift.

Korshunov, Dmitry

2007-01-01T23:59:59.000Z

357

Illustrated plant identification keys: An interactive tool to learn botany  

Science Conference Proceedings (OSTI)

An Interactive Dichotomous Key (IDK) for 390 taxa of vascular plants from the Ria de Aveiro, available on a website, was developed to help teach botany to school and universitary students. This multimedia tool includes several links to Descriptive and ... Keywords: Applications in subject areas, Post-secondary education, Secondary education, Teaching/learning strategies

Helena Silva; Rosa Pinho; Lísia Lopes; António J. A. Nogueira; Paulo Silveira

2011-05-01T23:59:59.000Z

358

A Verifiable Random Function With Short Proofs and Keys  

E-Print Network (OSTI)

construction of a verifiable ran- dom function (VRF) on groups equipped with a bilinear mapping. Our to a VRF in contrast to prior works of Micali-Rabin-Vadhan [MRV99] and Lysyanskaya [Lys02]. Our proofs in [BB04a] to construct an identity based encryption scheme. Our VRF's proofs and keys have constant size

Dodis, Yevgeniy

359

A Verifiable Random Function With Short Proofs and Keys  

E-Print Network (OSTI)

#cient construction of a verifiable ran­ dom function (VRF) on groups equipped with a bilinear mapping. Our to a VRF in contrast to prior works of Micali­Rabin­Vadhan [MRV99] and Lysyanskaya [Lys02]. Our proofs in [BB04a] to construct an identity based encryption scheme. Our VRF's proofs and keys have constant size

Dodis, Yevgeniy

360

Verifiable Random Functions from Identity-Based Key Encapsulation  

Science Conference Proceedings (OSTI)

We propose a methodology to construct verifiable random functions from a class of identity based key encapsulation mechanisms (IB-KEM) that we call VRF suitable. Informally, an IB-KEM is VRF suitable if it provides what we call unique decryption ...

Michel Abdalla; Dario Catalano; Dario Fiore

2009-04-01T23:59:59.000Z

Note: This page contains sample records for the topic "analysis key factors" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

A Veri able Random Function With Short Proofs and Keys  

E-Print Network (OSTI)

?? Abstract. We give a simple and eÃ?cient construction of a veri#12;able random function (VRF) on bilinear groups. Our construction is direct. In contrast to prior VRF constructions [MRV99, Lys02], it avoids reasonable given cur- rent state of knowledge. For small message spaces, our VRF's proofs and keys have

362

What were the key energy commodity price trends in 2011?  

Reports and Publications (EIA)

Energy commodity price trends varied widely during 2011. Crude oil and petroleum products prices increased during 2011, while natural gas, coal, and electricity prices declined. This article provides an overview of key energy commodity price trends in 2011 based on prices seen in futures markets.

2012-02-14T23:59:59.000Z

363

Robust secret key based authentication scheme using smart cards  

Science Conference Proceedings (OSTI)

User authentication is an important part of security, along with confidentiality and integrity, for systems that allow remote access over untrustworthy networks, like the Internet. Recently, Chen et al. proposed an improvement on the SAS-like password ... Keywords: authentication, cryptography, secret key, smart card

Eun-Jun Yoon; Kee-Young Yoo

2005-11-01T23:59:59.000Z

364

An improved anonymous authentication and key exchange scheme  

Science Conference Proceedings (OSTI)

Nowadays, anonymity property of user authentication scheme becomes important. In 2003, Park et al. proposed an authentication and key exchange scheme using smart card. However, Juang et al. pointed out that Park et al.'s scheme did not provide the user ...

Kyung-kug Kim; Myung-Hwan Kim

2012-09-01T23:59:59.000Z

365

Quantum key distribution system clocked at 2 GHz  

E-Print Network (OSTI)

An improved quantum key distribution test system operating at clock rates of up to 2GHz using a specially adapted commercially available silicon single photon avalanche diode is presented. The use of improved detectors has improved the fibre-based test system performance in terms of transmission distance and quantum bit error rate.

K. J. Gordon; V. Fernandez; G. S. Buller; I. Rech; S. D. Cova; P. D. Townsend

2006-05-08T23:59:59.000Z

366

The Key Coal Producers ONLINE SUPPORTING MATERIALS to  

E-Print Network (OSTI)

The Key Coal Producers ONLINE SUPPORTING MATERIALS to A Global Coal Production Forecast with Multi's most important coal-producing area is North-Central China. The provinces of Inner Mongolia, Ningxia, Shaanxi and Shanxi together accounted for 83 percent of China's proven coal reserves in 2000, and Shanxi

Patzek, Tadeusz W.

367

Page 1 of 4 Creating and Submitting a Key Request  

E-Print Network (OSTI)

of employees. Enter search criteria in the search fields available and select the down red arrow to filter the terms. #12;Page 3 of 4 13. On the Key Request Form - Room List windowpane, select Add New. 14 use the Select Drawing button after entering the building and floor to display the floor plan

Howitt, Ivan

368

news and views A key issue for hydrogen storage materi-  

E-Print Network (OSTI)

news and views A key issue for hydrogen storage materi- als is that the hydrogenation and dehydro be possible to discover stable hydrogen hydrates with higher storage Hydrogen Posture Plan www.eere.energy.gov/hydrogenandfuelcells/pdfs/ hydrogen_posture_plan.pdf 7. Kuhs, W

Palumbi, Stephen

369

BURNING PLASMA NEXT STEPS: DISCUSSION OF KEY DEVELOPMENTS  

E-Print Network (OSTI)

BURNING PLASMA NEXT STEPS: DISCUSSION OF KEY DEVELOPMENTS Gerald A. Navratil Columbia University/FESAC Burning Plasma Strategy Dec 2002 NRC/NAS Interim Report on Burning Plasmas Jan 30, 2003 DOE of the physics of burning plasma, advance fusion technology, and contribute to the development of fusion energy

370

Key issues in ITER diagnostics: Problems and solutions (invited)  

Science Conference Proceedings (OSTI)

The key problems associated with designing diagnostic systems for the International Thermonuclear Experimental Reactor (ITER) are identified and representative solutions are described. The plans for dealing with some outstanding issues are briefly presented. The detailed work is specific to the ITER

A. E. Costley; Members of the ITER Joint Central Team and Home Teams

1999-01-01T23:59:59.000Z

371

Quantum key distribution with a reference quantum state  

SciTech Connect

A new quantum key distribution protocol stable at arbitrary losses in a quantum communication channel has been proposed. For the stability of the protocol, it is of fundamental importance that changes in states associated with losses in the communication channel (in the absence of the eavesdropper) are included in measurements.

Molotkov, S. N., E-mail: molotkov@issp.ac.ru [Russian Academy of Sciences, Institute of Solid State Physics (Russian Federation)

2011-11-15T23:59:59.000Z

372

Generic Security Proof of Quantum Key Exchange using Squeezed States  

E-Print Network (OSTI)

Recently, a Quantum Key Exchange protocol that uses squeezed states was presented by Gottesman and Preskill. In this paper we give a generic security proof for this protocol. The method used for this generic security proof is based on recent work by Christiandl, Renner and Ekert.

Karin Poels; Pim Tuyls; Berry Schoenmakers

2005-08-09T23:59:59.000Z

373

A simple threshold authenticated key exchange from short secrets  

Science Conference Proceedings (OSTI)

This paper brings the password-based authenticated key exchange (PAKE) problem closer to practice. It takes into account the presence of firewalls when clients communicate with authentication servers. An authentication server can indeed be seen as two ... Keywords: password-based authentication, threshold protocols

Michel Abdalla; Olivier Chevassut; Pierre-Alain Fouque; David Pointcheval

2005-12-01T23:59:59.000Z

374

NIST Demonstrates Key Step in Use of Quantum Computers ...  

Science Conference Proceedings (OSTI)

... to factor large numbers, are used to encode ... Nevertheless, Shor's algorithm uses these properties to ... in the original input, and to use this information ...

2013-04-23T23:59:59.000Z

375

Transportation Energy Futures: Key Opportunities and Tools for Decision Makers (Brochure)  

Science Conference Proceedings (OSTI)

The Transportation Energy Futures (TEF) project examines underexplored greenhouse gas-abatement and oil-savings opportunities by consolidating transportation energy knowledge, conducting advanced analysis, and exploring additional opportunities for sound strategic action. Led by NREL, in collaboration with Argonne National Laboratory, the project's primary goal is to provide analysis to accompany DOE-EERE's long-term transportation energy planning by addressing high-priority questions, informing domestic decisions about transportation energy strategies, priorities, and investments. Research and analysis were conducted with an eye toward short-term actions that support long-term energy goals The project looks beyond technology to examine each key question in the context of the marketplace, consumer behavior, industry capabilities, and infrastructure. This updated fact sheet includes a new section on initial project findings.

Not Available

2012-12-01T23:59:59.000Z

376

TYPiMatch: type-specific unsupervised learning of keys and key values for heterogeneous web data integration  

Science Conference Proceedings (OSTI)

Instance matching and blocking, a preprocessing step used for selecting candidate matches, require determining the most representative attributes of instances called keys, based on which similarities between instances are computed. We show that for the ... Keywords: heterogeneous web data, information integration, unsupervised learning

Yongtao Ma; Thanh Tran

2013-02-01T23:59:59.000Z

377

Gradient based variable forgetting factor RLS algorithm  

Science Conference Proceedings (OSTI)

An accurate new variable forgetting factor recursive least-square adaptive algorithm is derived. An improved mean square behaviour analysis is presented, which shows that the theoretical analysis and the simulation results are close to each other. The ... Keywords: RLS algorithm, adaptive filters, variable forgetting factor

C. F. So; S. C. Ng; S. H. Leung

2003-06-01T23:59:59.000Z

378

Anthrax Lethal Factor  

NLE Websites -- All DOE Office Websites (Extended Search)

Thiang Yian Wong, Robert Schwarzenbacher and Robert C. Liddington Thiang Yian Wong, Robert Schwarzenbacher and Robert C. Liddington The Burnham Institute, 10901 North Torrey Pines Road, La Jolla, CA 92037. Anthrax Toxin is a major virulence factor in the infectious disease, Anthrax1. This toxin is produced by Bacillus anthracis, which is an encapsulated, spore-forming, rod-shaped bacterium. Inhalation anthrax, the most deadly form, is contracted through breathing spores. Once spores germinate within cells of the immune system called macrophages2, bacterial cells are released into the bloodstream. There they proliferate rapidly and secrete Anthrax Toxin, ultimately leading to septic shock and death. Although antibiotics may be used to kill the bacteria, the level of toxin has often become so high in the bloodstream that removing the bacteria alone is not sufficient to prevent death. Therefore, the design of anti-toxins offers the prospect of treatment in the advanced stages of infection. Together with collaborators from the NIH and Harvard Medical School, we are involved in the atomic resolution study of the Anthrax Toxin components and their complexes, including small molecules with therapeutic potential. Data collection at SSRL and other synchrotron radiation sources has been key to the advances made in this research so far and is expected to play a continuing role in the future.

379

Key West, Florida: Energy Resources | Open Energy Information  

Open Energy Info (EERE)

(Redirected from Key West, FL) (Redirected from Key West, FL) Jump to: navigation, search Equivalent URI DBpedia Coordinates 24.5557025°, -81.7825914° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":24.5557025,"lon":-81.7825914,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

380

President Obama Announces More Key Administration Posts | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

July 27, 2011 - 3:25pm July 27, 2011 - 3:25pm Addthis WASHINGTON - Today, President Barack Obama announced his intent to nominate the following individuals to key Administration posts: David Danielson - Assistant Secretary for Energy Efficiency and Renewable Energy, Department of Energy Dot Harris - Director of the Office of Minority Economic Impact, Department of Energy President Obama said, "I am honored that these talented individuals have decided to join this Administration and serve our country. I look forward to working with them in the months and years to come." President Obama announced his intent to nominate the following individuals to key Administration posts: David Danielson, Nominee for Assistant Secretary for Energy Efficiency and Renewable Energy, Department of Energy

Note: This page contains sample records for the topic "analysis key factors" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Key Accomplishments @ Catalysis: Reactivity and Structure Group | Chemistry  

NLE Websites -- All DOE Office Websites (Extended Search)

Recent Key Accomplishments Recent Key Accomplishments WGS: Importance of the Metal-Oxide Interface in Catalysis: In Situ Studies of the Water-Gas Shift Reaction by Ambient-Pressure X-ray Photoelectron Spectroscopy A New Type of Strong Metal-Support Interaction and the Production of H-2 through the Transformation of Water on Pt/CeO2(111) and Pt/CeOx/TiO2(110) Catalysts In situ studies of CeO2-supported Pt, Ru, and Pt-Ru alloy catalysts for the water-gas shift reaction: Active phases and reaction intermediates In situ/operando studies for the production of hydrogen through the water-gas shift on metal oxide catalysts Mechanistic understanding of WGS catalysts from first principles: Au(111) Supported Oxide Nanoparticles Theoretical catalyst optimization of WGS catalysts: Cu(111) supported oxide nanostructures

382

Contributions to Key Energy Conversion Technologies and Advanced Methods  

NLE Websites -- All DOE Office Websites (Extended Search)

Contributions to Key Energy Conversion Technologies and Advanced Methods Contributions to Key Energy Conversion Technologies and Advanced Methods for Optimum Energy Systems Design and Planning Speaker(s): Daniel Favrat Date: February 27, 2003 - 12:00pm Location: Bldg. 90 Seminar Host/Point of Contact: Kristina LaCommare This presentation reviews some of EPFL-LENI's recent contributions to advanced cogeneration and heat pump technologies as well as to new system design approaches based on multimodal evolutionar algorithms. In the field of cogeneration, theoretical and experimental results show that gas engines with unscavenged ignition prechambers can, without the need of a catalyst, achieve high efficiencies with reasonable emissions with both natural gas and biogas. Combination with Organic Rankine Cycle (ORC) heat recovery

383

President Obama Announces More Key Administration Posts | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

January 23, 2012 - 8:28pm January 23, 2012 - 8:28pm Addthis THE WHITE HOUSE Office of the Press Secretary FOR IMMEDIATE RELEASE January 23, 2012 President Obama Announces More Key Administration Posts WASHINGTON - Today, President Barack Obama announced his intent to nominate the following individuals to key Administration posts: Erin C. Conaton - Under Secretary of Defense for Personnel and Readiness, Department of Defense Scott H. DeLisi - Ambassador to the Republic of Uganda, Department of State Deborah Delisle - Assistant Secretary for Elementary and Secondary Education, Department of Education Tracey Ann Jacobson - Ambassador to the Republic of Kosovo, Department of State James J. Jones - Assistant Administrator for Toxic Substances, Environmental Protection Agency Frank Kendall III - Under Secretary of Defense for Acquisition,

384

Quantum key distribution using intra-particle entanglement  

E-Print Network (OSTI)

We propose the use of intra-particle entanglement to enhance the security of a practical implementation of the Bennett-Brassard-1984 (BB84) quantum key distribution scheme. Intra-particle entanglement is an attractive resource since it can be easily generated using only linear optics. Security is studied under a simple model of incoherent attack for protocols involving two or all five mutually unbiased bases. In terms of efficiency of secret key generation and tolerable error rate, the latter is found to be superior to the former. We find that states that allow secrecy distillation are necessarily entangled, though they may be local. Since more powerful attacks by Eve obviously exist, our result implies that security is a strictly stronger condition than entanglement for these protocols.

S. Adhikari; Dipankar Home; A. S. Majumdar; A. K. Pan; Akshata Shenoy H.; R. Srikanth

2011-01-04T23:59:59.000Z

385

Public key Steganography Using Discrete Cross-Coupled Chaotic Maps  

E-Print Network (OSTI)

By cross-coupling two logistic maps a novel method is proposed for the public key steganography in JPEG image. Chaotic maps entail high complexity in the used algorithm for embedding secret data in a medium. In this paper, discrete cross- coupled chaotic maps are used to specifying the location of the different parts of the secret data in the image. Modifying JPEG format during compressing and decompressing, and also using public key enhanced difficulty of the algorithm. Simulation results show that in addition to excessive capacity, this method has high robustness and resistance against hackers and can be applicable in secret communication. Also the PSNR value is high compared to the other works.

Sodeif Ahadpour; Mahdiyeh Majidpour; Yaser Sadra

2012-11-01T23:59:59.000Z

386

President Obama Announces More Key Administration Posts | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

August 2, 2011 - 9:20pm August 2, 2011 - 9:20pm Addthis WASHINGTON - Today, President Barack Obama announced his intent to nominate the following individuals to key Administration posts: Ashton B. Carter - Nominee for Deputy Secretary of Defense, Department of Defense I. Charles McCullough III - Inspector General of the Intelligence Community, Office of the Director of National Intelligence Ernest Mitchell, Jr. - Administrator, United States Fire Administration, Federal Emergency Management Agency, Department of Homeland Security Nancy M. Ware - Director, Court Services and Offender Supervision Agency for the District of Columbia Gregory H. Woods - General Counsel, Department of Energy The President also announced his intent to appoint the following individuals to key Administration posts:

387

THIS GUIDE IS INTENDED TO PROVIDE KEY INFORMATION to  

NLE Websites -- All DOE Office Websites (Extended Search)

THIS GUIDE IS INTENDED TO PROVIDE KEY INFORMATION to THIS GUIDE IS INTENDED TO PROVIDE KEY INFORMATION to policy makers on energy codes and to offer guidance on how policy makers can support the creation of statewide energy efficiency goals and standards. In addition, this guide will help instruct policy makers on how they can: » Encourage the adoption of statewide codes. » Establish energy code awareness programs. » Support enforcement of and compliance with energy codes. » Participate in the development of national codes and standards. » Determine the viability of the new code. Building TECHnOlOgiES PROgRAM Resource Guide for Policy Makers PREPAREd By Building Energy Codes Program The u.S. department of Energy's (uSdOE) Building Energy Codes Program (BECP) is an information resource on national energy codes. They work with other government

388

Extensible router for multi-user quantum key distribution network  

E-Print Network (OSTI)

A feasible quantum key distribution (QKD) network scheme has been proposed with the wavelength routing. An apparatus called "quantum router", which is made up of many wavelength division multiplexers, can route the quantum signals without destroying their quantum states. Combining with existing point-to-point QKD technology, we can setup a perfectly QKD star-network. A simple characteristic and feasibility of this scheme has also been obtained.

Zhang, T; Han, Z F; Mo, X F; Guo, Guang-Can; Han, Zheng-Fu; Mo, Xiao-Fan; Zhang, Tao

2006-01-01T23:59:59.000Z

389

Examination and experimental constraints of the stellar reaction rate factor $N_A $ of the $^{18}$Ne($?$,$p$)$^{21}$Na reaction at temperatures of X-Ray Bursts  

E-Print Network (OSTI)

The $^{18}$Ne($\\alpha$,$p$)$^{21}$Na reaction is one key for the break-out from the hot CNO-cycles to the $rp$-process. Recent papers have provided reaction rate factors $N_A $ which are discrepant by at least one order of magnitude. The compatibility of the latest experimental results is tested, and a partial explanation for the discrepant $N_A$ is given. A new rate factor is derived from the combined analysis of all available data. The new rate factor is located slightly below the higher rate factor by Matic {\\it et al.}\\ at low temperatures and significantly below at higher temperatures whereas it is about a factor of five higher than the lower rate factor recently published by Salter {\\it et al.}

P. Mohr; A. Matic

2013-03-06T23:59:59.000Z

390

A Key Enzyme to the Potency of an Anticancer Agent  

NLE Websites -- All DOE Office Websites (Extended Search)

A Key Enzyme to the Potency of an Anticancer Agent Print A Key Enzyme to the Potency of an Anticancer Agent Print Incorporation of halogen atoms into drug molecules often increases biological activity. This is the case with salinosporamide A (sal A), a natural product from the marine bacterium Salinispora tropica that is 500 times more active than sal B, its nonchlorinated analog. Sal A is in phase I human clinical trials for the treatment of multiple myeloma and solid tumors. A group of researchers, using diffraction data collected at ALS Beamline 8.2.2, discovered and characterized the chlorinating SalL enzyme, a crucial component in sal A biosynthesis that uses a unique chlorine-activating mechanism. Chlorine-Loving Enzyme Speeds Things Up The smell of chlorine is unmistakable. It's in the swimming pool, in household bleach, and sometimes the faint odor of chlorine rises up from your tap water. But chlorine is more than a purifier and a disinfectant. It's found almost everywhere in nature-in table salt, dissolved in the ocean, and as a key ingredient in biosynthesis, a vital part of the metabolism of all living organisms.

391

Key management and encryption under the bounded storage model.  

SciTech Connect

There are several engineering obstacles that need to be solved before key management and encryption under the bounded storage model can be realized. One of the critical obstacles hindering its adoption is the construction of a scheme that achieves reliable communication in the event that timing synchronization errors occur. One of the main accomplishments of this project was the development of a new scheme that solves this problem. We show in general that there exist message encoding techniques under the bounded storage model that provide an arbitrarily small probability of transmission error. We compute the maximum capacity of this channel using the unsynchronized key-expansion as side-channel information at the decoder and provide tight lower bounds for a particular class of key-expansion functions that are pseudo-invariant to timing errors. Using our results in combination with Dziembowski et al. [11] encryption scheme we can construct a scheme that solves the timing synchronization error problem. In addition to this work we conducted a detailed case study of current and future storage technologies. We analyzed the cost, capacity, and storage data rate of various technologies, so that precise security parameters can be developed for bounded storage encryption schemes. This will provide an invaluable tool for developing these schemes in practice.

Draelos, Timothy John; Neumann, William Douglas; Lanzone, Andrew J.; Anderson, William Erik

2005-11-01T23:59:59.000Z

392

Population modeling in conservation planning of the Lower Keys marsh rabbit  

E-Print Network (OSTI)

Rapid development and urbanization of the Lower Florida Keys in the last 30 years has fragmented the habitat of the Lower Keys marsh rabbit (Sylvilagus palustris hefneri) and threatened it with extinction. Current threats exist at multiple spatiotemporal scales and include threats due to development, invasive species, and global climate change. On Boca Chica Key, the Lower Keys marsh rabbit (LKMR) exists as a metapopulation on Naval Air Station-Key West (NASKW). I conducted a population viability analysis to determine the metapopulation's risk of extinction under multiple management scenarios by developing a spatially-explicit, stage-structured, stochastic matrix model using the programs RAMAS Metapop and ArcGIS. These management scenarios include clearance of airfield vegetation, habitat conversion, and control of feral cats as an invasive species. Model results provided the Navy with relative risk estimates under these different scenarios. Airfield clearance with habitat conversion increased extinction risk, but when coupled with feral cat control, risk was decreased. Because of the potential of sea-level rise due to human-induced global climate change, and its projected impact on the biodiversity of the Florida Keys, I estimated the impacts of rising sea levels on LKMR across its geographic distribution under scenarios of no, low (0.3m), medium (0.6m), and high (0.9m) sea-level rise. I also investigated impacts due to 2 treatments (allowing vegetation to migrate upslope and not allowing migration), and 2 land-use planning decisions (protection and abandonment of humandominated areas). Not surprisingly, under both treatments and both land-use planning decisions, I found a general trend of decreasing total potential LKMR habitat with increasing sea-level rise. Not allowing migration and protecting human-dominated areas both tended to decrease potential LKMR habitat as compared with allowing migration and abandoning human-dominated areas. In conclusion, conservation strategies at multiple scales need to be implemented in order to reduce threats to LKMR, such as development, invasive species, and global climate change.

LaFever, David Howard

2006-08-01T23:59:59.000Z

393

Initial Risk Analysis and Decision Making Framework  

Science Conference Proceedings (OSTI)

Commercialization of new carbon capture simulation initiative (CCSI) technology will include two key elements of risk management, namely, technical risk (will process and plant performance be effective, safe, and reliable) and enterprise risk (can project losses and costs be controlled within the constraints of market demand to maintain profitability and investor confidence). Both of these elements of risk are incorporated into the risk analysis subtask of Task 7. Thus far, this subtask has developed a prototype demonstration tool that quantifies risk based on the expected profitability of expenditures when retrofitting carbon capture technology on a stylized 650 MW pulverized coal electric power generator. The prototype is based on the selection of specific technical and financial factors believed to be important determinants of the expected profitability of carbon capture, subject to uncertainty. The uncertainty surrounding the technical performance and financial variables selected thus far is propagated in a model that calculates the expected profitability of investments in carbon capture and measures risk in terms of variability in expected net returns from these investments. Given the preliminary nature of the results of this prototype, additional work is required to expand the scope of the model to include additional risk factors, additional information on extant and proposed risk factors, the results of a qualitative risk factor elicitation process, and feedback from utilities and other interested parties involved in the carbon capture project. Additional information on proposed distributions of these risk factors will be integrated into a commercial implementation framework for the purpose of a comparative technology investment analysis.

Engel, David W.

2012-02-01T23:59:59.000Z

394

Shor's Factoring Algorithm and Modern Cryptography. An Illustration of the Capabilities Inherent in Quantum Computers  

E-Print Network (OSTI)

The security of messages encoded via the widely used RSA public key encryption system rests on the enormous computational effort required to find the prime factors of a large number N using classical (i.e., conventional) computers. In 1994, however, Peter Shor showed that for sufficiently large N a quantum computer would be expected to perform the factoring with much less computational effort. This paper endeavors to explain, in a fashion comprehensible to the non-expert readers of this journal: (i) the RSA encryption protocol; (ii) the various quantum computer manipulations constituting the Shor algorithm; (iii) how the Shor algorithm performs the factoring; and (iv) the precise sense in which a quantum computer employing Shor's algorithm can be said to accomplish the factoring of very large numbers with less computational effort than a classical computer can. It is made apparent that factoring $N$ generally requires many successive runs of the algorithm. The careful analysis herein reveals, however, that the probability of achieving a successful factorization on a single run is about twice as large as commonly quoted in the literature.

Edward Gerjuoy

2004-11-25T23:59:59.000Z

395

Analysis of factors affecting participation of faculty and choice of strategies for the internationalization of the undergraduate agricultural curriculum: the case in two land grant universities  

E-Print Network (OSTI)

To adapt to the new global system, internationalization is increasingly being accepted as a necessity in higher education. Although the process involves the research, service, and education components of academic institutions, many authors have contended that the internationalization of the curriculum is the most important component of the process and that faculty are its main drivers and actors. While a number of the issues involving internationalization are very well documented, there is still little published information regarding the perspectives of random samples of faculty regarding strategies by which to internationalize the undergraduate curriculum. The purpose of this study was to analyze perspectives of faculty in two land grant colleges of agriculture regarding academic and institutional strategies for the internationalization of the undergraduate agricultural curriculum. A mixed method research approach was used to gather data, combining the use of a questionnaire with both quantitative and open-ended questions sent to a census of the teaching faculty of the two colleges, and conducting eight one-hour interviews. The researcher also carried out an in-depth assessment of the effect of nonresponse error in the study by using and comparing various methods of nonresponse analysis. Faculty knowledge of international issues was positively correlated with their participation in the internationalization process. Knowledge and participation were, in turn, positively correlated with faculty perceptions of relevance of internationalization of the curriculum, and with faculty acceptance of most of the proposed academic and institutional strategies for internationalization. Faculty ranked mobility and infusion approaches as their preferred academic strategies for internationalization of the curriculum, and there were clear patterns of associations between selections by faculty, with mobility and infusion belonging to different groups. When asked about incentives to participate in the internationalization process, faculty mentioned funds, "real" recognition, and release time as their foremost choices. Also, faculty expressed a need for increased leadership, vision, and focus for the process. When looking at the academic and institutional strategies together, various patterns of association also appeared, reiterating the notion that there is not a single best approach to internationalization, but that multiple and complementary strategies are needed.

Navarro, Maria

2005-05-01T23:59:59.000Z

396

Factors Affecting KM Implementation in the Chinese Community  

Science Conference Proceedings (OSTI)

This paper reviews past research on KM to identify key factors affecting Chinese KM implementation. It begins with a chronological overview of 76 KM related publications, followed by two separate discussions of socio-cultural and non-socio-cultural factors ... Keywords: China, Chinese, KM Implementation, Knowledge Management

Yang Lin; Kimiz Dalkir

2010-01-01T23:59:59.000Z

397

EIS-0265-SA-75: Supplement Analysis | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

EIS-0265-SA-75: Supplement Analysis EIS-0265-SA-75: Supplement Analysis EIS-0265-SA-75: Supplement Analysis Watershed Management Program - Gourlay Creek Fish Ladder Project Bonneville Power Administration proposes to fund the construction of a fish passage facility at the Gourlay Creek Dam/water reservoir in Columbia County, Oregon. The City of Scappoose owns and manages close to half of the Gourlay Creek Watershed including high quality habitat above and below the Gourlay Creek Dam. Gourlay Creek Dam has been identified as a key limiting factor in the re-generation of salmon and trout in the Gourlay Creek Watershed. Supplement Analysis for the Watershed Management Program EIS (DOE/EIS-0265/SA-75) - Gourlay Creek Fish Ladder Project (February 2002) More Documents & Publications EIS-0265-SA-59: Supplement Analysis

398

Experimental study on Gaussian-modulated coherent states quantum key distribution over standard telecom fiber  

E-Print Network (OSTI)

In this paper, we present a fully fiber-based one-way Quantum Key Distribution (QKD) system implementing the Gaussian-Modulated Coherent States (GMCS) protocol. The system employs a double Mach-Zehnder Interferometer (MZI) configuration in which the weak quantum signal and the strong Local Oscillator (LO) go through the same fiber between Alice and Bob, and are separated into two paths inside Bob's terminal. To suppress the LO leakage into the signal path, which is an important contribution to the excess noise, we implemented a novel scheme combining polarization and frequency multiplexing, achieving an extinction ratio of 70dB. To further minimize the system excess noise due to phase drift of the double MZI, we propose that, instead of employing phase feedback control, one simply let Alice remap her data by performing a rotation operation. We further present noise analysis both theoretically and experimentally. Our calculation shows that the combined polarization and frequency multiplexing scheme can achieve better stability in practice than the time-multiplexing scheme, because it allows one to use matched fiber lengths for the signal and the LO paths on both sides of the double MZI, greatly reducing the phase instability caused by unmatched fiber lengths. Our experimental noise analysis quantifies the three main contributions to the excess noise, which will be instructive to future studies of the GMCS QKD systems. Finally, we demonstrate, under the "realistic model" in which Eve cannot control the system within Bob's terminal, a secure key rate of 0.3bit/pulse over a 5km fiber link. This key rate is about two orders of magnitude higher than that of a practical BB84 QKD system.

Bing Qi; Lei-Lei Huang; Li Qian; Hoi-Kwong Lo

2007-09-23T23:59:59.000Z

399

Regarding Proton Form Factors  

Science Conference Proceedings (OSTI)

1 DFG Research Center ''Mathematics for Key Technologies,'' c=o Weierstrass Institute ...... Burden, C. J., Roberts, C. D., Thomson, M. J.: Phys. Lett. B371, 163 ...

400

Transformational Energy Action Management (TEAM) Wireless Energy Efficiency Keys Initiative  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

by by Transformational Energy Action Management (TEAM) Wireless Energy Efficiency Keys Initiative *Ways of Using Wireless Technology to Help You Reduce Energy Usage at your Facility Together with our industry partners, we strive to: * Accelerate adoption of the many energy-efficient technologies and practices available today * Conduct vigorous technology innovation to radically improve future energy diversity, resource efficiency, and carbon mitigation * Promote a corporate culture of energy efficiency and carbon management What Is the Industrial Technologies Program ? The Industrial Technologies Program (ITP) is the lead federal agency responsible for improving energy efficiency in the largest energy-using sector of the country. Industrial Sector National Initiative

Note: This page contains sample records for the topic "analysis key factors" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Local structures - key to improved gas adsorption in carbon materials |  

NLE Websites -- All DOE Office Websites (Extended Search)

Functional Materials for Energy Functional Materials for Energy Local structures - key to improved gas adsorption in carbon materials September 23, 2013 (Inset, top left) A simulated disordered carbon structure. (Inset, bottom right) Same structure, with dense colored regions showing the strongest adsorption positions. (Main figure) Isosteric heat of adsorption as a function of carbon density, showing the strong change of adsorption with pore size. Combined results from electron microscopy, neutron scattering, and theory, illustrate the link between local structures and adsorption properties in carbon materials. The achieved understanding at the atomic scale is a crucial step towards predicting and designing materials with enhanced gas adsorption properties, with important implications for applications such as

402

Stable polarization-encoded quantum key distribution in fiber  

E-Print Network (OSTI)

Polarizations of single-photon pulses have been controlled with long-term stability of more than 10 hours by using an active feedback technique for auto-compensation of unpredictable polarization scrambling in long-distance fiber. Experimental tests of long-term operations in 50, 75 and 100 km fibers demonstrated that such a single-photon polarization control supported stable polarization encoding in long-distance fibers to facilitate stable one-way fiber system for polarization-encoded quantum key distribution, providing quantum bit error rates below the absolute security threshold.

Wu, G; Li, Y; Zeng, H; Wu, Guang; Chen, Jie; Li, Yao; Zeng, Heping

2006-01-01T23:59:59.000Z

403

Key results from SB8 simulant flowsheet studies  

SciTech Connect

Key technically reviewed results are presented here in support of the Defense Waste Processing Facility (DWPF) acceptance of Sludge Batch 8 (SB8). This report summarizes results from simulant flowsheet studies of the DWPF Chemical Process Cell (CPC). Results include: Hydrogen generation rate for the Sludge Receipt and Adjustment Tank (SRAT) and Slurry Mix Evaporator (SME) cycles of the CPC on a 6,000 gallon basis; Volume percent of nitrous oxide, N2O, produced during the SRAT cycle; Ammonium ion concentrations recovered from the SRAT and SME off-gas; and, Dried weight percent solids (insoluble, soluble, and total) measurements and density.

Koopman, D. C.

2013-04-26T23:59:59.000Z

404

Epimorphin Functions as a Key Morphoregulator for Mammary Epithelial Cells  

SciTech Connect

Hepatocyte growth factor (HGF) and EGF have been reported to promote branching morphogenesis of mammary epithelial cells. We now show that it is epimorphin that is primarily responsible for this phenomenon. In vivo, epimorphin was detected in the stromal compartment but not in lumenal epithelial cells of the mammary gland; in culture, however, a subpopulation of mammary epithelial cells produced significant amounts of epimorphin. When epimorphin-expressing epithelial cell clones were cultured in collagen gels they displayed branching morphogenesis in the presence of HGF, EGF, keratinocyte growth factor, or fibroblast growth factor, a process that was inhibited by anti-epimorphin but not anti-HGF antibodies. The branch length, however, was roughly proportional to the ability of the factors to induce growth. Accordingly, epimorphin-negative epithelial cells simply grew in a cluster in response to the growth factors and failed to branch. When recombinant epimorphin was added to these collagen gels, epimorphin-negative cells underwent branching morphogenesis. The mode of action of epimorphin on morphogenesis of the gland, however, was dependent on how it was presented to the mammary cells. If epimorphin was overexpressed in epimorphin-negative epithelial cells under regulation of an inducible promoter or was allowed to coat the surface of each epithelial cell in a nonpolar fashion, the cells formed globular, alveoli-like structures with a large central lumen instead of branching ducts. This process was enhanced also by addition of HGF, EGF, or other growth factors and was inhibited by epimorphin antibodies. These results suggest that epimorphin is the primary morphogen in the mammary gland but that growth factors are necessary to achieve the appropriate cell numbers for the resulting morphogenesis to be visualized.

Hirai, H.; Lochter, A.; Galosy, S.; Koshida, S.; Niwa, S.; Bissell, M.J.

1997-10-13T23:59:59.000Z

405

Conversion factors for energy equivalents: All factors  

Science Conference Proceedings (OSTI)

... Conversion factors for energy equivalents Return to online conversions. Next page of energy equivalents. Definition of uncertainty ...

406

Key World Energy Statistics-2010 | Open Energy Information  

Open Energy Info (EERE)

AgencyCompany Organization: International Energy Agency Sector: Energy Topics: Market analysis Resource Type: Dataset, Maps Website: www.iea.orgtextbasenppdffree...

407

Newly Described "Dragon" Protein Could Be Key to Bird Flu Cure |  

NLE Websites -- All DOE Office Websites (Extended Search)

Hearing the Highest Pitches Hearing the Highest Pitches Unveiling the Secrets of Nanoparticle Haloing A Fruit-Fly Protein that Captures Tumor Growth Factors A Protein that Repairs Damage to Cancer Cells An X-ray Vortex on the Horizon? Science Highlights Archives: 2013 | 2012 | 2011 | 2010 2009 | 2008 | 2007 | 2006 2005 | 2004 | 2003 | 2002 2001 | 2000 | 1998 | Subscribe to APS Science Highlights rss feed Newly Described "Dragon" Protein Could Be Key to Bird Flu Cure JULY 16, 2008 Bookmark and Share The overall structure of the PAC -PB1 N complex. The structure is colored according to secondary structure and elements are labeled. Helices are shown as cylinders and are red in the brain domain and blue in the mouth domain; strands are yellow and loops are green. The PB1 N peptide is

408

Key Distribution based on Three Player Quantum Games  

E-Print Network (OSTI)

We study a new QKD that is different from the scheme proposed by \\cite{Ramz2}, though it essentially takes our ground on three-player quantum games and Greenberg-Horne-Zeilinger triplet entangled state (GHZ state) \\cite{Gree} is used. In the scheme proposed in this paper, players in the game, Bob and Charlie (and Alice also) can get some common key or information (applied strategies and their payoffs in the game), when Alice informs Bob and Charlie about some results of the measurement made by her. Even if somebody else knows the public information, he/she can not get any key information. There is not any arbiter in our scheme, since existence of an arbiter increases the risk of wiretapping. Lastly we discuss robustness of the proposed QKD method for eavesdrop. We show that though maximally entangled case and non-entangled case essentially provide an equivalent way as QKD, the latter is not available in the case where there are some eavesdroppers. At the same time, we point put that the entanglement of the initial state is crucial when a partially entangled state is used.

Norihito Toyota

2010-10-09T23:59:59.000Z

409

Encryption Key Search using Java-based ALiCE Grid  

E-Print Network (OSTI)

Encryption Key Search is a compute-intensive operation that consists of a brute-force search of a particular key in a given key space. Sequential execution time for a 56-bit encryption key search is approximately 200,000 ...

Virkar, Ameya

410

Emission Factors For Formaldehyde - Home | Energy Analysis ...  

U.S. Energy Information Administration (EIA)

Emissions of TMPB-DIB (a plasticizer found in vinyl products) were found to be higher than values reported in comparable housing by Hodgson et al.,3.

411

Water Is Key to Sustainability of Energy Production  

E-Print Network (OSTI)

Estimate net water use (consumption) ­ Irrigation water, process water, produced water, cooling water 4 fuels The Issue With substantial amounts of water needed to produce energy feedstocks and fuels, water consumption factors across the U.S. (assuming corn produced from all regions is used to produce ethanol) Water

Argonne National Laboratory

412

Investing in Oil and Natural Gas A Few Key Issues  

U.S. Energy Information Administration (EIA) Indexed Site

Strategic Advisors in Global Energy Strategic Advisors in Global Energy Strategic Advisors in Global Energy Strategic Advisors in Global Energy Investing in Oil and Natural Gas: A Few Key Issues Prepared for EIA Conference Susan Farrell, Senior Director PFC Energy April 8, 2009 Investing in Oil and Gas| PFC Energy| Page 2 The Top 20 IOCs and Top 20 NOCs Account for Over Half of E&P Spend Source: PFC Energy, Global E&P Surveys Investing in Oil and Gas| PFC Energy| Page 3 Oil Prices Rose, But So Did Costs + 52% $0 $20 $40 $60 $80 $100 $120 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 WTI $/barrel Annual averages Large Gulf of Mexico Facility Costs by Segment Avg $28.31 Avg $59.13 Source: PFC Energy Investing in Oil and Gas| PFC Energy| Page 4 Near term Spending Cuts will be Significant

413

President Obama Announces More Key Administration Posts | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

December 9, 2009 - 12:00am December 9, 2009 - 12:00am Addthis WASHINGTON - Today, President Barack Obama announced his intent to nominate the following individuals to key administration posts: Patricia A. Hoffman, Assistant Secretary for Electricity Delivery and Energy Reliability, Department of Energy Mari Del Carmen Aponte, Ambassador to the Republic of El Salvador, Department of State Donald E. Booth, Ambassador to the Federal Democratic Republic of Ethiopia, Department of State Larry Persily, Federal Coordinator for Alaska Natural Gas Transportation Projects President Obama said, "The depth of experience these individuals bring to their roles will be valuable to my administration as we work to bring about real change for the American people. I look forward to working with them in

414

Nano Changes Have Macro Importance for a Key Electronics Material |  

NLE Websites -- All DOE Office Websites (Extended Search)

Squeezing an Old Material Could Yield "Instant-On" Memory Squeezing an Old Material Could Yield "Instant-On" Memory A Metal That Becomes Transparent under Pressure Under Pressure, Atoms Make Unlikely Alloys Slowing Down Near the Glass Transition New Light on Improving Engine Efficiencies Science Highlights Archives: 2013 | 2012 | 2011 | 2010 2009 | 2008 | 2007 | 2006 2005 | 2004 | 2003 | 2002 2001 | 2000 | 1998 | Subscribe to APS Science Highlights rss feed Nano Changes Have Macro Importance for a Key Electronics Material APRIL 23, 2009 Bookmark and Share Original image courtesy of http://www.freefoto.com By combining the results from several powerful techniques for studying materials structure at the nanoscale, including work at the U.S. Department of Energy's Advanced Photon Source (APS) at Argonne National Laboratory,

415

LANL to play key role in biofuel development  

NLE Websites -- All DOE Office Websites (Extended Search)

Biofuel development Biofuel development LANL to play key role in biofuel development LANL to create a proof-of-concept system for commercializing algae-based biofuels or other advanced biofuels that can be transported and sold using the nation's existing fueling infrastructure. January 14, 2010 Los Alamos National Laboratory sits on top of a once-remote mesa in northern New Mexico with the Jemez mountains as a backdrop to research and innovation covering multi-disciplines from bioscience, sustainable energy sources, to plasma physics and new materials. Los Alamos National Laboratory sits on top of a once-remote mesa in northern New Mexico with the Jemez mountains as a backdrop to research and innovation covering multi-disciplines from bioscience, sustainable energy sources, to plasma physics and new materials.

416

President Obama Announces More Key Administration Posts | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

April 17, 2009 - 12:00am April 17, 2009 - 12:00am Addthis WASHINGTON, DC - Today, President Barack Obama announced his intent to nominate the following individuals for key administration posts: Christine M. Griffin, Deputy Director of Office of Personnel Management; Kevin Concannon, Under Secretary for Food, Nutrition and Consumer Services, United States Department of Agriculture; Rajiv Shah, Under Secretary for Research, Education, and Economics, United States Department of Agriculture; Michael Nacht, Assistant Secretary of Defense (Global Strategic Affairs), Department of Defense; Mercedes Márquez, Assistant Secretary for Community Planning and Development, Department of Housing and Urban Development; Raymond M. Jefferson, Assistant Secretary for Veterans Employment and Training, Department of Labor; Robert S. Litt, General

417

President Obama Announces More Key Administration Posts | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

December 10, 2010 - 12:00am December 10, 2010 - 12:00am Addthis WASHINGTON - Today, President Barack Obama announced his intent to nominate the following individuals to key Administration posts: Peter B. Lyons, Assistant Secretary for Nuclear Energy, Department of Energy Denise E. O'Donnell, Director of the Bureau of Justice Assistance, Department of Justice Stephanie O'Sullivan, Principal Deputy Director of National Intelligence, Directorate of National Intelligence David Shear, Ambassador to the Socialist Republic of Vietnam, Department of State The President also announced his intent to appoint Harvey S. Wineberg as a Member of the President's Advisory Council on Financial Capability. His biography is below. President Obama said, "The American people will be greatly served by the

418

Potential Benefits from Improved Energy Efficiency of Key Electrical Products:  

NLE Websites -- All DOE Office Websites (Extended Search)

8254 8254 Potential Benefits from Improved Energy Efficiency of Key Electrical Products: The Case of India Michael McNeil, Maithili Iyer, Stephen Meyers, Virginie Letschert, James E. McMahon Environmental Energy Technologies Division Lawrence Berkeley National Laboratory University of California, Berkeley Berkeley, CA December 2005 This work was supported by the International Copper Association through the U.S. Department of Energy under Contract No. DE-AC03-76SF00098. 2 ABSTRACT The goal of this project was to estimate the net benefits that cost-effective improvements in energy efficiency can bring to developing countries. The study focused on four major electrical products in the world's second largest developing country, India. These

419

President Obama Announces More Key Administration Posts | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

July 8, 2009 - 12:00am July 8, 2009 - 12:00am Addthis WASHINGTON, DC - Today, President Barack Obama announced his intent to nominate the following individuals for key administration posts: Joe Garcia, Director of the Office of Minority Economic Impact, Department of Energy Michael H. Posner, Assistant Secretary of State for Democracy, Human Rights, and Labor, Department of State Stephen J. Rapp, Ambassador at Large for War Crimes Issues, Department of State Alexander G. Garza, Assistant Secretary for Health Affairs and Chief Medical Officer, Department of Homeland Security Susan L. Kurland, Assistant Secretary for Aviation and International Affairs, Department of Transportation Kenneth A. Spearman, Member of the Board of Directors, Farm Credit Administration Rolena Adorno, Member of the National Council on the Humanities

420

A Key Target for Diabetes Drugs | Advanced Photon Source  

NLE Websites -- All DOE Office Websites (Extended Search)

Molten Metal Solidifies into a New Kind of Glass Molten Metal Solidifies into a New Kind of Glass Organic Polymers Show Sunny Potential A New Family of Quasicrystals Cool Muscles: Storing Elastic Energy for Flight A Further Understanding of Superconductivity Science Highlights Archives: 2013 | 2012 | 2011 | 2010 2009 | 2008 | 2007 | 2006 2005 | 2004 | 2003 | 2002 2001 | 2000 | 1998 | Subscribe to APS Science Highlights rss feed A Key Target for Diabetes Drugs JULY 26, 2013 Bookmark and Share The structure of the human glucagon receptor, which could help scientists design new drugs for type 2 diabetes. (Image courtesy of Katya Kadyshevskaya, The Scripps Research Institute) The three-dimensional (3-D) atomic structure of the human glucagon receptor has been identified by an international team of researchers carrying out

Note: This page contains sample records for the topic "analysis key factors" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

City of Key West, Florida (Utility Company) | Open Energy Information  

Open Energy Info (EERE)

Florida (Utility Company) Florida (Utility Company) Jump to: navigation, search Name Key West City of Place Florida Utility Id 10226 Utility Location Yes Ownership M NERC Location FRCC NERC FRCC Yes Operates Generating Plant Yes Activity Generation Yes Activity Transmission Yes Activity Buying Transmission Yes Activity Distribution Yes Alt Fuel Vehicle Yes Alt Fuel Vehicle2 Yes References EIA Form EIA-861 Final Data File for 2010 - File1_a[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. Utility Rate Schedules Grid-background.png Governmental Recreational Facility Lighting (Schedule S-3) LED High Watt, Approx. 72 Watt (Street Light Schedule S-1) Lighting LED High Watt, Approx. 72 Watts (Area Lighting Schedule S-2) Lighting

422

LANL breaks ground on key sediment control project  

NLE Websites -- All DOE Office Websites (Extended Search)

Sediment control project Sediment control project LANL breaks ground on key sediment control project Called "grade-control" structures, the approximately $2 million features are up to eight feet high and made of rocks packed tightly into wire enclosures. November 5, 2009 Los Alamos National Laboratory sits on top of a once-remote mesa in northern New Mexico with the Jemez mountains as a backdrop to research and innovation covering multi-disciplines from bioscience, sustainable energy sources, to plasma physics and new materials. Los Alamos National Laboratory sits on top of a once-remote mesa in northern New Mexico with the Jemez mountains as a backdrop to research and innovation covering multi-disciplines from bioscience, sustainable energy sources, to plasma physics and new materials.

423

The Seven Keys to Success in Energy Management and Conservation  

E-Print Network (OSTI)

This paper is a summary of the seven key elements of the Deere & Company Energy Management and Conservation Program. These elements have been found to be essential for the ultimate success of any company-wide energy management program. The process of initiating an energy management program is detailed. The establishment of long range goals, together with the organization and commitment to accomplish these goals are specified. The necessity of performing an energy audit is discussed, together with an explanation of the three 'types' of energy used in a manufacturing facility. The requirement of having a good 'energy ethic' among all employees is discussed in detail. The method of monitoring the program and measuring results is also discussed.

Darby, D. F.

1984-01-01T23:59:59.000Z

424

President Obama Announces More Key Administration Posts | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4, 2009 - 12:00am 4, 2009 - 12:00am Addthis WASHINGTON, DC - Today, President Barack Obama announced his intent to nominate the following individuals for key administration posts: Daniel B. Poneman, Deputy Secretary, Department of Energy; Fred P. Hochberg, President and Chairman of the Export-Import Bank of the United States; Francisco "Frank" J. Sánchez, Under Secretary for International Trade, Department of Commerce; Miriam E. Sapiro, Deputy Trade Representative; Judith A. McHale, Under Secretary for Public Diplomacy and Public Affairs, Department of State; Philip J. "P.J." Crowley, Assistant Secretary of State for Public Affairs, Department of State; Bonnie D. Jenkins, Coordinator for Threat Reduction Programs (with the Rank of Ambassador), Department of

425

Life-Cycle Cost Analysis of Energy Efficiency Design Options...  

NLE Websites -- All DOE Office Websites (Extended Search)

to consider whether to amend the existing energy efficiency standards for furnaces and boilers. A key factor in DOE's consideration of new standards is the economic impacts on...

426

DOE SuperTruck Program Benefits Analysis  

NLE Websites -- All DOE Office Websites (Extended Search)

in the project's technical scope development, information collection, and analysis. He also served as the key technical contact point for the SuperTruck development...

427

Using Key Performance Indicators to Manage Energy Costs  

E-Print Network (OSTI)

Modern management systems rely heavily on information technology to set goals, track performance and communicate results. Energy management approaches (such as those offered by the US Department of Energy and Natural Resources Canada) and measurement and verification protocols (such as IPMVP 2001) often highlight the importance an information system has in maximizing results. The increasing adoption of energy information systems has led, however, to an interesting paradox: while it is now cost-effective to collect much more data than ever before, many energy managers find themselves drowning in the volume of data generated. Business information systems faced a similar challenge a decade ago, and it is now common practice to use Key Performance Indicators (KPIs) to summarize volumes of data into a few critical “nuggets” of actionable information. These KPIs provide both the metrics that will be used to determine the success of a business plan as well as the timely information managers need to track performance and make adjustments to ensure success. A similar approach can be used in the practice of energy management, where KPIs can be designed to measure the success of key elements in an energy management plan and provide energy managers with the timely “nuggets” of information they need to ensure success. This paper describes how to define and use KPIs to track the performance and measure the success of an energy management plan. A framework is provided to assist in selecting measurable goals from an energy management plan and determine the raw data and processing required to generate the associated KPIs.

Van Gorp, J. C.

2005-01-01T23:59:59.000Z

428

Earth System Analysis for Sustainability  

E-Print Network (OSTI)

Earth System Analysis for Sustainability By Hans JoachimSystem Analysis for Sustainability. MIT Press, Cambridge,the factors shaping sustainability yet undertaken and makes

Hamilton-Smith, Elery

2005-01-01T23:59:59.000Z

429

Understanding Key Players and Factors Involved in the Implementation of Physical Activity Push Strategies into Organizational Settings  

E-Print Network (OSTI)

evolution of an organizational heart health assessment. Am Jbuilding a legacy of health organizational wellness program.in employee health and organizational productivity outcomes

Hopkins, Jammie Mack

2012-01-01T23:59:59.000Z

430

SUBTASK 1.7 EVALUATION OF KEY FACTORS AFFECTING SUCCESSFUL OIL PRODUCTION IN THE BAKKEN FORMATION, NORTH DAKOTA PHASE II  

Science Conference Proceedings (OSTI)

Production from the Bakken and Three Forks Formations continues to trend upward as forecasts predict significant production of oil from unconventional resources nationwide. As the U.S. Geological Survey reevaluates the 3.65 billion bbl technically recoverable estimate of 2008, technological advancements continue to unlock greater unconventional oil resources, and new discoveries continue within North Dakota. It is expected that the play will continue to expand to the southwest, newly develop in the northeastern and northwestern corners of the basin in North Dakota, and fully develop in between. Although not all wells are economical, the economic success rate has been near 75% with more than 90% of wells finding oil. Currently, only about 15% of the play has been drilled, and recovery rates are less than 5%, providing a significant future of wells to be drilled and untouched hydrocarbons to be pursued through improved stimulation practices or enhanced oil recovery. This study provides the technical characterizations that are necessary to improve knowledge, provide characterization, validate generalizations, and provide insight relative to hydrocarbon recovery in the Bakken and Three Forks Formations. Oil-saturated rock charged from the Bakken shales and prospective Three Forks can be produced given appropriate stimulation treatments. Highly concentrated fracture stimulations with ceramic- and sand-based proppants appear to be providing the best success for areas outside the Parshall and Sanish Fields. Targeting of specific lithologies can influence production from both natural and induced fracture conductivity. Porosity and permeability are low, but various lithofacies units within the formation are highly saturated and, when targeted with appropriate technology, release highly economical quantities of hydrocarbons.

Darren D. Schmidt; Steven A. Smith; James A. Sorensen; Damion J. Knudsen; John A. Harju; Edward N. Steadman

2011-10-31T23:59:59.000Z

431

Key success factors in managing the visitors' experience at the Klein Karoo National Arts Festival / Erasmus L.J.J.  

E-Print Network (OSTI)

??The ABSA Klein Karoo National Arts Festival (KKNK) is one of the biggest and most popular Afrikaans arts festivals in South Africa, and since its… (more)

Erasmus, Lourens Johannes Jacobus

2011-01-01T23:59:59.000Z

432

How to Protect DES Against Exhaustive Key Search (an Analysis of ...  

Science Conference Proceedings (OSTI)

Jan 1, 2001 ... The block cipher \\DESX is defined by \\DESX k.k1.k2 (x) = k2\\xor \\DES k (k1\\xor x) , where \\xor denotes bitwise exclusive-or. This construction ...

433

The Climate-G Portal: The context, key features and a multi-dimensional analysis  

Science Conference Proceedings (OSTI)

Grid portals are web gateways aiming at concealing the underlying infrastructure through a pervasive, transparent, user-friendly, ubiquitous and seamless access to heterogeneous and geographically spread resources (i.e. storage, computational facilities, ... Keywords: Data sharing, Grid computing, Grid portals, Web2.0

Sandro Fiore; Alessandro Negro; Giovanni Aloisio

2012-01-01T23:59:59.000Z

434

Failure impact analysis of key management in AMI using cybernomic situational assessment (CSA)  

Science Conference Proceedings (OSTI)

In earlier work we presented a metric that quantifies system security in terms of the average loss per unit of time incurred by a stakeholder of the system as a result of security threats. The computational infrastructure of this metric involves system ... Keywords: cyber security metrics, information security, risk management

Robert K. Abercrombie; Frederick T. Sheldon; Katie R. Hauser; Margaret W. Lantz; Ali Mili

2013-01-01T23:59:59.000Z

435

Key worker housing : a demand analysis of middle-income workforce housing in eastern Massachusetts  

E-Print Network (OSTI)

The Boston Metropolitan Area is one of the most expensive places to live in the United States. In recent years studies have speculated that middle-income workers have had to endure increased commute times as they have moved ...

Sacks, Sean D

2005-01-01T23:59:59.000Z

436

Materials Analysis: A Key to Unlocking the Mystery of the Columbia ...  

Science Conference Proceedings (OSTI)

Brian M. Mayeaux, Thomas E. Collins, Gregory A. Jerman, Steven J. McDanels, Robert S. Piascik, Richard W. Russell, and Sandeep R. Shah ...

437

Conversion factors for energy equivalents: All factors  

Science Conference Proceedings (OSTI)

... Previous page of energy equivalents. Definition of uncertainty notation eg, 123(45) | Basis of conversion factors for energy equivalents. Top. ...

438

Break-Even Cost for Residential Photovoltaics in the United States: Key Drivers and Sensitivities  

DOE Green Energy (OSTI)

Grid parity--or break-even cost--for photovoltaic (PV) technology is defined as the point where the cost of PV-generated electricity equals the cost of electricity purchased from the grid. Break-even cost is expressed in $/W of an installed system. Achieving break-even cost is a function of many variables. Consequently, break-even costs vary by location and time for a country, such as the United States, with a diverse set of resources, electricity prices, and other variables. In this report, we analyze PV break-even costs for U.S. residential customers. We evaluate some key drivers of grid parity both regionally and over time. We also examine the impact of moving from flat to time-of-use (TOU) rates, and we evaluate individual components of the break-even cost, including effect of rate structure and various incentives. Finally, we examine how PV markets might evolve on a regional basis considering the sensitivity of the break-even cost to four major drivers: technical performance, financing parameters, electricity prices and rates, and policies. We find that local incentives rather than ?technical? parameters are in general the key drivers of the break-even cost of PV. Additionally, this analysis provides insight about the potential viability of PV markets.

Denholm, P.; Margolis, R. M.; Ong, S.; Roberts, B.

2009-12-01T23:59:59.000Z

439

Breakeven Cost for Residential Photovoltaics in the United States: Key Drivers and Sensitivities (Report Summary) (Presentation)  

DOE Green Energy (OSTI)

"Break-even cost" for photovoltaic (PV) technology is defined as the point where the cost of PV-generated electricity equals the cost of electricity purchased from the grid. Break-even cost is expressed in $/W of an installed system. Achieving break-even cost is a function of many variables. Consequently, break-even costs vary by location and time for a country, such as the United States, with a diverse set of resources, electricity prices, and other variables. In this presentation, we introduce an analysis of PV break-even costs for residential customers in the United States, including an evaluation of some of the key drivers of PV breakeven both regionally and over time. This presentation includes our methodology and presents results for both near-term residential breakeven costs(2009) and future market sensitivities of break-even costs (2015). See also the the report "Break-Even Cost for Residential Photovoltaics in the United States: Key Drivers and Sensitivities". Presentation for NREL/TP-6A2-45991.

Denholm, P.; Margolis, R. M.; Ong, S.; Roberts, B.

2009-12-01T23:59:59.000Z

440

Passive Faraday-mirror attack in a practical two-way quantum-key-distribution system  

Science Conference Proceedings (OSTI)

The Faraday mirror (FM) plays a very important role in maintaining the stability of two-way plug-and-play quantum key distribution (QKD) systems. However, the practical FM is imperfect, which will not only introduce an additional quantum bit error rate (QBER) but also leave a loophole for Eve to spy the secret key. In this paper we propose a passive Faraday mirror attack in two-way QKD system based on the imperfection of FM. Our analysis shows that if the FM is imperfect, the dimension of Hilbert space spanned by the four states sent by Alice is three instead of two. Thus Eve can distinguish these states with a set of Positive Operator Valued Measure (POVM) operators belonging to three-dimension space, which will reduce the QBER induced by her attack. Furthermore, a relationship between the degree of the imperfection of FM and the transmittance of the practical QKD system is obtained. The results show that the probability that Eve loads her attack successfully depends on the degree of the imperfection of FM rapidly, but the QBER induced by Eve's attack changes slightly with the degree of the FM imperfection.

Sun Shihai; Jiang Musheng; Liang Linmei [Department of Physics, National University of Defense Technology, Changsha 410073 (China)

2011-06-15T23:59:59.000Z

Note: This page contains sample records for the topic "analysis key factors" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Updated distribution and reintroduction of the Lower Keys marsh rabbit  

E-Print Network (OSTI)

Listed as federally-endangered in 1990, the Lower Keys marsh rabbit (LKMR, Sylvilagus palustris hefneri) exists as a metapopulation in patches of wetland habitat in Florida?s Lower Keys. This study sought to address 2 priority actions identified by the LKMR Recovery Team: (1) monitoring of populations and (2) reintroduction. Monitoring the distribution and status of LKMR populations is critical for targeting future management actions. Informal transects for rabbit fecal pellets were used to survey habitat patches documented in1988?1995 surveys and to identify additional patches of occupied and potential habitat. Next, a buffer was created around patches to help managers account for uncertainty in rabbit movements and to identify groups of patches that might function as local populations. Surveys included 228 patches of occupied and potential habitat, 102 of which were occupied by rabbits. Patches were arranged in 56 occupied and 88 potential populations. Surveys revealed new patches of both occupied and potential habitat. Considering only areas included in 1988?1995 surveys, however, revealed a net decrease in the number of occupied patches. Many of the recently extirpated populations, which tended to occupy the periphery of larger islands or small neighboring islands, were unlikely to be recolonized without human intervention. Reintroduction provides a means of artificially recolonizing potential habitat. Two pilot reintroductions were conducted to evaluate this conservation strategy for the species. The second reintroduction was postponed, but the first effort met all criteria for short-term success, including survival comparable to a control group, fidelity to release sites, and evidence of reproduction. There are a limited number of potential source populations for translocations. Future efforts should consider using in-situ captive breeding to prevent potential long-term impacts to these populations. Few potential release sites exhibited suitable habitat quality and landscape context. Thus, for reintroduction to be more widely-applied for this species, it must be part of a comprehensive management plan involving land acquisition, control of secondary impacts from development, and habitat restoration and enhancement.

Faulhaber, Craig Alan

2003-12-01T23:59:59.000Z

442

Geographically-Based Infrastructure Analysis for California  

NLE Websites -- All DOE Office Websites (Extended Search)

Geographically-Based Infrastructure Geographically-Based Infrastructure Analysis for California Joan Ogden Institute of Transportation Studies University of California, Davis Presented at the USDOE Hydrogen Transition Analysis Meeting Washington, DC August 9-10, 2006 Acknowledgments UC Davis Researchers: Michael Nicholas Dr. Marc Melaina Dr. Marshall Miller Dr. Chris Yang USDOE: Dr. Sig Gronich Research support: USDOE; H2 Pathways Program sponsors at UC Davis * Refueling station siting and sizing are key aspects of designing H2 infrastructure during a transition * Initial H2 stations may be co-located with vehicle fleets * Wider consumer adoption of H2 vehicles depends on fuel availability and cost (which are related to station number, size and location), + other factors. * Decision when and where to deploy network

443

Break-Even Cost for Residential Solar Water Heating in the United States: Key Drivers and Sensitivities  

SciTech Connect

This paper examines the break-even cost for residential rooftop solar water heating (SWH) technology, defined as the point where the cost of the energy saved with a SWH system equals the cost of a conventional heating fuel purchased from the grid (either electricity or natural gas). We examine the break-even cost for the largest 1,000 electric and natural gas utilities serving residential customers in the United States as of 2008. Currently, the break-even cost of SWH in the United States varies by more than a factor of five for both electricity and natural gas, despite a much smaller variation in the amount of energy saved by the systems (a factor of approximately one and a half). The break-even price for natural gas is lower than that for electricity due to a lower fuel cost. We also consider the relationship between SWH price and solar fraction and examine the key drivers behind break-even costs. Overall, the key drivers of the break-even cost of SWH are a combination of fuel price, local incentives, and technical factors including the solar resource location, system size, and hot water draw.

Cassard, H.; Denholm, P.; Ong, S.

2011-02-01T23:59:59.000Z

444

The United States Industrial Electric Motor Systems Market Opportunities Assessment: Key Results  

E-Print Network (OSTI)

This paper summarizes the findings of the U. S. Industrial Electric Motor Systems Market Opportunities Assessment. The Market Assessment was sponsored by the U. S. Department of Energy. The project's principal objectives were to create a detailed portrait of the inventory of motor systems currently in use in US industrial facilities, estimate motor system energy use and potential for energy savings. The research and analysis to support these objectives consisted primarily of on-site motor system inventories of a probability sample of 254 manufacturing facilities nationwide. In addition to characterizing the motor systems in use, the research effort also gathered detailed information on motor system management and purchasing practices. This paper presents key findings from the Market Assessment in regard to patterns of motor energy use, saturation of energy efficiency measures such as efficient motors and adjustable speed drives, and motor system purchase and maintenance practices.

Rosenberg, M.

1999-05-01T23:59:59.000Z

445

Demonstration of Free-space Reference Frame Independent Quantum Key Distribution  

E-Print Network (OSTI)

Quantum key distribution (QKD) is moving from research laboratories towards applications. As computing becomes more mobile, cashless as well as cardless payment solutions are introduced, and a need arises for incorporating QKD in a mobile device. Handheld devices present a particular challenge as the orientation and the phase of a qubit will depend on device motion. This problem is addressed by the reference frame independent (RFI) QKD scheme. The scheme tolerates an unknown phase between logical states that varies slowly compared to the rate of particle repetition. Here we experimentally demonstrate the feasibility of RFI QKD over a free-space link in a prepare and measure scheme using polarisation encoding. We extend the security analysis of the RFI QKD scheme to be able to deal with uncalibrated devices and a finite number of measurements. Together these advances are an important step towards mass production of handheld QKD devices.

J. Wabnig; D. Bitauld; H. W. Li; A. Laing; J. L. O'Brien; A. O. Niskanen

2013-05-01T23:59:59.000Z

446

Do myoepithelial cells hold the key for breast tumorprogression?  

SciTech Connect

Mammary myoepithelial cells have been the foster child of breast cancer biology and have been largely ignored since they were considered to be less important for tumorigenesis than luminal epithelial cells from which most of breast carcinomas are thought to arise. In recent years as our knowledge in stem cell biology and the cellular microenvironment has been increasing myoepithelial cells are slowly starting to gain more attention. Emerging data raise the hypothesis if myoepithelial cells play a key role in breast tumor progression by regulating the in situ to invasive carcinoma transition and if myoepithelial cells are part of the mammary stem cell niche. Paracrine interactions between myoepithelial and luminal epithelial cells are known to be important for cell cycle arrest, establishing epithelial cell polarity, and inhibiting migration and invasion. Based on these functions normal mammary myoepithelial cells have been called ''natural tumor suppressors''. However, during tumor progression myoepithelial cells seem to loose these properties and eventually they themselves diminish as tumors become invasive. Better understanding of myoepithelial cell function and their role in tumor progression may lead to their exploitation for cancer therapeutic and preventative measures.

Polyak, Kornelia; Hu, Min

2005-11-18T23:59:59.000Z

447

Multi-client quantum key distribution using wavelength division multiplexing  

Science Conference Proceedings (OSTI)

Quantum Key Distribution (QKD) exploits the rules of quantum mechanics to generate and securely distribute a random sequence of bits to two spatially separated clients. Typically a QKD system can support only a single pair of clients at a time, and so a separate quantum link is required for every pair of users. We overcome this limitation with the design and characterization of a multi-client entangled-photon QKD system with the capacity for up to 100 clients simultaneously. The time-bin entangled QKD system includes a broadband down-conversion source with two unique features that enable the multi-user capability. First, the photons are emitted across a very large portion of the telecom spectrum. Second, and more importantly, the photons are strongly correlated in their energy degree of freedom. Using standard wavelength division multiplexing (WDM) hardware, the photons can be routed to different parties on a quantum communication network, while the strong spectral correlations ensure that each client is linked only to the client receiving the conjugate wavelength. In this way, a single down-conversion source can support dozens of channels simultaneously--and to the extent that the WDM hardware can send different spectral channels to different clients, the system can support multiple client pairings. We will describe the design and characterization of the down-conversion source, as well as the client stations, which must be tunable across the emission spectrum.

Grice, Warren P [ORNL; Bennink, Ryan S [ORNL; Earl, Dennis Duncan [ORNL; Evans, Philip G [ORNL; Humble, Travis S [ORNL; Pooser, Raphael C [ORNL; Schaake, Jason [ORNL; Williams, Brian P [ORNL

2011-01-01T23:59:59.000Z

448

Feasibility of 300 km Quantum Key Distribution with Entangled States  

E-Print Network (OSTI)

A significant limitation of practical quantum key distribution (QKD) setups is currently their limited operational range. It has recently been emphasized (X. Ma, C.-H. F. Fung, and H.-K. Lo., Phys. Rev. A, 76:012307, 2007) that entanglement-based QKD systems can tolerate higher channel losses than systems based on weak coherent laser pulses (WCP), in particular when the source is located symmetrically between the two communicating parties, Alice and Bob. In the work presented here, we experimentally study this important advantage by implementing different entanglement-based QKD setups on a 144~km free-space link between the two Canary Islands of La Palma and Tenerife. We established three different configurations where the entangled photon source was placed at Alice's location, asymmetrically between Alice and Bob and symmetrically in the middle between Alice and Bob, respectively. The resulting quantum channel attenuations of 35~dB, 58~dB and 71~dB, respectively, significantly exceed the limit for WCP systems. This confirms that QKD over distances of 300~km and even more is feasible with entangled state sources placed in the middle between Alice and Bob.

Thomas Scheidl; Rupert Ursin; Alessandro Fedrizzi; Sven Ramelow; Xiao-Song Ma; Thomas Herbst; Robert Prevedel; Lothar Ratschbacher; Johannes Kofler; Thomas Jennewein; Anton Zeilinger

2010-07-27T23:59:59.000Z

449

Do myoepithelial cells hold the key for breast tumorprogression?  

SciTech Connect

Mammary myoepithelial cells have been the foster child of breast cancer biology and have been largely ignored since they were considered to be less important for tumorigenesis than luminal epithelial cells from which most of breast carcinomas are thought to arise. In recent years as our knowledge in stem cell biology and the cellular microenvironment has been increasing myoepithelial cells are slowly starting to gain more attention. Emerging data raise the hypothesis if myoepithelial cells play a key role in breast tumor progression by regulating the in situ to invasive carcinoma transition and if myoepithelial cells are part of the mammary stem cell niche. Paracrine interactions between myoepithelial and luminal epithelial cells are known to be important for cell cycle arrest, establishing epithelial cell polarity, and inhibiting migration and invasion. Based on these functions normal mammary myoepithelial cells have been called ''natural tumor suppressors''. However, during tumor progression myoepithelial cells seem to loose these properties and eventually they themselves diminish as tumors become invasive. Better understanding of myoepithelial cell function and their role in tumor progression may lead to their exploitation for cancer therapeutic and preventative measures.

Polyak, Kornelia; Hu, Min

2005-11-18T23:59:59.000Z

450

Developing health-based pre-planning clearance goals for airport remediation following chemical terrorist attack: Introduction and key assessment considerations  

Science Conference Proceedings (OSTI)

In the event of a chemical terrorist attack on a transportation hub, post-event remediation and restoration activities necessary to attain unrestricted facility re-use and re-entry could require hours to multiple days. While restoration timeframes are dependent on numerous variables, a primary controlling factor is the level of pre-planning and decision-making completed prior to chemical terrorist release. What follows is the first of a two-part analysis identifying key considerations, critical information, and decision criteria to facilitate post-attack and post-decontamination consequence management activities. A conceptual site model and human health-based exposure guidelines are developed and reported as an aid to site-specific pre-planning in the current absence of U.S. state or Federal values designated as compound-specific remediation or re-entry concentrations, and to safely expedite facility recovery to full operational status. Chemicals of concern include chemical warfare nerve and vesicant agents and the toxic industrial compounds phosgene, hydrogen cyanide, and cyanogen chloride. This work has been performed as a national case study conducted in partnership with the Los Angeles International Airport and The Bradley International Terminal. All recommended guidelines have been selected for consistency with airport scenario release parameters of a one-time, short-duration, finite airborne release from a single source followed by compound-specific decontamination.

Watson, Annetta Paule [ORNL; Raber, Ellen [Lawrence Livermore National Laboratory (LLNL); Dolislager, Frederick [University of Tennessee, Knoxville (UTK); Hauschild, Veronique [U.S. Army Center for Health Promotion and Preventive Medicine; Hall, Dr. Linda [ENVIRON International Corporation; Love, Dr. Adam [Johnson Wright, Inc.

2011-01-01T23:59:59.000Z

451

Key figure impact in trust-enhanced recommender systems  

Science Conference Proceedings (OSTI)

Collaborative filtering recommender systems are typically unable to generate adequate recommendations for newcomers. Empirical evidence suggests that the incorporation of a trust network among the users of a recommender system can significantly help ... Keywords: Trust network, cold start problem, recommender system, social network analysis

Patricia Victor; Chris Cornelis; Martine De Cock; Ankur M. Teredesai

2008-04-01T23:59:59.000Z

452

Framework for Identifying Key Environmental Concerns in Marine Renewable Energy Projects- Appendices  

SciTech Connect

Marine wave and tidal energy technology could interact with marine resources in ways that are not well understood. As wave and tidal energy conversion projects are planned, tested, and deployed, a wide range of stakeholders will be engaged; these include developers, state and federal regulatory agencies, environmental groups, tribal governments, recreational and commercial fishermen, and local communities. Identifying stakeholders’ environmental concerns in the early stages of the industry’s development will help developers address and minimize potential environmental effects. Identifying important concerns will also assist with streamlining siting and associated permitting processes, which are considered key hurdles by the industry in the U.S. today. In September 2008, RE Vision consulting, LLC was selected by the Department of Energy (DoE) to conduct a scenario-based evaluation of emerging hydrokinetic technologies. The purpose of this evaluation is to identify and characterize environmental impacts that are likely to occur, demonstrate a process for analyzing these impacts, identify the “key” environmental concerns for each scenario, identify areas of uncertainty, and describe studies that could address that uncertainty. This process is intended to provide an objective and transparent tool to assist in decision-making for siting and selection of technology for wave and tidal energy development. RE Vision worked with H. T. Harvey & Associates, to develop a framework for identifying key environmental concerns with marine renewable technology. This report describes the results of this study. This framework was applied to varying wave and tidal power conversion technologies, scales, and locations. The following wave and tidal energy scenarios were considered: ? 4 wave energy generation technologies ? 3 tidal energy generation technologies ? 3 sites: Humboldt coast, California (wave); Makapu’u Point, Oahu, Hawaii (wave); and the Tacoma Narrows, Washington (tidal) ? 3 project sizes: pilot, small commercial, and large commercial The possible combinations total 24 wave technology scenarios and 9 tidal technology scenarios. We evaluated 3 of the 33 scenarios in detail: 1. A small commercial OPT Power Buoy project off the Humboldt County, California coast 2. A small commercial Pelamis Wave Power P-2 project off Makapu’u Point, Oahu, Hawaii 3. A pilot MCT SeaGen tidal project, sited in the Tacoma Narrows, Washington This framework document used information available from permitting documents that were written to support actual wave or tidal energy projects, but the results obtained here should not be confused with those of the permitting documents1. The main difference between this framework document and permitting documents of currently proposed pilot projects is that this framework identifies key environmental concerns and describes the next steps in addressing those concerns; permitting documents must identify effects, find or declare thresholds of significance, evaluate the effects against the thresholds, and find mitigation measures that will minimize or avoid the effects so they can be considered less-than-significant. Two methodologies, 1) an environmental effects analysis and 2) Raptools, were developed and tested to identify potential environmental effects associated with wave or tidal energy conversion projects. For the environmental effects analysis, we developed a framework based on standard risk assessment techniques. The framework was applied to the three scenarios listed above. The environmental effects analysis addressed questions such as: ? What is the temporal and spatial exposure of a species at a site? ? What are the specific potential project effects on that species? ? What measures could minimize, mitigate, or eliminate negative effects? ? Are there potential effects of the project, or species’ response to the effect, that are highly uncertain and warrant additional study? The second methodology, Raptools, is a collaborative approach useful for evaluating multiple characteristi

Sharon Kramer; Mirko Previsic; Peter Nelson; Sheri Woo

2010-06-17T23:59:59.000Z

453

Provably-Secure two-round password-authenticated group key exchange in the standard model  

Science Conference Proceedings (OSTI)

Password-authenticated group key exchange (PAGKE) allows group users to share a session key using a human-memorable password only. The fundamental security goal of PAGKE is security against dictionary attacks. Several solutions have been proposed ...

Jeong Ok Kwon; Ik Rae Jeong; Dong Hoon Lee

2006-10-01T23:59:59.000Z

454

High-Rate Quantum Key Distribution with Superconducting Nanowire Single Photon Detectors  

E-Print Network (OSTI)

We demonstrate the potential for 1.85 Mbit/s secure key rates over 101 km of fiber, >100 times faster than previously demonstrated, using the differential phase shift quantum key distribution protocol and superconducting ...

Spellmeyer, Neal W.

455

A hybrid data structure for dense keys in in-memory database systems  

E-Print Network (OSTI)

This thesis presents a data structure which performs well for in-memory indexing of keys that are unevenly distributed into clusters with a high density of keys. This pattern is prevalent, for example, in systems that use ...

Muñiz Navarro, José Alberto

2010-01-01T23:59:59.000Z

456

Direct and Reverse Secret-Key Capacities of a Quantum Channel  

E-Print Network (OSTI)

We define the direct and reverse secret-key capacities of a memoryless quantum channel as the optimal rates that entanglement-based quantum-key-distribution protocols can reach by using a single forward classical communication ...

Braunstein, Samuel L.

457

NERSC Global Filesystem Played a Key Role in Discovery of the...  

NLE Websites -- All DOE Office Websites (Extended Search)

NGFS Played a Key Role in Neutrino Finding NERSC Global Filesystem Played a Key Role in Discovery of the Last Neutrino Mixing Angle February 7, 2013 | Tags: High Energy Physics...

458

Accident analysis and hazard analysis for human and organizational factors  

E-Print Network (OSTI)

Pressures and incentives to operate complex socio-technical aerospace systems in a high-risk state are ever present. Without consideration of the role humans and organizations play in system safety during the development ...

Stringfellow, Margaret Virgina

2011-01-01T23:59:59.000Z

459

Chapter 2 Suggested Problems: Final Answer Key Atomic mass: mass of an individual atom  

E-Print Network (OSTI)

Chapter 2 Suggested Problems: Final Answer Key 2.1 Atomic mass: mass of an individual atom Atomic;Chapter 3 Suggested Problems: Final Answer Key 3.1 Atomic Structure: relates the # of protons and neutrons of intercepts 2 2 1 Reduction not necessary Enclosure (221) #12;Chapter 12 Suggested Problems: Final Answer Key

Grunlan, Melissa A.

460

Improvement on Pretty-Simple Password Authenticated Key-Exchange Protocol for Wireless Networks  

Science Conference Proceedings (OSTI)

This paper presents an improved method inspired by the recently proposed Pretty-Simple PAKE (Password Authenticated Key-Exchange) protocol, which is already a well-known, robust and simple password authenticated key exchange scheme. In our even more ... Keywords: elliptic curve discrete logarithm, key exchange, password authentication, wireless network

Ting-Yi Chang; Chou-Chen Yang; Chia-Meng Chen

2004-04-01T23:59:59.000Z

Note: This page contains sample records for the topic "analysis key factors" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Low Complexity Spatio-Temporal Key Frame Encoding for Wyner-Ziv Video Coding  

Science Conference Proceedings (OSTI)

In most Wyner-Ziv video coding approaches, the temporal correlation of key frames is not exploited since they are simply intra encoded and decoded. In this paper, using the previously decoded key frame as the side information for the key frame to be ... Keywords: Wyner-Ziv coding, Distributed video coding

Ghazaleh Esmaili; Pamela Cosman

2009-03-01T23:59:59.000Z

462

KALwEN: a new practical and interoperable key management scheme for body sensor networks  

Science Conference Proceedings (OSTI)

Key management is the pillar of a security architecture. Body sensor networks (BSNs) pose several challenges–some inherited from wireless sensor networks (WSNs), some unique to themselves–that require a new key management scheme to be tailor-made. ... Keywords: body area networks, body sensor networks, healthcare, key management, security

Yee Wei Law; Giorgi Moniava; Zheng Gong; Pieter Hartel; Marimuthu Palaniswami

2011-11-01T23:59:59.000Z

463

factor.mws - CECM  

E-Print Network (OSTI)

... 0 "" {TEXT -1 61 "Be default \\+ factor factors over the field of rational numbers. ... {PARA 0 "> " 0 "" {MPLTEXT 1 0 36 "alias(beta=RootOf(x^5+x^3+x^2+x+1));" } ...

464

Factors affecting adoption of renewable and other electricity ...  

U.S. Energy Information Administration (EIA)

U.S. Energy Information Administration Independent Statistics & Analysis www.eia.gov Factors affecting adoption of renewable and other electricity generation technologies

465

A New Parameterization of an Asymmetry Factor of Cirrus Clouds for Climate Models  

Science Conference Proceedings (OSTI)

The aspect ratio (AR) of a nonspherical ice particle is identified as the key microphysical parameter to determine its asymmetry factor for solar radiation. The mean effective AR is defined for cirrus clouds containing various nonspherical ice ...

Qiang Fu

2007-11-01T23:59:59.000Z

466

Agent-Based Modeling and Simulation for Hydrogen Transition Analysis  

NLE Websites -- All DOE Office Websites (Extended Search)

Agent Agent Agent - - Based Modeling Based Modeling and Simulation (ABMS) and Simulation (ABMS) for Hydrogen Transition for Hydrogen Transition Analysis Analysis Marianne Mintz Hydrogen Transition Analysis Workshop US Department of Energy January 26, 2006 Objectives and Scope for Phase 1 2 Analyze the hydrogen infrastructure development as a complex adaptive system using an agent-based modeling and simulation (ABMS) approach Develop an ABMS model to simulate the evolution of that system, spanning the entire H2 supply chain from production to consumption Identify key factors that either promote or inhibit the growth of H2 infrastructure Apply ABMS to get new insights into transition, particularly early transition phase - Dynamic interplay between supply and demand

467

Secure Cryptographic Key Management System (CKMS) Considerations for Smart Grid Devices  

SciTech Connect

In this paper, we examine some unique challenges associated with key management in the Smart Grid and concomitant research initiatives: 1) effectively model security requirements and their implementations, and 2) manage keys and key distribution for very large scale deployments such as Smart Meters over a long period of performance. This will set the stage to: 3) develop innovative, low cost methods to protect keying material, and 4) provide high assurance authentication services. We will present our perspective on key management and will discuss some key issues within the life cycle of a cryptographic key designed to achieve the following: 1) control systems designed, installed, operated, and maintained to survive an intentional cyber assault with no loss of critical function, and 2) widespread implementation of methods for secure communication between remote access devices and control centers that are scalable and cost-effective to deploy.

Abercrombie, Robert K [ORNL; Sheldon, Frederick T [ORNL; Aldridge, Hal [ORNL; Duren, Mike [Sypris Electronics, LLC; Ricci, Tracy [Sypris Electronics, LLC; Bertino, Elisa [ORNL; Kulatunga, Athula [Purdue University; Navaratne, Uditha Sudheera [Purdue University

2011-01-01T23:59:59.000Z

468

The generation of shared cryptographic keys through channel impulse response estimation at 60 GHz.  

SciTech Connect

Methods to generate private keys based on wireless channel characteristics have been proposed as an alternative to standard key-management schemes. In this work, we discuss past work in the field and offer a generalized scheme for the generation of private keys using uncorrelated channels in multiple domains. Proposed cognitive enhancements measure channel characteristics, to dynamically change transmission and reception parameters as well as estimate private key randomness and expiration times. Finally, results are presented on the implementation of a system for the generation of private keys for cryptographic communications using channel impulse-response estimation at 60 GHz. The testbed is composed of commercial millimeter-wave VubIQ transceivers, laboratory equipment, and software implemented in MATLAB. Novel cognitive enhancements are demonstrated, using channel estimation to dynamically change system parameters and estimate cryptographic key strength. We show for a complex channel that secret key generation can be accomplished on the order of 100 kb/s.

Young, Derek P.; Forman, Michael A.; Dowdle, Donald Ryan

2010-09-01T23:59:59.000Z

469

SKA Key science project: Radio observations of cosmic reionization and first light  

E-Print Network (OSTI)

I update the SKA key science program (KSP) on first light and cosmic reionization. The KSP has two themes: (i) Using the 21cm line of neutral hydrogen as the most direct probe into the evolution of the neutral intergalactic medium during cosmic reionization. Such HI 21cm studies are potentially the most important new window on cosmology since the discovery of the CMB. (ii) Observing the gas, dust, star formation, and dynamics, of the first galaxies and AGN. Observations at cm and mm wavelengths, provide an unobscured view of galaxy formation within 1 Gyr of the Big Bang, and are an ideal complement to the study of stars, ionized gas, and AGN done using near-IR telescopes. I summarize HI 21cm signals, challenges, and telescopes under construction. I also discuss the prospects for studying the pre-galactic medium, prior to first light, using a low frequency telescope on the Moon. I then review the current status of mm and cm observations of the most known distant galaxies (z > 6). I make the simple argument that even a 10% SKA-high demonstrator will have a profound impact on the study of the first galaxies. In particular, extending the SKA to the 'natural' atmospheric limit (set by the O_2 line) of 45 GHz, increases the effective sensitivity to thermal emission by another factor four.

C. L. Carilli

2008-02-12T23:59:59.000Z

470

130 The Journal of Ocean Technology Spindrift Copyright Journal of Ocean Technology 2012 Planning for oil spill response requires identifying key hazards that could cause an incident,  

E-Print Network (OSTI)

, GIS data, and personnel. It activated its Disaster Response Team to provide assistance to users and services through its disaster response web site. These included an online oil spill plume trajectory model Planning for oil spill response requires identifying key hazards that could cause an incident, an analysis

Wright, Dawn Jeannine

471

Energy use and carbon dioxide emissions in energy-intensive industries in key developing countries  

E-Print Network (OSTI)

Structural Factors Affecting Energy Use and Carbon DioxideStructural Factors Affecting Energy Use and Carbon Dioxide

Price, Lynn; Worrell, Ernst; Phylipsen, Dian

1999-01-01T23:59:59.000Z

472

Family of Finite Geometry Low-Density Parity-Check Codes for Quantum Key Expansion  

E-Print Network (OSTI)

We consider a quantum key expansion (QKE) protocol based on entanglement-assisted quantum error-correcting codes (EAQECCs). In these protocols, a seed of a previously shared secret key is used in the post-processing stage of a standard quantum key distribution protocol like the Bennett-Brassard 1984 protocol, in order to produce a larger secret key. This protocol was proposed by Luo and Devetak, but codes leading to good performance have not been investigated. We look into a family of EAQECCs generated by classical finite geometry (FG) low-density parity-check (LDPC) codes, for which very efficient iterative decoders exist. A critical observation is that almost all errors in the resulting secret key result from uncorrectable block errors that can be detected by an additional syndrome check and an additional sampling step. Bad blocks can then be discarded. We make some changes to the original protocol to avoid the consumption of the preshared key when the protocol fails. This allows us to greatly reduce the bit error rate of the key at the cost of a minor reduction in the key production rate, but without increasing the consumption rate of the preshared key. We present numerical simulations for the family of FG LDPC codes, and show that this improved QKE protocol has a good net key production rate even at relatively high error rates, for appropriate choices of these codes.

Kung-Chuan Hsu; Todd A. Brun

2013-03-07T23:59:59.000Z

473

Business Planning: A Key to Energy Efficiency in Russia  

E-Print Network (OSTI)

Financing is a significant barrier to energy efficiency in Russia. Many banks and Western companies would like to invest in energy efficiency projects in Russia, but are frustrated by the lack of Western-style business planning and preparation in Russian project proposals. With support from the U.S. Department of Energy, the Pacific Northwest National Laboratory has organized several training workshops on writing business plans for energy efficiency projects. Russian project proposals typically describe the technical measures to be implemented, and they provide a simple payback analysis of the costs. The most difficult tasks for Russian business people are often developing a marketing plan, using creative financing techniques, describing the implementation plan in sufficient detail, and providing appropriate information on the organizations involved in the project. As Russians learn to prepare solid business plans, their ability to attract financing for energy efficiency projects and successfully implement such projects will increase. Business planning also provides a useful framework for assessing energy projects. In this sense, it can help Russian business people better understand the advantages of energy efficiency and increase their willingness to invest in demand-side measures.

Evans, M.

1997-04-01T23:59:59.000Z

474

The Douglas Factors  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Douglas Factors Douglas Factors The Merit Systems Protection Board in its landmark decision, Douglas vs. Veterans Administration, 5 MSPR 280, established criteria that supervisors must consider in determining an appropriate penalty to impose for an act of employee misconduct. These twelve factors are commonly referred to as "Douglas Factors: (1) The nature and seriousness of the offense, and its relation to the employee's duties, position, and responsibilities, including whether the offense was intentional or technical or inadvertent, or was committed maliciously or for gain, or was frequently repeated; (2) the employee's job level and type of employment, including supervisory or fiduciary role,

475

Critical error rate of quantum-key-distribution protocols versus the size and dimensionality of the quantum alphabet  

SciTech Connect

A quantum-information analysis of how the size and dimensionality of the quantum alphabet affect the critical error rate of the quantum-key-distribution (QKD) protocols is given on an example of two QKD protocols--the six-state and {infinity}-state (i.e., a protocol with continuous alphabet) ones. In the case of a two-dimensional Hilbert space, it is shown that, under certain assumptions, increasing the number of letters in the quantum alphabet up to infinity slightly increases the critical error rate. Increasing additionally the dimensionality of the Hilbert space leads to a further increase in the critical error rate.

Sych, Denis V.; Grishanin, Boris A.; Zadkov, Victor N. [International Laser Center and Faculty of Physics, M.V. Lomonosov Moscow State University, 119899 Moscow (Russian Federation)

2004-11-01T23:59:59.000Z

476

How to implement decoy-state quantum key distribution for a satellite uplink with 50 dB channel loss  

E-Print Network (OSTI)

Quantum key distribution (QKD) takes advantage of fundamental properties of quantum physics to allow two distant parties to share a secret key; however, QKD is hampered by a distance limitation of a few hundred kilometers on earth. The most immediate solution for global coverage is to use a satellite, which can receive separate QKD transmissions from two or more ground stations and act as a trusted node to link these ground stations. In this article, we report a system capable of performing QKD in the high loss regime expected in an uplink to a satellite using weak coherent pulses and decoy states. Such a scenario profits from the simplicity of its receiver payload, but has so far considered to be infeasible due to very high transmission losses (40 - 50 dB). The high loss is overcome by implementing an innovative photon source and advanced timing analysis. Our system handles up to 57 dB photon loss in the infinite key limit, confirming the viability of the satellite uplink scenario. We emphasize that while this system was designed with a satellite uplink in mind, it could just as easily overcome high losses on any free space QKD link.

Evan Meyer-Scott; Zhizhong Yan; Allison MacDonald; Jean-Philippe Bourgoin; Hannes Hübel; Thomas Jennewein

2011-11-03T23:59:59.000Z

477

How to implement decoy-state quantum key distribution for a satellite uplink with 50-dB channel loss  

SciTech Connect

Quantum key distribution (QKD) takes advantage of fundamental properties of quantum physics to allow two distant parties to share a secret key; however, QKD is hampered by a distance limitation of a few hundred kilometers on Earth. The most immediate solution for global coverage is to use a satellite, which can receive separate QKD transmissions from two or more ground stations and act as a trusted node to link these ground stations. In this article we report on a system capable of performing QKD in the high loss regime expected in an uplink to a satellite using weak coherent pulses and decoy states. Such a scenario profits from the simplicity of its receiver payload, but has so far been considered to be infeasible due to very high transmission losses (40-50 dB). The high loss is overcome by implementing an innovative photon source and advanced timing analysis. Our system handles up to 57 dB photon loss in the infinite key limit, confirming the viability of the satellite uplink scenario. We emphasize that while this system was designed with a satellite uplink in mind, it could just as easily overcome high losses on any free space QKD link.

Meyer-Scott, Evan; Yan, Zhizhong; MacDonald, Allison; Bourgoin, Jean-Philippe; Huebel, Hannes; Jennewein, Thomas [Institute for Quantum Computing, University of Waterloo, 200 University Avenue W, Waterloo ON, Canada N2L 3G1 (Canada)

2011-12-15T23:59:59.000Z

478

T-571: Linux Kernel dns_resolver Key Processing Error Lets Local Users Deny  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Linux Kernel dns_resolver Key Processing Error Lets Local 1: Linux Kernel dns_resolver Key Processing Error Lets Local Users Deny Services T-571: Linux Kernel dns_resolver Key Processing Error Lets Local Users Deny Services March 7, 2011 - 3:05pm Addthis PROBLEM: Linux Kernel dns_resolver Key Processing Error Lets Local Users Deny Services. PLATFORM: Linux Kernel 2.6.37 and prior versions ABSTRACT: A vulnerability was reported in the Linux Kernel. A local user can cause denial of service conditions. reference LINKS: SecurityTracker Alert ID:1025162 Latest Stable Kernel CVE-2011-1076 IMPACT ASSESSMENT: High Discussion: When a DNS resolver key is instantiated with an error indication, a local user can attempt to read the key to trigger a null pointer dereference and cause a kernel crash. A local user can cause the target system to crash.

479

Secure multi-party communication with quantum key distribution managed by trusted authority  

DOE Patents (OSTI)

Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD are extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.

Nordholt, Jane Elizabeth; Hughes, Richard John; Peterson, Charles Glen

2013-07-09T23:59:59.000Z

480

U-027: RSA Key Manager Appliance Session Logout Bug Fails to Terminate  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: RSA Key Manager Appliance Session Logout Bug Fails to 7: RSA Key Manager Appliance Session Logout Bug Fails to Terminate Sessions U-027: RSA Key Manager Appliance Session Logout Bug Fails to Terminate Sessions November 4, 2011 - 8:00am Addthis PROBLEM: RSA Key Manager Appliance Session Logout Bug Fails to Terminate Sessions. PLATFORM: RSA Key Manager Appliance 2.7 Service Pack 1 ABSTRACT: A remote authenticated user session may not terminate properly. reference LINKS: SecurityTracker Alert ID: 1026276 SecurityFocus Bug Traq Seclists: ESA-2011-035 CVE-2011-2740 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in RSA Key Manager Appliance. A remote authenticated user session may not terminate properly. When using Firefox 4 and 5, an authenticated user session is not terminated properly when logging out.

Note: This page contains sample records for the topic "analysis key factors" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Daylight operation of a free space, entanglement-based quantum key distribution system  

E-Print Network (OSTI)

Many quantum key distribution (QKD) implementations using a free space transmission path are restricted to operation at night time in order to distinguish the signal photons used for a secure key establishment from background light. Here, we present a lean entanglement-based QKD system overcoming that imitation. By implementing spectral, spatial and temporal filtering techniques, we were able to establish a secure key continuously over several days under varying light and weather conditions.

Peloso, Matthew P; Ho, Caleb; Lamas-Linares, Antia; Kurtsiefer, Christian

2008-01-01T23:59:59.000Z

482

Daylight operation of a free space, entanglement-based quantum key distribution system  

E-Print Network (OSTI)

Many quantum key distribution (QKD) implementations using a free space transmission path are restricted to operation at night time in order to distinguish the signal photons used for a secure key establishment from background light. Here, we present a lean entanglement-based QKD system overcoming that imitation. By implementing spectral, spatial and temporal filtering techniques, we were able to establish a secure key continuously over several days under varying light and weather conditions.

Matthew P. Peloso; Ilja Gerhardt; Caleb Ho; Antia Lamas-Linares; Christian Kurtsiefer

2008-12-10T23:59:59.000Z

483

Category Key Area Sub Area Do?an, Ö.N., "Materials...  

NLE Websites -- All DOE Office Websites (Extended Search)

and Papers funded by the Fuels Program (2013) Category Key Area Sub Area Doan, .N., "Materials Development for Fossil Fueled Energy Conversion Systems," Materials Science...

484

Cryptanalysis of Al-Riyami-Paterson's Authenticated Three Party Key Agreement Protocols  

E-Print Network (OSTI)

Recently, Al-Riyami and Paterson [1] proposed four authenticated tripartite key agreement protocols which make use of Weil pairing. In this paper, we show...

Kyungah Shim

2003-01-01T23:59:59.000Z

485

0001 1-5 KEY VISUAL CUES: man, clutter, headphone 0001 ...  

Science Conference Proceedings (OSTI)

... 0290 1-5 KEY VISUAL CUES: Rudy Giuliani, giant head, Yankee Stadium, pennant 0290 QUERY: Find the video with Rudy Giuliani's giant talking ...

2011-01-06T23:59:59.000Z

486

Growing Green As part of its strategic plan to foster growth and development in key  

E-Print Network (OSTI)

in geomicrobiology, ecosystem health, nuclear waste technology and reactor safety, environmental science and ecology reconstruction, nuclear waste containment and disposal, and photochemical deconstruction of pollutants Key

Christensen, Dan

487

Improved practical decoy state method in quantum key distribution with parametric down conversion source  

E-Print Network (OSTI)

In this paper, a new decoy-state scheme for quantum key distribution with parametric down-conversion source is proposed. We use both three-intensity decoy states and their triggered and nontriggered components to estimate the fraction of single-photon counts and quantum bit-error rate of single-photon, and then deduce a more accurate value of key generation rate. The final key rate over transmission distance is simulated, which shows that we can obtain a higher key rate than that of the existing methods, including our own earlier work.

Qin Wang; Xiang-Bin Wang; Gunnar Bjork; Anders Karlsson

2007-03-27T23:59:59.000Z

488

0500 1-5 KEY VISUAL CUES: laptop, young man, swivel chair ...  

Science Conference Proceedings (OSTI)

... light, gold ring 0512 QUERY: Find a video by Stone Farm showing a ... 0514 1-5 KEY VISUAL CUES: sailboat anchored in the wind and waves, water ...

2012-01-11T23:59:59.000Z

489

TransForum v7n1 - Diversity of Choices: Key to Improving Transportatio...  

NLE Websites -- All DOE Office Websites (Extended Search)

Diversity of Choices: Key to Improving Transportation Energy Efficiency Argonne's Mobile Automotive Technology Testbed Argonne's Mobile Automotive Technology Testbed can be...

490

Modeling Metal Fatigue As a Key Step in PV Module Life Time Prediction (Presentation)  

DOE Green Energy (OSTI)

This presentation covers modeling metal fatigue as a key step in photovoltaic (PV) module lifetime predictions. Described are time-dependent and time-independent case studies.

Bosco, N.

2012-02-01T23:59:59.000Z

491

DOE-2 building energy analysis computer program  

SciTech Connect

Concern with energy conservation requirements has resulted in a growing awareness throughout the architectural/engineering community of the need for an easy-to-use, fast-running, completely documented, public-domain computer program for the energy-use analysis of buildings. DOE-2 has been developed to meet these needs. The program emphasizes ease of input, efficiency of computation, flexibility of operation, and usefulness of output. A key factor in meeting these requirements has been achieved by the development of a free-format Building Design Language (BDL) that greatly facilitates the user's task in defining the building; its heating, ventilating, and air conditioning (HVAC) systems; and its operation. The DOE-2 program is described.

Hunn, B.D.

1979-01-01T23:59:59.000Z

492

Utility-Scale Solar 2012: An Empirical Analysis of Project Cost...  

NLE Websites -- All DOE Office Websites (Extended Search)

through key findings from this report. The webinar covers trends in not only installed project costs or prices, but also operating costs, capacity factors, and power purchase...

493

Nuclear & Uranium - Analysis & Projections - U.S. Energy ...  

U.S. Energy Information Administration (EIA)

Financial market analysis and financial data for major energy ... assumptions concerning energy markets, and the key input data and parameters that are the most ...

494

An Interactive Case Study in Composite Failure Analysis  

Science Conference Proceedings (OSTI)

In the case study, the audience will be presented with the failure scenario and key ... Advanced Digital Microscopy is Revolutionizing Failure Analysis.

495

Activities of key metabolic enzymes in the heater organs of scombroid fishes  

E-Print Network (OSTI)

Maximal in vitro activities of key metabolic enzymes were measured in brain and eye heaters of five species of scombroid fishes. Istiophorid billfishes (blue marlin, striped marlin and Mediterranean spearfish), xiphiid billfishes (Pacific and Mediterranean stocks) and a scombrid fish (butterfly mackerel) were included in the analysis. Our main objectives were (1) to assess the maximum possible substrate flux in heater tissue, and (2) to determine what metabolic substrates could fuel heat production. Heater tissue of all scombroids examined showed extremely high oxidative capacity. Activities of citrate synthase, a commonly measured index of oxidative metabolism, included the highest value ever reported for vertebrate tissue. In most billfishes, citrate synthase activities were similar to or higher than those found for mammalian cardiac and avian flight muscle. Marker enzymes for aerobic carbohydrate metabolism (hexokinase) and fatty acid metabolism (carnitine palmitoyltransferase and 3-hydroxyacyl-CoA dehydrogenase) also displayed extraordinarily high activities. Activities of carnitine palmitoyltransferase measured in heater organs were among the highest reported for vertebrates. These results indicate that heat production could be fueled aerobically by either lipid or carbohydrate metabolism. Inter- and intraspecifically, heater organs of fishes from the colder Mediterranean waters had a higher aerobic capacity and, hence, a greater heat-generating potential, than fishes from the warmer waters of the Pacific. This difference may be attributed to different thermal environments or it may result from allometry, since fishes caught in the Mediterranean were considerably smaller than those caught in the Pacific.

Alexa Tullis; Barbara A. Block; Bruce; D. Sidell

1991-01-01T23:59:59.000Z

496

Conversion factors for energy equivalents  

Science Conference Proceedings (OSTI)

... Conversion factors for energy equivalents, For your convenience, you may convert energies online below. Or display factors as: ...

497

On the (Im)Possibility of Key Dependent Encryption Iftach Haitner  

E-Print Network (OSTI)

, queries h(k ), encrypt this with k itself, and gives the resulting ciphertext to Breaker. We prove for every key. In this case, Breaker finds a key k such that fk,r (h(k)) = c, where f is the pseudorandom given by Halevi and Krawczyk [HK07]), is that Breaker as defined above does not seem to give useful

International Association for Cryptologic Research (IACR)

498

Common randomness and secret key capacities of two-way channels  

Science Conference Proceedings (OSTI)

Common Randomness Generation (CRG) and Secret Key Establishment (SKE) are fundamental primitives in information theory and cryptography. We study these two problems over the two-way communication channel model, introduced by Shannon. In this model, the ... Keywords: common randomness capacity, secret key capacity, two-way channel, wiretap channel

Hadi Ahmadi; Reihaneh Safavi-Naini

2011-05-01T23:59:59.000Z

499

Bit Transmission Probability Maximizing the Key Rate of the BB84 Protocol  

E-Print Network (OSTI)

In all papers on the BB84 protocol, the transmission probability of each bit value is usually set to be equal. In this paper, we show that by assigning different transmission probability to each transmitted qubit within a single polarization basis, we can generally improve the key generation rate of the BB84 protocol and achieve a higher key rate.

Sonny Lumbantoruan; Ryutaroh Matsumoto; Tomohiko Uyematsu

2010-03-11T23:59:59.000Z

500

Identity-based encryption: how to decrypt multiple ciphertexts using a single decryption key  

Science Conference Proceedings (OSTI)

The beauty of identity-based encryption (IBE) lies in the convenience of public key handling, in the sense that any identification such as an email address, a name, or an IP number can serve as a public key of a party. However, such convenience is not ... Keywords: ID-based encryption, pairing

Fuchun Guo; Yi Mu; Zhide Chen

2007-07-01T23:59:59.000Z