Powered by Deep Web Technologies
Note: This page contains sample records for the topic "analysis key factors" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

E-Banking Diffusion in the Jordanian Banking Services Sector: An Empirical Analysis of Key Factors  

E-Print Network [OSTI]

E-Banking Diffusion in the Jordanian Banking Services Sector: An Empirical Analysis of Key Factors influence e- banking adoption in Jordanian banks. This article added some constructs to (TOE) framework, availability of online revenues, competition intensity or pressure, and regulatory support environment) while e

2

E-Business Value Creation in Jordanian Banking Services Industry: An Empirical Analysis of Key Factors  

E-Print Network [OSTI]

E-Business Value Creation in Jordanian Banking Services Industry: An Empirical Analysis of Key an extended conceptual research model for assessing the value of e-business at the bank level environment) that may affect value creation of carrying out e- business in Jordanian banking sector. Survey

3

Author's personal copy An economic and technological analysis of the key factors affecting  

E-Print Network [OSTI]

, OR 97201, United States a r t i c l e i n f o Article history: Received 7 August 2011 Received in revised analysis results show that a 9­27% ECV price reduction can greatly increase their competitiveness when emissions in urban areas, and to address the impact of oil dependence on the USA economy and security (O

Bertini, Robert L.

4

Key Factors in Displacement Ventilation Systems for Better IAQ  

E-Print Network [OSTI]

This paper sets up a mathematical model of three-dimensional steady turbulence heat transfer in an air-conditioned room of multi-polluting heat sources. Numerical simulation helps identify key factors in displacement ventilation systems that affect...

Wang, X.; Chen, J.; Li, Y.; Wang, Z.

2006-01-01T23:59:59.000Z

5

Key Response Planning Factors for the Aftermath of Nuclear Terrorism  

SciTech Connect (OSTI)

Despite hundreds of above-ground nuclear tests and data gathered from Hiroshima and Nagasaki, the effects of a ground-level, low-yield nuclear detonation in a modern urban environment are still the subject of considerable scientific debate. Extensive review of nuclear weapon effects studies and discussions with nuclear weapon effects experts from various federal agencies, national laboratories, and technical organizations have identified key issues and bounded some of the unknowns required to support response planning for a low-yield, ground-level nuclear detonation in a modern U.S. city. This study, which is focused primarily upon the hazards posed by radioactive fallout, used detailed fallout predictions from the advanced suite of three-dimensional (3-D) meteorology and plume/fallout models developed at Lawrence Livermore National Laboratory (LLNL), including extensive global Key Response Planning Factors for the Aftermath of Nuclear Terrorism geographical and real-time meteorological databases to support model calculations. This 3-D modeling system provides detailed simulations that account for complex meteorology and terrain effects. The results of initial modeling and analysis were presented to federal, state, and local working groups to obtain critical, broad-based review and feedback on strategy and messaging. This effort involved a diverse set of communities, including New York City, National Capitol Regions, Charlotte, Houston, Portland, and Los Angeles. The largest potential for reducing casualties during the post-detonation response phase comes from reducing exposure to fallout radiation. This can be accomplished through early, adequate sheltering followed by informed, delayed evacuation.B The response challenges to a nuclear detonation must be solved through multiple approaches of public education, planning, and rapid response actions. Because the successful response will require extensive coordination of a large number of organizations, supplemented by appropriate responses by local responders and the general population within the hazard zones, regional planning is essential to success. The remainder of this Executive Summary provides summary guidance for response planning in three areas: (1) Public Protection Strategy details the importance of early, adequate shelter followed by informed evacuation. (2) Responder Priorities identify how to protect response personnel, perform regional situational assessment, and support public safety. (3) Key Planning Considerations refute common myths and provide important information on planning how to respond in the aftermath of nuclear terrorism.

Buddemeier, B R; Dillon, M B

2009-01-21T23:59:59.000Z

6

Analysis of the factors and the roles of HRD in organizational learning styles as identified by key informants at selected corporations in the Republic of Korea  

E-Print Network [OSTI]

what organizational learning styles exist; 2) to identify the factors that differentiate the organizations with different organizational learning styles; 3) to identify the roles of HRD to facilitate organizational learning within the organizations...

Jeong, Jinchul

2005-08-29T23:59:59.000Z

7

analysis material key: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Temperature(C) 200 2 Finite key analysis for symmetric attacks in quantum key distribution Quantum Physics (arXiv) Summary: We introduce a constructive method to calculate...

8

A Key Review On Exergetic Analysis And Assessment Of Renewable...  

Open Energy Info (EERE)

thermodynamic parameters, such as fuel depletion ratio, relative irreversibility, productivity lack and exergetic factor) used in the analysis are presented first. Next,...

9

Experimental quantum key distribution with finite-key security analysis for noisy channels  

E-Print Network [OSTI]

In quantum key distribution implementations, each session is typically chosen long enough so that the secret key rate approaches its asymptotic limit. However, this choice may be constrained by the physical scenario, as in the perspective use with satellites, where the passage of one terminal over the other is restricted to a few minutes. Here we demonstrate experimentally the extraction of secure keys leveraging an optimal design of the prepare-and-measure scheme, according to recent finite-key theoretical tight-bounds. The experiment is performed in different channel conditions, and assuming two distinct attack models: individual attacks, or general quantum attacks. The request on the number of exchanged qubits is then obtained as a function of the key size and of the ambient quantum bit error rate. The results indicate that viable conditions for effective symmetric, and even one-time-pad, cryptography are achievable.

Davide Bacco; Matteo Canale; Nicola Laurenti; Giuseppe Vallone; Paolo Villoresi

2014-06-17T23:59:59.000Z

10

Key factors governing uncertainty in the response to sunshade geoengineering from a comparison  

E-Print Network [OSTI]

Key factors governing uncertainty in the response to sunshade geoengineering from a comparison of solar geoengineering are central to evaluating whether such approaches may help to reduce the harmful impacts of global warming. In this study we compare the sunshade solar geoengineering response

Robock, Alan

11

A key factor to the spin parameter of uniformly rotating compact stars: crust structure  

E-Print Network [OSTI]

We study the key factor to determine the dimensionless spin parameter $j\\equiv cJ/(GM^2)$ of different kinds of uniformly rotating compact stars, including the traditional neutron stars, hyperonic neutron stars, and hybrid stars, and check the reliability of the results on various types of equations of state of dense matter. The equations of state from the relativistic mean field theory and the MIT bag model are adopted to simulate compact stars. Numerical calculations of rigidly rotating neutron stars are performed using the RNS code in the framework of general relativity by solving the Einstein equations for stationary axis-symmetric spacetime. The crust structure of compact stars is found to be a key factor to determine the maximum value of the spin parameter $j_{\\rm max}$. For the stars with inclusion of the crust, $j_{\\rm max}\\sim 0.7$ is sustained for various kinds of compact stars with $M>0.5 M_{\\odot}$, and is found to be insensitive to the mass of star and selected equations of state. For the traditi...

Qi, B; Sun, B Y; Wang, S Y; Gao, J H

2014-01-01T23:59:59.000Z

12

Weak-Key Analysis of POET Mohamed Ahmed Abdelraheem, Andrey Bogdanov, and Elmar Tischhauser  

E-Print Network [OSTI]

Weak-Key Analysis of POET Mohamed Ahmed Abdelraheem, Andrey Bogdanov, and Elmar Tischhauser,anbog,ewti}@dtu.dk Abstract. We evaluate the security of the recently proposed authenticated encryption scheme POET. We give explicit constructions for weak key classes not covered by POET's weak key testing strategy

13

Human Factors Engineering Program Review Model (NUREG-0711)Revision 3: Update Methodology and Key Revisions  

SciTech Connect (OSTI)

The U.S. Nuclear Regulatory Commission (NRC) reviews the human factors engineering (HFE) programs of applicants for nuclear power plant construction permits, operating licenses, standard design certifications, and combined operating licenses. The purpose of these safety reviews is to help ensure that personnel performance and reliability are appropriately supported. Detailed design review procedures and guidance for the evaluations is provided in three key documents: the Standard Review Plan (NUREG-0800), the HFE Program Review Model (NUREG-0711), and the Human-System Interface Design Review Guidelines (NUREG-0700). These documents were last revised in 2007, 2004 and 2002, respectively. The NRC is committed to the periodic update and improvement of the guidance to ensure that it remains a state-of-the-art design evaluation tool. To this end, the NRC is updating its guidance to stay current with recent research on human performance, advances in HFE methods and tools, and new technology being employed in plant and control room design. NUREG-0711 is the first document to be addressed. We present the methodology used to update NUREG-0711 and summarize the main changes made. Finally, we discuss the current status of the update program and the future plans.

OHara J. M.; Higgins, J.; Fleger, S.

2012-07-22T23:59:59.000Z

14

annihilation factor analysis: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

16 Correlated Bayesian Factor Analysis CiteSeer Summary: Factor analysis is a method in multivariate statistical analysis that can help scientists determine which variables to...

15

Repairing Tom Swift's electric factor analysis machine  

E-Print Network [OSTI]

Proper use of exploratory factor analysis (EFA) requires the researcher to make a series of careful decisions. Despite attempts by Floyd and Widaman (1995), Fabrigar, Wegener, MacCallum, and Strahan (1999), and others to ...

Preacher, K. J.; MacCallum, R. C.

2003-01-01T23:59:59.000Z

16

Factor Analysis for Skewed Data and Skew-Normal Maximum Likelihood Factor Analysis  

E-Print Network [OSTI]

. . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 2.7.1 The Factor Analysis Model . . . . . . . . . . . . . . . . . 28 v 2.8 Model Selection . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 2.8.1 The Akaike Information Criterion . . . . . . . . . . . . . . 30 2.8.2 The Bayesian... Information Criterion . . . . . . . . . . . . . 31 2.9 Factor Scores . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 2.10 Non-uniqueness of Factor Loadings . . . . . . . . . . . . . . . . . . 32 2.10.1 The Rotation of Factor Loadings...

Gaucher, Beverly Jane

2013-04-04T23:59:59.000Z

17

Towards Fresh Re-Keying with Leakage-Resilient PRFs: Cipher Design Principles and Analysis  

E-Print Network [OSTI]

-resilient cryptography is its significant performance overheads, it naturally suggests an intermediate line of re- searchTowards Fresh Re-Keying with Leakage-Resilient PRFs: Cipher Design Principles and Analysis Sonia advantage of our analysis to extract new design principles for block ciphers to be used in leakage

18

Concise and Tight Security Analysis of the Bennett-Brassard 1984 Protocol with Finite Key Lengths  

E-Print Network [OSTI]

We present a tight security analysis of the Bennett-Brassard 1984 protocol taking into account the finite size effect of key distillation, and achieving unconditional security. We begin by presenting a concise analysis utilizing the normal approximation of the hypergeometric function. Then next we show that a similarly tight bound can also be obtained by a rigorous argument without relying on any approximation. In particular, for the convenience of experimentalists who wish to evaluate the security of their QKD systems, we also give explicit procedures of our key distillation, and also show how to calculate the secret key rate and the security parameter from a given set of experimental parameters. Besides the exact values of key rates and security parameters, we also present how to obtain their rough estimates using the normal approximation.

Masahito Hayashi; Toyohiro Tsurumaru

2012-05-17T23:59:59.000Z

19

Economic Life Cycle Assessment as element of sustainability certification – a key success factor moving beyond Life Cycle Costing  

E-Print Network [OSTI]

Target topic: achieving sustainability, saving energy, and improving occupant comfort? Lead Author Wolfram Trinius, PhD, Ingenieurb?ro Trinius, Hamburg, Germany and University of Gavle, Sweden Co Authors Harry Hirsch, HH Consulting, Baden... Baden, Germany Simone Lakenbrink, DU Diederichs Project Management, Munich, Germany Title Economic Life Cycle Assessment as element of sustainability certification ? a key success factor moving beyond Life Cycle Costing The move from...

Trinius, W.; Hirsch, H.

20

Biosphere dose conversion Factor Importance and Sensitivity Analysis  

SciTech Connect (OSTI)

This report presents importance and sensitivity analysis for the environmental radiation model for Yucca Mountain, Nevada (ERMYN). ERMYN is a biosphere model supporting the total system performance assessment (TSPA) for the license application (LA) for the Yucca Mountain repository. This analysis concerns the output of the model, biosphere dose conversion factors (BDCFs) for the groundwater, and the volcanic ash exposure scenarios. It identifies important processes and parameters that influence the BDCF values and distributions, enhances understanding of the relative importance of the physical and environmental processes on the outcome of the biosphere model, includes a detailed pathway analysis for key radionuclides, and evaluates the appropriateness of selected parameter values that are not site-specific or have large uncertainty.

M. Wasiolek

2004-10-15T23:59:59.000Z

Note: This page contains sample records for the topic "analysis key factors" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Nominal Performance Biosphere Dose Conversion Factor Analysis  

SciTech Connect (OSTI)

This analysis report is one of the technical reports containing documentation of the Environmental Radiation Model for Yucca Mountain, Nevada (ERMYN), a biosphere model supporting the Total System Performance Assessment (TSPA) for the license application (LA) for the Yucca Mountain repository. This analysis report describes the development of biosphere dose conversion factors (BDCFs) for the groundwater exposure scenario, and the development of conversion factors for assessing compliance with the groundwater protection standard. A graphical representation of the documentation hierarchy for the ERMYN is presented in Figure 1-1. This figure shows the interrelationships among the products (i.e., analysis and model reports) developed for biosphere modeling and provides an understanding of how this analysis report contributes to biosphere modeling. This report is one of two reports that develop biosphere BDCFs, which are input parameters for the TSPA-LA model. The ''Biosphere Model Report'' (BSC 2004 [DIRS 169460]) describes in detail the ERMYN conceptual model and mathematical model. The input parameter reports, shown to the right of the ''Biosphere Model Report'' in Figure 1-1, contain detailed description of the model input parameters, their development, and the relationship between the parameters and specific features events and processes (FEPs). This report describes biosphere model calculations and their output, the BDCFs, for the groundwater exposure scenario. The objectives of this analysis are to develop BDCFs for the groundwater exposure scenario for the three climate states considered in the TSPA-LA as well as conversion factors for evaluating compliance with the groundwater protection standard. The BDCFs will be used in performance assessment for calculating all-pathway annual doses for a given concentration of radionuclides in groundwater. The conversion factors will be used for calculating gross alpha particle activity in groundwater and the annual dose from drinking water for beta- and photon-emitting radionuclides. Another objective of this analysis was to re-qualify the output of the previous revision (BSC 2003 [DIRS 164403]).

M. Wasiolek

2004-09-08T23:59:59.000Z

22

Identification of Key Processes that Control Tumor Necrosis Factor Availability in a Tuberculosis Granuloma  

E-Print Network [OSTI]

/TNF receptor binding and trafficking processes. We used the results of sensitivity analysis as a tool://www.nih.gov/). The funders had no role in study design, data collection and analysis, decision to publish, or preparation infection can be reactivated years later leading to active tuberculosis. The risk of reactivatio

Kirschner, Denise

23

Nominal Performance Biosphere Dose Conversion Factor Analysis  

SciTech Connect (OSTI)

This analysis report is one of the technical reports containing documentation of the Environmental Radiation Model for Yucca Mountain, Nevada (ERMYN), a biosphere model supporting the Total System Performance Assessment (TSPA) for the license application (LA) for the Yucca Mountain repository. This analysis report describes the development of biosphere dose conversion factors (BDCFs) for the groundwater exposure scenario, and the development of conversion factors for assessing compliance with the groundwater protection standards. A graphical representation of the documentation hierarchy for the ERMYN is presented in Figure 1-1. This figure shows the interrelationships among the products (i.e., analysis and model reports) developed for biosphere modeling and provides an understanding of how this analysis report contributes to biosphere modeling. This report is one of two reports that develop BDCFs, which are input parameters for the TSPA-LA model. The ''Biosphere Model Report'' (BSC 2004 [DIRS 169460]) describes in detail the ERMYN conceptual model and mathematical model. The input parameter reports, shown to the right of the ''Biosphere Model Report'' in Figure 1-1, contain detailed description of the model input parameters, their development, and the relationship between the parameters and specific features events and processes (FEPs). This report describes biosphere model calculations and their output, the BDCFs, for the groundwater exposure scenario. This analysis receives direct input from the outputs of the ''Biosphere Model Report'' (BSC 2004 [DIRS 169460]) and the five analyses that develop parameter values for the biosphere model (BSC 2005 [DIRS 172827]; BSC 2004 [DIRS 169672]; BSC 2004 [DIRS 169673]; BSC 2004 [DIRS 169458]; BSC 2004 [DIRS 169459]). The results of this report are further analyzed in the ''Biosphere Dose Conversion Factor Importance and Sensitivity Analysis'' (Figure 1-1). The objectives of this analysis are to develop BDCFs for the groundwater exposure scenario for the three climate states (present day, monsoon, and glacial transition) considered in the TSPA-LA, as well as conversion factors for compliance evaluation with the groundwater protection standards. The BDCFs will be used in performance assessment for calculating all-pathway annual doses for a given concentration of radionuclides in groundwater. The conversion factors will be used for calculating gross alpha particle activity in groundwater and the annual dose from drinking water for beta- and photon-emitting radionuclides.

M.A. Wasiolek

2005-04-28T23:59:59.000Z

24

KEY FACTORS THAT INFLUENCE THE PERFORMANCE PROPERTIES OF ARP/MCU SALTSTONE MIXES  

SciTech Connect (OSTI)

At the Saltstone Production Facility (SPF), decontaminated salt solution (DSS) is combined with premix (a cementitious mixture of portland cement (PC), blast furnace slag (BFS) and Class F fly ash (FA)) in a Readco mixer to produce fresh (uncured) Saltstone. After transfer to the Saltstone Disposal Facility (SDF) the hydration reactions initiated during the contact of the premix and salt solution continue during the curing period to produce the hardened waste form product. The amount of heat generated from hydration and the resultant temperature increase in the vaults depend on the composition of the decontaminated salt solution being dispositioned as well as the grout formulation (mix design). This report details the results from Task 3 of the Saltstone Variability Study for FY09 which was performed to identify, and quantify when possible, those factors that drive the performance properties of the projected ARP/MCU Batches. A baseline ARP/MCU mix (at 0.60 water to cementitious materials (w/cm) ratio) was established and consisted of the normal premix composition and a salt solution that was an average of the projected compositions of the last three ARP/MCU batches developed by T. A. Le. This task introduced significant variation in (1) wt % slag, w/cm ratio, and wt % portland cement about the baseline mix and (2) the temperature of curing in order to better assess the dependence of the performance properties on these factors. Two separate campaigns, designated Phase 10 and Phase 11, were carried out under Task 3. Experimental designs and statistical analyses were used to search for correlation among properties and to develop linear models to predict property values based on factors such as w/cm ratio, slag concentration, and portland cement concentration. It turns out that the projected salt compositions contained relatively high amounts of aluminate (0.22 M) even though no aluminate was introduced due to caustic aluminate removal from High Level Waste. Previous studies revealed that increased levels of aluminate in the feed cause a significant increase in the heat generation. For Phase 10, a mix with 0.05 M aluminate was used as a comparison point for the mixes at 0.22 M aluminate. The temperature of curing in Task 3 ranged from 22 C to 75 C. Recent results demonstrated that it is not only the temperature of curing which is important but also the time/temperature sequence of curing. Therefore, this report also focuses on the impact of the sequencing of time and curing temperature on Saltstone properties.

Harbour, J.; Edwards, T.; Williams, V.

2009-10-05T23:59:59.000Z

25

Some Physics And System Issues In The Security Analysis Of Quantum Key Distribution Protocols  

E-Print Network [OSTI]

In this paper we review a number of issues on the security of quantum key distribution (QKD) protocols that bear directly on the relevant physics or mathematical representation of the QKD cryptosystem. It is shown that the cryptosystem representation itself may miss out many possible attacks which are not accounted for in the security analysis and proofs. Hence the final security claims drawn from such analysis are not reliable, apart from foundational issues about the security criteria that are discussed elsewhere. The cases of continuous-variable QKD and multi-photon sources are elaborated upon.

Horace P. Yuen

2014-05-07T23:59:59.000Z

26

Disruptive Event Biosphere Dose Conversion Factor Analysis  

SciTech Connect (OSTI)

This analysis report is one of the technical reports containing documentation of the Environmental Radiation Model for Yucca Mountain, Nevada (ERMYN), a biosphere model supporting the total system performance assessment (TSPA) for the license application (LA) for the Yucca Mountain repository. This analysis report describes the development of biosphere dose conversion factors (BDCFs) for the volcanic ash exposure scenario, and the development of dose factors for calculating inhalation dose during volcanic eruption. A graphical representation of the documentation hierarchy for the ERMYN is presented in Figure 1-1. This figure shows the interrelationships among the products (i.e., analysis and model reports) developed for biosphere modeling and provides an understanding of how this analysis report contributes to biosphere modeling. This report is one of two reports that develop biosphere BDCFs, which are input parameters for the TSPA model. The ''Biosphere Model Report'' (BSC 2004 [DIRS 169460]) describes in detail the ERMYN conceptual model and mathematical model. The input parameter reports, shown to the right of the Biosphere Model Report in Figure 1-1, contain detailed descriptions of the model input parameters, their development and the relationship between the parameters and specific features, events and processes (FEPs). This report describes biosphere model calculations and their output, the BDCFs, for the volcanic ash exposure scenario. This analysis receives direct input from the outputs of the ''Biosphere Model Report'' (BSC 2004 [DIRS 169460]) and from the five analyses that develop parameter values for the biosphere model (BSC 2004 [DIRS 169671]; BSC 2004 [DIRS 169672]; BSC 2004 [DIRS 169673]; BSC 2004 [DIRS 169458]; and BSC 2004 [DIRS 169459]). The results of this report are further analyzed in the ''Biosphere Dose Conversion Factor Importance and Sensitivity Analysis''. The objective of this analysis was to develop the BDCFs for the volcanic ash exposure scenario and the dose factors for calculating inhalation doses during volcanic eruption (eruption phase of the volcanic event). For the volcanic ash exposure scenario, the mode of radionuclide release into the biosphere is a volcanic eruption through the repository with the resulting entrainment of contaminated waste in the tephra and the subsequent atmospheric transport and dispersion of contaminated material in the biosphere. The biosphere process model for this scenario uses the surface deposition of contaminated ash as the source of radionuclides in the biosphere. The initial atmospheric transport and dispersion of the ash as well as its subsequent redistribution by fluvial and aeolian processes are not addressed within the biosphere model. These processes influence the value of the source term that is calculated elsewhere and then combined with the BDCFs in the TSPA model to calculate expected dose to the receptor. Another objective of this analysis was to re-qualify the output of the previous revision (BSC 2003 [DIRS 163958]).

M. Wasiolek

2004-09-08T23:59:59.000Z

27

Geography: Critical Factors in the Analysis of Complex Systems  

E-Print Network [OSTI]

Geography is a disciple of discovery and exploration. From earliest human endeavor until today, it remains the key to understanding human interaction with the landscape. A conceptual framework of geographic factors provides ...

Welch, Ivan

2012-05-31T23:59:59.000Z

28

Exploratory factor analysis in behavior genetics research: Factor recovery with small sample sizes  

E-Print Network [OSTI]

Results of a Monte Carlo study of exploratory factor analysis demonstrate that in studies characterized by low sample sizes the population factor structure can be adequately recovered if communalities are high, model error ...

Preacher, K. J.; MacCallum, R. C.

2002-01-01T23:59:59.000Z

29

Risk analysis of Trojan-horse attacks on practical quantum key distribution systems  

E-Print Network [OSTI]

An eavesdropper Eve may probe a quantum key distribution (QKD) system by sending a bright pulse from the quantum channel into the system and analyzing the back-reflected pulses. Such Trojan-horse attacks can breach the security of the QKD system if appropriate safeguards are not installed or if they can be fooled by Eve. We present a risk analysis of such attacks based on extensive spectral measurements, such as transmittance, reflectivity, and detection sensitivity of some critical components used in typical QKD systems. Our results indicate the existence of wavelength regimes where the attacker gains considerable advantage as compared to launching an attack at 1550 nm. We also propose countermeasures to reduce the risk of such attacks.

Nitin Jain; Birgit Stiller; Imran Khan; Vadim Makarov; Christoph Marquardt; Gerd Leuchs

2014-12-19T23:59:59.000Z

30

Disruptive Event Biosphere Doser Conversion Factor Analysis  

SciTech Connect (OSTI)

The purpose of this report was to document the process leading to, and the results of, development of radionuclide-, exposure scenario-, and ash thickness-specific Biosphere Dose Conversion Factors (BDCFs) for the postulated postclosure extrusive igneous event (volcanic eruption) at Yucca Mountain. BDCF calculations were done for seventeen radionuclides. The selection of radionuclides included those that may be significant dose contributors during the compliance period of up to 10,000 years, as well as radionuclides of importance for up to 1 million years postclosure. The approach documented in this report takes into account human exposure during three different phases at the time of, and after, volcanic eruption. Calculations of disruptive event BDCFs used the GENII-S computer code in a series of probabilistic realizations to propagate the uncertainties of input parameters into the output. The pathway analysis included consideration of different exposure pathway's contribution to the BDCFs. BDCFs for volcanic eruption, when combined with the concentration of radioactivity deposited by eruption on the soil surface, allow calculation of potential radiation doses to the receptor of interest. Calculation of radioactivity deposition is outside the scope of this report and so is the transport of contaminated ash from the volcano to the location of the receptor. The integration of the biosphere modeling results (BDCFs) with the outcomes of the other component models is accomplished in the Total System Performance Assessment (TSPA), in which doses are calculated to the receptor of interest from radionuclides postulated to be released to the environment from the potential repository at Yucca Mountain.

M. Wasiolek

2000-12-28T23:59:59.000Z

31

Nominal Performance Biosphere Dose Conversion Factor Analysis  

SciTech Connect (OSTI)

The purpose of this report was to document the process leading to development of the Biosphere Dose Conversion Factors (BDCFs) for the postclosure nominal performance of the potential repository at Yucca Mountain. BDCF calculations concerned twenty-four radionuclides. This selection included sixteen radionuclides that may be significant nominal performance dose contributors during the compliance period of up to 10,000 years, five additional radionuclides of importance for up to 1 million years postclosure, and three relatively short-lived radionuclides important for the human intrusion scenario. Consideration of radionuclide buildup in soil caused by previous irrigation with contaminated groundwater was taken into account in the BDCF development. The effect of climate evolution, from the current arid conditions to a wetter and cooler climate, on the BDCF values was evaluated. The analysis included consideration of different exposure pathway's contribution to the BDCFs. Calculations of nominal performance BDCFs used the GENII-S computer code in a series of probabilistic realizations to propagate the uncertainties of input parameters into the output. BDCFs for the nominal performance, when combined with the concentrations of radionuclides in groundwater allow calculation of potential radiation doses to the receptor of interest. Calculated estimates of radionuclide concentration in groundwater result from the saturated zone modeling. The integration of the biosphere modeling results (BDCFs) with the outcomes of the other component models is accomplished in the Total System Performance Assessment (TSPA) to calculate doses to the receptor of interest from radionuclides postulated to be released to the environment from the potential repository at Yucca Mountain.

Wasiolek, Maryla A.

2000-12-21T23:59:59.000Z

32

Sample size in factor analysis: The role of model error  

E-Print Network [OSTI]

This article examines effects of sample size and other design features on correspondence between factors obtained from analysis of sample data and those present in the population from which the samples were drawn. We extend ...

MacCallum, R. C.; Widaman, K. F.; Preacher, K. J.; Hong, Sehee

2001-01-01T23:59:59.000Z

33

Genetic analysis of the endangered silver rice rat (Oryzomys palustris natator) and Lower Keys marsh rabbit (Sylvilagus palustris hefneri)  

E-Print Network [OSTI]

; Goodyear 1992; Forys et al. 1996), and increased mortality of neonates as a result of imported fire ants (Solenopsis invicta; Forys et al. 2002), a recent colonizer of the Florida Keys. As a result of concern over the loss of native endemic land.... Factors including loss of habitat, habitat fragmentation by road systems and multiple indirect anthropogenic effects (Goodyear 1992; Forys et al. 1996; Forys and Humphrey 1999; USFWS 1999; Forys et al. 2002; Harveson et al. 2004) have all contributed...

Crouse, Amanda Louise

2007-04-25T23:59:59.000Z

34

Power Analysis of Atmel CryptoMemory Recovering Keys from Secure EEPROMs  

E-Print Network [OSTI]

, [...] including physical attacks". We de- veloped a successful power analysis attack on the authentication step knowledge, this is the first power analysis attack on Atmel CryptoMemory products reported in the literature

Verdult, Roel

35

Panel Data Analysis of Regulatory Factors Shaping Environmental Performance  

E-Print Network [OSTI]

and the influence of regulatory factors in general, this paper examines a specific demonstration of environmental perfor- mance: biological oxygen demand (BOD) wastewater dis- charges by large (“major”) municipal wastewater treatment plants in Kansas during... example, limit levels). To analyze the effects of these regulatory factors on envi- ronmental performance, this particular empirical analysis examines the wastewater discharges by large municipal wastewater treatment facilities in the state of Kansas...

Earnhart, Dietrich H.

2006-03-13T23:59:59.000Z

36

Summary We investigated key factors controlling mass and energy exchange by a young (6-year-old) ponderosa pine  

E-Print Network [OSTI]

forest type in the western United States, occupying approximately 20% of unreserved forest area (Powell with tree size and age influence the ecosystem-scale energy balance, transpiration rates, and net carbon uptake. Our objective was to compare the factors con- trolling energy balance and net carbon uptake over

Cohen, Ronald C.

37

Analysis of IFR driver fuel hot channel factors  

SciTech Connect (OSTI)

Thermal-hydraulic uncertainty factors for Integral Fast Reactor (IFR) driver fuels have been determined based primarily on the database obtained from the predecessor fuels used in the IFR prototype, Experimental Breeder Reactor II. The uncertainty factors were applied to the channel factors (HCFs) analyses to obtain separate overall HCFs for fuel and cladding for steady-state analyses. A ``semistatistical horizontal method`` was used in the HCFs analyses. The uncertainty factor of the fuel thermal conductivity dominates the effects considered in the HCFs analysis; the uncertainty in fuel thermal conductivity will be reduced as more data are obtained to expand the currently limited database for the IFR ternary metal fuel (U-20Pu-10Zr). A set of uncertainty factors to be used for transient analyses has also been derived.

Ku, J.Y.; Chang, L.K.; Mohr, D.

1994-03-01T23:59:59.000Z

38

Key word:Daylight Factor Window Wall Ratio Pendentive dome Lighting design Tropical region Architecture and Interior design  

E-Print Network [OSTI]

Abstract: Daylighting design plays important role in architecture of religious buildings such as churches and mosques where pendentive dome construction is frequently used. In daylighting design, many designers face difficulty in estimating the interior share of light which is usually expressed by daylight factor due to complexity of interior form. This study aims to provide designers with a rather high precision rule of thumb for average daylight factor in pendentive dome building. Thus, it investigates the Daylight Factor [DF] distribution of such buildings with reference to the tropics. It takes the Window Wall Ratio [WWR] into account and seeks its influence on daylight factor. By a 12 X 12 points grid, it examines five different ratios including 0.1, 0.2, 0.3, 0.4 and 0.5 on DF of the floor beneath the dome. The results endorse the direct relation of WWR and DF. The least WWR equal to 0.1 yields an average DF of 0.55 % while the greatest WWR of 0.5 yields in average DF of 2.56%. The intermediate WWR in steps of 0.2, 0.3 and 0.4 correspond to 1.04, 1.56 and 2.07 percent respectively. As a relatively precise rule of thumb, any increment in consequent steps of WWR with 0.1 intervals results in 0.5 % increase in DF. This can be employed by architects and interior designers for lighting design of pendentive dome buildings in tropical region.

Mehrdad Mazloomi

39

Key Attributes of the SAPHIRE Risk and Reliability Analysis Software for Risk-Informed Probabilistic Applications  

SciTech Connect (OSTI)

The Idaho National Laboratory is a primary developer of probabilistic risk and reliability analysis (PRRA) tools, dating back over 35 years. Evolving from mainframe-based software, the current state-of-the-practice has lead to the creation of the SAPHIRE software. Currently, agencies such as the Nuclear Regulatory Commission, the National Aeronautics and Aerospace Agency, the Department of Energy, and the Department of Defense use version 7 of the SAPHIRE software for many of their risk-informed activities. In order to better understand and appreciate the power of software as part of risk-informed applications, we need to recall that our current analysis methods and solution methods have built upon pioneering work done 30 to 40 years ago. We contrast this work with the current capabilities in the SAPHIRE analysis package. As part of this discussion, we provide information for both the typical features and special analysis capabilities which are available. We also present the application and results typically found with state-of-the-practice PRRA models. By providing both a high-level and detailed look at the SAPHIRE software, we give a snapshot in time for the current use of software tools in a risk-informed decision arena.

Curtis Smith; James Knudsen; Kellie Kvarfordt; Ted Wood

2008-08-01T23:59:59.000Z

40

Failure Impact Analysis of Key Management in AMI Using Cybernomic Situational Assessment (CSA)  

SciTech Connect (OSTI)

In earlier work, we presented a computational framework for quantifying the security of a system in terms of the average loss a stakeholder stands to sustain as a result of threats to the system. We named this system, the Cyberspace Security Econometrics System (CSES). In this paper, we refine the framework and apply it to cryptographic key management within the Advanced Metering Infrastructure (AMI) as an example. The stakeholders, requirements, components, and threats are determined. We then populate the matrices with justified values by addressing the AMI at a higher level, rather than trying to consider every piece of hardware and software involved. We accomplish this task by leveraging the recently established NISTR 7628 guideline for smart grid security. This allowed us to choose the stakeholders, requirements, components, and threats realistically. We reviewed the literature and selected an industry technical working group to select three representative threats from a collection of 29 threats. From this subset, we populate the stakes, dependency, and impact matrices, and the threat vector with realistic numbers. Each Stakeholder s Mean Failure Cost is then computed.

Abercrombie, Robert K [ORNL] [ORNL; Sheldon, Frederick T [ORNL] [ORNL; Hauser, Katie R [ORNL] [ORNL; Lantz, Margaret W [ORNL] [ORNL; Mili, Ali [New Jersey Insitute of Technology] [New Jersey Insitute of Technology

2013-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "analysis key factors" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Performance analysis of parallel supernodal sparse LU factorization  

SciTech Connect (OSTI)

We investigate performance characteristics for the LU factorization of large matrices with various sparsity patterns. We consider supernodal right-looking parallel factorization on a bi-dimensional grid of processors, making use of static pivoting. We develop a performance model and we validate it using the implementation in SuperLU-DIST, the real matrices and the IBM Power3 machine at NERSC. We use this model to obtain performance bounds on parallel computers, to perform scalability analysis and to identify performance bottlenecks. We also discuss the role of load balance and data distribution in this approach.

Grigori, Laura; Li, Xiaoye S.

2004-02-05T23:59:59.000Z

42

Sensitivity Analysis of Wind Plant Performance to Key Turbine Design Parameters: A Systems Engineering Approach; Preprint  

SciTech Connect (OSTI)

This paper introduces the development of a new software framework for research, design, and development of wind energy systems which is meant to 1) represent a full wind plant including all physical and nonphysical assets and associated costs up to the point of grid interconnection, 2) allow use of interchangeable models of varying fidelity for different aspects of the system, and 3) support system level multidisciplinary analyses and optimizations. This paper describes the design of the overall software capability and applies it to a global sensitivity analysis of wind turbine and plant performance and cost. The analysis was performed using three different model configurations involving different levels of fidelity, which illustrate how increasing fidelity can preserve important system interactions that build up to overall system performance and cost. Analyses were performed for a reference wind plant based on the National Renewable Energy Laboratory's 5-MW reference turbine at a mid-Atlantic offshore location within the United States.

Dykes, K.; Ning, A.; King, R.; Graf, P.; Scott, G.; Veers, P.

2014-02-01T23:59:59.000Z

43

Method for factor analysis of GC/MS data  

DOE Patents [OSTI]

The method of the present invention provides a fast, robust, and automated multivariate statistical analysis of gas chromatography/mass spectroscopy (GC/MS) data sets. The method can involve systematic elimination of undesired, saturated peak masses to yield data that follow a linear, additive model. The cleaned data can then be subjected to a combination of PCA and orthogonal factor rotation followed by refinement with MCR-ALS to yield highly interpretable results.

Van Benthem, Mark H; Kotula, Paul G; Keenan, Michael R

2012-09-11T23:59:59.000Z

44

Numerical Simulation of a Displacement Ventilation System with Multi-heat Sources and Analysis of Influential Factors  

E-Print Network [OSTI]

Doctor Instructor Professor The key laboratory of clean coal power generation and combustion technology of the ministry of education, southeast university College of energy sources & environment, Inner Mongolia University of Science & Technology...ICEBO2006, Shenzhen, China Maximize Comfort: Temperature, Humidity and IAQ Vol.I-7-1 Numerical Simulation of a Displacement Ventilation System with Multi-heat Sources and Analysis of Influential Factors Xuan Wu Jingfang Gao Wenfei Wu...

Wu, X.; Gao, J.; Wu, W.

2006-01-01T23:59:59.000Z

45

Human factors review for Severe Accident Sequence Analysis (SASA)  

SciTech Connect (OSTI)

The paper will discuss work being conducted during this human factors review including: (1) support of the Severe Accident Sequence Analysis (SASA) Program based on an assessment of operator actions, and (2) development of a descriptive model of operator severe accident management. Research by SASA analysts on the Browns Ferry Unit One (BF1) anticipated transient without scram (ATWS) was supported through a concurrent assessment of operator performance to demonstrate contributions to SASA analyses from human factors data and methods. A descriptive model was developed called the Function Oriented Accident Management (FOAM) model, which serves as a structure for bridging human factors, operations, and engineering expertise and which is useful for identifying needs/deficiencies in the area of accident management. The assessment of human factors issues related to ATWS required extensive coordination with SASA analysts. The analysis was consolidated primarily to six operator actions identified in the Emergency Procedure Guidelines (EPGs) as being the most critical to the accident sequence. These actions were assessed through simulator exercises, qualitative reviews, and quantitative human reliability analyses. The FOAM descriptive model assumes as a starting point that multiple operator/system failures exceed the scope of procedures and necessitates a knowledge-based emergency response by the operators. The FOAM model provides a functionally-oriented structure for assembling human factors, operations, and engineering data and expertise into operator guidance for unconventional emergency responses to mitigate severe accident progression and avoid/minimize core degradation. Operators must also respond to potential radiological release beyond plant protective barriers. Research needs in accident management and potential uses of the FOAM model are described. 11 references, 1 figure.

Krois, P.A.; Haas, P.M.; Manning, J.J.; Bovell, C.R.

1984-01-01T23:59:59.000Z

46

Security analysis of the decoy method with the Bennett-Brassard 1984 protocol for finite key lengths  

E-Print Network [OSTI]

This paper provides a formula for the sacrifice bit-length for privacy amplification with the Bennett-Brassard 1984 protocol for finite key lengths when we employ the decoy method. Using the formula, we can guarantee the security parameter for realizable quantum key distribution system. The key generation rates with finite key lengths are numerically evaluated. The proposed method improves the existing key generation rate even in the asymptotic setting.

Masahito Hayashi; Ryota Nakayama

2013-11-19T23:59:59.000Z

47

ANALYSIS ON THE MAJOR INFLUENCE FACTORS OF ENERGY INTENSITY CHANGING  

E-Print Network [OSTI]

Based on the energy intensity data of period 1990-2008, this paper uses impulse response function and variance decomposition model to empirical analysis the main influencing factors and effects of energy intensity,. The empirical results show that: the energy intensity of itself, and the proportion of secondary industry have a larger impact on energy intensity; the change of energy price and technological progress also play a certain impact on energy intensity; and the link with the internal relations and interaction mechanisms, which can play an active role in improving energy efficiency.

Xia Wang; Lu Tang

48

Accelerated Gibbs Sampling for Infinite Sparse Factor Analysis  

SciTech Connect (OSTI)

The Indian Buffet Process (IBP) gives a probabilistic model of sparse binary matrices with an unbounded number of columns. This construct can be used, for example, to model a fixed numer of observed data points (rows) associated with an unknown number of latent features (columns). Markov Chain Monte Carlo (MCMC) methods are often used for IBP inference, and in this technical note, we provide a detailed review of the derivations of collapsed and accelerated Gibbs samplers for the linear-Gaussian infinite latent feature model. We also discuss and explain update equations for hyperparameter resampling in a 'full Bayesian' treatment and present a novel slice sampler capable of extending the accelerated Gibbs sampler to the case of infinite sparse factor analysis by allowing the use of real-valued latent features.

Andrzejewski, D M

2011-09-12T23:59:59.000Z

49

Human Factors Considerations in New Nuclear Power Plants: Detailed Analysis.  

SciTech Connect (OSTI)

This Nuclear Regulatory Commission (NRC) sponsored study has identified human-performance issues in new and advanced nuclear power plants. To identify the issues, current industry developments and trends were evaluated in the areas of reactor technology, instrumentation and control technology, human-system integration technology, and human factors engineering (HFE) methods and tools. The issues were organized into seven high-level HFE topic areas: Role of Personnel and Automation, Staffing and Training, Normal Operations Management, Disturbance and Emergency Management, Maintenance and Change Management, Plant Design and Construction, and HFE Methods and Tools. The issues where then prioritized into four categories using a 'Phenomena Identification and Ranking Table' methodology based on evaluations provided by 14 independent subject matter experts. The subject matter experts were knowledgeable in a variety of disciplines. Vendors, utilities, research organizations and regulators all participated. Twenty issues were categorized into the top priority category. This Brookhaven National Laboratory (BNL) technical report provides the detailed methodology, issue analysis, and results. A summary of the results of this study can be found in NUREG/CR-6947. The research performed for this project has identified a large number of human-performance issues for new control stations and new nuclear power plant designs. The information gathered in this project can serve as input to the development of a long-term strategy and plan for addressing human performance in these areas through regulatory research. Addressing human-performance issues will provide the technical basis from which regulatory review guidance can be developed to meet these challenges. The availability of this review guidance will help set clear expectations for how the NRC staff will evaluate new designs, reduce regulatory uncertainty, and provide a well-defined path to new nuclear power plant licensing.

OHara,J.; Higgins, J.; Brown, W.; Fink, R.

2008-02-14T23:59:59.000Z

50

Analysis of Factors Affecting Motorcycle-Motor Vehicle Crash Characteristics.  

E-Print Network [OSTI]

??As everybody knows, there are many traffic crashes happening every day. Traffic crashes may result in injury, death, and property damage. A number of factors… (more)

Zhu, Di

2014-01-01T23:59:59.000Z

51

SciTech Connect: Industrial Power Factor Analysis Guidebook.  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

factor is a way of measuring the percentage of reactive power in an electrical system. Reactive power represents wasted energy--electricity that does no useful work because the...

52

An analysis of factors contributing to train-involved crashes  

E-Print Network [OSTI]

. Crashes involving trains and vehicles are a significant safety problem in Texas each year. This research attempts to identify and analyze contributing factors to train-involved accidents in Texas. Three years of accident data (1328 total accidents) were...

Cooner, Scott Allen

1995-01-01T23:59:59.000Z

53

Factors Analysis on Safety of Indoor Air Quality  

E-Print Network [OSTI]

. Handbook on Review and Detection of Indoor Environment [M]. Beijing: Mechanical Industry Press, 2003: 1-5.(In Chinese) [2] Pan Xiaochuan. Review on Indoor Air Pollution and Its Harmfulness to Health [J]. Chin. Prev. Med., 2002,3(3):167-169 (in... of Urban Construction, Nanhua University, Hengyang, P.R.China hunanluoqinghai@163.com Abstract: Influence factors on safety of indoor air quality (IAQ) were analyzed in this paper. Some regeneration compositions resulting from potential indoor...

Luo, Q.; Liu, Z.; Xiong, J.

2006-01-01T23:59:59.000Z

54

270 | VOL.9 NO.3 | MARCH2012 | nature methods Key requirements for methylation analysis of large sample sizes  

E-Print Network [OSTI]

). This method eliminates five steps from Illumina's library- construction protocol such that multiplexed and sequenced all at once in a single Illumina HiSeq flowcell. Additionally we designed barcodes to process 384 an analysis pipeline for read mapping and methylation quantification, called bisReadMapper (Supplementary Fig

Cai, Long

55

Proteome analysis of factor for inversion stimulation (Fis) overproduction in Escherichia coli  

E-Print Network [OSTI]

Proteome analysis of factor for inversion stimulation (Fis) overproduction in Escherichia coli The factor-for-inversion stimulation protein (Fis) is a global regulatory protein in Escherichia coliRNA promoter and enhances transcription 5- to 10-fold in vivo. Fis overexpression results in different effects

Chen, Wilfred

56

RESEARCH Open Access Analysis of primary risk factors for oral cancer  

E-Print Network [OSTI]

RESEARCH Open Access Analysis of primary risk factors for oral cancer from select US states , Michelle Chino3 , Karl Kingsley1* Abstract Objectives: To examine the primary risk factor for oral cancer in oral cancer incidence and mortality. Methods: Population-based data on oral cancer morbidity

Ahmad, Sajjad

57

Factor Analysis: Investigating Important Aspects for Agile Adoption in Malaysia Ani Liza Asnawi, Andrew M. Gravell and Gary B. Wills  

E-Print Network [OSTI]

on identifying the important aspects of Agile adoption from software practitioners in Malaysia. We analyse 27 for their organisations. Keywords-Agile methods; software process; factor analysis; loadings; factor extraction; factor rotation I. INTRODUCTION We analyse factor analysis from variables of Agile adoption responded by software

Gravell, Andrew M.

58

Molecular genetic analysis of activation-tagged transcription factors thought to be involved in photomorphogenesis  

SciTech Connect (OSTI)

This is a final report for Department of Energy Grant No. DE-FG02-08ER15927 entitled “Molecular Genetic Analysis of Activation-Tagged Transcription Factors Thought to be Involved in Photomorphogenesis”. Based on our preliminary photobiological and genetic analysis of the sob1-D mutant, we hypothesized that OBP3 is a transcription factor involved in both phytochrome and cryptochrome-mediated signal transduction. In addition, we hypothesized that OBP3 is involved in auxin signaling and root development. Based on our preliminary photobiological and genetic analysis of the sob2-D mutant, we also hypothesized that a related gene, LEP, is involved in hormone signaling and seedling development.

Neff, Michael M.

2011-06-23T23:59:59.000Z

59

Human Factors Engineering and Ergonomics Analysis for the Canister Storage Building (CSB) Results and Findings  

SciTech Connect (OSTI)

The purpose for this supplemental report is to follow-up and update the information in SNF-3907, Human Factors Engineering (HFE) Analysis: Results and Findings. This supplemental report responds to applicable U.S. Department of Energy Safety Analysis Report review team comments and questions. This Human Factors Engineering and Ergonomics (HFE/Erg) analysis was conducted from April 1999 to July 1999; SNF-3907 was based on analyses accomplished in October 1998. The HFE/Erg findings presented in this report and SNF-3907, along with the results of HNF-3553, Spent Nuclear Fuel Project, Final Safety Analysis Report, Annex A, ''Canister Storage Building Final Safety Analysis Report,'' Chapter A3.0, ''Hazards and Accidents Analyses,'' provide the technical basis for preparing or updating HNF-3553. Annex A, Chaptex A13.0, ''Human Factors Engineering.'' The findings presented in this report allow the HNF-3553 Chapter 13.0, ''Human Factors,'' to respond fully to the HFE requirements established in DOE Order 5480.23, Nuclear Safety Analysis Reports.

GARVIN, L.J.

1999-09-20T23:59:59.000Z

60

NREL: Energy Analysis - Key Activities  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratory | National Nuclearover twoPrintable Version Email ContactJEDI

Note: This page contains sample records for the topic "analysis key factors" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

SPATIAL FACTOR ANALYSIS OF STREAM SEDIMENT GEOCHEMISTRY DATA FROM SOUTH GREENLAND  

E-Print Network [OSTI]

SPATIAL FACTOR ANALYSIS OF STREAM SEDIMENT GEOCHEMISTRY DATA FROM SOUTH GREENLAND Allan A. Nielsen1 and Greenland, Thoravej 8, DK-2400 Křbenhavn NV, Denmark. ast@geus.dk SUMMARY This paper describes from South Greenland. Kriged MAF images are compared with kriged images based on varimax rotated

62

Use of Evolutionary Factor Analysis in the Spectroelectrochemistry of Escherichia coli Sulfite  

E-Print Network [OSTI]

, and their concentrations and spectra were determined by the use of the mass balance equation. The spectra of the one and a mass balance equation. Identification of the fifth species, which was probably the initial reduction that it was present in the same time region as the starting material. Factor analysis has been shown to be a powerful

Reid, Scott A.

63

Beta-Negative Binomial Process and Poisson Factor Analysis Mingyuan Zhou Lauren A. Hannah  

E-Print Network [OSTI]

Beta-Negative Binomial Process and Poisson Factor Analysis Mingyuan Zhou Lauren A. Hannah David B 27708, USA Abstract A beta-negative binomial (BNB) process is proposed, leading to a beta-gamma-Poisson process, which may be viewed as a "multi- scoop" generalization of the beta-Bernoulli process. The BNB

Carin, Lawrence

64

Parametric Analysis of the Factors Controlling the Costs of Sedimentary Geothermal Systems - Preliminary Results (Poster)  

SciTech Connect (OSTI)

Parametric analysis of the factors controlling the costs of sedimentary geothermal systems was carried out using a modified version of the Geothermal Electricity Technology Evaluation Model (GETEM). The sedimentary system modeled assumed production from and injection into a single sedimentary formation.

Augustine, C.

2013-10-01T23:59:59.000Z

65

Method for exploiting bias in factor analysis using constrained alternating least squares algorithms  

DOE Patents [OSTI]

Bias plays an important role in factor analysis and is often implicitly made use of, for example, to constrain solutions to factors that conform to physical reality. However, when components are collinear, a large range of solutions may exist that satisfy the basic constraints and fit the data equally well. In such cases, the introduction of mathematical bias through the application of constraints may select solutions that are less than optimal. The biased alternating least squares algorithm of the present invention can offset mathematical bias introduced by constraints in the standard alternating least squares analysis to achieve factor solutions that are most consistent with physical reality. In addition, these methods can be used to explicitly exploit bias to provide alternative views and provide additional insights into spectral data sets.

Keenan, Michael R. (Albuquerque, NM)

2008-12-30T23:59:59.000Z

66

Combined factor analysis of the WISC-III and CMS: does the resulting factor structure discriminate among children with and without clinical disorders?  

E-Print Network [OSTI]

of the four-factor structure of the WISC-III has been questioned, particularly in terms of its utility in the diagnosis of ADHD based on the Freedom from Distractibility Index (FFD). A combined confirmatory factor analysis was conducted on the WISC-III and CMS...

Siekierski, Becky Mayes

2006-10-30T23:59:59.000Z

67

Public Key Cryptography and Key Management  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The use and management of certificate-based public key cryptography for the Department of Energy (DOE) requires the establishment of a public key infrastructure (PKI). This chapter defines the policy related to roles, requirements, and responsibilities for establishing and maintaining a DOE PKI and the documentation necessary to ensure that all certificates are managed in a manner that maintains the overall trust required to support a viable PKI. Canceled by DOE N 251.112.

2000-02-15T23:59:59.000Z

68

Key Milestones/Outlook  

Broader source: Energy.gov [DOE]

Key Milestones/Outlook per the Department of Energy 2015 Congressional Budget Request, Environmental Management, March 2014

69

Fusion integral experiments and analysis and the determination of design safety factors - I: Methodology  

SciTech Connect (OSTI)

The role of the neutronics experimentation and analysis in fusion neutronics research and development programs is discussed. A new methodology was developed to arrive at estimates to design safety factors based on the experimental and analytical results from design-oriented integral experiments. In this methodology, and for a particular nuclear response, R, a normalized density function (NDF) is constructed from the prediction uncertainties, and their associated standard deviations, as found in the various integral experiments where that response, R, is measured. Important statistical parameters are derived from the NDF, such as the global mean prediction uncertainty, and the possible spread around it. The method of deriving safety factors from many possible NDFs based on various calculational and measuring methods (among other variants) is also described. Associated with each safety factor is a confidence level, designers may choose to have, that the calculated response, R, will not exceed (or will not fall below) the actual measured value. An illustrative example is given on how to construct the NDFs. The methodology is applied in two areas, namely the line-integrated tritium production rate and bulk shielding integral experiments. Conditions under which these factors could be derived and the validity of the method are discussed. 72 refs., 17 figs., 4 tabs.

Youssef, M.Z.; Kumar, A.; Abdou, M.A. [Univ. of California, Los Angeles, CA (United States); Oyama, Y.; Maekawa, H. [Japan Atomic Energy Research Inst., Ibaraki (Japan)

1995-09-01T23:59:59.000Z

70

Quantum dense key distribution  

SciTech Connect (OSTI)

This paper proposes a protocol for quantum dense key distribution. This protocol embeds the benefits of a quantum dense coding and a quantum key distribution and is able to generate shared secret keys four times more efficiently than the Bennet-Brassard 1984 protocol. We hereinafter prove the security of this scheme against individual eavesdropping attacks, and we present preliminary experimental results, showing its feasibility.

Degiovanni, I.P.; Ruo Berchera, I.; Castelletto, S.; Rastello, M.L.; Bovino, F.A.; Colla, A.M.; Castagnoli, G. [Istituto Elettrotecnico Nazionale G. Ferraris, Strada delle Cacce 91, 10135 Torino (Italy); ELSAG SpA, Via Puccini 2, 16154, Genova (Italy)

2004-03-01T23:59:59.000Z

71

Key Events Timeline  

Broader source: Energy.gov [DOE]

This document lists key events beginning with the April 20 fire on the Deepwater Horizon through July 28th. Updated July 28, 2010.

72

Global analysis of proton elastic form factor data with two-photon exchange corrections  

SciTech Connect (OSTI)

We use the world's data on elastic electron-proton scattering and calculations of two-photon exchange effects to extract corrected values of the proton's electric and magnetic form factors over the full Q^2 range of the existing data. Our analysis combines the corrected Rosenbluth cross section and polarization transfer data, and is the first extraction of G_Ep and G_Mp including explicit two-photon exchange corrections and their associated uncertainties. In addition, we examine the angular dependence of the corrected cross sections, and discuss the possible nonlinearities of the cross section as a function of epsilon.

J. Arrington; W. Melnitchouk; J. A. Tjon

2007-09-01T23:59:59.000Z

73

Economic Analysis of Hydrogen Energy Station Concepts: Are "H 2E-Stations" a Key Link to a Hydrogen Fuel Cell Vehicle Infrastructure?  

E-Print Network [OSTI]

in the analysis of hydrogen energy stations, additionalattractiveness of the hydrogen energy station scheme in bothECONOMIC ANALYSIS OF HYDROGEN ENERGY STATION CONCEPTS: ARE '

Lipman, Timothy E.; Edwards, Jennifer L.; Kammen, Daniel M.

2002-01-01T23:59:59.000Z

74

Human Factors Process Failure Mode and Effects Analysis (HF PFMEA) Application in the Evaluation of Management Risks  

E-Print Network [OSTI]

.3.1. Mechanisms of Prevention ............................................................................................... 11 2.4. Human Factors Process Failure Mode and Effects Analysis (HF PFMEA) ....................... 11 2.5. FMEA Components... ........................................................................................... 15 2.5.5. Risk Priority Number ....................................................................................................... 17 2.6. FMEA Model...

Soguilon, Nenita M.

2009-12-18T23:59:59.000Z

75

Optical key system  

DOE Patents [OSTI]

An optical key system comprises a battery-operated optical key and an isolated lock that derives both its operating power and unlock signals from the correct optical key. A light emitting diode or laser diode is included within the optical key and is connected to transmit a bit-serial password. The key user physically enters either the code-to-transmit directly, or an index to a pseudorandom number code, in the key. Such person identification numbers can be retained permanently, or ephemeral. When a send button is pressed, the key transmits a beam of light modulated with the password information. The modulated beam of light is received by a corresponding optical lock with a photovoltaic cell that produces enough power from the beam of light to operate a password-screen digital logic. In one application, an acceptable password allows a two watt power laser diode to pump ignition and timing information over a fiberoptic cable into a sealed engine compartment. The receipt of a good password allows the fuel pump, spark, and starter systems to each operate. Therefore, bypassing the lock mechanism as is now routine with automobile thieves is pointless because the engine is so thoroughly disabled.

Hagans, Karla G. (Livermore, CA); Clough, Robert E. (Danville, CA)

2000-01-01T23:59:59.000Z

76

How Many Performance Shaping Factors are Necessary for Human Reliability Analysis?  

SciTech Connect (OSTI)

It has been argued that human reliability analysis (HRA) has expended considerable energy on creating detailed representations of human performance through an increasingly long list of performance shaping factors (PSFs). It is not clear, however, to what extent this refinement and expansion of PSFs has enhanced the quality of HRA. Indeed, there is considerable range in the number of PSFs provided by individual HRA methods, ranging from single factor models such as time-reliability curves, up to 50 or more PSFs in some current HRA models. The US Nuclear Regulatory Commission advocates 15 PSFs in its HRA Good Practices (NUREG-1792), while its SPAR-H method (NUREG/CR-6883) espouses the use of eight PSFs and its ATHEANA method (NUREG-1624) features an open-ended number of PSFs. The apparent differences in the optimal number of PSFs can be explained in terms of the diverse functions of PSFs in HRA. The purpose of this paper is to explore the role of PSFs across different stages of HRA, including identification of potential human errors, modeling of these errors into an overall probabilistic risk assessment, quantifying errors, and preventing errors.

Ronald L. Boring

2010-06-01T23:59:59.000Z

77

VSEAMS: A pipeline for variant set enrichment analysis using summary GWAS data identifies IKZF3, BATF and ESRRA as key transcription factors in type 1 diabetes  

E-Print Network [OSTI]

in part by Eli Lilly and Company. The JDRF/Wellcome Trust Diabetes and Inflammation Laboratory receives funding from Hoffmann La Roche and Eli Lilly and Company. The funders had no influence on the analyses or con- clusions of the study. REFERENCES Barrett...

Burren, Oliver S.; Guo, Hui; Wallace, Chris

2014-08-27T23:59:59.000Z

78

Analysis of the Past and Future Trends of Energy Use in Key Medium- and Large-Sized Chinese Steel Enterprises, 2000-2030  

E-Print Network [OSTI]

Agency (IEA). 2010. The Energy Technology Systems AnalysisProgram (ETSAP)- Technology Brief: Iron and Steel. AvailableAvailable and Emerging Technologies for Reducing. Greenhouse

Hasanbeigi, Ali

2014-01-01T23:59:59.000Z

79

Cryptographic Key Management System  

SciTech Connect (OSTI)

This report summarizes the outcome of U.S. Department of Energy (DOE) contract DE-OE0000543, requesting the design of a Cryptographic Key Management System (CKMS) for the secure management of cryptographic keys for the energy sector infrastructure. Prime contractor Sypris Electronics, in collaboration with Oak Ridge National Laboratories (ORNL), Electric Power Research Institute (EPRI), Valicore Technologies, and Purdue University's Center for Education and Research in Information Assurance and Security (CERIAS) and Smart Meter Integration Laboratory (SMIL), has designed, developed and evaluated the CKMS solution. We provide an overview of the project in Section 3, review the core contributions of all contractors in Section 4, and discuss bene#12;ts to the DOE in Section 5. In Section 6 we describe the technical construction of the CKMS solution, and review its key contributions in Section 6.9. Section 7 describes the evaluation and demonstration of the CKMS solution in different environments. We summarize the key project objectives in Section 8, list publications resulting from the project in Section 9, and conclude with a discussion on commercialization in Section 10 and future work in Section 11.

No, author

2014-02-21T23:59:59.000Z

80

Leak-Path Factor Analysis for the Nuclear Materials Storage Facility  

SciTech Connect (OSTI)

Leak-path factors (LPFs) were calculated for the Nuclear Materials Storage Facility (NMSF) located in the Plutonium Facility, Building 41 at the Los Alamos National Laboratory Technical Area 55. In the unlikely event of an accidental fire powerful enough to fail a container holding actinides, the subsequent release of oxides, modeled as PuO{sub 2} aerosols, from the facility and into the surrounding environment was predicted. A 1-h nondestructive assay (NDA) laboratory fire accident was simulated with the MELCOR severe accident analysis code. Fire-driven air movement along with wind-driven air infiltration transported a portion of these actinides from the building. This fraction is referred to as the leak-path factor. The potential effect of smoke aerosol on the transport of the actinides was investigated to verify the validity of neglecting the smoke as conservative. The input model for the NMSF consisted of a system of control volumes, flow pathways, and surfaces sufficient to model the thermal-hydraulic conditions within the facility and the aerosol transport data necessary to simulate the transport of PuO{sub 2} particles. The thermal-hydraulic, heat-transfer, and aerosol-transport models are solved simultaneously with data being exchanged between models. A MELCOR input model was designed such that it would reproduce the salient features of the fire per the corresponding CFAST calculation. Air infiltration into and out of the facility would be affected strongly by wind-driven differential pressures across the building. Therefore, differential pressures were applied to each side of the building according to guidance found in the ASHRAE handbook using a standard-velocity head equation with a leading multiplier to account for the orientation of the wind with the building. The model for the transport of aerosols considered all applicable transport processes, but the deposition within the building clearly was dominated by gravitational settling.

Shaffer, C.; Leonard, M.

1999-06-13T23:59:59.000Z

Note: This page contains sample records for the topic "analysis key factors" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

NAPS 2003, 35th North American Power Symposium, University of Missouri-Rolla in Rolla, Missouri, October 20-21, 2003. pp. 559-566. Abstract--Security of supply has been always a key factor  

E-Print Network [OSTI]

as a terrorist attack to some key power plants or transmission lines. Since September 11, 2001 the threat three kinds of threats over society: a) Attacks upon the power system. Here the target is the electricNAPS 2003, 35th North American Power Symposium, University of Missouri-Rolla in Rolla, Missouri

Catholic University of Chile (Universidad Católica de Chile)

82

Model-Based Analysis of the Role of Biological, Hydrological and Geochemical Factors Affecting Uranium Bioremediation  

SciTech Connect (OSTI)

Uranium contamination is a serious concern at several sites motivating the development of novel treatment strategies such as the Geobacter-mediated reductive immobilization of uranium. However, this bioremediation strategy has not yet been optimized for the sustained uranium removal. While several reactive-transport models have been developed to represent Geobacter-mediated bioremediation of uranium, these models often lack the detailed quantitative description of the microbial process (e.g., biomass build-up in both groundwater and sediments, electron transport system, etc.) and the interaction between biogeochemical and hydrological process. In this study, a novel multi-scale model was developed by integrating our recent model on electron capacitance of Geobacter (Zhao et al., 2010) with a comprehensive simulator of coupled fluid flow, hydrologic transport, heat transfer, and biogeochemical reactions. This mechanistic reactive-transport model accurately reproduces the experimental data for the bioremediation of uranium with acetate amendment. We subsequently performed global sensitivity analysis with the reactive-transport model in order to identify the main sources of prediction uncertainty caused by synergistic effects of biological, geochemical, and hydrological processes. The proposed approach successfully captured significant contributing factors across time and space, thereby improving the structure and parameterization of the comprehensive reactive-transport model. The global sensitivity analysis also provides a potentially useful tool to evaluate uranium bioremediation strategy. The simulations suggest that under difficult environments (e.g., highly contaminated with U(VI) at a high migration rate of solutes), the efficiency of uranium removal can be improved by adding Geobacter species to the contaminated site (bioaugmentation) in conjunction with the addition of electron donor (biostimulation). The simulations also highlight the interactive effect of initial cell concentration and flow rate on U(VI) reduction.

Zhao, Jiao; Scheibe, Timothy D.; Mahadevan, Radhakrishnan

2011-01-24T23:59:59.000Z

83

ARM - Key Science Questions  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc Documentation RUC : XDCResearch Related Information Collaborations Meetings ofgovScienceKey

84

Key condenser failure mechanisms  

SciTech Connect (OSTI)

Eight practical lessons highlight many of the factors that can influence condenser tube corrosion at coal-fired utilities and the effects contaminant in-leakage can have on steam generating units. 1 ref., 4 figs.

Buecker, B.

2009-04-15T23:59:59.000Z

85

British Poultry Science (1999) 40: 599604 Analysis of risk factors for the occurrence of feather pecking in  

E-Print Network [OSTI]

British Poultry Science (1999) 40: 599­604 Analysis of risk factors for the occurrence of feather the feathers of conspecifics and is judged to be an abnormal behaviour in poultry. It may result in severe for poultry farmers and today it is regarded as one of the major problems in intensively kept laying hens

Richner, Heinz

86

analysis-based prognostic factors: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Sciences Websites Summary: major contributions: Butterfly Analysis and Chrysalis Analysis, as well as extensions to both enabling explicit tracking of uncertainty....

87

NETL: Key Staff  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recovery challengeMultiscaleLogos NERSCJeffreyKey Actions forEnergy Systems

88

Key recycling in authentication  

E-Print Network [OSTI]

In their seminal work on authentication, Wegman and Carter propose that to authenticate multiple messages, it is sufficient to reuse the same hash function as long as each tag is encrypted with a one-time pad. They argue that because the one-time pad is perfectly hiding, the hash function used remains completely unknown to the adversary. Since their proof is not composable, we revisit it using a composable security framework. It turns out that the above argument is insufficient: if the adversary learns whether a corrupted message was accepted or rejected, information about the hash function is leaked, and after a bounded finite amount of rounds it is completely known. We show however that this leak is very small: Wegman and Carter's protocol is still $\\epsilon$-secure, if $\\epsilon$-almost strongly universal$_2$ hash functions are used. This implies that the secret key corresponding to the choice of hash function can be reused in the next round of authentication without any additional error than this $\\epsilon$. We also show that if the players have a mild form of synchronization, namely that the receiver knows when a message should be received, the key can be recycled for any arbitrary task, not only new rounds of authentication.

Christopher Portmann

2014-09-29T23:59:59.000Z

89

Key-shift transmission  

SciTech Connect (OSTI)

A key-shift transmission is described, characterized by the speed-change shaft being divided into a pair of trough-shaped shaft halves each having an arched inner surface which defines a part of a cylindrical bore extending axially through the speed-change shaft thereby the shaft being formed into a hollow shaft, and by each of the shaft halves including a pair of flattened end surfaces which extend axially of each shaft half at both sides of the inner surface, one of the end surfaces having thereon an axially elongated projection and the other of the end surfaces having herein an axially elongated recess of a depth smaller than the height of the projection. The pair of shaft halves are engaged to each other co-rotatably by fitting the projections of the respective shaft halves into the recesses of the respective shaft halves so as to form in an outer surface of the speed-change shaft a pair of elongated axial grooves which are located radially outwardly of the elongated projections of the respective shaft halves and between the flattened end surfaces of the respective shaft halves. A pair of the shift keys are disposed within the pair of elongated axial grooves.

Nemoto, S.

1989-03-07T23:59:59.000Z

90

Worldwide Trends in Energy Use and Efficiency: Key Insights from...  

Open Energy Info (EERE)

Efficiency: Key Insights from International Energy Agency (IEA) Indicator Analysis in Support of the Group of Eight (G8) Plan of Action Jump to: navigation, search Tool Summary...

91

SciTech Connect: Use of indexed sensitivity factors in the analysis...  

Office of Scientific and Technical Information (OSTI)

and was influenced by the particular sheath material used in the thermocouple construction. Relative sensitivity factors, indexed by a matrix ion species ratio, were used to...

92

Factor structure analysis of the Comprehensive Effects of Alcohol - Spanish questionnaire among adolescents in Mexico  

E-Print Network [OSTI]

from a sample of adolescents from Mexico (N = 345). The results replicated the 7-factor structure of the CEOA. Moreover, CEOA factor-scale derived scores predicted alcohol use. Overall, the CEOA-Spanish appears to be a valid measure of alcohol...

Flato, Claudia Graciela

2007-09-17T23:59:59.000Z

93

Linear regression analysis of emissions factors when firing fossil fuels and biofuels in a commercial water-tube boiler  

SciTech Connect (OSTI)

This paper compares the emissions factors for a suite of liquid biofuels (three animal fats, waste restaurant grease, pressed soybean oil, and a biodiesel produced from soybean oil) and four fossil fuels (i.e., natural gas, No. 2 fuel oil, No. 6 fuel oil, and pulverized coal) in Penn State's commercial water-tube boiler to assess their viability as fuels for green heat applications. The data were broken into two subsets, i.e., fossil fuels and biofuels. The regression model for the liquid biofuels (as a subset) did not perform well for all of the gases. In addition, the coefficient in the models showed the EPA method underestimating CO and NOx emissions. No relation could be studied for SO{sub 2} for the liquid biofuels as they contain no sulfur; however, the model showed a good relationship between the two methods for SO{sub 2} in the fossil fuels. AP-42 emissions factors for the fossil fuels were also compared to the mass balance emissions factors and EPA CFR Title 40 emissions factors. Overall, the AP-42 emissions factors for the fossil fuels did not compare well with the mass balance emissions factors or the EPA CFR Title 40 emissions factors. Regression analysis of the AP-42, EPA, and mass balance emissions factors for the fossil fuels showed a significant relationship only for CO{sub 2} and SO{sub 2}. However, the regression models underestimate the SO{sub 2} emissions by 33%. These tests illustrate the importance in performing material balances around boilers to obtain the most accurate emissions levels, especially when dealing with biofuels. The EPA emissions factors were very good at predicting the mass balance emissions factors for the fossil fuels and to a lesser degree the biofuels. While the AP-42 emissions factors and EPA CFR Title 40 emissions factors are easier to perform, especially in large, full-scale systems, this study illustrated the shortcomings of estimation techniques. 23 refs., 3 figs., 8 tabs.

Sharon Falcone Miller; Bruce G. Miller [Pennsylvania State University, University Park, PA (United States). Energy Institute

2007-12-15T23:59:59.000Z

94

Dynamic Simulation and Analysis of Factors Impacting the Energy Consumption of Residential Buildings  

E-Print Network [OSTI]

Buildings have a close relationship with climate. There are a lot of important factors that influence building energy consumption such as building shape coefficient, insulation work of building envelope, covered area, and the area ratio of window...

Lian, Y.; Hao, Y.

2006-01-01T23:59:59.000Z

95

An analysis of factors that influence community college students' attitudes toward technology  

E-Print Network [OSTI]

This study investigated the factors that influence community college students' attitudes toward technology, particularly in teaching and learning experiences. Studies on post-secondary students' attitudes reported in the literature are limited...

Fleming, Kathleen Literski

2007-04-25T23:59:59.000Z

96

Analysis of variation at transcription factor binding sites in Drosophila and humans  

E-Print Network [OSTI]

Background: Advances in sequencing technology have boosted population genomics and made it possible to map the positions of transcription factor binding sites (TFBSs) with high precision. Here we investigate TFBS variability ...

Spivakov, Mikhail

97

A reactive contingency analysis algorithm using MW and MVAR distribution factors  

SciTech Connect (OSTI)

This paper describes an algorithm that can be used in analyzing reactive power flow contingencies. This approach uses MW distribution factors (DFAX) in conjunction with newly developed VAR distribution factors (RDFAX) to solve for the post-contingency bus voltage magnitude changes of an interconnecter EHV system. A prototype version of the algorithm described in this paper is presently being tested at the Pennsylvania-New Jersey-Maryland (PJM) interconnection office.

Taylor, D.G.; Maahs, L.J. (Pennsylvania-New Jersey-Maryland Interconnection, Norristown, PA (US))

1991-02-01T23:59:59.000Z

98

The five-factor model of personality and treatment utilization: an exploratory analysis of patients with personality disorders  

E-Print Network [OSTI]

THE FIVE-FACTOR MODEL OF PERSONALITY AND TREATMENT UTILIZATION: AN EXPLORATORY ANALYSIS OF PATIENTS WITH PERSONALITY DISORDERS A Thesis by BRIAN DAVID QUIGLEY Submitted to the Office of Graduate Studies of Texas ARM University in partial... by BRIAN DAVID QUIGLEY Submitted to Texas A&M University in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE Approved as to style and content by: Leslie C. orey (Chair of Committee) Douglas Sny er (Member) Cynthia Riccio...

Quigley, Brian David

2012-06-07T23:59:59.000Z

99

Data analysis and radionuclide scaling factor for the B-Cell waste stream  

SciTech Connect (OSTI)

This report documents a statistical data analysis of radiological data obtained to characterize the 324 Facility B-Cell decontamination and decommissioning waste stream.

HILL, R.L.

2000-04-25T23:59:59.000Z

100

Concerted bioinformatic analysis of genome-scale blood transcription factor compendium reveals new control mechanisms  

E-Print Network [OSTI]

1 to chromatin by core binding transcription factors. Mol Cell 2012, 45:330–343. 5. Trowbridge JJ, Sinha AU, Zhu N, Li M, Armstrong SA, Orkin SH: Haploinsufficiency of Dnmt1 impairs leukemia stem cell function through derepression of bivalent... of polycomb repressive complex 1 to chromatin by core binding transcription factors, Mol. Cell, 2012, 45, 330–343. 5 J. J. Trowbridge, A. U. Sinha, N. Zhu, M. Li, S. A. Armstrong and S. H. Orkin, Haploinsufficiency of Dnmt1 impairs leukemia stem cell function...

Joshi, Anagha; Gottgens, Berthold

2014-08-11T23:59:59.000Z

Note: This page contains sample records for the topic "analysis key factors" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Formal Analysis and Systematic Construction of Two-factor Authentication Scheme  

E-Print Network [OSTI]

, Duncan S. Wong1 , Huaxiong Wang2 , and Xiaotie Deng1 1 Department of Computer Science City University-factor authentication mechanisms is based on smart card and user's password. Throughout the years, there have been many-resistant hash functions. Keywords: Authentication, Password, Smart Card, Guessing Attack 1 Introduction Password

102

Analysis of Instabilities and Their Impact on Friction Factor in Hole-Pattern Seals  

E-Print Network [OSTI]

The determination of the leakage and consequently the friction factor is an important part of analyzing the flow through a seal. This is done experimentally by means of a flat plate tester, which allows for the simplified representation of the seal...

Sekaran, Aarthi 1985-

2012-11-21T23:59:59.000Z

103

Fuzzy Comprehensive Evaluation Model and Influence Factors Analysis on Comprehensive Performance of Green Buildings  

E-Print Network [OSTI]

management. In order to solve problems of subjectivity, uncertainty and impossibility of quantitative analysis when evaluating green building, this study establishes a multi-level fuzzy evaluation model by means of fuzzy mathematics method to analyze...

Sun, J.; Wu, Y.; Dai, Z.; Hao, Y.

2006-01-01T23:59:59.000Z

104

Institutional, Retrospective Analysis of 777 Patients With Brain Metastases: Treatment Outcomes and Diagnosis-Specific Prognostic Factors  

SciTech Connect (OSTI)

Purpose: To retrospectively evaluate the prognostic factors and survival of a series of 777 patients with brain metastases (BM) from a single institution. Methods and Materials: Patients were treated with surgery followed by whole-brain radiation therapy (WBRT) or with WBRT alone in 16.3% and 83.7% of the cases, respectively. The patients were RPA (recursive partitioning analysis) class I, II, and III in 11.2%, 69.6%, and 18.4% of the cases, respectively; RPA class II-a, II-b, and II-c in 8.3%, 24.8%, and 66.9% of the cases, respectively; and with GPA (graded prognostic assessment) scores of 0-1.0, 1.5-2.0, 2.5-3.0, and 3.5-4.0 in 35%, 27.5%, 18.2%, and 8.6% of the cases, respectively. Results: The median overall survival (OS) times according to RPA class I, II, and III were 20.1, 5.1, and 1.3 months, respectively (P<.0001); according to RPA class II-a, II-b, II-c: 9.1, 8.9, and 4.0 months, respectively (P<.0001); and according to GPA score 0-1.0, 1.5-2.0, 2.5-3.0, and 3.5-4.0: 2.5, 4.4, 9.0, and 19.1 months, respectively (P<.0001). By multivariate analysis, the favorable independent prognostic factors for survival were as follows: for gastrointestinal tumor, a high Karnofsky performance status (KPS) (P=.0003) and an absence of extracranial metastases (ECM) (P=.003); for kidney cancer, few BM (P=.002); for melanoma, few BM (P=.01), an absence of ECM (P=.002), and few ECM (P=.0002); for lung cancer, age (P=.007), a high KPS (P<.0001), an absence of ECM (P<.0001), few ECM and BM (P<.0001 and P=.0006, respectively), and control of the primary tumor (P=.004); and for breast cancer, age (P=.001), a high KPS (P=.007), control of the primary tumor (P=.05), and few ECM and BM (P=.01 and P=.0002, respectively). The triple-negative subtype was a significant unfavorable factor (P=.007). Conclusion: Prognostic factors varied by pathology. Our analysis confirms the strength of prognostic factors used to determine the GPA score, including the genetic subtype for breast cancer.

Antoni, Delphine, E-mail: Dantoni@strasbourg.unicancer.fr [Radiotherapy Department, Paul Strauss Cancer Center, Strasbourg (France)] [Radiotherapy Department, Paul Strauss Cancer Center, Strasbourg (France); Clavier, Jean-Baptiste; Pop, Marius; Schumacher, Catherine [Radiotherapy Department, Paul Strauss Cancer Center, Strasbourg (France)] [Radiotherapy Department, Paul Strauss Cancer Center, Strasbourg (France); Lefebvre, François [Biostatistics Department, Strasbourg University, Strasbourg (France)] [Biostatistics Department, Strasbourg University, Strasbourg (France); Noël, Georges [Radiotherapy Department, Paul Strauss Cancer Center, Strasbourg (France)] [Radiotherapy Department, Paul Strauss Cancer Center, Strasbourg (France)

2013-07-15T23:59:59.000Z

105

Using Factor Analysis to Generate Clusters of Agile (A Guide for Agile Process Improvement)  

E-Print Network [OSTI]

and what are the best ways to use these methods. Organizations apply agile software development differently or more of the development process. Software development teams in general and agile teams in particular analysis methods such as Gantt chart and detailed requirements specification. Keywards: agile software

Gravell, Andrew M.

106

Quantum key distribution with key extracted from basis information  

E-Print Network [OSTI]

In conventional quantum key distribution protocols, the secure key is normally extracted from the measurement outcomes of the system. Here, a different approach is proposed, where the secure key is extracted from the measurement bases, rather than outcomes. Compared to the original Bennett-Brassard-1984 protocol, the proposed protocol involves no hardware change but modifications in data postprocessing. We show that this protocol is more robust against detector efficiency attacks and photon-number-splitting attacks when practical detectors and photon sources are used.

Xiongfeng Ma

2014-10-20T23:59:59.000Z

107

Tomography increases key rates of quantum-key-distribution protocols  

E-Print Network [OSTI]

We construct a practically implementable classical processing for the BB84 protocol and the six-state protocol that fully utilizes the accurate channel estimation method, which is also known as the quantum tomography. Our proposed processing yields at least as high key rate as the standard processing by Shor and Preskill. We show two examples of quantum channels over which the key rate of our proposed processing is strictly higher than the standard processing. In the second example, the BB84 protocol with our proposed processing yields a positive key rate even though the so-called error rate is higher than the 25% limit.

Shun Watanabe; Ryutaroh Matsumoto; Tomohiko Uyematsu

2008-07-22T23:59:59.000Z

108

Fake state attack on practically decoy state quantum key distribution  

E-Print Network [OSTI]

In this paper, security of practically decoy state quantum key distribution under fake state attack is considered. If quantum key distribution is insecure under this type of attack, decoy sources can not also provide it with enough security. Strictly analysis shows that Eve should eavesdrop with the aid of photon-number-resolving instruments. In practical implementation of decoy state quantum key distribution where statistical fluctuation is considered, however, Eve can attack it successfully with threshold detectors.

Yong-gang Tan

2012-02-15T23:59:59.000Z

109

Multi-factor authentication  

DOE Patents [OSTI]

Detection and deterrence of spoofing of user authentication may be achieved by including a cryptographic fingerprint unit within a hardware device for authenticating a user of the hardware device. The cryptographic fingerprint unit includes an internal physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a PUF value. Combining logic is coupled to receive the PUF value, combines the PUF value with one or more other authentication factors to generate a multi-factor authentication value. A key generator is coupled to generate a private key and a public key based on the multi-factor authentication value while a decryptor is coupled to receive an authentication challenge posed to the hardware device and encrypted with the public key and coupled to output a response to the authentication challenge decrypted with the private key.

Hamlet, Jason R; Pierson, Lyndon G

2014-10-21T23:59:59.000Z

110

The LOFAR Transients Key Project  

E-Print Network [OSTI]

LOFAR, the Low Frequency Array, is a new radio telescope under construction in the Netherlands, designed to operate between 30 and 240 MHz. The Transients Key Project is one of the four Key Science Projects which comprise the core LOFAR science case. The remit of the Transients Key Project is to study variable and transient radio sources detected by LOFAR, on timescales from milliseconds to years. This will be achieved via both regular snapshot monitoring of historical and newly-discovered radio variables and, most radically, the development of a `Radio Sky Monitor' which will survey a large fraction of the northern sky on a daily basis.

Rob Fender; Robert Braun; Ben Stappers; Ralph Wijers; Michael Wise; Thijs Coenen; Heino Falcke; Jean-Mathias Griessmeier; Michiel van Haarlem; Peter Jonker; Casey Law; Sera Markoff; Joseph Masters; James Miller-Jones; Rachel Osten; Bart Scheers; Hanno Spreeuw; John Swinbank; Corina Vogt; Rudy Wijnands; Philippe Zarka

2006-11-09T23:59:59.000Z

111

Wigner distinguished lecturer Majumdar says scale-up factor key...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

speaks at ORNL's Wigner Distinguished Lecture Series. Arun Majumdar, vice president of energy at Google, speaks at ORNL's Wigner Distinguished Lecture Series. (hi-res image)...

112

Key Issues | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:YearRound-UpHeatMulti-Dimensionalthe10 DOEWashington, DC 20585on253.16582104)Key Issues Key Issues

113

Key Activities | Department of Energy  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGY TAX POLICIES7.pdfFuel2007 | Department7JanuaryWASTE-TO-ENERGY:About » KeyKey

114

Key Activities | Department of Energy  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGY TAX POLICIES7.pdfFuel2007 | Department7JanuaryWASTE-TO-ENERGY:About » KeyKeyAbout the

115

PTA of Infrapopliteal Arteries: Long-term Clinical Follow-up and Analysis of Factors Influencing Clinical Outcome  

SciTech Connect (OSTI)

This study was a retrospective analysis of patients with CLI who underwent infrapopliteal percutaneous transluminal angioplasty (PTA). The main goal was to evaluate clinical and morphological factors that influence the clinical outcome of PTA in long-term follow-up. A total of 1,445 PTA procedures were performed in 1,268 patients. Main indications for PTA included gangrene, nonhealing ulcers, or rest pain. The mean number of treated arteries was 1.77 artery/limb, and the majority of lesions were type TASC D. The technical success rate of PTA was 89% of intended-to-treat arteries. The main criterion of clinical success was functional limb salvage (LS). One-year follow-up involved 1,069 limbs. Primary and secondary 1-year LS rates were 76.1 and 84.4%, respectively. The effect of clinical and morphological parameters on the 1-year LS was that the only associated disease with an adverse effect on LS rate was DM combined with dialysis. Regarding limb preprocedural status, gangrene was clearly a negative predictor. The most important factor affecting LS was the number of patent arteries post-PTA: patients with 0, 1, 2, and 3 patent arteries had 1-year primary LS rates of 56.4, 73.1, 80.4, and 83%, respectively. Long-term follow-up of LS rates demonstrated secondary LS rates of 84.4, 78.8, and 73.3% at 1, 5, and 10 years. Every effort should be made to perform PTA for as many arteries as possible, even if TASC D type, to improve clinical outcome. Our study shows that repeat PTA is capable of keeping the long-term LS rate close to 75%.

Peregrin, Jan H., E-mail: jape@medicon.cz; Koznar, Boris; Kovac, Josef; Lastovickova, Jarmila; Novotny, Jiri; Vedlich, Daniel [Institute for Clinical and Experimental Medicine, Department of Diagnostic and Interventional Radiology (Czech Republic); Skibova, Jelena [Institute for Clinical and Experimental Medicine, Department of Statistics (Czech Republic)

2010-08-15T23:59:59.000Z

116

Monroe County Extension Services Key West Office  

E-Print Network [OSTI]

Energy Services: 305-295-1010 Florida Keys Electric Co-op: 305-852-2431 Monroe County Roads & Bridges-292-4501 http://monroe.ifas.ufl.edu Key Largo Office: 102050 Overseas Highway, Room 244 City and County Tree Lower Keys: 305-797-4929 Upper Keys: 305-852-7161 Contact local tree services throughout the Keys

Jawitz, James W.

117

Key-Insulated Symmetric Key Cryptography and Mitigating Attacks against Cryptographic Cloud Software  

E-Print Network [OSTI]

Key-Insulated Symmetric Key Cryptography and Mitigating Attacks against Cryptographic Cloud- sociated cryptographic keys in their entirety. In this paper, we investigate key-insulated symmetric key. To illustrate the feasibility of key-insulated symmetric key cryptography, we also report a proof

Dodis, Yevgeniy

118

An Analysis of the Effects of Sociodemographic Factors on Daily Per Capita Residential Water Use in Texas Cities  

E-Print Network [OSTI]

consideration of numerous factors including hydrologic and physiographic factors, engineering feasibility and economic feasibility. At the same time, it is increasingly evident that water needs are closely tied to population growth and to the social, economic...

Murdock, Steve H.; Albrecht, Don E.; Hamm, Rita R.; Bachman, Kenneth; Parpia, Banoo

119

Brain Receptor Structures Key to Future Therapeutics  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Brain Receptor Structures Key to Future Therapeutics Brain Receptor Structures Key to Future Therapeutics Print Wednesday, 28 January 2015 00:00 With an aging population in...

120

Worker reproduction and policing in insect societies: an ESS analysis  

E-Print Network [OSTI]

Worker reproduction and policing in insect societies: an ESS analysis T. WENSELEERS,* H. HELANTERA strategy (ESS) model to investigate factors that could explain these observed low levels of reproductive exploitation. Two key factors are identified: relatedness and policing. Relatedness affects the ESS proportion

Wenseleers, Tom

Note: This page contains sample records for the topic "analysis key factors" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Input from Key Stakeholders in the National Security Technology Incubator  

SciTech Connect (OSTI)

This report documents the input from key stakeholders of the National Security Technology Incubator (NSTI) in developing a new technology incubator and related programs for southern New Mexico. The technology incubator is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes identification of key stakeholders as well as a description and analysis of their input for the development of an incubator.

None

2008-01-31T23:59:59.000Z

122

Key Activities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGYWomen OwnedofDepartment ofJared Temanson - Project LeaderDepartment's DirectivesKey

123

Key Activities | Department of Energy  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGY TAX POLICIES7.pdfFuel2007 | Department7JanuaryWASTE-TO-ENERGY:About » Key

124

Public/private key certification authority and key distribution. Draft  

SciTech Connect (OSTI)

Traditional encryption, which protects messages from prying eyes, has been used for many decades. The present concepts of encryption are built from that heritage. Utilization of modern software-based encryption techniques implies much more than simply converting files to an unreadable form. Ubiquitous use of computers and advances in encryption technology coupled with the use of wide-area networking completely changed the reasons for utilizing encryption technology. The technology demands a new and extensive infrastructure to support these functions. Full understanding of these functions, their utility and value, and the need for an infrastructure, takes extensive exposure to the new paradigm. This paper addresses issues surrounding the establishment and operation of a key management system (i.e., certification authority) that is essential to the successful implementation and wide-spread use of encryption.

Long, J.P.; Christensen, M.J.; Sturtevant, A.P.; Johnston, W.E.

1995-09-25T23:59:59.000Z

125

Quantum key distribution with entangled photon sources  

E-Print Network [OSTI]

A parametric down-conversion (PDC) source can be used as either a triggered single photon source or an entangled photon source in quantum key distribution (QKD). The triggering PDC QKD has already been studied in the literature. On the other hand, a model and a post-processing protocol for the entanglement PDC QKD are still missing. In this paper, we fill in this important gap by proposing such a model and a post-processing protocol for the entanglement PDC QKD. Although the PDC model is proposed to study the entanglement-based QKD, we emphasize that our generic model may also be useful for other non-QKD experiments involving a PDC source. Since an entangled PDC source is a basis independent source, we apply Koashi-Preskill's security analysis to the entanglement PDC QKD. We also investigate the entanglement PDC QKD with two-way classical communications. We find that the recurrence scheme increases the key rate and Gottesman-Lo protocol helps tolerate higher channel losses. By simulating a recent 144km open-air PDC experiment, we compare three implementations -- entanglement PDC QKD, triggering PDC QKD and coherent state QKD. The simulation result suggests that the entanglement PDC QKD can tolerate higher channel losses than the coherent state QKD. The coherent state QKD with decoy states is able to achieve highest key rate in the low and medium-loss regions. By applying Gottesman-Lo two-way post-processing protocol, the entanglement PDC QKD can tolerate up to 70dB combined channel losses (35dB for each channel) provided that the PDC source is placed in between Alice and Bob. After considering statistical fluctuations, the PDC setup can tolerate up to 53dB channel losses.

Xiongfeng Ma; Chi-Hang Fred Fung; Hoi-Kwong Lo

2007-03-14T23:59:59.000Z

126

COLLEGE AVE CAMPUS (CAC) KEY PICK UP  

E-Print Network [OSTI]

COLLEGE AVE CAMPUS (CAC) KEY PICK UP NOTE TO ALL STUDENTS: ONLY YOU CAN PICK UP YOUR KEY. You in and key pick up. If you are unable to pick up your key by 5:00 p.m. on September 1st , please make prior in Clothier Hall on CAC. Keys not picked up during the above-noted hours can be picked up at the Housing

127

Quantum key distribution with entangled photon sources  

E-Print Network [OSTI]

A parametric down-conversion (PDC) source can be used as either a triggered single photon source or an entangled photon source in quantum key distribution (QKD). The triggering PDC QKD has already been studied in the literature. On the other hand, a model and a post-processing protocol for the entanglement PDC QKD are still missing. In this paper, we fill in this important gap by proposing such a model and a post-processing protocol for the entanglement PDC QKD. Although the PDC model is proposed to study the entanglement-based QKD, we emphasize that our generic model may also be useful for other non-QKD experiments involving a PDC source. Since an entangled PDC source is a basis independent source, we apply Koashi-Preskill's security analysis to the entanglement PDC QKD. We also investigate the entanglement PDC QKD with two-way classical communications. We find that the recurrence scheme increases the key rate and Gottesman-Lo protocol helps tolerate higher channel losses. By simulating a recent 144km open-a...

Ma, X; Lo, H K; Ma, Xiongfeng; Fung, Chi-Hang Fred; Lo, Hoi-Kwong

2007-01-01T23:59:59.000Z

128

Self-referenced continuous-variable quantum key distribution  

E-Print Network [OSTI]

We introduce a new continuous-variable quantum key distribution (CV-QKD) protocol, self-referenced CV-QKD, that eliminates the need for transmission of a high-power local oscillator between the communicating parties. In this protocol, each signal pulse is accompanied by a reference pulse (or a pair of twin reference pulses), used to align Alice's and Bob's measurement bases. We present a proof-of-principle, fiber-based experimental demonstration of the protocol and quantify the expected secret key rates by expressing them in terms of experimental parameters. Our analysis of the secret key rate fully takes into account the inherent uncertainty associated with the quantum nature of the reference pulse(s) and quantifies the limit at which the theoretical key rate approaches that of the respective conventional protocol that requires local oscillator transmission. The self-referenced protocol greatly simplifies the hardware required for CV-QKD, especially for potential integrated photonics implementations of trans...

Soh, Daniel B S; Coles, Patrick J; Lütkenhaus, Norbert; Camacho, Ryan M; Urayama, Junji; Sarovar, Mohan

2015-01-01T23:59:59.000Z

129

Answering Key Fuel Cycle Questions  

SciTech Connect (OSTI)

The Advanced Fuel Cycle Initiative (AFCI) program has both “outcome” and “process” goals because it must address both waste already accumulating as well as completing the fuel cycle in connection with advanced nuclear power plant concepts. The outcome objectives are waste geological repository capacity and cost, energy security and sustainability, proliferation resistance, fuel cycle economics, and safety. The process objectives are readiness to proceed and adaptability and robustness in the face of uncertainties. A classic decision-making approach to such a multi-attribute problem would be to weight individual quantified criteria and calculate an overall figure of merit. This is inappropriate for several reasons. First, the goals are not independent. Second, the importance of different goals varies among stakeholders. Third, the importance of different goals is likely to vary with time, especially the “energy future.” Fourth, some key considerations are not easily or meaningfully quantifiable at present. Instead, at this point, we have developed 16 questions the AFCI program should answer and suggest an approach of determining for each whether relevant options improve meeting each of the program goals. We find that it is not always clear which option is best for a specific question and specific goal; this helps identify key issues for future work. In general, we suggest attempting to create as many win-win decisions (options that are attractive or neutral to most goals) as possible. Thus, to help clarify why the program is exploring the options it is, and to set the stage for future narrowing of options, we have developed 16 questions, as follows: · What are the AFCI program goals? · Which potential waste disposition approaches do we plan for? · What are the major separations, transmutation, and fuel options? · How do we address proliferation resistance? · Which potential energy futures do we plan for? · What potential external triggers do we plan for? · Should we separate uranium? · If we separate uranium, should we recycle it, store it or dispose of it? · Is it practical to plan to fabricate and handle “hot” fuel? · Which transuranic elements (TRU) should be separated and transmuted? · Of those TRU separated, which should be transmuted together? · Should we separate and/or transmute Cs and Sr isotopes that dominate near-term repository heating? · Should we separate and/or transmute very long-lived Tc and I isotopes? · Which separation technology? · What mix of transmutation technologies? · What fuel technology best supports the above decisions?

Steven J. Piet; Brent W. Dixon; J. Stephen Herring; David E. Shropshire; Mary Lou Dunzik-Gougar

2003-10-01T23:59:59.000Z

130

2011 KEY ACCOMPLISHMENTS Fundamental & Computational  

E-Print Network [OSTI]

: Department of Energy Office of Biological and Environmental Research and other agencies PNNL scientists have and renewable energy, new technologies that capture and store carbon dioxide, and changes in agricultural sulfur dioxide (SO2 ) emissions started rising again in 2000. An analysis by researchers at the Joint

131

Lightweight Key Establishment for Distributed Networking Environments  

E-Print Network [OSTI]

/ COSIC Seminar 2007 Keith Martin #12;Lightweight Key Establishment/Introduction The plan 1. Wireless sensor networks 2. A key establishment framework 3. Key establishment for grids COSIC Seminar 2007 Keith Establishment/Wireless sensor networks The "classical" scenario COSIC Seminar 2007 Keith Martin #12;Lightweight

Martin, Keith

132

Meta-analysis of the Alpha/Beta Ratio for Prostate Cancer in the Presence of an Overall Time Factor: Bad News, Good News, or No News?  

SciTech Connect (OSTI)

Purpose: To present a novel method for meta-analysis of the fractionation sensitivity of tumors as applied to prostate cancer in the presence of an overall time factor. Methods and Materials: A systematic search for radiation dose-fractionation trials in prostate cancer was performed using PubMed and by manual search. Published trials comparing standard fractionated external beam radiation therapy with alternative fractionation were eligible. For each trial the {alpha}/{beta} ratio and its 95% confidence interval (CI) were extracted, and the data were synthesized with each study weighted by the inverse variance. An overall time factor was included in the analysis, and its influence on {alpha}/{beta} was investigated. Results: Five studies involving 1965 patients were included in the meta-analysis of {alpha}/{beta}. The synthesized {alpha}/{beta} assuming no effect of overall treatment time was -0.07 Gy (95% CI -0.73-0.59), which was increased to 0.47 Gy (95% CI -0.55-1.50) if a single highly weighted study was excluded. In a separate analysis, 2 studies based on 10,808 patients in total allowed extraction of a synthesized estimate of a time factor of 0.31 Gy/d (95% CI 0.20-0.42). The time factor increased the {alpha}/{beta} estimate to 0.58 Gy (95% CI -0.53-1.69)/1.93 Gy (95% CI -0.27-4.14) with/without the heavily weighted study. An analysis of the uncertainty of the {alpha}/{beta} estimate showed a loss of information when the hypofractionated arm was underdosed compared with the normo-fractionated arm. Conclusions: The current external beam fractionation studies are consistent with a very low {alpha}/{beta} ratio for prostate cancer, although the CIs include {alpha}/{beta} ratios up to 4.14 Gy in the presence of a time factor. Details of the dose fractionation in the 2 trial arms have critical influence on the information that can be extracted from a study. Studies with unfortunate designs will supply little or no information about {alpha}/{beta} regardless of the number of subjects enrolled.

Vogelius, Ivan R., E-mail: vogelius@gmail.com [Department of Radiation Oncology, Rigshospitalet, University of Copenhagen (Denmark); Bentzen, Soren M. [Department of Human Oncology, University of Wisconsin School of Medicine and Public Health, Madison, Wisconsin (United States)] [Department of Human Oncology, University of Wisconsin School of Medicine and Public Health, Madison, Wisconsin (United States)

2013-01-01T23:59:59.000Z

133

Human factors engineering report for the cold vacuum drying facility  

SciTech Connect (OSTI)

The purpose of this report is to present the results and findings of the final Human Factors Engineering (HFE) technical analysis and evaluation of the Cold Vacuum Drying Facility (CVDF). Ergonomics issues are also addressed in this report, as appropriate. This report follows up and completes the preliminary work accomplished and reported by the Preliminary HFE Analysis report (SNF-2825, Spent Nuclear Fuel Project Cold Vacuum Drying Facility Human Factors Engineering Analysis: Results and Findings). This analysis avoids redundancy of effort except for ensuring that previously recommended HFE design changes have not affected other parts of the system. Changes in one part of the system may affect other parts of the system where those changes were not applied. The final HFE analysis and evaluation of the CVDF human-machine interactions (HMI) was expanded to include: the physical work environment, human-computer interface (HCI) including workstation and software, operator tasks, tools, maintainability, communications, staffing, training, and the overall ability of humans to accomplish their responsibilities, as appropriate. Key focal areas for this report are the process bay operations, process water conditioning (PWC) skid, tank room, and Central Control Room operations. These key areas contain the system safety-class components and are the foundation for the human factors design basis of the CVDF.

IMKER, F.W.

1999-06-30T23:59:59.000Z

134

Electronics - Key to Energy Control  

E-Print Network [OSTI]

electricity could possibly have been elimi nated in the past years by the use of coal, nuclear power, and hydropower. To accomplish this would have been a very expensive and complicated task, even requiring Federal Legislation; never-the-less I submit... in the world, and the type manufacturing process4s are fundamental to the analysis. One must then qon sider the heating, ventilation, and air-conditio~? ing (HVAC) systems, the possibilities of heat ret covery, heat pumps, evaporative cooling systems, I...

Nelson, K. P.

1981-01-01T23:59:59.000Z

135

Analysis and calibration of social factors in a consumer acceptance and adoption model for diffusion of diesel vehicle in Europe  

E-Print Network [OSTI]

While large scale diffusion of alternative fuel vehicles (AFVs) is widely anticipated, the mechanisms that determine their success or failure are ill understood. Analysis of an AFV transition model developed at MIT has ...

Zhang, Qi, S.M. Massachusetts Institute of Technology

2008-01-01T23:59:59.000Z

136

Security Proof of a Semi-Quantum Key Distribution Protocol  

E-Print Network [OSTI]

Semi-quantum key distribution protocols are designed to allow two users to establish a secure secret key when one of the two users is limited to performing certain "classical" operations. There have been several such protocols developed recently, however, due to their reliance on a two-way quantum communication channel (and thus, the attacker's opportunity to interact with the qubit twice), their security analysis is difficult and little is known concerning how secure they are compared to their fully quantum counterparts. In this paper we prove the unconditional security of a particular semi-quantum protocol. We derive an expression for the key rate of this protocol, in the asymptotic scenario, as a function of the quantum channel's noise. Finally, we will show that this semi-quantum protocol can tolerate a maximal noise level comparable to certain fully quantum protocols.

Walter O. Krawec

2014-11-30T23:59:59.000Z

137

Brain Receptor Structures Key to Future Therapeutics  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Brain Receptor Structures Key to Future Therapeutics Print With an aging population in America, it is more important than ever to discover ways to treat or prevent diseases...

138

A preliminary analysis of comparable cooling-thermal loading-reservoir ownership as a factor in annual recreation attendance  

E-Print Network [OSTI]

the reservoir sought alternatives to private or personal investment and opted for a grant or long term lease of their holdings to the Texas Parks and Wildlife system. In the case of Fairfield reservoir, the 25 Texas Utility Generating Company granted 1200... tion of primary data vev'aIeu lnformat'on concer ning the following factors: (1) access (2) contig- uous surrounding lands (3) grazing leases (4) lake frrnt leases (5) water quality (6) recreation facilities (7) recreation opportunities and (8) law...

Darga, Thomas Jerome

1978-01-01T23:59:59.000Z

139

Monroe County Extension Services Key West Office  

E-Print Network [OSTI]

-292-4501 http://monroe.ifas.ufl.edu Key Largo Office: 102050 Overseas Highway, Room 244 City and County Tree Energy Services: 305-295-1010 Florida Keys Electric Co-op: 305-852-2431 Monroe County Roads & Bridges conditions based on USDA zone, water and light requirements, soil conditions, salt and wind tolerance

Florida, University of

140

Hydrogen Fuel Cell Performance in the Key Early Markets of Material Handling Equipment and Backup Power (Presentation)  

SciTech Connect (OSTI)

This presentation summarizes the results of NREL's analysis of hydrogen fuel cell performance in the key early markets of material handling equipment (MHE) and backup power.

Kurtz, J.; Sprik, S.; Ramsden, T.; Saur, G.; Ainscough, C.; Post, M.; Peters, M.

2013-10-01T23:59:59.000Z

Note: This page contains sample records for the topic "analysis key factors" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Captured key electrical safety lockout system  

DOE Patents [OSTI]

A safety lockout apparatus for an electrical circuit includes an electrical switch, a key, a lock and a blocking mechanism. The electrical switch is movable between an ON position at which the electrical circuit is energized and an OFF position at which the electrical circuit is deactivated. The lock is adapted to receive the key and is rotatable among a plurality of positions by the key. The key is only insertable and removable when the lock is at a preselected position. The lock is maintained in the preselected position when the key is removed from the lock. The blocking mechanism physically maintains the switch in its OFF position when the key is removed from the lock. The blocking mechanism preferably includes a member driven by the lock between a first position at which the electrical switch is movable between its ON and OFF positions and a second position at which the member physically maintains the electrical switch in its OFF position. Advantageously, the driven member`s second position corresponds to the preselected position at which the key can be removed from and inserted into the lock. 7 figs.

Darimont, D.E.

1995-10-31T23:59:59.000Z

142

Captured key electrical safety lockout system  

SciTech Connect (OSTI)

A safety lockout apparatus for an electrical circuit includes an electrical switch, a key, a lock and a blocking mechanism. The electrical switch is movable between an ON position at which the electrical circuit is energized and an OFF position at which the electrical circuit is deactivated. The lock is adapted to receive the key and is rotatable among a plurality of positions by the key. The key is only insertable and removable when the lock is at a preselected position. The lock is maintained in the preselected position when the key is removed from the lock. The blocking mechanism physically maintains the switch in its OFF position when the key is removed from the lock. The blocking mechanism preferably includes a member driven by the lock between a first position at which the electrical switch is movable between its ON and OFF positions and a second position at which the member physically maintains the electrical switch in its OFF position. Advantageously, the driven member's second position corresponds to the preselected position at which the key can be removed from and inserted into the lock.

Darimont, Daniel E. (Aurora, IL)

1995-01-01T23:59:59.000Z

143

Experimental study of high speed polarization-coding quantum key distribution with sifted-key  

E-Print Network [OSTI]

and links 1. C. H. Bennet and G. Brassard, "Quantum cryptography: Public key distribution and coin tossing

144

Key Implications of the Global Economic Environment  

E-Print Network [OSTI]

Key Implications of the Global Economic Environment For PCT Filings: A Survey of the Issues DMI...............................................................................9 Annex 1: Incentives for Patent Filing: The Analytical Framework...........................11 I-1 Intellectual property, innovation, and economic growth.................................13 2-2 Individual

Lansky, Joshua

145

Extracting secret keys from integrated circuits  

E-Print Network [OSTI]

Modern cryptographic protocols are based on the premise that only authorized participants can obtain secret keys and access to information systems. However, various kinds of tampering methods have been devised to extract ...

Lim, Daihyun, 1976-

2004-01-01T23:59:59.000Z

146

Research Summary Key Ingredients of Collaborative Management  

E-Print Network [OSTI]

, wildlife management and water catchments. This project, developed in discussion with stakeholders, soughtResearch Summary Key Ingredients of Collaborative Management It is widely accepted that collaboration amongst stakeholders can lead to more sustainable land-management. Voluntary collaboration

147

Final analysis of proton form factor ratio data at Q2 = 4.0, 4.8, and 5.6 GeV2  

DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

Recently published measurements of the proton electromagnetic form factor ratio R = ?p GEp/GMp at momentum transfers Q2 up to 8.5 GeV2 in Jefferson Lab Hall C deviate from the linear trend of previous measurements in Jefferson Lab Hall A, favoring a slower rate of decrease of R with Q2. While statistically compatible in the region of overlap with Hall A, the Hall C data hint at a systematic difference between the two experiments. This possibility was investigated in a reanalysis of the Hall A data. We find that the original analysis underestimated the background in the selection of elastic events. The application of an additional cut to further suppress the background increases the results for R, improving the consistency between Halls A and C.

Puckett, Andrew J. [JLAB

2012-04-01T23:59:59.000Z

148

MEASUREMENT OF IMPEDANCE CHARACTERISTICS OF COMPUTER KEYBOARD KEYS1  

E-Print Network [OSTI]

of computer keyboard keys are commonly used: rubber-dome and coil-spring keys. As indicated by their names, a rubber-dome key has a rubber dome under the keycap whereas a coil-spring key has a coil spring under of keys. From a user's perspective, the rubber-dome and coil-spring keys feel different. The properties

Nagurka, Mark L.

149

Impact analysis of MBTA 2009 Key Bus Route Initiative program  

E-Print Network [OSTI]

The Massachusetts Bay Transit Agency (MBTA) has the stated service objectives of customer service excellence, accessibility, reliability, and state-of-the-art technology. Over the last few years, the MBTA has been concerned ...

Krysinski, Yann

2010-01-01T23:59:59.000Z

150

GREET Bioenergy Life Cycle Analysis and Key Issues for Woody...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Systems, Argonne National Laboratory wangbiomass2014.pdf More Documents & Publications Resource Assessment and Land Use Change Bioenergy Technologies Office Multi-Year Program...

151

Advanced Analysis Software Key to New, Energy-Efficient Technologies -  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth (AOD)ProductssondeadjustsondeadjustAbout the Building TechnologiesS1!4T opAddress:Adolphus L.Program Office

152

Mediated Semi-Quantum Key Distribution  

E-Print Network [OSTI]

In this paper, we design a new quantum key distribution protocol, allowing two limited semi-quantum or "classical" users to establish a shared secret key with the help of a fully quantum server. A semi-quantum user can only prepare and measure qubits in the computational basis and so must rely on this quantum server to produce qubits in alternative bases and also to perform alternative measurements. However, we assume that the sever is untrusted and we prove the unconditional security of our protocol even in the worst case: when this quantum server is an all-powerful adversary. We also compute a lower bound of the key rate of our protocol, in the asymptotic scenario, as a function of the observed error rate in the channel allowing us to compute the maximally tolerated error of our protocol. Our results show that a semi-quantum protocol may hold similar security to a fully quantum one.

Walter O. Krawec

2014-11-21T23:59:59.000Z

153

Public key infrastructure for DOE security research  

SciTech Connect (OSTI)

This document summarizes the Department of Energy`s Second Joint Energy Research/Defence Programs Security Research Workshop. The workshop, built on the results of the first Joint Workshop which reviewed security requirements represented in a range of mission-critical ER and DP applications, discussed commonalties and differences in ER/DP requirements and approaches, and identified an integrated common set of security research priorities. One significant conclusion of the first workshop was that progress in a broad spectrum of DOE-relevant security problems and applications could best be addressed through public-key cryptography based systems, and therefore depended upon the existence of a robust, broadly deployed public-key infrastructure. Hence, public-key infrastructure ({open_quotes}PKI{close_quotes}) was adopted as a primary focus for the second workshop. The Second Joint Workshop covered a range of DOE security research and deployment efforts, as well as summaries of the state of the art in various areas relating to public-key technologies. Key findings were that a broad range of DOE applications can benefit from security architectures and technologies built on a robust, flexible, widely deployed public-key infrastructure; that there exists a collection of specific requirements for missing or undeveloped PKI functionality, together with a preliminary assessment of how these requirements can be met; that, while commercial developments can be expected to provide many relevant security technologies, there are important capabilities that commercial developments will not address, due to the unique scale, performance, diversity, distributed nature, and sensitivity of DOE applications; that DOE should encourage and support research activities intended to increase understanding of security technology requirements, and to develop critical components not forthcoming from other sources in a timely manner.

Aiken, R.; Foster, I.; Johnston, W.E. [and others

1997-06-01T23:59:59.000Z

154

On the Security of Public Key Protocols  

E-Print Network [OSTI]

Recently the use of public key encryption to provide secure network communication has received considerable attention. Such public key systems are usually effective against passive eavesdroppers, who merely tap the lines and try to decipher the message. It has been pointed out, however, that an improperly designed protocol could be vulnerable to an active saboteur, one who may impersonate another user or alter the message being transmitted. Several models are formulated in which the security of protocols can be discussed precisely. Algorithms and characteri-zations that can be used to determine protocol security in these models are given.

Danny Dolev; et al.

1983-01-01T23:59:59.000Z

155

The key to minimizing minesite versus utility laboratory analyses on Powder River Basin coals  

SciTech Connect (OSTI)

Powder River Basin (PRB) coals are continuing to expand their areas of use into regions previously reserved for higher ranked coals. PRB coals are subbituminous by rank. Inherent moisture values of 25 to 30 percent are the norm. PRB coals, being lower rank in nature, also tend to oxidize very easily. These factors combined produce a coal which can cause analysis problems for laboratories unaccustomed to PRB coals. In fact, even laboratories that deal with this type of coal on a daily basis can experience analytical difficulties. Special care needs to be taken by both minesite laboratory and the utility laboratory to ensure accurate analyses. Cooperation between both parties is the key to reproducible analyses. Only by working together can parties fully analyze the situation and develop analytical methods acceptable to both. This paper will describe the methods employed by the Caballo Rojo Mine (CRM) and the Georgia Power Company (GPC) to resolve laboratory analysis differences found during shipments by CRM to GPC beginning in 1994. The following topics are discussed: initial comparative results, analytical investigations, the cooperative process, recent comparative results, and conclusions.

Rexin, M.G.

1995-08-01T23:59:59.000Z

156

Key facts about Argonne National Laboratory  

E-Print Network [OSTI]

Key facts about Argonne National Laboratory Argonne National Laboratory occupies 1,500 wooded acres in southeast DuPage County near Chicago. Mission Argonne's mission is to apply a unique blend of world needs of our nation. Argonne conducts R&D in many areas of basic and applied science and engineering

Kemner, Ken

157

CHEMICAL ABBREVIATION KEY ABBREVIATION CHEMICAL NAME HAZARDS  

E-Print Network [OSTI]

Corrosive - base LiCl Lithium chloride Harmful MeOH Methanol Flammable #12;CHEMICAL ABBREVIATION KEY Irritant destain Methanol,acetic acid,H2O Flammable, Corrosive - acid DI H2O Deionized water DCM FeCl3 Iron(III) chloride Corrosive - acid FeSO4 Iron(II) sulfate Toxic H2O Water HCl Hydrochloric

Pawlowski, Wojtek

158

Roadmap for selected key measurements of LHCb  

E-Print Network [OSTI]

Six of the key physics measurements that will be made by the LHCb experiment, concerning CP asymmetries and rare B decays, are discussed in detail. The "road map" towards the precision measurements is presented, including the use of control channels and other techniques to understand the performance of the detector with the first data from the LHC.

The LHCb Collaboration; B. Adeva; M. Adinolfi; A. Affolder; Z. Ajaltouni; J. Albrecht; F. Alessio; M. Alexander; P. Alvarez Cartelle; A. A. Alves Jr; S. Amato; Y. Amhis; J. Amoraal; J. Anderson; O. Aquines Gutierrez; L. Arrabito; M. Artuso; E. Aslanides; G. Auriemma; S. Bachmann; Y. Bagaturia; D. S. Bailey; V. Balagura; W. Baldini; MdC. Barandela Pazos; R. J. Barlow; S. Barsuk; A. Bates; C. Bauer; Th. Bauer; A. Bay; I. Bediaga; K. Belous; I. Belyaev; M. Benayoun; G. Bencivenni; R. Bernet; M. -O. Bettler; A. Bizzeti; T. Blake; F. Blanc; C. Blanks; J. Blouw; S. Blusk; A. Bobrov; V. Bocci; A. Bondar; N. Bondar; W. Bonivento; S. Borghi; A. Borgia; E. Bos; T. J. V. Bowcock; C. Bozzi; J. Bressieux; S. Brisbane; M. Britsch; N. H. Brook; H. Brown; A. Büchler-Germann; J. Buytaert; J. -P. Cachemiche; S. Cadeddu; J. M. Caicedo Carvajal; O. Callot; M. Calvi; M. Calvo Gomez; A. Camboni; W. Cameron; P. Campana; A. Carbone; G. Carboni; A. Cardini; L. Carson; K. Carvalho Akiba; G. Casse; M. Cattaneo; M. Charles; Ph. Charpentier; A. Chlopik; P. Ciambrone; X. Cid Vidal; P. J. Clark; P. E. L. Clarke; M. Clemencic; H. V. Cliff; J. Closier; C. Coca; V. Coco; J. Cogan; P. Collins; F. Constantin; G. Conti; A. Contu; G. Corti; G. A. Cowan; B. D'Almagne; C. D'Ambrosio; D. G. d'Enterria; W. Da Silva; P. David; I. De Bonis; S. De Capua; M. De Cian; F. De Lorenzi; J. M. De Miranda; L. De Paula; P. De Simone; H. De Vries; D. Decamp; H. Degaudenzi; M. Deissenroth; L. Del Buono; C. Deplano; O. Deschamps; F. Dettori; J. Dickens; H. Dijkstra; M. Dima; S. Donleavy; A. C. dos Reis; A. Dovbnya; T. Du Pree; P. -Y. Duval; L. Dwyer; R. Dzhelyadin; C. Eames; S. Easo; U. Egede; V. Egorychev; F. Eisele; S. Eisenhardt; L. Eklund; D. Esperante Pereira; L. Estčve; S. Eydelman; E. Fanchini; C. Färber; G. Fardell; C. Farinelli; S. Farry; V. Fave; V. Fernandez Albor; M. Ferro-Luzzi; S. Filippov; C. Fitzpatrick; F. Fontanelli; R. Forty; M. Frank; C. Frei; M. Frosini; J. L. Fungueirino Pazos; S. Furcas; A. Gallas Torreira; D. Galli; M. Gandelman; Y. Gao; J-C. Garnier; L. Garrido; C. Gaspar; N. Gauvin; M. Gersabeck; T. Gershon; Ph. Ghez; V. Gibson; Yu. Gilitsky; V. V. Gligorov; C. Göbel; D. Golubkov; A. Golutvin; A. Gomes; M. Grabalosa Gándara; R. Graciani Diaz; L. A. Granado Cardoso; E. Graugés; G. Graziani; A. Grecu; G. Guerrer; E. Gushchin; Yu. Guz; Z. Guzik; T. Gys; F. Hachon; G. Haefeli; S. C. Haines; T. Hampson; S. Hansmann-Menzemer; R. Harji; N. Harnew; P. F. Harrison; J. He; K. Hennessy; P. Henrard; J. A. Hernando Morata; A. Hicheur; E. Hicks; W. Hofmann; K. Holubyev; P. Hopchev; W. Hulsbergen; P. Hunt; T. Huse; R. S. Huston; D. Hutchcroft; V. Iakovenko; C. Iglesias Escudero; J. Imong; R. Jacobsson; M. Jahjah Hussein; E. Jans; F. Jansen; P. Jaton; B. Jean-Marie; M. John; C. R. Jones; B. Jost; F. Kapusta; T. M. Karbach; J. Keaveney; U. Kerzel; T. Ketel; A. Keune; S. Khalil; B. Khanji; Y. M. Kim; M. Knecht; J. Knopf; S. Koblitz; A. Konoplyannikov; P. Koppenburg; I. Korolko; A. Kozlinskiy; M. Krasowski; L. Kravchuk; P. Krokovny; K. Kruzelecki; M. Kucharczyk; I. Kudryashov; T. Kvaratskheliya; D. Lacarrere; A. Lai; R. W. Lambert; G. Lanfranchi; C. Langenbruch; T. Latham; R. Le Gac; R. Lefevre; A. Leflat; J. Lefrançois; O. Leroy; K. Lessnoff; L. Li; Y. Y. Li; J. Libby; M. Lieng; R. Lindner; S. Lindsey; C. Linn; B. Liu; G. Liu; J. H. Lopes; E. Lopez Asamar; J. Luisier; F. Machefert; I. Machikhiliyan; F. Maciuc; O. Maev; J. Magnin; A. Maier; R. M. D. Mamunur; G. Manca; G. Mancinelli; N. Mangiafave; U. Marconi; F. Marin; J. Marks; G. Martellotti; A. Martens; L. Martin; D. Martinez Santos; Z. Mathe; C. Matteuzzi; V. Matveev; A. Mazurov; G. McGregor; B. Mcharek; C. Mclean; R. McNulty; M. Merk; J. Merkel; M. Merkin; R. Messi; F. C. D. Metlica; J. Michalowski; S. Miglioranzi; M. -N. Minard; S. Monteil; D. Moran; J. V. Morris; R. Mountain; I. Mous; F. Muheim; R. Muresan; F. Murtas; B. Muryn; M. Musy; J. Mylroie-Smith; P. Naik; T. Nakada; R. Nandakumar; J. Nardulli; Z. Natkaniec; M. Nedos; M. Needham; N. Neufeld; L. Nicolas; S. Nies; V. Niess; N. Nikitin; A. Noor; A. Oblakowska-Mucha; V. Obraztsov; S. Oggero; O. Okhrimenko; R. Oldeman; M. Orlandea; A. Ostankov; J. Palacios; M. Palutan; J. Panman; A. Papadelis; A. Papanestis; M. Pappagallo; C. Parkes; G. Passaleva; G. D. Patel; M. Patel; S. K. Paterson; G. N. Patrick; E. Pauna; C. Pauna; C. Pavel; A. Pazos Alvarez; A. Pellegrino; G. Penso; M. Pepe Altarelli; S. Perazzini; D. L. Perego; A. Pérez-Calero Yzquierdo; E. Perez Trigo; P. Perret; G. Pessina; A. Petrella; A. Petrolini; B. Pietrzyk; D. Pinci; S. Playfer; M. Plo Casasus; G. Polok; A. Poluektov; E. Polycarpo; D. Popov; B. Popovici; S. Poss; C. Potterat; A. Powell; S. Pozzi; V. Pugatch; A. Puig Navarro; W. Qian; J. H. Rademacker; B. Rakotomiaramanana; I. Raniuk; G. Raven; S. Redford; W. Reece

2010-11-23T23:59:59.000Z

159

www.defra.gov.uk Environmental Key  

E-Print Network [OSTI]

that good environmental performance makes good business sense. Environmental risks and uncertainties impact. These Guidelines seek to help companies report their environmental impacts in a meaningful and cost-effective waywww.defra.gov.uk Environmental Key Performance Indicators Reporting Guidelines for UK Business #12

160

2 Key Achievements 7 Greenhouse Gas Reduction  

E-Print Network [OSTI]

Princeton University Reports Contents 2 Key Achievements 7 Greenhouse Gas Reduction Campus Energy was established in 2008, the University has invested $5.3 million in energy-savings projects, resulting in annual of a 5.2-megawatt solar collector field. · Audit the remaining 20 of the top 50 energy- consuming

Note: This page contains sample records for the topic "analysis key factors" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Rangeland ecology: Key global research issues & questions  

E-Print Network [OSTI]

1 Rangeland ecology: Key global research issues & questions Robin Reid and Maria Fernandez-Gimenez This paper discusses developments in our understanding about rangeland ecology and rangeland dynamics in the last 20 years. Before the late 1980's, the mainstream view in range ecology was that livestock

162

Rangeland ecology: Key global research issues & questions  

E-Print Network [OSTI]

1 Rangeland ecology: Key global research issues & questions Robin Reid1 and Maria Fernandez Ecology Lab 2Associate Professor Colorado State University, Fort Collins, Colorado, USA Global Issues and Questions in Rangeland Ecology · Despite the focus here on global issues, we need to recognize that Mongolia

163

Key Management Challenges in Smart Grid  

SciTech Connect (OSTI)

Agenda Awarded in February 2011 Team of industry and research organizations Project Objectives Address difficult issues Complexity Diversity of systems Scale Longevity of solution Participate in standards efforts and working groups Develop innovative key management solutions Modeling and simulation ORNL Cyber Security Econometric Enterprise System Demonstrate effectiveness of solution Demonstrate scalability

Sheldon, Frederick T [ORNL] [ORNL; Duren, Mike [Sypris Electronics, LLC] [Sypris Electronics, LLC

2012-01-01T23:59:59.000Z

164

Chemical and Petroleum Engineering Key and Lab Space Agreement  

E-Print Network [OSTI]

Chemical and Petroleum Engineering Key and Lab Space Agreement Key Holder Information Last Name and Petroleum Engineering remain the property of the Department. I agree to pay a deposit for the keys

Calgary, University of

165

Key Physical Mechanisms in Nanostructured Solar Cells  

SciTech Connect (OSTI)

The objective of the project was to study both theoretically and experimentally the excitation, recombination and transport properties required for nanostructured solar cells to deliver energy conversion efficiencies well in excess of conventional limits. These objectives were met by concentrating on three key areas, namely, investigation of physical mechanisms present in nanostructured solar cells, characterization of loss mechanisms in nanostructured solar cells and determining the properties required of nanostructured solar cells in order to achieve high efficiency and the design implications.

Dr Stephan Bremner

2010-07-21T23:59:59.000Z

166

Three key elements necessary for successful testing  

SciTech Connect (OSTI)

Real-time surface readout during data acquisition, downhole shutting, and appropriate pressure gauges are three key elements for successful well tests. These elements are often overlooked in designing and implementing a successful well test. This second in a series of three articles on well testing shows how these elements affected the testing of an example well. Also reviewed are the capabilities of several new testing tools and techniques.

Ehlig-Economides, C.A.; Hegeman, P. (Schlumberger Oilfield Services, Houston, TX (United States)); Clark, G. (Schlumberger Oilfield Services, Aberdeen (United Kingdom))

1994-07-25T23:59:59.000Z

167

Midstream Infrastructure Improvements Key to Realizing Full Potential...  

Office of Environmental Management (EM)

Midstream Infrastructure Improvements Key to Realizing Full Potential of Domestic Natural Gas Midstream Infrastructure Improvements Key to Realizing Full Potential of Domestic...

168

Vehicle Electrification is Key to Reducing Petroleum Dependency...  

Broader source: Energy.gov (indexed) [DOE]

Vehicle Electrification is Key to Reducing Petroleum Dependency and Greenhouse Gas Emission Vehicle Electrification is Key to Reducing Petroleum Dependency and Greenhouse Gas...

169

Sandia National Laboratories: Direct Measurement of Key Molecule...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Modeling & SimulationDirect Measurement of Key Molecule Will Increase Accuracy of Combustion Models Direct Measurement of Key Molecule Will Increase Accuracy of Combustion...

170

Tips for Key Maps / Inset Maps How Do I Add a Key Maps or Inset Maps  

E-Print Network [OSTI]

Tips for Key Maps / Inset Maps How Do I Add a Key Maps or Inset Maps You need a new data frame o the properties/look of the extent rectangle Tips Index Map o Should be a simplified version of the map o Should cover at least 5X the area of the main map o Should have its own scale/coordinates/title o Main coverage

Brownstone, Rob

171

The analysis of the factors effect on coalbed methane pool concentration and high-production -- The North China coalbed methane districts as an example  

SciTech Connect (OSTI)

The factors which affect coalbed methane (CBM) pool concentration and high-production based upon the exploration and research of the North China CBM districts are coal facies, coal rank and metamorphic types, structural features, the surrounding rocks and their thickness, and hydrogeological conditions. Coal facies, coal rank and their metamorphic types mainly affect the CBM forming characteristic, while the other factors effect the trap of CBM pool. The interaction of the above factors determines the petrophysics of coal reservoirs and extractability of CBM. The high-production areas where CBM pools develop well in North China CBM districts are sites which have a favorable coordination of the five factors. The poor-production areas where CBM pools are undeveloped in North China are caused by action of one or more unfavorable factors. Therefore the favorable factors coordination is the prerequisite in selecting sites for coalbed methane recovery.

Wang Shengwei; Zhang Ming; Zhuang Xiaoli

1997-12-31T23:59:59.000Z

172

Introducing Traffic Analysis Attacks, Defences and Public Policy Issues. . .  

E-Print Network [OSTI]

Roots Traffic analysis is a key part of signal intelligence and electronic warfare. Michael Hermann, who

Danezis, George

173

Introducing Traffic Analysis George Danezis and Richard Clayton  

E-Print Network [OSTI]

. 2 Military Roots Traffic analysis is a key component of signal intelligence and electronic warfare

Danezis, George

174

Keyes, California: Energy Resources | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia: Energy Resources Jump to:46 - 429 Throttled (botOpen6Kentwood, Michigan: EnergyKesona PowerStatistics-2010Keyes,

175

Key Renewable Energy Opportunities for Oklahoma Tribes  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGY TAX POLICIES7.pdfFuel2007 | Department7JanuaryWASTE-TO-ENERGY:About »KEY RENEWABLE

176

Fermilab | Science | Particle Physics | Key Discoveries  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation Desert Southwest Region service area. TheEPSCI Home ItDarkDiscoveries WorldwideDarkKey

177

Another key Y-12 General Foreman remembered  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth (AOD)ProductssondeadjustsondeadjustAbout theOFFICEAmes Laboratory Site|Andrea4»Another key Y-12 General

178

Key Agency Targets Summary _FY 2012_.doc  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation ProposedUsingFunInfraredJeffersonJonathan PershingrelocatesKaye D.Ken T.NA>Kevlar andKey5 B

179

Possibility to Determine the Astrophysical S-Factor for the Be-7(p,gamma)b-8 Radiative-Capture from Analysis of the Be-7(he-3,d)b-8 Reaction  

E-Print Network [OSTI]

PHYSICAL REVIEW C VOLUME 51, NUMBER 6 JUNE 1995 Possibility to determine the astrophysical S factor for the Be(p, p)sB radiative capture from analysis of the Be(sHe, d)sB reaction A. M. Mukhamedzhanov and R. E. Tribble Cyclotron Institute, Texas...) of the internal bound-state wave functions of B and Be, IsB'rB, (r) = ($?~~PsB), where r is the relative coordinate between the proton and the center of mass of Be, is approximated by S,&,B &P?, ?(r) . Here S887B is the spectroscopic factor of the configura...

Mukhamedzhanov, AM; Tribble, Robert E.; imofeyuk, N. K.

1995-01-01T23:59:59.000Z

180

Economic analysis of fusion breeders  

SciTech Connect (OSTI)

This paper presents a study of the economic performance of Fission/Fusion Hybrid devices. This work takes fusion breeder cost estimates and applies methodology and cost factors used in the fission reactor programs to compare fusion breeders with Liquid Metal Fast Breeder Reactors (LMFBR). The results of the analysis indicate that the Hybrid will be in the same competitive range as proposed LMFBRs and have the potential to provide economically competitive power in a future of rising uranium prices. The sensitivity of the results to variations in key parameters is included.

Delene, J.G.

1985-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "analysis key factors" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

The effect of sociocultural factors on the quality of relations of the United States with Hispaniola: analysis of the American military occupation of Haiti and the Dominican Republic (1915-1934)  

E-Print Network [OSTI]

THE EFFECT OF SOCIOCULTURAL FACTORS ON THE QUALITY OF RELATIONS OF THE UNITED STATES WITH HISPANIOLA: ANALYSIS OF THE AMERICAN MILITARY OCCUPATION OF HAITI AND THE DOMINICAN REPUBLIC (1915-1934) A Thesis By FAUSTO B. ALVAREZ Submitted... WITH HISPANIOLA: ANALYSIS OF THE AMERICAN MILITARY OCCUPATION OF HAITI AND THE DOMINICAN REPUBLIC (1915-1934) A Thesis by FAUSTO B. ALVAREZ Approved as to style and content by: C arrperson o Co ee) ames H. Copp (Member) Wm. Alex McIntosh (Member) James...

Alvarez, Fausto B.

1988-01-01T23:59:59.000Z

182

Final analysis of proton form factor ratio data at Q[superscript 2]=4.0, 4.8, and 5.6 GeV[superscript 2  

E-Print Network [OSTI]

Precise measurements of the proton electromagnetic form factor ratio R=?[subscript p]G[subscript E][superscript p]/G[subscript M][superscript p] using the polarization transfer method at Jefferson Lab have revolutionized ...

Bertozzi, William

183

Factors Associated With Newly Graduated Nurses' Intent to Leave Current Position in U.S. Acute Care Hospitals: A Descriptive Research Study Using Secondary Data Analysis  

E-Print Network [OSTI]

Indicators TM (NDNQI ®) RN Survey with Job Satisfaction Scales and NDNQI patient census and staffing data (N = 8343). The data were analyzed using three-level hierarchical linear modeling to identify factors that were significantly correlated with ITLcp...

Meyer, Mary N.

2014-08-31T23:59:59.000Z

184

Compression station key to Texas pipeline project  

SciTech Connect (OSTI)

This was probably the largest pipeline project in the US last year, and the largest in Texas in the last decade. The new compressor station is a key element in this project. TECO, its servicing dealer, and compression packager worked closely throughout the planning and installation stages of the project. To handle the amount of gas required, TECO selected the GEMINI F604-1 compressor, a four-throw, single-stage unit with a six-inch stroke manufactured by Weatherford Enterra Compression Co. (WECC) in Corpus Christi, TX. TECO also chose WECC to package the compressors. Responsibility for ongoing support of the units will be shared among TECO, the service dealer and the packager. TECO is sending people to be trained by WECC, and because the G3600 family of engines is still relatively new, both the Caterpillar dealer and WECC sent people for advanced training at Caterpillar facilities in Peoria, IL. As part of its service commitment to TECO, the servicing dealer drew up a detailed product support plan, encompassing these five concerns: Training, tooling; parts support; service support; and commissioning.

NONE

1996-10-01T23:59:59.000Z

185

The impacts of urbanization on endangered florida key deer  

E-Print Network [OSTI]

for resources between man and wildlife continues, it is important to understand the effects of urbanization on species. Endangered Key deer (Odocoileus virginianus clavium) are endemic to the Florida Keys archipelago stretching southwest off the southern tip...

Harveson, Patricia Moody

2006-04-12T23:59:59.000Z

186

actual key success: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

key exchange over an insecure channel. The security of the proposed algorithm grows as NPm, where M, P are the size of the key and the computational commplexity fo the linear...

187

Updated distribution and reintroduction of the Lower Keys marsh rabbit  

E-Print Network [OSTI]

Listed as federally-endangered in 1990, the Lower Keys marsh rabbit (LKMR, Sylvilagus palustris hefneri) exists as a metapopulation in patches of wetland habitat in Florida?s Lower Keys. This study sought to address 2 priority actions identified...

Faulhaber, Craig Alan

2005-02-17T23:59:59.000Z

188

authenticated key agreement: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

desirable attributes. Index Terms--Mutual Authentication; Key Management; SRP; Security; Smart Meter; Smart Leung, Victor C.M. 53 On the security of some password-based key...

189

Exploring the context : a small hotel in Key West  

E-Print Network [OSTI]

This thesis develops a personal method and approach for designing in a delicate context such as the Key West Historic District. This thesis is composed of two parts. The first part presents observations of Key West, focusing ...

VanBeuzekom, Edrick

1984-01-01T23:59:59.000Z

190

Residential Energy Efficiency Financing: Key Elements of Program Design  

Broader source: Energy.gov [DOE]

Presents key programmatic elements and context of financing initiatives, including contractor support, rebates, quality assurance, and more.

191

Review paper Topography as a key factor driving atmospheric nitrogen exchanges in  

E-Print Network [OSTI]

the response of northern systems to changes in climatic conditions. In this review we examine pathways of N British Columbia, Prince George, BC, Canada a r t i c l e i n f o Article history: Received 26 April 2013 important indirect roles in gaseous N cycling via evapotranspiration effects. Our review indicates

Grogan, Paul

192

Key factors affecting voltage oscillations of distribution networks with distributed generation and induction motor loads  

E-Print Network [OSTI]

of distributed energy sources such as, combined heat and power (CHP), wind, solar, and fuel cells, are expected and IT, The University of New South Wales, Canberra, ACT 2600, Australia b Future Grid Research Centre, The University of Melbourne, Parkville, VIC 3010, Australia c Griffith School of Engineering, Griffith University

Pota, Himanshu Roy

193

Behaviors and housing inertia are key factors in determining the consequences of a shock in  

E-Print Network [OSTI]

;1 Introduction In four years, between 2002 and 2006, energy prices have soared in the U.S., following the rapid higher gasoline prices to promote energy conservation and innovation in renewable and clean energies in determining the vulnerability to transportation price variability and to the introduction of climate policies

Boyer, Edmond

194

FE-Funded Study Released on Key Factors Affecting China Shale...  

Broader source: Energy.gov (indexed) [DOE]

government gives priority to the development of China's shale gas sector to help fight air pollution and reduce reliance on natural gas imports; and The U.S. government supports...

195

Wigner distinguished lecturer Majumdar says scale-up factor key to R&D  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched FerromagnetismWaste and MaterialsWenjun DengWISP SignInWho do IWhyWhy: TheWidesuccess

196

FE-Funded Study Released on Key Factors Affecting China Shale Gas  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:YearRound-UpHeat PumpRecord ofESPCofConstruction Management14, 2011February 7, 2011FE

197

A Full Key Recovery Attack on HMAC-AURORA-512  

E-Print Network [OSTI]

A Full Key Recovery Attack on HMAC-AURORA-512 Yu Sasaki NTT Information Sharing Platform.yu@lab.ntt.co.jp Abstract. In this note, we present a full key recovery attack on HMAC- AURORA-512 when 512-bit secret keys is 2259 AURORA-512 operations, which is significantly less than the complexity of the exhaustive search

198

Transfer Factors for Contaminant Uptake by Fruit and Nut Trees  

SciTech Connect (OSTI)

Transfer of radionuclides from soils into plants is one of the key mechanisms for long-term contamination of the human food chain. Nearly all computer models that address soil-to-plant uptake of radionuclides use empirically-derived transfer factors to address this process. Essentially all available soil-to-plant transfer factors are based on measurements in annual crops. Because very few measurements are available for tree fruits, samples were taken of alfalfa and oats and the stems, leaves, and fruits and nuts of almond, apple, apricot, carob, fig, grape, nectarine, pecan, pistachio (natural and grafted), and pomegranate, along with local surface soil. The samples were dried, ground, weighed, and analyzed for trace constituents through a combination of induction-coupled plasma mass spectrometry and instrumental neutron activation analysis for a wide range of naturally-occurring elements. Analysis results are presented and converted to soil-to-plant transfer factors. These are compared to commonly used and internationally recommended values. Those determined for annual crops are very similar to commonly-used values; those determined for tree fruits show interesting differences. Most macro- and micronutrients are slightly reduced in fruits; non-essential elements are reduced further. These findings may be used in existing computer models and may allow development of tree-fruit-specific transfer models.

Napier, Bruce A.; Fellows, Robert J.; Minc, Leah D.

2013-11-20T23:59:59.000Z

199

K:\\Operations\\Forms\\201 Key or Vendor Card Request.pdf Rev ASU DPc Key/Vendor Card Request  

E-Print Network [OSTI]

K:\\Operations\\Forms\\201 Key or Vendor Card Request.pdf Rev ASU DPc Key/Vendor Card Request Complete/Staff Undergrad Grad Asst Other Department or Vendor PO # or Agency/ORG Mail Code Affiliation (place X in one box am personally accountable for all ASU keys/vendor cards issued to me. I understand that only I am

Rhoads, James

200

Compilation of Diversity Factors and Schedules for Energy and Cooling Load Calculations, Phase II Report - Identified Relevant Data Sets, Methods, and Variability Analysis  

E-Print Network [OSTI]

for classifying the Office building categories; (3) the relevant methods for daytyping necessary for creating the typical load shapes for energy and cooling load calculation; (4) the relevant robust variability (uncertainty) analysis; (5) typical load shapes...

Abushakra, B.; Haberl, J. S.; Claridge, D. E.

1999-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "analysis key factors" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Type I error and power of the mean and covariance structure confirmatory factor analysis for differential item functioning detection: Methodological issues and resolutions  

E-Print Network [OSTI]

and latent constructs (i.e., trait, denoted by 𝜉𝜉). In the MACS model, the observed response 𝑥𝑥𝑖𝑖 to an item i (i = 1, …, p) is represented as a linear function of an intercept 𝜏𝜏𝑖𝑖 , latent trait variables 𝜉𝜉𝑖𝑖 (j = 1, …, m), and a unique... is a p × 1 vector of observed responses (in group g), 𝜏𝜏𝑔𝑔 is a p × 1 vector of intercepts, 𝜉𝜉𝑔𝑔 is an m × 1 vector of latent trait variables, ?𝑔𝑔 is a p × m matrix of factor loadings, and 𝛿𝛿𝑔𝑔 is a p × 1 vector of unique factor...

Lee, Jaehoon

2009-01-01T23:59:59.000Z

202

Drift Degradation Analysis  

SciTech Connect (OSTI)

Degradation of underground openings as a function of time is a natural and expected occurrence for any subsurface excavation. Over time, changes occur to both the stress condition and the strength of the rock mass due to several interacting factors. Once the factors contributing to degradation are characterized, the effects of drift degradation can typically be mitigated through appropriate design and maintenance of the ground support system. However, for the emplacement drifts of the geologic repository at Yucca Mountain, it is necessary to characterize drift degradation over a 10,000-year period, which is well beyond the functional period of the ground support system. This document provides an analysis of the amount of drift degradation anticipated in repository emplacement drifts for discrete events and time increments extending throughout the 10,000-year regulatory period for postclosure performance. This revision of the drift degradation analysis was developed to support the license application and fulfill specific agreement items between the U.S. Nuclear Regulatory Commission (NRC) and the U.S. Department of Energy (DOE). The earlier versions of ''Drift Degradation Analysis'' (BSC 2001 [DIRS 156304]) relied primarily on the DRKBA numerical code, which provides for a probabilistic key-block assessment based on realistic fracture patterns determined from field mapping in the Exploratory Studies Facility (ESF) at Yucca Mountain. A key block is defined as a critical block in the surrounding rock mass of an excavation, which is removable and oriented in an unsafe manner such that it is likely to move into an opening unless support is provided. However, the use of the DRKBA code to determine potential rockfall data at the repository horizon during the postclosure period has several limitations: (1) The DRKBA code cannot explicitly apply dynamic loads due to seismic ground motion. (2) The DRKBA code cannot explicitly apply loads due to thermal stress. (3) The DRKBA code, which determines structurally controlled key-block failure, is not applicable for stress-controlled failure in the lithophysal units. To address these limitations, additional numerical codes have been included that can explicitly apply seismic and thermal loads, providing significant improvements to the analysis of drift degradation and extending the validity of drift degradation models.

D. Kicker

2004-09-16T23:59:59.000Z

203

Chromidio: an interface for color tracking with key frames in Max and Nato  

E-Print Network [OSTI]

11 QuickTime Movie Input 11 Interactive Color Picking 12 Key Frames 12 Useful Output 14 File Management 16 C.play I 6 IV I M P L E M E N T A T I O N A N D RESULTS 17 Chromidio User Interface 17 QuickTime Movie Display and Playback 22 vi i... CHAPTER Page Interactive Color Picking 26 Key Frame Management 27 Data Analysis and Output 32 Project File Management 36 C.play 39 User Interface 39 Mathematical Functions and F ilters 41 MIDI Implementations 44 Output : 46 Results Using C...

Tucker, Amy Rebecca

2002-01-01T23:59:59.000Z

204

An Empirical Analysis of Factors That Influence the First Year to Second Year Retention of Students at One Large, Hispanic Serving Institution (HSI)  

E-Print Network [OSTI]

-year seminar course. Both iv descriptive and univariate statistics were used to describe the sample population, as well as the similarities and differences found to exist among the seven Astin types. Three separate logistic regression analyses organized... ............................................................ 85 Preliminary Data Analysis.................................................... 86 Descriptive and Univariate Statistics for Astin Types........... 92 Logistic Regression Analyses.............................................. 112...

Wilkerson, Steven Lamar

2009-05-15T23:59:59.000Z

205

Vacancy -Soil Science Climate change is a key challenge for both, science and society. The Cluster of Excellence  

E-Print Network [OSTI]

1 Vacancy - Soil Science Climate change is a key challenge for both, science and society/in) with a strong background in Soil Science or terrestrial Biogeochemistry The successful applicant will study/she will conduct laboratory analysis, field research on permafrost soils and GIS analysis in thermokarst landscapes

Hamburg,.Universität

206

QKD with finite resources: secret key rates via Rényi entropies  

E-Print Network [OSTI]

A realistic Quantum Key Distribution (QKD) protocol necessarily deals with finite resources, such as the number of signals exchanged by the two parties. We derive a bound on the secret key rate which is expressed as an optimization problem over R\\'enyi entropies. Under the assumption of collective attacks by an eavesdropper, a computable estimate of our bound for the six-state protocol is provided. This bound leads to improved key rates in comparison to previous results.

Silvestre Abruzzo; Hermann Kampermann; Markus Mertz; Dagmar Bruß

2011-05-27T23:59:59.000Z

207

Climate Action Planning: A Review of Best Practices, Key Elements...  

Open Energy Info (EERE)

Planning: A Review of Best Practices, Key Elements, and Common Climate Strategies for Signatories to the American College & University Presidents' Climate Commitment Jump to:...

208

TEC Working Group Topic Groups Rail Key Documents Radiation Monitoring...  

Broader source: Energy.gov (indexed) [DOE]

Radiation Monitoring Subgroup TEC Working Group Topic Groups Rail Key Documents Radiation Monitoring Subgroup Radiation Monitoring Subgroup Draft Work Plan - February 4, 2008 More...

209

LANL breaks ground on key sediment control project  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Sediment control project LANL breaks ground on key sediment control project Called "grade-control" structures, the approximately 2 million features are up to eight feet high and...

210

Hydrodynamic experiment provides key data for Stockpile Stewardship  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

predictively model and assess weapon performance in the absence of full-scale underground nuclear testing," said Webster. Los Alamos hydrodynamic experiment provides key data for...

211

Water dynamics clue to key residues in protein folding  

SciTech Connect (OSTI)

A computational method independent of experimental protein structure information is proposed to recognize key residues in protein folding, from the study of hydration water dynamics. Based on all-atom molecular dynamics simulation, two key residues are recognized with distinct water dynamical behavior in a folding process of the Trp-cage protein. The identified key residues are shown to play an essential role in both 3D structure and hydrophobic-induced collapse. With observations on hydration water dynamics around key residues, a dynamical pathway of folding can be interpreted.

Gao, Meng [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Zhu, Huaiqiu, E-mail: hqzhu@pku.edu.cn [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Yao, Xin-Qiu [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China) [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Department of Biophysics, Kyoto University, Sakyo Kyoto 606-8502 (Japan); She, Zhen-Su, E-mail: she@pku.edu.cn [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)

2010-01-29T23:59:59.000Z

212

Pantex Plant Achieves Key Safety Milestone Ahead of Schedule...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Achieves Key Safety Milestone Ahead of Schedule | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

213

Key Practical Issues in Strengthening Safety Culture, INSAG-15  

Broader source: Energy.gov [DOE]

Key Pratical Issues in Strengthening Safety Culture, INSAG-15. A report by the International Nuclear Safety Advisory Gorup, International Atomic Energy Agency, Vienna, 2002.

214

Technique for information retrieval using enhanced latent semantic analysis generating rank approximation matrix by factorizing the weighted morpheme-by-document matrix  

DOE Patents [OSTI]

A technique for information retrieval includes parsing a corpus to identify a number of wordform instances within each document of the corpus. A weighted morpheme-by-document matrix is generated based at least in part on the number of wordform instances within each document of the corpus and based at least in part on a weighting function. The weighted morpheme-by-document matrix separately enumerates instances of stems and affixes. Additionally or alternatively, a term-by-term alignment matrix may be generated based at least in part on the number of wordform instances within each document of the corpus. At least one lower rank approximation matrix is generated by factorizing the weighted morpheme-by-document matrix and/or the term-by-term alignment matrix.

Chew, Peter A; Bader, Brett W

2012-10-16T23:59:59.000Z

215

Energy Security: A Key Requirement forSustainable Development  

E-Print Network [OSTI]

1 Energy Security: A Key Requirement forSustainable Development Perspective and Action Plan Robert Card Under Secretary US Department of Energy August 30, 2002 Session One: Maintaining Energy Security WSSD Side Event Energy for Sustainable Development IEA/UNEP/Eskom #12;2 Energy Security is a Key

216

Prairie Fruit Summary, 2010 Some key considerations for the homeowner  

E-Print Network [OSTI]

1 Prairie Fruit Summary, 2010 Some key considerations for the homeowner by Bob Bors The following list highlights some key positive (+), negative (-) and variable ( ± ) attributes for growing fruit into account. For more info visit: www.fruit.usask.ca Haskap/Blue Honeysuckle: - All varieties are very cold

Peak, Derek

217

Efficient Hybrid Key Agreement Protocol for Wireless Ad Hoc Networks  

E-Print Network [OSTI]

Efficient Hybrid Key Agreement Protocol for Wireless Ad Hoc Networks Xiang-Yang Li Yu Wang Ophir important aspects in ad-hoc wireless networks. To ensure the security, several cryptography protocols must efficient when applied to wireless ad-hoc networks. In this paper, we propose a key agreement protocol

Wang, Yu

218

Reflective cracking of shear keys in multi-beam bridges  

E-Print Network [OSTI]

..............................................2 Figure 2: PCI 33? Box Girder with Shear Keys................................................................5 Figure 3: TxDOT 34? Box Girder with Shear Keys .........................................................5 Figure 4: Test Specimen... Under Tension.........................................................................12 Figure 5: Test Specimen in Bending ...............................................................................12 Figure 6: Test Specimen in Shear...

Sharpe, Graeme Peter

2009-06-02T23:59:59.000Z

219

Public Key Encryption that Allows PIR Queries Eyal Kushilevitz  

E-Print Network [OSTI]

Public Key Encryption that Allows PIR Queries Dan Boneh Eyal Kushilevitz Rafail Ostrovsky William E to create a public- key encryption scheme for Alice that allows PIR searching over encrypted documents. Our allows for Single-Database PIR writing with sublinear communication complexity, which we consider

220

Public Key Encryption that Allows PIR Queries Eyal Kushilevitz  

E-Print Network [OSTI]

Public Key Encryption that Allows PIR Queries Dan Boneh Eyal Kushilevitz Rafail Ostrovsky William E. In this paper, we show how to create a public-key encryption scheme for Alice that allows PIR searching over allows for Single-Database PIR writing with sublinear communication complexity, which we consider

Ostrovsky, Rafail

Note: This page contains sample records for the topic "analysis key factors" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Electricity and Development: Global Trends and Key Challenges  

E-Print Network [OSTI]

Electricity and Development: Global Trends and Key Challenges Romeo Pacudan, PhD Risoe National · Prospects for electricity development · Investment requirements · Key challenges · Final remarks #12 and the transport burden in Tanzania. Source: Modi, 2004 #12;2. Energy and Human Development Access to electricity

222

Key ornamental innovations facilitate diversification in an avian radiation  

E-Print Network [OSTI]

Key ornamental innovations facilitate diversification in an avian radiation Rafael Maiaa,1 , Dustin novel ways of interacting with the en- vironment (key innovations) play a fundamental role in promoting evolution of orna- mental traits. Because selection can operate only on existing vari- ation, the tendency

Rubenstein, Dustin R.

223

Practical Key-Recovery for All Possible Parameters of SFLASH  

E-Print Network [OSTI]

function over a finite field. However, unlike RSA this power function is an easy-to-invert bijec- tion a new practical key-recovery attack on the SFLASH signature scheme. SFLASH is a derivative of the older from the public-key. The attack uses new crypt- analytic tools, most notably pencils of matrices

Fouque, Pierre-Alain

224

Offshore Wind Power Experiences, Potential and Key Issues for  

E-Print Network [OSTI]

Offshore Wind Power Experiences, Potential and Key Issues for Deployment Jørgen Lemming, Poul Erik-Erik Clausen Title: Offshore Wind Power Experiences, Potential and Key Issues for Deployment Division: VEA, SYS Risø-R-1673(EN) January 2008 Abstract: Wind power has been growing at spectacular rates. Today

225

Apparatus, system, and method for synchronizing a timer key  

DOE Patents [OSTI]

A timer key relating to monitoring a countdown time of a countdown routine of an electronic device is disclosed. The timer key comprises a processor configured to respond to a countdown time associated with operation of the electronic device, a display operably coupled with the processor, and a housing configured to house at least the processor. The housing has an associated structure configured to engage with the electronic device to share the countdown time between the electronic device and the timer key. The processor is configured to begin a countdown routine based at least in part on the countdown time, wherein the countdown routine is at least substantially synchronized with a countdown routine of the electronic device when the timer key is removed from the electronic device. A system and method for synchronizing countdown routines of a timer key and an electronic device are also disclosed.

Condit, Reston A; Daniels, Michael A; Clemens, Gregory P; Tomberlin, Eric S; Johnson, Joel A

2014-04-22T23:59:59.000Z

226

The ISO/NASA Key Project on AGN Spectral Energy Distributions (Characteristics of the ISO Data)  

E-Print Network [OSTI]

The U.S. ISO Key Project on quasar spectral energy distributions seeks to better understand the very broad-band emission features of quasars from radio to X-rays. A key element of this project is observations of 72 quasars with the ISOPHOT instrument at 8 bands, from 5 to 200 microns. The sample was chosen to span a wide range of redshifts and quasar types. This paper presents an overview of the analysis and reduction techniques, as well as general trends within the data set (comparisons with IRAS fluxes, uncertainties as a function of background sky brightness, and an analysis of vignetting corrections in chopped observing mode). A more detailed look at a few objects in the sample is presented in Wilkes et al. 1999, astro-ph/9902084.

Eric J. Hooper; Belinda J. Wilkes; Kim K. McLeod; Martin S. Elvis; Chris D. Impey; Carol J. Lonsdale; Matt A. Malkan; Jonathan C. McDowell

1999-02-05T23:59:59.000Z

227

Structural analysis of the Sil1-Bip complex reveals the mechanism for Sil1 to function as a nucleotide-exchange factor  

SciTech Connect (OSTI)

Sil1 functions as a NEF (nucleotide-exchange factor) for the ER (endoplasmic reticulum) Hsp70 (heat-shock protein of 70 kDa) Bip in eukaryotic cells. Sil1 may catalyse the ADP release from Bip by interacting directly with the ATPase domain of Bip. In the present study we show the complex crystal structure of the yeast Bip and the NEF Sil1 at the resolution of 2.3 {angstrom} (1 {angstrom} = 0.1 nm). In the Sil1-Bip complex structure, the Sil1 molecule acts as a 'clamp' which binds lobe IIb of the Bip ATPase domain. The binding of Sil1 causes the rotation of lobe IIb {approx} 13.5{sup o} away from the ADP-binding pocket. The complex formation also induces lobe Ib to swing in the opposite direction by {approx} 3.7{sup o}. These conformational changes open up the nucleotide-binding pocket in the Bip ATPase domain and disrupt the hydrogen bonds between Bip and bound ADP, which may catalyse ADP release. Mutation of the Sil1 residues involved in binding the Bip ATPase domain compromise the binding affinity of Sil1 to Bip, and these Sil1 mutants also abolish the ability to stimulate the ATPase activity of Bip.

Yan, Ming; Li, Jingzhi; Sha, Bingdong (UAB)

2013-01-16T23:59:59.000Z

228

Initial Risk Analysis and Decision Making Framework  

SciTech Connect (OSTI)

Commercialization of new carbon capture simulation initiative (CCSI) technology will include two key elements of risk management, namely, technical risk (will process and plant performance be effective, safe, and reliable) and enterprise risk (can project losses and costs be controlled within the constraints of market demand to maintain profitability and investor confidence). Both of these elements of risk are incorporated into the risk analysis subtask of Task 7. Thus far, this subtask has developed a prototype demonstration tool that quantifies risk based on the expected profitability of expenditures when retrofitting carbon capture technology on a stylized 650 MW pulverized coal electric power generator. The prototype is based on the selection of specific technical and financial factors believed to be important determinants of the expected profitability of carbon capture, subject to uncertainty. The uncertainty surrounding the technical performance and financial variables selected thus far is propagated in a model that calculates the expected profitability of investments in carbon capture and measures risk in terms of variability in expected net returns from these investments. Given the preliminary nature of the results of this prototype, additional work is required to expand the scope of the model to include additional risk factors, additional information on extant and proposed risk factors, the results of a qualitative risk factor elicitation process, and feedback from utilities and other interested parties involved in the carbon capture project. Additional information on proposed distributions of these risk factors will be integrated into a commercial implementation framework for the purpose of a comparative technology investment analysis.

Engel, David W.

2012-02-01T23:59:59.000Z

229

HighPerformance Library Software for QR Factorization  

E-Print Network [OSTI]

factorization. Using recursion leads us to a natural way to choose the k­way aggregating Householder transform604e node. Keywords: Serial and parallel library software, QR factorization, recur­ sion, register utilize the memory hierarchy is the key to high performance on uniprocessors as well as on SMP systems

Elmroth, Erik

230

Numerical models analysis of energy conversion process in air-breathing laser propulsion  

SciTech Connect (OSTI)

Energy source was considered as a key essential in this paper to describe energy conversion process in air-breathing laser propulsion. Some secondary factors were ignored when three independent modules, ray transmission module, energy source term module and fluid dynamic module, were established by simultaneous laser radiation transportation equation and fluid mechanics equation. The incidence laser beam was simulated based on ray tracing method. The calculated results were in good agreement with those of theoretical analysis and experiments.

Hong Yanji; Song Junling; Cui Cunyan; Li Qian [Academy of Equipment Command and Technology, 101416 Beijing (China)

2011-11-10T23:59:59.000Z

231

Reactive Support and Voltage Control Service: Key Issues and Challenges  

E-Print Network [OSTI]

reactive support and voltage control services. Keywords ­ Competitive Electricity Markets, Reactive PowerReactive Support and Voltage Control Service: Key Issues and Challenges George Gross^, Paolo Marannino° and Gianfranco Chicco* ^ Department of Electrical and Computer Engineering, University

Gross, George

232

Detailed Description of Key NIF Milestones for NNSA Description  

E-Print Network [OSTI]

1 Detailed Description of Key NIF Milestones for NNSA Short Description NIC EP Rev 4.0 Approved = Milestone Reporting Tool, which NNSA uses to support quarterly status reporting of NIC Level 1-2 milestones

233

NREL: News - NREL Scientists Find Key Function for Ferredoxins...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

614 NREL Scientists Find Key Function for Ferredoxins in Algae Hydrogen Production Two of six iron-rich proteins shown to have role in algae metabolism; discovery could lead to...

234

Daylight quantum key distribution over 1.6 km  

E-Print Network [OSTI]

Quantum key distribution (QKD) has been demonstrated over a point-to-point transmission distance brings QKD a step closer to surface-to-satellite and other long-distance applications.

Buttler, W T; Lamoreaux, S K; Morgan, G L; Nordholt, J E; Peterson, C G

2000-01-01T23:59:59.000Z

235

Building America Expert Meeting: Key Innovations for Adding Energy...  

Broader source: Energy.gov (indexed) [DOE]

This report describes an expert meeting hosted by the Building America research team NAHB Research Center, which was held on February 8, 2012, in Orlando, Florida. The topic, Key...

236

Families First: Keys to Successful Family Functioning Communication  

E-Print Network [OSTI]

Families First: Keys to Successful Family Functioning Communication Rick Peterson, Extension Specialist and Assistant Professor, Department of Human Development, Virginia Tech Stephen Green, Department of Human Development, Virginia Tech www.ext.vt.edu Produced by Communications and Marketing, College

Liskiewicz, Maciej

237

Nano Lect 1 Questions and Keypoints Key Points  

E-Print Network [OSTI]

Nano Lect 1 ­ Questions and Keypoints Key Points 1. What is nano technology: a. Very small technology with device in the 1nm to 100nm lots of useful properties Questions 1. Define nanotechnology. Is an nano

Smy, Tom

238

Power Factor Compensation (PFC) Power Factor Compensation  

E-Print Network [OSTI]

Power Factor Compensation (PFC) Power Factor Compensation The power factor (PF) is defined as the ratio between the active power and the apparent power of a system. If the current and voltage are periodic with period , and [ ), then the active power is defined by ( ) ( ) (their inner product

Knobloch,JĂĽrgen

239

Unveiling Microbial Carbon Cycling Processes in Key U.S. Soils using “Omics”  

SciTech Connect (OSTI)

Soils process and store large amounts of C; however, considerable uncertainty still exists about the details of that influence microbial partitioning of C into soil C pools, and what are the main influential forces that control the fraction of the C input that is stabilized. The soil microbial community is genotypically and phenotypically diverse. Despite our ability to predict the kinds of regional environmental changes that will accompany global climate change, it is not clear how the microbial community will respond to climate-induced modification of precipitation and inter-precipitation intervals, and if this response will affect the fate of C deposited into soil by the local plant community. Part of this uncertainty lies with our ignorance of how the microbial community adapts genotypically and physiologically to changes in soil moisture brought about by shifts in precipitation. Our overarching goal is to harness the power of multiple meta-omics tools to gain greater understanding of the functioning of whole-soil microbial communities and their role in C cycling. We will do this by meeting the following three objectives: 1. Further develop and optimize a combination of meta-omics approaches to study how environmental factors affect microbially-mediated C cycling processes. 2. Determine the impacts of long-term changes in precipitation timing on microbial C cycling using an existing long-term field manipulation of a tallgrass prairie soil. 3. Conduct laboratory experiments that vary moisture and C inputs to confirm field observations of the linkages between microbial communities and C cycling processes. We took advantage of our state-of-the-art expertise in community “omics” to better understand the functioning soil C cycling within the Great Prairie ecosystem, including our ongoing Konza Prairie soil metagenome flagship project at JGI and the unique rainfall manipulation plots (RaMPs) established at this site more than a decade ago. We employed a systems biology approach, considering the complex soil microbial community as a functioning system and using state-of-the-art metatranscriptomic, metaproteomic, and metabolomic approaches. These omics tools were refined, applied to field experiments, and confirmed with controlled laboratory studies. Our experiments were designed to specifically identify microbial community members and processes that are instrumental players in processing of C in the prairie soils and how these processes are impacted by wetting and drying events. This project addresses a key ecosystem in the United States that current climate models predict will be subjected to dramatic changes in rainfall patterns as a result of global warming. Currently Mollisols, such as those of the tallgrass prairie, are thought to sequester more C than is released into the atmosphere, but it is not known what changes in rainfall patterns will have on future C fluxes. Through an analysis of the molecular response of the soil microbial community to shifts in precipitation cycles that are accompanied by phenologically driven changes in quality of plant C rhizodeposits, we gained deeper insight into how the metabolism of microbes has adapted to different precipitation regimes and the impact of this adaption on the fate of C deposited into soil. In doing so, we addressed key questions about the microbial cycling of C in soils that have been identified by the DOE.

Myrold, David D. [Oregon State University; Bottomely, Peter J. [Oregon State University; Jumpponen, Ari [Kansas State University; Rice, Charles W. [Kansas State University; Zeglin, Lydia H. [Kansas State University; David, Maude M. [Lawrence Berkeley National Laboratory; Jansson, Janet K. [Lawrence Berkeley National Laboratory; Prestat, Emmanuel [Lawrence Berkeley National Laboratory; Hettich, Robert L. [Oak Ridge National Laboratory

2014-09-17T23:59:59.000Z

240

Grid Parity for Residential Photovoltaics in the United States: Key Drivers and Sensitivities; Preprint  

SciTech Connect (OSTI)

In this report, we analyze PV break-even costs for U.S. residential customers. We evaluate some key drivers of grid parity both regionally and over time. We also examine the impact of moving from flat to time-of-use (TOU) rates, and we evaluate individual components of the break-even cost, including effect of rate structure and various incentives. Finally, we examine how PV markets might evolve on a regional basis considering the sensitivity of the break-even cost to four major drivers: technical performance, financing parameters, electricity prices and rates, and policies. We find that electricity price rather than technical parameters are in general the key drivers of the break-even cost of PV. Additionally, this analysis provides insight about the potential viability of PV markets.

Ong, S.; Denholm, P.; Clark, N.

2012-08-01T23:59:59.000Z

Note: This page contains sample records for the topic "analysis key factors" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Quantum-Secure Authentication with a Classical Key  

E-Print Network [OSTI]

Authentication provides the trust people need to engage in transactions. The advent of physical keys that are impossible to copy promises to revolutionize this field. Up to now, such keys have been verified by classical challenge-response protocols. Such protocols are in general susceptible to emulation attacks. Here we demonstrate Quantum-Secure Authentication ("QSA") of an unclonable classical physical key in a way that is inherently secure by virtue of quantum-physical principles. Our quantum-secure authentication operates in the limit of a large number of channels, represented by the more than thousand degrees of freedom of an optical wavefront shaped with a spatial light modulator. This allows us to reach quantum security with weak coherent pulses of light containing dozens of photons, too few for an adversary to determine their complex spatial shapes, thereby rigorously preventing emulation.

Sebastianus A. Goorden; Marcel Horstmann; Allard P. Mosk; Boris Škori?; Pepijn W. H. Pinkse

2014-06-03T23:59:59.000Z

242

Field Test of Measurement-Device-Independent Quantum Key Distribution  

E-Print Network [OSTI]

A main type of obstacles of practical applications of quantum key distribution (QKD) network is various attacks on detection. Measurement-device-independent QKD (MDIQKD) protocol is immune to all these attacks and thus a strong candidate for network security. Recently, several proof-of-principle demonstrations of MDIQKD have been performed. Although novel, those experiments are implemented in the laboratory with secure key rates less than 0.1 bps. Besides, they need manual calibration frequently to maintain the system performance. These aspects render these demonstrations far from practicability. Thus, justification is extremely crucial for practical deployment into the field environment. Here, by developing an automatic feedback MDIQKD system operated at a high clock rate, we perform a field test via deployed fiber network of 30 km total length, achieving a 16.9 bps secure key rate. The result lays the foundation for a global quantum network which can shield from all the detection-side attacks.

Yan-Lin Tang; Hua-Lei Yin; Si-Jing Chen; Yang Liu; Wei-Jun Zhang; Xiao Jiang; Lu Zhang; Jian Wang; Li-Xing You; Jian-Yu Guan; Dong-Xu Yang; Zhen Wang; Hao Liang; Zhen Zhang; Nan Zhou; Xiongfeng Ma; Teng-Yun Chen; Qiang Zhang; Jian-Wei Pan

2014-08-11T23:59:59.000Z

243

Network theory is important for describing and analyzing complex biological phenomena. Often, key  

E-Print Network [OSTI]

characteristics of a specific network are well described, but not the factors that shape their structure and evolution. A game theoretical approach is presented that allows calculating evolutionary stable network of heterogeneity, and also known to vary geographically. The theoretical analysis revealed (1) multiple stable

Kamo, Masashi

244

Transportation Energy Futures: Key Opportunities and Tools for Decision Makers (Brochure)  

SciTech Connect (OSTI)

The Transportation Energy Futures (TEF) project examines underexplored greenhouse gas-abatement and oil-savings opportunities by consolidating transportation energy knowledge, conducting advanced analysis, and exploring additional opportunities for sound strategic action. Led by NREL, in collaboration with Argonne National Laboratory, the project's primary goal is to provide analysis to accompany DOE-EERE's long-term transportation energy planning by addressing high-priority questions, informing domestic decisions about transportation energy strategies, priorities, and investments. Research and analysis were conducted with an eye toward short-term actions that support long-term energy goals The project looks beyond technology to examine each key question in the context of the marketplace, consumer behavior, industry capabilities, and infrastructure. This updated fact sheet includes a new section on initial project findings.

Not Available

2012-12-01T23:59:59.000Z

245

Key Dates | U.S. DOE Office of Science (SC)  

Office of Science (SC) Website

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched5 IndustrialIsadore Perlman, 1960 The Ernest OrlandoJohn B.Jorge LuisKayeKey DatesKey

246

Key Dates | U.S. DOE Office of Science (SC)  

Office of Science (SC) Website

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched5 IndustrialIsadore Perlman, 1960 The Ernest OrlandoJohn B.Jorge LuisKayeKeyKey Dates

247

Key Dates | U.S. DOE Office of Science (SC)  

Office of Science (SC) Website

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched5 IndustrialIsadore Perlman, 1960 The Ernest OrlandoJohn B.Jorge LuisKayeKeyKey

248

Key Parameters Affecting DPF Performance Degradation and Impact on Lifetime  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:YearRound-UpHeatMulti-Dimensionalthe10 DOEWashington, DC 20585on253.16582104)Key Issues Key

249

Key Concepts in Project Development and Financing in Alaska  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGY TAX POLICIES7.pdfFuel2007 | Department7JanuaryWASTE-TO-ENERGY:About » KeyKeyAbout

250

EVALUATING NATIONAL ENVIRONMENTAL SUSTAINABILITY: PERFORMANCE MEASURES AND INFLUENTIAL FACTORS FOR  

E-Print Network [OSTI]

development, industrial structure, energy prices, environmental governance, pollution abatement and control, environmental governance, and energy prices are major influential factors, with energy prices the most important components factor analysis to help build subindices measuring waste and pollution, sustainable energy

251

BUSCH CAMPUS KEY PICK UP INSTRUCTIONS: ALL STUDENTS: ONLY YOU CAN PICK UP YOUR KEY. You will be required to present photo  

E-Print Network [OSTI]

BUSCH CAMPUS KEY PICK UP INSTRUCTIONS: ALL STUDENTS: ONLY YOU CAN PICK UP YOUR KEY. You at the Housing and Residence Life Office, 581 Taylor Road, Busch Campus. If you are unable to pick up your key. _____________________________________________________________________________________ FIRST-YEAR STUDENTS MOVE-IN DAY KEY PICK UP BUSCH CAMPUS SATURDAY, AUGUST 28th 8:00 a.m. ­ 2:00 p

252

Conjugate Gradient Methods in Confirmatory Factor Analysis  

E-Print Network [OSTI]

R. I. (1988), "Conjugate Gradient Methods in Confirmatoryapply generalized conjugate gradient methods in an attemptby used. The conjugate gradient method, which is simple and

Jamshardian, Mortaza; Jennrich, Robert

1993-01-01T23:59:59.000Z

253

Energy Price Indices and Discount Factors for Life-Cycle Cost...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

0 Energy Price Indices and Discount Factors for Life-Cycle Cost Analysis - 2010 Report describes the 2010 edition of energy price indices and discount factors for performing...

254

Cedar Key Aquaculture Workshop Sulfide Concentrations in Sediments  

E-Print Network [OSTI]

Cedar Key Aquaculture Workshop Sulfide Concentrations in Sediments and Water: Influence on Hard;ObjectivesObjectives Examine sediment sulfide levels in the SuwanneeExamine sediment sulfide levels of sulfide on hard clam survivalsurvival #12;MethodsMethods SedimentSediment porewaterporewater samples

Florida, University of

255

Dictionaries Using Variable-Length Keys and Data, with Applications *  

E-Print Network [OSTI]

(Isil- logn, 1) + Itil) and Isil is the length of bit string si. We assume a word length w > log m. We present string Isil > 1, Itil > 1 for all bit-strings si and ti. Fox' fixed-length keys the dictionary problem

Blelloch, Guy E.

256

TICKS: KEY TO GENERA IN UNITED STATES Harry D. Pratt  

E-Print Network [OSTI]

·38 TICKS: KEY TO GENERA IN UNITED STATES Harry D. Pratt I Capitulum inferior; scutum absent. without definite sutural line. anus, indistinct, or absent. j ~ I lated .... ~ :. / ORNITHODOROS I ment Mouthparts much longer than ..~".'LJv--_, .0",,,,L } }_..., ---'~':r,.-.__.{ Mouthparts as long as basis

257

news and views A key issue for hydrogen storage materi-  

E-Print Network [OSTI]

news and views A key issue for hydrogen storage materi- als is that the hydrogenation and dehydro be possible to discover stable hydrogen hydrates with higher storage Hydrogen Posture Plan www.eere.energy.gov/hydrogenandfuelcells/pdfs/ hydrogen_posture_plan.pdf 7. Kuhs, W

Palumbi, Stephen

258

Using Key Performance Indicators to Manage Energy Costs  

E-Print Network [OSTI]

-effective to collect much more data than ever before, many energy managers find themselves drowning in the volume of data generated. Business information systems faced a similar challenge a decade ago, and it is now common practice to use Key Performance Indicators...

Van Gorp, J. C.

2005-01-01T23:59:59.000Z

259

Page 1 of 4 Creating and Submitting a Key Request  

E-Print Network [OSTI]

of employees. Enter search criteria in the search fields available and select the down red arrow to filter the terms. #12;Page 3 of 4 13. On the Key Request Form - Room List windowpane, select Add New. 14 use the Select Drawing button after entering the building and floor to display the floor plan

Howitt, Ivan

260

Cold Boot Key Recovery by Solving Polynomial Systems with Noise  

E-Print Network [OSTI]

Cold Boot Key Recovery by Solving Polynomial Systems with Noise Martin Albrecht and Carlos Cid 1 proposed in [9]; the technique was called Cold Boot attacks. When considering block ciphers Cold Boot attacks, was proposed in [9] and also provided an insight into the strength of a particular

Sheldon, Nathan D.

Note: This page contains sample records for the topic "analysis key factors" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

The Seven Keys to Success in Energy Management and Conservation  

E-Print Network [OSTI]

This paper is a summary of the seven key elements of the Deere & Company Energy Management and Conservation Program. These elements have been found to be essential for the ultimate success of any company-wide energy management program. The process...

Darby, D. F.

1984-01-01T23:59:59.000Z

262

SETTING INITIAL SECRET KEYS IN A MOBILE AD HOC NETWORK  

E-Print Network [OSTI]

SETTING INITIAL SECRET KEYS IN A MOBILE AD HOC NETWORK Murat Cihan1 and C¸etin Kaya Ko¸c2,3 1 I@eecs.oregonstate.edu Abstract. Mobile ad hoc networks require specialized authentication protocols due to the mobility of users and lack of always-available trusted servers. There are a variety of mobile ad hoc authentication protocols

263

Termites, elephants and fire are key drivers of tree mortality  

E-Print Network [OSTI]

mortality: 2 dominated by elephant damage, 2 by termite attack and 1 by fire. Wind and human activity wereTermites, elephants and fire are key drivers of tree mortality 5 plots suffered substantial tree not major causes of tree mortality. Sample sizes are too small to reasonably determine the most significant

264

Daylight quantum key distribution over 1.6 km  

E-Print Network [OSTI]

Quantum key distribution (QKD) has been demonstrated over a point-to-point $\\sim1.6$-km atmospheric optical path in full daylight. This record transmission distance brings QKD a step closer to surface-to-satellite and other long-distance applications.

W. T. Buttler; R. J. Hughes; S. K. Lamoreaux; G. L. Morgan; J. E. Nordholt; C. G. Peterson

2000-01-25T23:59:59.000Z

265

Key words: STREAMLINE, yeast, scale up, automation, sanitization.  

E-Print Network [OSTI]

adsorption by defining a realistic process example at small scale and taking it all the way up to a fullyKey words: STREAMLINE, yeast, scale up, automation, sanitization. Abstract This application note was evaluated by performing a sanitization study in which the column and system were challenged with culture

Lebendiker, Mario

266

Highly Efficient Quantum Key Distribution Immune to All Detector Attacks  

E-Print Network [OSTI]

Vulnerabilities and imperfections of single-photon detectors have been shown to compromise security for quantum key distribution (QKD). The measurement-device-independent QKD (MDI-QKD) appears to be the most appealing solution to solve the issues. However, in practice one faces severe obstacles of having significantly lower key generation rate, difficult two photon interferences, and remote synchronization etc. In this letter, we propose a highly efficient and simple quantum key distribution scheme to remove all of these drawbacks. Our proposal can be implemented with only small modifications over the standard decoy BB84 system. Remarkably it enjoys both the advantages of high key generation rate (being almost two orders of magnitude higher than that based on conventional MDI-QKD) comparable to the normal decoy system, and security against any detector side channel attacks. Most favorably one can achieve complete Bell state measurements with resort to single photon interference, which reduces significantly experimental costs. Our approach enables utilization of high speed and efficient secure communication, particularly in real-life scenario of both metropolitan and intercity QKD network, with an attack free fashion from arbitrary detector side channels.

Wen-Fei Cao; Yi-Zheng Zhen; Yu-Lin Zheng; Zeng-Bing Chen; Nai-Le Liu; Kai Chen; Jian-Wei Pan

2014-10-10T23:59:59.000Z

267

Essentials of Energy Key concepts for the day  

E-Print Network [OSTI]

Essentials of Energy 4/14/05 Key concepts for the day Markets monopoly Substitution volatility Energy intensity Levelized costs externalities I. Market essentials Are there working energy markets · international geo-political issues Speculation Long lead times for development so supply is not very responsive

268

PEM FUEL CELL TECHNOLOGY Key Research Needs and Approaches  

E-Print Network [OSTI]

Developer University #12;8 FUEL CELL RESEARCH NEEDS MEA optimization should focus on new materials Pt (full1 PEM FUEL CELL TECHNOLOGY Key Research Needs and Approaches Tom Jarvi UTC Power South Windsor, CT 06074 23 January 2008 #12;2 UTC POWER MARKET FOCUS Transportation Fuel Cells On-Site Power Solutions #12

269

BERNAL and RESTREPO Key issues for decentralization in municipal  

E-Print Network [OSTI]

BERNAL and RESTREPO Key issues for decentralization in municipal wastewater treatment Diana Paola, the inadequate management and disposal of wastewater and the implementation of sophisticated treatment systems is the decentralisation in wastewater treatment. In this article, it is proposed an overview of the state of the art

Boyer, Edmond

270

Public-Key Locally-Decodable Codes Brett Hemenway  

E-Print Network [OSTI]

Semantically-Secure Public Key En- cryption (SS-PKE) and any Private Information Retrieval (PIR) protocol. Since Homomorphic encryption implies PIR, we also show a reduction from any Homomorphic encryption protocol to PKLDC. Applying our construction to the best known PIR protocol (that of Gentry and Ramzan), we

Ostrovsky, Rafail

271

In 2010 a group of key forestry players  

E-Print Network [OSTI]

Forestry Skills Action Plan #12;Summary #12;In 2010 a group of key forestry players came together to start a movement across the sector to upskill the current, and train the future, forestry workforce. #12;In May 2010 Forestry Commission England convened a small cross- sector task and finish group

272

The U.S. ISO Key Project on Quasars  

E-Print Network [OSTI]

Observations for the U.S. key project on quasars using ISO were completed in April when the satellite's cryogen supply expired. This proceeding presents an update of the project, including information on the final sample, a discussion of some of the data reduction challenges and current efforts to meet them, plus a comparison of preliminary results with IRAS fluxes.

Eric Hooper; Belinda Wilkes; Kim McLeod; Jonathan McDowell; Martin Elvis; Matthew Malkan; Carol Lonsdale; Chris Impey

1998-09-22T23:59:59.000Z

273

Architecture of the Secoqc Quantum Key Distribution network  

E-Print Network [OSTI]

The European projet Secoqc (Secure Communication based on Quantum Cryptography) aims at developing a global network for unconditionally secure key distribution. This paper specifies the requirements and presents the principles guiding the design of this network, and relevant to its architecture and protocols.

Mehrdad Dianati; Romain Alleaume

2006-10-25T23:59:59.000Z

274

The Design of a Group Key Agreement API Giuseppe Ateniese  

E-Print Network [OSTI]

and communication-independent API. The rest of this paper is organized as follows. We be- gin with the notationThe Design of a Group Key Agreement API Giuseppe Ateniese Computer Science Department Johns Hopkins describes a protocol suite and an API geared for securing collab- orative applications. The API is based

Kim, Dae-Shik

275

Cryptanalysis of two knapsack public-key cryptosystems  

E-Print Network [OSTI]

Han1 {jguobi,hanlidong}@sdu.edu.cn mengxm@sdfi.edu.cn 1 Key Laboratory of Cryptologic Technology is useless to the security of the cryptosystem. Because of the special super increasing structure, we can. We show that the permutation algorithm is useless to avoid the low-density attack and the density

276

Putting cancer in focusPathologists key to picking the  

E-Print Network [OSTI]

Putting cancer in focusPathologists key to picking the right path to a cure momentum IN THIS ISSUE without cancer. #12;EDITOR Heather Newman DESIGN Diana Duren DIRECTOR OF PUBLICATIONS Wayne Wood ASSOCIATE / Photo Researchers, Inc. EDITORIAL OFFICE Vanderbilt-Ingram Cancer Center 691 Preston Building Nashville

Eichman, Brandt F.

277

Efficient Algorithms for Implementing Elliptic Curve PublicKey Schemes  

E-Print Network [OSTI]

Efficient Algorithms for Implementing Elliptic Curve Public­Key Schemes by Dan Beauregard A Thesis Cyganski Thesis Advisor Thesis Committee Dr. Stanley Selkow Dr. John Orr Thesis Committee Department Head #12; Preface This thesis describes the research which I conducted while completing my graduate work

278

Key issues of FED/INTOR impurity control system  

SciTech Connect (OSTI)

A key part of the FED/INTOR activity over the past year has focused on examining the critical issues and developing credible physics and engineering solutions for the impurity control system. The primary emphasis of the work was on the edge-region physics, plasma-wall interaction, materials, engineering and magnetic considerations of the poloidal divertor and pump limiter.

Abdou, M.A.

1982-10-01T23:59:59.000Z

279

The Key Coal Producers ONLINE SUPPORTING MATERIALS to  

E-Print Network [OSTI]

The Key Coal Producers ONLINE SUPPORTING MATERIALS to A Global Coal Production Forecast with Multi's most important coal-producing area is North-Central China. The provinces of Inner Mongolia, Ningxia, Shaanxi and Shanxi together accounted for 83 percent of China's proven coal reserves in 2000, and Shanxi

Patzek, Tadeusz W.

280

Unconditional security of the Bennett 1992 quantum key-distribution scheme with strong reference pulse  

E-Print Network [OSTI]

We prove the unconditional security of the original Bennett 1992 protocol with strong reference pulse. We show that we may place a projection onto suitably defined qubit spaces before the receiver, which makes the analysis as simple as qubit-based protocols. Unlike the single-photon-based qubits, the qubits identified in this scheme are almost surely detected by the receiver even after a lossy channel. This leads to the key generation rate that is proportional to the channel transmission rate for proper choices of experimental parameters.

Kiyoshi Tamaki; Norbert Lütkenhaus; Masato Koashi; Jamie Batuwantudawe

2009-09-03T23:59:59.000Z

Note: This page contains sample records for the topic "analysis key factors" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Potential Application Of Radionuclide Scaling Factors To High Level Waste Characterization  

SciTech Connect (OSTI)

Production sources, radiological properties, relative solubilities in waste, and laboratory analysis techniques for the forty-five radionuclides identified in Hanford?s Waste Treatment and Immobilization Plant (WTP) Feed Acceptance Data Quality Objectives (DQO) document are addressed in this report. Based on Savannah River Site (SRS) experience and waste characteristics, thirteen of the radionuclides are judged to be candidates for potential scaling in High Level Waste (HLW) based on the concentrations of other radionuclides as determined through laboratory measurements. The thirteen radionuclides conducive to potential scaling are: Ni-59, Zr-93, Nb-93m, Cd-113m, Sn-121m, Sn-126, Cs-135, Sm-151, Ra-226, Ra-228, Ac-227, Pa-231, and Th-229. The ability to scale radionuclides is useful from two primary perspectives: 1) it provides a means of checking the radionuclide concentrations that have been determined by laboratory analysis; and 2) it provides a means of estimating radionuclide concentrations in the absence of a laboratory analysis technique or when a complex laboratory analysis technique fails. Along with the rationale for identifying and applying the potential scaling factors, this report also provides examples of using the scaling factors to estimate concentrations of radionuclides in current SRS waste and into the future. Also included in the report are examples of independent laboratory analysis techniques that can be used to check results of key radionuclide analyses. Effective utilization of radionuclide scaling factors requires understanding of the applicable production sources and the chemistry of the waste. As such, the potential scaling approaches identified in this report should be assessed from the perspective of the Hanford waste before reaching a decision regarding WTP applicability.

Reboul, S. H.

2013-09-30T23:59:59.000Z

282

Key-Insulated Signcryption (Science and Technology on Communication Security Laboratory,  

E-Print Network [OSTI]

Key-Insulated Signcryption Jia Fan 1 (Science and Technology on Communication Security Laboratory addresses the issue of key exposure by proposing a key-insulated signcryption technique. We define a security model for key-insulated signcryption and prove that the key- insulated signcryption technique

Zheng, Yuliang

283

Public key Steganography Using Discrete Cross-Coupled Chaotic Maps  

E-Print Network [OSTI]

By cross-coupling two logistic maps a novel method is proposed for the public key steganography in JPEG image. Chaotic maps entail high complexity in the used algorithm for embedding secret data in a medium. In this paper, discrete cross- coupled chaotic maps are used to specifying the location of the different parts of the secret data in the image. Modifying JPEG format during compressing and decompressing, and also using public key enhanced difficulty of the algorithm. Simulation results show that in addition to excessive capacity, this method has high robustness and resistance against hackers and can be applicable in secret communication. Also the PSNR value is high compared to the other works.

Sodeif Ahadpour; Mahdiyeh Majidpour; Yaser Sadra

2012-11-01T23:59:59.000Z

284

Systems analysis of multiple regulator perturbations allows discoveryo...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Systems analysis of multiple regulator perturbations allows discoveryof virulence factors in Salmonella. Systems analysis of multiple regulator perturbations allows discoveryof...

285

I t=106sec3a 10 Energy key) 10'  

E-Print Network [OSTI]

. Optics for EUV, X-Ray, and Gamma-Ray Astronomy II, edited by Oberto Citterio, Stephen L. O'Dell, ProcRXTE HE& I t=106sec3a - AEIEH/2 a =10 - 10 Energy key) 10' IBIS NuSTAR Hard X-ray Optics Jason ESTAR will be the first satellite mission to employ focusing optics in the hard X-ray band (8- 80 keV). Its design

286

Economy key to 1992 U. S. oil, gas demand  

SciTech Connect (OSTI)

This paper provides a forecast US oil and gas markets and industry in 1992. An end to economic recession in the U.S. will boost petroleum demand modestly in 1992 after 2 years of decline. U.S. production will resume its slide after a fractional increase in 1991. Drilling in the U.S. will set a record low. Worldwide, the key questions are economic growth and export volumes from Iraq, Kuwait, and former Soviet republics.

Beck, R.J.

1992-01-27T23:59:59.000Z

287

City of Key West, Florida (Utility Company) | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartmentAUDITOhio (UtilityHolyrood, Kansas (Utility Company)JohnsonKennett, MissouriKey

288

Statistical Hot Channel Analysis for the NBSR  

SciTech Connect (OSTI)

A statistical analysis of thermal limits has been carried out for the research reactor (NBSR) at the National Institute of Standards and Technology (NIST). The objective of this analysis was to update the uncertainties of the hot channel factors with respect to previous analysis for both high-enriched uranium (HEU) and low-enriched uranium (LEU) fuels. Although uncertainties in key parameters which enter into the analysis are not yet known for the LEU core, the current analysis uses reasonable approximations instead of conservative estimates based on HEU values. Cumulative distribution functions (CDFs) were obtained for critical heat flux ratio (CHFR), and onset of flow instability ratio (OFIR). As was done previously, the Sudo-Kaminaga correlation was used for CHF and the Saha-Zuber correlation was used for OFI. Results were obtained for probability levels of 90%, 95%, and 99.9%. As an example of the analysis, the results for both the existing reactor with HEU fuel and the LEU core show that CHFR would have to be above 1.39 to assure with 95% probability that there is no CHF. For the OFIR, the results show that the ratio should be above 1.40 to assure with a 95% probability that OFI is not reached.

Cuadra A.; Baek J.

2014-05-27T23:59:59.000Z

289

New Approach to Quantum Key Distribution Via Quantum Encryption  

E-Print Network [OSTI]

In this Paper, we investigate the security of Zhang, Li and Guo quantum key distribution via quantum encryption protocol [$\\text{Phys. Rev. A} \\textbf{64}, 24302 (2001)$] and show that it is not secure against some of Eve's attacks and with the probability one half she gets all of keys without being detected by the two parties. The main defect in this protocol is that there is an attack strategy by which Eve can change the previously shared Bell state between Alice and Bob to two Bell states among herself and Alice and Bob. Hence, we show that with probability $1/d$ its generalization to $d$-dimension systems is not secure and show that its extension to the case of more partners based on the reusable GHZ states is not secure and with probability one half Eve gets all of keys without being detected by the two parties. In what follows, we show how in going to higher dimensions those protocols can be repaired.

A. Fahmi

2006-04-25T23:59:59.000Z

290

Distribution Statistics and Random Matrix Formalism of Multicarrier Continuous-Variable Quantum Key Distribution  

E-Print Network [OSTI]

We propose a combined mathematical framework of order statistics and random matrix theory for multicarrier continuous-variable (CV) quantum key distribution (QKD). In a multicarrier CVQKD scheme, the information is granulated into Gaussian subcarrier CVs, and the physical Gaussian link is divided into Gaussian sub-channels. The sub-channels are dedicated to the conveying of the subcarrier CVs. The distribution statistics analysis covers the study of the distribution of the sub-channel transmittance coefficients in the presence of a Gaussian noise and the utilization of the moment generation function (MGF) in the error analysis. We reveal the mathematical formalism of sub-channel selection and formulation of the transmittance coefficients, and show a reduced complexity progressive sub-channel scanning method. We define a random matrix formalism for multicarrier CVQKD to evaluate the statistical properties of the information flowing process. Using random matrix theory, we express the achievable secret key rates and study the efficiency of the AMQD-MQA (adaptive multicarrier quadrature division-multiuser quadrature allocation) multiple-access multicarrier CVQKD. The proposed combined framework is particularly convenient for the characterization of the physical processes of experimental multicarrier CVQKD.

Laszlo Gyongyosi

2014-10-30T23:59:59.000Z

291

Power Factor Improvement  

E-Print Network [OSTI]

Power factor control is a necessary ingredient in any successful Energy Management Program. Many companies are operating with power factors of 70% or less and are being penalized through the electrical utility bill. This paper starts by describing...

Viljoen, T. A.

1979-01-01T23:59:59.000Z

292

E-Print Network 3.0 - access technologies key Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

electronic identifier (IdentiKey) including access and password requirements, account lockout... that are accessed using a university electronic identifier or IdentiKey. The...

293

A Comparison of Key PV Backsheet and Module Properties from Fielded...  

Broader source: Energy.gov (indexed) [DOE]

of Key PV Backsheet and Module Properties from Fielded Module Exposures and Accelerated Test Conditions A Comparison of Key PV Backsheet and Module Properties from Fielded...

294

An Attack on RSA Using LSBs of Multiples of the Prime Factors  

E-Print Network [OSTI]

An Attack on RSA Using LSBs of Multiples of the Prime Factors Abderrahmane Nitaj Laboratoire de attack on RSA with d in polynomial time under special conditions. For example, various partial key exposure attacks on RSA and some

Nitaj, Abderrahmane

295

Energy Price Indices and Discount Factors for Life-Cycle Cost...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

2 Energy Price Indices and Discount Factors for Life-Cycle Cost Analysis - 2012 Report provides tables of present-value factors for use in the life-cycle cost analysis of capital...

296

Energy Price Indices and Discount Factors for Life-Cycle Cost...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Energy Price Indices and Discount Factors for Life-Cycle Cost Analysis-2014 Energy Price Indices and Discount Factors for Life-Cycle Cost Analysis-2014 Handbook describes the...

297

Practical Training in Microalgae Utilization with Key Industry Engineering Group Key Industry Engineering Group s.r.o. has developed a biotechnology for the production of an animal  

E-Print Network [OSTI]

Practical Training in Microalgae Utilization with Key Industry Engineering Group Key Industry on a suspension of Planktochlorella microalgae. The product consists of a suspension of algae in the growing

298

Accident analysis and hazard analysis for human and organizational factors  

E-Print Network [OSTI]

Pressures and incentives to operate complex socio-technical aerospace systems in a high-risk state are ever present. Without consideration of the role humans and organizations play in system safety during the development ...

Stringfellow, Margaret Virgina

2011-01-01T23:59:59.000Z

299

ACCIDENT ANALYSIS AND HAZARD ANALYSIS FOR HUMAN AND ORGANIZATIONAL FACTORS  

E-Print Network [OSTI]

and Astronautics in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY on 10/29/2010 in partial fulfillment of the requirements for the degree of Doctor of Philosophy systems in a high-risk state are ever present. Without consideration of the role humans and organizations

Leveson, Nancy

300

Epimorphin Functions as a Key Morphoregulator for Mammary Epithelial Cells  

SciTech Connect (OSTI)

Hepatocyte growth factor (HGF) and EGF have been reported to promote branching morphogenesis of mammary epithelial cells. We now show that it is epimorphin that is primarily responsible for this phenomenon. In vivo, epimorphin was detected in the stromal compartment but not in lumenal epithelial cells of the mammary gland; in culture, however, a subpopulation of mammary epithelial cells produced significant amounts of epimorphin. When epimorphin-expressing epithelial cell clones were cultured in collagen gels they displayed branching morphogenesis in the presence of HGF, EGF, keratinocyte growth factor, or fibroblast growth factor, a process that was inhibited by anti-epimorphin but not anti-HGF antibodies. The branch length, however, was roughly proportional to the ability of the factors to induce growth. Accordingly, epimorphin-negative epithelial cells simply grew in a cluster in response to the growth factors and failed to branch. When recombinant epimorphin was added to these collagen gels, epimorphin-negative cells underwent branching morphogenesis. The mode of action of epimorphin on morphogenesis of the gland, however, was dependent on how it was presented to the mammary cells. If epimorphin was overexpressed in epimorphin-negative epithelial cells under regulation of an inducible promoter or was allowed to coat the surface of each epithelial cell in a nonpolar fashion, the cells formed globular, alveoli-like structures with a large central lumen instead of branching ducts. This process was enhanced also by addition of HGF, EGF, or other growth factors and was inhibited by epimorphin antibodies. These results suggest that epimorphin is the primary morphogen in the mammary gland but that growth factors are necessary to achieve the appropriate cell numbers for the resulting morphogenesis to be visualized.

Hirai, H.; Lochter, A.; Galosy, S.; Koshida, S.; Niwa, S.; Bissell, M.J.

1997-10-13T23:59:59.000Z

Note: This page contains sample records for the topic "analysis key factors" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

"Turn-Key" Open Source Software Solutions for Energy Management...  

Office of Environmental Management (EM)

that uses EnergyPlus peak loads analysis and equipment sizing capabilities to allow mechanical engineers to quickly explore and compare multiple HVAC systems (top image). Photos...

302

Key results from SB8 simulant flowsheet studies  

SciTech Connect (OSTI)

Key technically reviewed results are presented here in support of the Defense Waste Processing Facility (DWPF) acceptance of Sludge Batch 8 (SB8). This report summarizes results from simulant flowsheet studies of the DWPF Chemical Process Cell (CPC). Results include: Hydrogen generation rate for the Sludge Receipt and Adjustment Tank (SRAT) and Slurry Mix Evaporator (SME) cycles of the CPC on a 6,000 gallon basis; Volume percent of nitrous oxide, N2O, produced during the SRAT cycle; Ammonium ion concentrations recovered from the SRAT and SME off-gas; and, Dried weight percent solids (insoluble, soluble, and total) measurements and density.

Koopman, D. C.

2013-04-26T23:59:59.000Z

303

Orthogonal-state-based protocols of quantum key agreement  

E-Print Network [OSTI]

Two orthogonal-state-based protocols of quantum key agreement (QKA) are proposed. The first protocol of QKA proposed here is designed for two-party QKA, whereas the second protocol is designed for multi-party QKA. Security of these orthogonal-state-based protocols arise from monogamy of entanglement. This is in contrast to the existing protocols of QKA where security arises from the use of non-orthogonal state (non-commutativity principle). Further, it is shown that all the quantum systems that are useful for implementation of quantum dialogue and most of the protocols of secure direct quantum communication can be modified to implement protocols of QKA.

Chitra Shukla; Nasir Alam; Anirban Pathak

2013-10-05T23:59:59.000Z

304

2014 CATEE: Collaboration is the Key- Public/Private Partnerships  

E-Print Network [OSTI]

, Texas Nov. 18-20 HGOC Education and Outreach ? District Meetings ? Peer Exchange ? Workshops ? Webinars ? One-on-One Trainings ? Newsletters ? Social media ESL-KT-14-11-24 CATEE 2014: Clean Air Through Efficiency Conference, Dallas, Texas Nov. 18...2014 CATEE Collaboration is the Key - Public/Private Partnerships November 19, 2014 Lisa Lin, Sustainability Manager, City of Houston ESL-KT-14-11-24 CATEE 2014: Clean Air Through Efficiency Conference, Dallas, Texas Nov. 18-20 City of Houston...

Lin, L.

2014-01-01T23:59:59.000Z

305

LEDSGP/Transportation Toolkit/Key Actions | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia: Energy Resources Jump to:46 - 429 ThrottledInformation KumasiTools < LEDSGP‎ | DIA-Toolkit Jump<Key

306

NERSC Played Key Role in Nobel Laureate's Discovery  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recovery challengeMultiscaleLogos NERSC Logos NERSC logos arePlayed Key Role in Nobel

307

NNSA Administrator, Three Lab Directors Tour Key Weapons Facility |  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recovery challengeMultiscaleLogos NERSCJeffreyKey ActionsThe NextAwards

308

Key Dates | U.S. DOE Office of Science (SC)  

Office of Science (SC) Website

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched5 IndustrialIsadore Perlman, 1960 The Ernest OrlandoJohn B.Jorge LuisKayeKey Dates

309

Key Dates | U.S. DOE Office of Science (SC)  

Office of Science (SC) Website

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched5 IndustrialIsadore Perlman, 1960 The Ernest OrlandoJohn B.Jorge LuisKayeKey

310

A Key Enzyme to the Potency of an Anticancer Agent  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLasDelivered‰PNGExperience hands-onASTROPHYSICSHe β-Research andA Hollow-IonHybridA Key

311

A Key Enzyme to the Potency of an Anticancer Agent  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLasDelivered‰PNGExperience hands-onASTROPHYSICSHe β-Research andA Hollow-IonHybridA KeyA

312

A Key Enzyme to the Potency of an Anticancer Agent  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLasDelivered‰PNGExperience hands-onASTROPHYSICSHe β-Research andA Hollow-IonHybridA KeyAA

313

A Key Enzyme to the Potency of an Anticancer Agent  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLasDelivered‰PNGExperience hands-onASTROPHYSICSHe β-Research andA Hollow-IonHybridA KeyAAA

314

Iron is the Key to Preserving Dinosaur Soft Tissue  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-SeriesFlickrinformation for andFuel-Efficient Engines |Iron is the Key to

315

Iron is the Key to Preserving Dinosaur Soft Tissue  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-SeriesFlickrinformation for andFuel-Efficient Engines |Iron is the Key toIron is

316

Key Activities in Energy Efficiency | Department of Energy  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGY TAX POLICIES7.pdfFuel2007 | Department7JanuaryWASTE-TO-ENERGY:About » Key Activities

317

GE Key Partner in Innovation Institutes | GE Global Research  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation ProposedUsingFun with Big Sky Learning Fun with Big SkyDIII-D Performance ToolsGlobalIs Key

318

Key Activities in Wind Energy | Department of Energy  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |EnergyonSupport0.pdf5 OPAM SEMIANNUAL REPORT TOJaredKansas City DataKen Salazar AboutKey

319

Key Activities of the Geothermal Technologies Office | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists'Montana.ProgramJulietipDepartmentJuneWhen IAjani Stewart was close toKeri FultonKey

320

Catalysis Center for Energy Innovation KEY ACCOMPLISHMENTS AND CORE CAPABILITIES  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation InInformationCenterResearchCASL Symposium:and Technical Information Catalogue ofKEY

Note: This page contains sample records for the topic "analysis key factors" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Florida Keys El Coop Assn, Inc | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of InspectorConcentrating Solar Power Basics (TheEtelligence (SmartHome Kyoung's pictureFlint ElectricKeys El

322

ON THE GAGE FACTOR FOR OPTICAL FIBER GRATING STRAIN GAGES  

E-Print Network [OSTI]

of grating and fiber types. KEY WORDS: Fiber-Optic Gratings, Fiber-Optic Sensors, Strain Gage Factor 1 theoretical background. Then, in Section 3, we discuss measurement methods followed by the experimental tests and results in Section 4, before concluding in Section 5. 2. THEORETICAL BACKGROUND Consider an FBG fabricated

Park, Yong-Lae

323

Cost per-User as Key Factor in Project Prioritization: A Case Study of the San Francisco Bay Area  

E-Print Network [OSTI]

signi?cant additional costs per ride to existing operations.total estimated investment cost of network-related. ll0V gapwould lower the estimated costs per Affected ride. pmjem was

Nuworsoo, Cornelius; Parks, Kamala; Deakin, Elizabeth

2006-01-01T23:59:59.000Z

324

Cost per-User as Key Factor in Project Prioritization: A Case Study of the San Francisco Bay Area  

E-Print Network [OSTI]

The total estimated investment cost of network-related. ll0Vdistribution of capital investment costs and consequentlyThe total estimated investment cost of service-related

Nuworsoo, Cornelius; Parks, Kamala; Deakin, Elizabeth

2006-01-01T23:59:59.000Z

325

Foreign Language Enrollment Attrition: Exploring the Key Factors of Motivation, Academic Success, Instruction, and Anxiety at the Elementary Level  

E-Print Network [OSTI]

, 1998; Stewart, 2005; Weatherford, 1986). However, proficiency in a second language does not happen overnight. On the contrary, developing a level of proficiency that provides a minimal level of communicative ability for the learner takes many years... one’s L1 was to increase an individual’s “intellectual capacity” (Weatherford, 1986). Now, however, investigators have indicated that studying a foreign language can be beneficial in multiple areas and therefore goes well beyond the notion...

Meyer, Sarah Nicole

2013-05-31T23:59:59.000Z

326

SUBTASK 1.7 EVALUATION OF KEY FACTORS AFFECTING SUCCESSFUL OIL PRODUCTION IN THE BAKKEN FORMATION, NORTH DAKOTA PHASE II  

SciTech Connect (OSTI)

Production from the Bakken and Three Forks Formations continues to trend upward as forecasts predict significant production of oil from unconventional resources nationwide. As the U.S. Geological Survey reevaluates the 3.65 billion bbl technically recoverable estimate of 2008, technological advancements continue to unlock greater unconventional oil resources, and new discoveries continue within North Dakota. It is expected that the play will continue to expand to the southwest, newly develop in the northeastern and northwestern corners of the basin in North Dakota, and fully develop in between. Although not all wells are economical, the economic success rate has been near 75% with more than 90% of wells finding oil. Currently, only about 15% of the play has been drilled, and recovery rates are less than 5%, providing a significant future of wells to be drilled and untouched hydrocarbons to be pursued through improved stimulation practices or enhanced oil recovery. This study provides the technical characterizations that are necessary to improve knowledge, provide characterization, validate generalizations, and provide insight relative to hydrocarbon recovery in the Bakken and Three Forks Formations. Oil-saturated rock charged from the Bakken shales and prospective Three Forks can be produced given appropriate stimulation treatments. Highly concentrated fracture stimulations with ceramic- and sand-based proppants appear to be providing the best success for areas outside the Parshall and Sanish Fields. Targeting of specific lithologies can influence production from both natural and induced fracture conductivity. Porosity and permeability are low, but various lithofacies units within the formation are highly saturated and, when targeted with appropriate technology, release highly economical quantities of hydrocarbons.

Darren D. Schmidt; Steven A. Smith; James A. Sorensen; Damion J. Knudsen; John A. Harju; Edward N. Steadman

2011-10-31T23:59:59.000Z

327

US Green Building Council Keys Branch Presents: Designing Mosquito Free Cisterns  

E-Print Network [OSTI]

Higgins, Sustainability Director - City of Key West Rainwater Harvesting from Roof Collection through

Watson, Craig A.

328

Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys  

E-Print Network [OSTI]

Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys Beno^it Libert1 in Identity-Based Encryption. In this model, if the Private Key Generator (PKG) maliciously re' public keys are public identifiers (e.g. email addresses) and the matching private keys are derived

Paris-Sud XI, Université de

329

Encryption Key Search using Java-based ALiCE Grid  

E-Print Network [OSTI]

Encryption Key Search is a compute-intensive operation that consists of a brute-force search of a particular key in a given key space. Sequential execution time for a 56-bit encryption key search is approximately 200,000 ...

Virkar, Ameya

330

Developing health-based pre-planning clearance goals for airport remediation following chemical terrorist attack: Introduction and key assessment considerations  

SciTech Connect (OSTI)

In the event of a chemical terrorist attack on a transportation hub, post-event remediation and restoration activities necessary to attain unrestricted facility re-use and re-entry could require hours to multiple days. While restoration timeframes are dependent on numerous variables, a primary controlling factor is the level of pre-planning and decision-making completed prior to chemical terrorist release. What follows is the first of a two-part analysis identifying key considerations, critical information, and decision criteria to facilitate post-attack and post-decontamination consequence management activities. A conceptual site model and human health-based exposure guidelines are developed and reported as an aid to site-specific pre-planning in the current absence of U.S. state or Federal values designated as compound-specific remediation or re-entry concentrations, and to safely expedite facility recovery to full operational status. Chemicals of concern include chemical warfare nerve and vesicant agents and the toxic industrial compounds phosgene, hydrogen cyanide, and cyanogen chloride. This work has been performed as a national case study conducted in partnership with the Los Angeles International Airport and The Bradley International Terminal. All recommended guidelines have been selected for consistency with airport scenario release parameters of a one-time, short-duration, finite airborne release from a single source followed by compound-specific decontamination.

Watson, Annetta Paule [ORNL; Raber, Ellen [Lawrence Livermore National Laboratory (LLNL); Dolislager, Frederick [University of Tennessee, Knoxville (UTK); Hauschild, Veronique [U.S. Army Center for Health Promotion and Preventive Medicine; Hall, Dr. Linda [ENVIRON International Corporation; Love, Dr. Adam [Johnson Wright, Inc.

2011-01-01T23:59:59.000Z

331

Key Elements of and Materials Performance Targets for Highly  

E-Print Network [OSTI]

and Technology, Hřgskoleringen 7A, NO-7491 Trondheim, Norway Abstract The thermal performance of windows of the transmission losses though the building envelope, even if their area fraction of the envelope is far less. The reason for this can be found by comparing the thermal transmittance (U-factor) of windows to the U

332

Meson electromagnetic form factors  

E-Print Network [OSTI]

The electromagnetic structure of the pseudoscalar meson nonet is completely described by the sophisticated Unitary&Analytic model, respecting all known theoretical properties of the corresponding form factors.

Stanislav Dubnicka; Anna Z. Dubnickova

2012-10-23T23:59:59.000Z

333

Break-Even Cost for Residential Solar Water Heating in the United States: Key Drivers and Sensitivities  

SciTech Connect (OSTI)

This paper examines the break-even cost for residential rooftop solar water heating (SWH) technology, defined as the point where the cost of the energy saved with a SWH system equals the cost of a conventional heating fuel purchased from the grid (either electricity or natural gas). We examine the break-even cost for the largest 1,000 electric and natural gas utilities serving residential customers in the United States as of 2008. Currently, the break-even cost of SWH in the United States varies by more than a factor of five for both electricity and natural gas, despite a much smaller variation in the amount of energy saved by the systems (a factor of approximately one and a half). The break-even price for natural gas is lower than that for electricity due to a lower fuel cost. We also consider the relationship between SWH price and solar fraction and examine the key drivers behind break-even costs. Overall, the key drivers of the break-even cost of SWH are a combination of fuel price, local incentives, and technical factors including the solar resource location, system size, and hot water draw.

Cassard, H.; Denholm, P.; Ong, S.

2011-02-01T23:59:59.000Z

334

Passive faraday mirror attack in practical two-way quantum key distribution system  

E-Print Network [OSTI]

The faraday mirror (FM) plays a very important role in maintaining the stability of two way plug-and-play quantum key distribution (QKD) system. However, the practical FM is imperfect, which will not only introduce additional quantum bit error rate (QBER) but also leave a loophole for Eve to spy the secret key. In this paper, we propose a passive faraday mirror attack in two way QKD system based on the imperfection of FM. Our analysis shows that, if the FM is imperfect, the dimension of Hilbert space spanned by the four states sent by Alice is three instead of two. Thus Eve can distinguish these states with a set of POVM operators belonging to three dimension space, which will reduce the QBER induced by her attack. Furthermore, a relationship between the degree of the imperfection of FM and the transmittance of the practical QKD system is obtained. The results show that, the probability that Eve loads her attack successfully depends on the degree of the imperfection of FM rapidly, but the QBER induced by Eve's attack changes with the degree of the imperfection of FM slightly.

Shi-Hai Sun; Mu-Sheng Jiang; Lin-Mei Liang

2012-03-04T23:59:59.000Z

335

Passive Faraday-mirror attack in a practical two-way quantum-key-distribution system  

SciTech Connect (OSTI)

The Faraday mirror (FM) plays a very important role in maintaining the stability of two-way plug-and-play quantum key distribution (QKD) systems. However, the practical FM is imperfect, which will not only introduce an additional quantum bit error rate (QBER) but also leave a loophole for Eve to spy the secret key. In this paper we propose a passive Faraday mirror attack in two-way QKD system based on the imperfection of FM. Our analysis shows that if the FM is imperfect, the dimension of Hilbert space spanned by the four states sent by Alice is three instead of two. Thus Eve can distinguish these states with a set of Positive Operator Valued Measure (POVM) operators belonging to three-dimension space, which will reduce the QBER induced by her attack. Furthermore, a relationship between the degree of the imperfection of FM and the transmittance of the practical QKD system is obtained. The results show that the probability that Eve loads her attack successfully depends on the degree of the imperfection of FM rapidly, but the QBER induced by Eve's attack changes slightly with the degree of the FM imperfection.

Sun Shihai; Jiang Musheng; Liang Linmei [Department of Physics, National University of Defense Technology, Changsha 410073 (China)

2011-06-15T23:59:59.000Z

336

Break-Even Cost for Residential Photovoltaics in the United States: Key Drivers and Sensitivities  

SciTech Connect (OSTI)

Grid parity--or break-even cost--for photovoltaic (PV) technology is defined as the point where the cost of PV-generated electricity equals the cost of electricity purchased from the grid. Break-even cost is expressed in $/W of an installed system. Achieving break-even cost is a function of many variables. Consequently, break-even costs vary by location and time for a country, such as the United States, with a diverse set of resources, electricity prices, and other variables. In this report, we analyze PV break-even costs for U.S. residential customers. We evaluate some key drivers of grid parity both regionally and over time. We also examine the impact of moving from flat to time-of-use (TOU) rates, and we evaluate individual components of the break-even cost, including effect of rate structure and various incentives. Finally, we examine how PV markets might evolve on a regional basis considering the sensitivity of the break-even cost to four major drivers: technical performance, financing parameters, electricity prices and rates, and policies. We find that local incentives rather than ?technical? parameters are in general the key drivers of the break-even cost of PV. Additionally, this analysis provides insight about the potential viability of PV markets.

Denholm, P.; Margolis, R. M.; Ong, S.; Roberts, B.

2009-12-01T23:59:59.000Z

337

Breakeven Cost for Residential Photovoltaics in the United States: Key Drivers and Sensitivities (Report Summary) (Presentation)  

SciTech Connect (OSTI)

"Break-even cost" for photovoltaic (PV) technology is defined as the point where the cost of PV-generated electricity equals the cost of electricity purchased from the grid. Break-even cost is expressed in $/W of an installed system. Achieving break-even cost is a function of many variables. Consequently, break-even costs vary by location and time for a country, such as the United States, with a diverse set of resources, electricity prices, and other variables. In this presentation, we introduce an analysis of PV break-even costs for residential customers in the United States, including an evaluation of some of the key drivers of PV breakeven both regionally and over time. This presentation includes our methodology and presents results for both near-term residential breakeven costs(2009) and future market sensitivities of break-even costs (2015). See also the the report "Break-Even Cost for Residential Photovoltaics in the United States: Key Drivers and Sensitivities". Presentation for NREL/TP-6A2-45991.

Denholm, P.; Margolis, R. M.; Ong, S.; Roberts, B.

2009-12-01T23:59:59.000Z

338

The Related-Key Analysis of Feistel Constructions Manuel Barbosa1 and Pooya Farshim2  

E-Print Network [OSTI]

to relatively simple physical attacks, when these exploit implementation aspects that were abstracted away the original work of Knudsen and Biham, there have been many reported cases of successful related

339

Provenance analysis as a key to orogenic exhumation: a case study from the East Carpathians (Romania)  

E-Print Network [OSTI]

(Romania) Cristina E. Panaiotu,1 Iuliana Vasiliev,2 Cristian G. Panaiotu,3 Wout Krijgsman2 and Cor G. Langereis2 1 Faculty of Geology and Geophysics, University of Bucharest, Bucharest, Romania; 2 Paleomagnetic, Bucharest, Romania Introduction and Geological overview The East Carpathians (Fig. 1) repre- sent

Utrecht, Universiteit

340

Analysis and mitigation of key losses in a multi-stage 25-100 K cryocooler  

E-Print Network [OSTI]

A need exists for small, robust, and efficient cryocoolers operating in the 25-100 K range; however, while technological advances have enabled the development of such machines, a greater understanding of the losses affecting ...

Segado, Martin Alan

2014-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "analysis key factors" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

An Analysis of Bridge Abutment Shear Key Behavior due to Embankment Modeling and Earthquake Intensity  

E-Print Network [OSTI]

Lsp2 ?? 4.8m W sp2 ?? Lsp2 ? W deck ? 0.761 ? MN Lsp3 ?? 4mW sp3 ?? Lsp3 ? W deck ? 0.635 ? MN Lsp4 ?? 3.8m W sp4 ??

Wasef, Nardin Mofid

342

GREET Bioenergy Life Cycle Analysis and Key Issues for Woody Feedstocks |  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:YearRound-UpHeatMulti-Dimensional Subject: Guidance for natural gas as aGEAGNEP

343

A Key Review On Exergetic Analysis And Assessment Of Renewable Energy  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address: 160 East 300 SouthWater Rights, Substantive(Sichuan, Sw China) |System,onEnergyResources

344

Key worker housing : a demand analysis of middle-income workforce housing in eastern Massachusetts  

E-Print Network [OSTI]

The Boston Metropolitan Area is one of the most expensive places to live in the United States. In recent years studies have speculated that middle-income workers have had to endure increased commute times as they have moved ...

Sacks, Sean D

2005-01-01T23:59:59.000Z

345

Financial Management: The Key to Farm-Firm Business Management  

E-Print Network [OSTI]

Those who succeed will manage their operations as farm/ranch businesses, with more emphasis on recordkeeping, planning, profitability analysis and repayment-based financing, and with better production and business monitoring and controls...

Pena, Jose G.; Klinefelter, Danny A.

2008-10-17T23:59:59.000Z

346

Friction Factor Measurement, Analysis, and Modeling for Flat-Plates with 12.15 mm Diameter Hole-Pattern, Tested with Air at Different Clearances, Inlet Pressures, and Pressure Ratios  

E-Print Network [OSTI]

of 800, 1000, and 1200 psi respectively). These nine combinations of clearance and inlet pressure will give a range of friction factor. The following objectives are considered. 17 Figure 10. Detailed view of a 3.175 mm diameter hole...

Deva Asirvatham, Thanesh

2011-02-22T23:59:59.000Z

347

Fusion integral experiments and analysis and the determination of design safety factors - II: Application to the prediction uncertainty of tritium production rate from the U.S. DOE/JAERI collaborative program on fusion blanket neutronics  

SciTech Connect (OSTI)

Many fusion integral experiments were performed during the last decade within a well-established collaboration between the United States and Japan on fusion breeder neutronics. The tritium production rate (TPR) has the prime focus among other reactions. The experimental and calculational data sets of local TPR in each experiment were interpolated to give an estimate of the prediction uncertainty, and the standard deviation, of the line-integrated TPR, a quantity that is closely related to the total breeding ratio (TBR) in the test assembly. A novel methodology developed during the collaboration was applied to arrive at estimates to design safety factors that fusion blanket designers can use to ensure that the achievable TBR in a blanket does not fall below a minimum required value. Associated with each safety factor is a confidence level, designers may choose to have, that calculated TPR will not exceed the actual measured value. Higher confidence levels require larger safety factors. Tabular and graphical forms for these factors are given, as derived independently for TPR from Li-6(T{sub 6}), Li-7 (T{sub 7}), and natural lithium (T{sub n}). Furthermore, distinction was made between safety factors based on the technique applied, discrete ordinates methods, and Monte Carlo methods in the U.S. calculations, JAERI`s calculations, and in both calculations considered simultaneously. The derived factors are applicable to TPR in Li{sub 2}O breeding material, 48 refs., 51 figs., 7 tabs.

Youssef, M.Z.; Kumar, A.; Abdou, M.A. [Univ. of California, Los Angeles, CA (United States)] [and others

1995-09-01T23:59:59.000Z

348

Key technological issues in LMFBR high-temperature structural design - the US perspective  

SciTech Connect (OSTI)

The purpose of this paper is: (1) to review the key technological issues in LMFBR high-temperature structural design, particularly as they relate to cost reduction; and (2) to provide an overview of activities sponsored by the US Department of Energy to resolve the issues and to establish stable, standardized, and defensible structural design methods and criteria. Specific areas of discussion include: weldments, structural validation tests, simplified design analysis procedures, design procedures for piping, validation of the methodology for notch-like geometries, improved life assessment procedures, thermal striping, extension of the methodology to new materials, and ASME high-temperature Code reform needs. The perceived problems and needs in each area are discussed, and the current status of related US activities is given.

Corum, J.M.

1984-01-01T23:59:59.000Z

349

Uncertainty Analysis for Photovoltaic Degradation Rates (Poster)  

SciTech Connect (OSTI)

Dependable and predictable energy production is the key to the long-term success of the PV industry. PV systems show over the lifetime of their exposure a gradual decline that depends on many different factors such as module technology, module type, mounting configuration, climate etc. When degradation rates are determined from continuous data the statistical uncertainty is easily calculated from the regression coefficients. However, total uncertainty that includes measurement uncertainty and instrumentation drift is far more difficult to determine. A Monte Carlo simulation approach was chosen to investigate a comprehensive uncertainty analysis. The most important effect for degradation rates is to avoid instrumentation that changes over time in the field. For instance, a drifting irradiance sensor, which can be achieved through regular calibration, can lead to a substantially erroneous degradation rates. However, the accuracy of the irradiance sensor has negligible impact on degradation rate uncertainty emphasizing that precision (relative accuracy) is more important than absolute accuracy.

Jordan, D.; Kurtz, S.; Hansen, C.

2014-04-01T23:59:59.000Z

350

analysis reveals candidate: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Biham 1 Adi Shamir 2 1 Computer consider Kocher's power analysis technique, which targets smart card inplementations and extracts their key by analysing their power consumption...

351

Guidance on Life-Cycle Cost Analysis Required by Executive Order...  

Energy Savers [EERE]

Documents & Publications Energy Price Indices and Discount Factors for Life-Cycle Cost Analysis - 2010 Energy Price Indices and Discount Factors for Life-Cycle Cost Analysis -...

352

SCIAMACHY MONITORING FACTORS: OBSERVATION AND END-TO-END CORRECTION OF INSTRUMENT PERFORMANCE DEGRADATION  

E-Print Network [OSTI]

DEGRADATION Klaus Bramstedt1 , Stefan No¨el1 , Heinrich Bovensmann1 , John P. Burrows1 , Christophe Lerot2Y) is a grating spectrometer in the UV-Vis-NIR spectral range. SCIA- MACHY is part of the ENVISAT payload-factors. Key words: SCIAMACHY; m-factors; degradation; mon- itoring. 1. INTRODUCTION SCIAMACHY [1] is now seven

Tilstra, Gijsbert

353

Framework for Identifying Key Environmental Concerns in Marine Renewable Energy Projects- Appendices  

SciTech Connect (OSTI)

Marine wave and tidal energy technology could interact with marine resources in ways that are not well understood. As wave and tidal energy conversion projects are planned, tested, and deployed, a wide range of stakeholders will be engaged; these include developers, state and federal regulatory agencies, environmental groups, tribal governments, recreational and commercial fishermen, and local communities. Identifying stakeholders’ environmental concerns in the early stages of the industry’s development will help developers address and minimize potential environmental effects. Identifying important concerns will also assist with streamlining siting and associated permitting processes, which are considered key hurdles by the industry in the U.S. today. In September 2008, RE Vision consulting, LLC was selected by the Department of Energy (DoE) to conduct a scenario-based evaluation of emerging hydrokinetic technologies. The purpose of this evaluation is to identify and characterize environmental impacts that are likely to occur, demonstrate a process for analyzing these impacts, identify the “key” environmental concerns for each scenario, identify areas of uncertainty, and describe studies that could address that uncertainty. This process is intended to provide an objective and transparent tool to assist in decision-making for siting and selection of technology for wave and tidal energy development. RE Vision worked with H. T. Harvey & Associates, to develop a framework for identifying key environmental concerns with marine renewable technology. This report describes the results of this study. This framework was applied to varying wave and tidal power conversion technologies, scales, and locations. The following wave and tidal energy scenarios were considered: ? 4 wave energy generation technologies ? 3 tidal energy generation technologies ? 3 sites: Humboldt coast, California (wave); Makapu’u Point, Oahu, Hawaii (wave); and the Tacoma Narrows, Washington (tidal) ? 3 project sizes: pilot, small commercial, and large commercial The possible combinations total 24 wave technology scenarios and 9 tidal technology scenarios. We evaluated 3 of the 33 scenarios in detail: 1. A small commercial OPT Power Buoy project off the Humboldt County, California coast 2. A small commercial Pelamis Wave Power P-2 project off Makapu’u Point, Oahu, Hawaii 3. A pilot MCT SeaGen tidal project, sited in the Tacoma Narrows, Washington This framework document used information available from permitting documents that were written to support actual wave or tidal energy projects, but the results obtained here should not be confused with those of the permitting documents1. The main difference between this framework document and permitting documents of currently proposed pilot projects is that this framework identifies key environmental concerns and describes the next steps in addressing those concerns; permitting documents must identify effects, find or declare thresholds of significance, evaluate the effects against the thresholds, and find mitigation measures that will minimize or avoid the effects so they can be considered less-than-significant. Two methodologies, 1) an environmental effects analysis and 2) Raptools, were developed and tested to identify potential environmental effects associated with wave or tidal energy conversion projects. For the environmental effects analysis, we developed a framework based on standard risk assessment techniques. The framework was applied to the three scenarios listed above. The environmental effects analysis addressed questions such as: ? What is the temporal and spatial exposure of a species at a site? ? What are the specific potential project effects on that species? ? What measures could minimize, mitigate, or eliminate negative effects? ? Are there potential effects of the project, or species’ response to the effect, that are highly uncertain and warrant additional study? The second methodology, Raptools, is a collaborative approach useful for evaluating multiple characteristi

Sharon Kramer; Mirko Previsic; Peter Nelson; Sheri Woo

2010-06-17T23:59:59.000Z

354

DYNAMIC INTERACTION FACTORS FOR FLOATING PILE GROUPS  

E-Print Network [OSTI]

-numerical formulation for two ideal- ized soil profiles (a homogeneous half-space and a half-space with modulus pro interaction factors for static deformation analysis of pile groups. INTRODUCTION Under static working loads) the sharing among individual piles of the load applied at the pile cap is generally uneven, with the corner

Entekhabi, Dara

355

Risk and Performance Technologies: Identifying the Keys to Successful Implementation  

SciTech Connect (OSTI)

The nuclear power industry has been utilizing risk and performance based technologies for over thirty years. Applications of these technologies have included risk assessment (e.g. Individual Plant Examinations), burden reduction (e.g. Risk-Informed Inservice Inspection, RI-ISI) and risk management (Maintenance Rule, 10CFR50.65). Over the last five to ten years the number of risk-informed (RI) burden reduction initiatives has increased. Unfortunately, the efficiencies of some of these applications have been questionable. This paper investigates those attributes necessary to support successful, cost-effective RI-applications. The premise to this paper is that by understanding the key attributes that support one successful application, insights can be gleaned that will streamline/coordinate future RI-applications. This paper is an extension to a paper presented at the Pressure Vessel and Piping (PVP-2001) Conference. In that paper, a number issues and opportunities were identified that needed to be assessed in order to support future (and efficient) RI-applications. It was noted in the paper that a proper understanding and resolution of these issues will facilitate implementation of risk and performance technology in the operation, maintenance and design disciplines. In addition, it will provide the foundation necessary to support regulatory review and approval. (authors)

McClain, Lynn [Niagara Mohawk (United States); Smith, Art [Entergy Operations (United States); O'Regan, Patrick [Electric Power Research Institute - EPRI, 3420 Hillview Avenue, Palo Alto, California 94304 (United States)

2002-07-01T23:59:59.000Z

356

Environmental labelling of green electricity with LCA key parameter models  

E-Print Network [OSTI]

Since the opening of European electricity markets, companies are launching green electricity products. In Switzerland the privately initiated eco-label “naturemade star ” ensures the environmental and ecological quality of electricity from renewable energy sources on a local scale and from a life cycle perspective. For the life cycle perspective, a simplified and partly site-specific life cycle assessment (LCA) is applied using the Eco-indicator 99 (Hierachist perspective) impact assessment method. In a first step, detailed LCAs case studies are made for power plants and technologies that are candidates for the „naturemade star “ label. They allow identifying technology-specific parameters that dominate the outcome of the LCA and for which data are available for the owner or operator of the power plant at issue. Based on this knowledge, key parameter models for photovoltaic, wind and hydroelectric power and electricity from biogas have been established on a spreadsheet-basis. With the help of the parameter models, operators of power plants can carry out the required LCA within a few hours. At the same time, they can check whether the plant fulfils the “naturemade star ” threshold or not, which has been set to 50 % of the environmental impact of a gas combined cycle power plant. Within a few months since the introduction of the labelling scheme, companies successfully applied the parameter models on nearly 50 photovoltaic and on several hydroelectric power plants. LCA is, in combination with other tools, a useful method for the definition of standards for environmental labelling of green electricity.

unknown authors

357

Key Geomechanics Issues at the Waste Isolation Pilot Plant Geomechanics  

SciTech Connect (OSTI)

Mechanical and hydrological properties of rock salt provide excellent bases for geological isolation of hazardous materials. Regulatory compliance determinations for the Waste Isolation Pilot Plant (WIPP) stand as testament to the widely held conclusion that salt provides excellent isolation properties. The WIPP saga began in the 1950s when the U.S. National Academy of Sciences (NAS) recommended a salt vault as a promising solution to the national problem of nuclear waste disposal. For over 20 years, the Scientific basis for the NAS recommendation has been fortified by Sandia National Laboratories through a series of large scale field tests and laboratory investigations of salt properties. These scientific investigations helped develop a comprehensive understanding of salt's 4 reformational behavior over an applicable range of stresses and temperatures. Sophisticated constitutive modeling, validated through underground testing, provides the computational ability to model long-term behavior of repository configurations. In concert with advancement of the mechanical models, fluid flow measurements showed not only that the evaporite lithology was essentially impermeable but that the WIPP setting was hydrologically inactive. Favorable mechanical properties ensure isolation of materials placed in a salt geological setting. Key areas of the geomechanics investigations leading to the certification of WIPP are in situ experiments, laboratory tests, and shaft seal design.

HANSEN,FRANCIS D.

1999-09-01T23:59:59.000Z

358

Lowest Engine-Out Emissions as the Key to the Future of the Heavy...  

Broader source: Energy.gov (indexed) [DOE]

Lowest Engine-Out Emissions as the Key to the Future of the Heavy-Duty Diesel Engine: New Development Rersults Lowest Engine-Out Emissions as the Key to the Future of the...

359

FGF growth factor analogs  

DOE Patents [OSTI]

The present invention provides a fibroblast growth factor heparin-binding analog of the formula: ##STR00001## where R.sub.1, R.sub.2, R.sub.3, R.sub.4, R.sub.5, X, Y and Z are as defined, pharmaceutical compositions, coating compositions and medical devices including the fibroblast growth factor heparin-binding analog of the foregoing formula, and methods and uses thereof.

Zamora, Paul O. (Gaithersburg, MD); Pena, Louis A. (Poquott, NY); Lin, Xinhua (Plainview, NY); Takahashi, Kazuyuki (Germantown, MD)

2012-07-24T23:59:59.000Z

360

The impact of BASIN-scale oceanographic and climate-related processes on the dynamics of key plankton and fish populations in the North  

E-Print Network [OSTI]

plankton and fish populations in the North Atlantic ocean: Analysis, integration, synthesis and modelling-scale oceanographic and climate-related processes on the dynamics of key plankton and fish populations in the North 1997. No. 8. Report of the first planning meeting on Small Pelagic Fishes and Climate Change Program

deYoung, Brad

Note: This page contains sample records for the topic "analysis key factors" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Evaluation of the effects of a highway improvement project on Key deer  

E-Print Network [OSTI]

assessed the potential impacts of the US 1 corridor project to Key deer movements by comparing (1) radio-collared Key deer annual ranges (2) radio-collared deer corridor movements, and (3) assessing Key deer underpass and corridor use. Female and male...

Braden, Anthony Wayne

2006-10-30T23:59:59.000Z

362

Weakness of two ID-based remote mutual authentication with key agreement protocols for mobile devices  

E-Print Network [OSTI]

to achieve explicit key confirmation. We also point out Wu's scheme decreases efficiency by using the double by the traditional public-key cryptography (Rivest et al., 1978; ElGama, l985). The computation ability and battery the number of users is increased, KAC needs a large storage space to store users' public keys

363

Imnaha Subbasin Assessment May 2004259 1.2.10.3 Key Environmental Correlates  

E-Print Network [OSTI]

, such as roads, buildings, and pollution. Including these fine-scale attributes of an animal's environment whenImnaha Subbasin Assessment May 2004259 1.2.10.3 Key Environmental Correlates Key environmental conditions. Key environmental correlates are the finest scale features that help to define wildlife habitat

364

Origin of a complex key innovation in an obligate insectplant mutualism  

E-Print Network [OSTI]

Origin of a complex key innovation in an obligate insect­plant mutualism Olle Pellmyr* and Harald W, and approved January 30, 2002 (received for review November 2, 2001) Evolutionary key innovations give for studies of coevolution, and it relies on the key innovation in the moths of complex tentacles used

Krenn, Harald W.

365

Private Key Recovery Combination Attacks: On Extreme Fragility of Popular Bitcoin  

E-Print Network [OSTI]

Private Key Recovery Combination Attacks: On Extreme Fragility of Popular Bitcoin Key Management and practical operational security in bitcoin digital currency storage systems. We study the security two most used bitcoin HD Wallet key management solutions (e.g. in BIP032 and in earlier systems). These systems

366

Distribution and abundance of endangered Florida Key deer on outer islands  

E-Print Network [OSTI]

parameters has limited status assessment and management of Key deer on outer islands. Traditional survey techniques for Key deer on Big Pine and No Name keys include road-counts, strip-counts, and mark-recapture methods. However, practical limitations render...

Watts, Dominque Elijah

2007-04-25T23:59:59.000Z

367

A Key Technology Evaluation Case Study: Applying a New Middleware Architecture on the  

E-Print Network [OSTI]

A Key Technology Evaluation Case Study: Applying a New Middleware Architecture on the Enterprise, fgoedickejuzdung@informatik.uni-essen.de Abstract Decisions for key technologies, like middleware, for large scale projects are hard, because the impact and relevance of key technologies go beyond their core technological

Zdun, Uwe

368

Los Alamos Explosives Performance Key to Stockpile Stewardship  

ScienceCinema (OSTI)

As the U.S. Nuclear Deterrent ages, one essential factor in making sure that the weapons will continue to perform as designed is understanding the fundamental properties of the high explosives that are part of a nuclear weapons system. As nuclear weapons go through life extension programs, some changes may be advantageous, particularly through the addition of what are known as "insensitive" high explosives that are much less likely to accidentally detonate than the already very safe "conventional" high explosives that are used in most weapons. At Los Alamos National Laboratory explosives research includes a wide variety of both large- and small-scale experiments that include small contained detonations, gas and powder gun firings, larger outdoor detonations, large-scale hydrodynamic tests, and at the Nevada Nuclear Security Site, underground sub-critical experiments.

Dattelbaum, Dana

2015-01-05T23:59:59.000Z

369

Anthrax Lethal Factor  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth (AOD)ProductssondeadjustsondeadjustAbout theOFFICEAmes Laboratory Site|Andrea4»Another keyAnthemat

370

SKA Key science project: Radio observations of cosmic reionization and first light  

E-Print Network [OSTI]

I update the SKA key science program (KSP) on first light and cosmic reionization. The KSP has two themes: (i) Using the 21cm line of neutral hydrogen as the most direct probe into the evolution of the neutral intergalactic medium during cosmic reionization. Such HI 21cm studies are potentially the most important new window on cosmology since the discovery of the CMB. (ii) Observing the gas, dust, star formation, and dynamics, of the first galaxies and AGN. Observations at cm and mm wavelengths, provide an unobscured view of galaxy formation within 1 Gyr of the Big Bang, and are an ideal complement to the study of stars, ionized gas, and AGN done using near-IR telescopes. I summarize HI 21cm signals, challenges, and telescopes under construction. I also discuss the prospects for studying the pre-galactic medium, prior to first light, using a low frequency telescope on the Moon. I then review the current status of mm and cm observations of the most known distant galaxies (z > 6). I make the simple argument that even a 10% SKA-high demonstrator will have a profound impact on the study of the first galaxies. In particular, extending the SKA to the 'natural' atmospheric limit (set by the O_2 line) of 45 GHz, increases the effective sensitivity to thermal emission by another factor four.

C. L. Carilli

2008-02-12T23:59:59.000Z

371

The generation of shared cryptographic keys through channel impulse response estimation at 60 GHz.  

SciTech Connect (OSTI)

Methods to generate private keys based on wireless channel characteristics have been proposed as an alternative to standard key-management schemes. In this work, we discuss past work in the field and offer a generalized scheme for the generation of private keys using uncorrelated channels in multiple domains. Proposed cognitive enhancements measure channel characteristics, to dynamically change transmission and reception parameters as well as estimate private key randomness and expiration times. Finally, results are presented on the implementation of a system for the generation of private keys for cryptographic communications using channel impulse-response estimation at 60 GHz. The testbed is composed of commercial millimeter-wave VubIQ transceivers, laboratory equipment, and software implemented in MATLAB. Novel cognitive enhancements are demonstrated, using channel estimation to dynamically change system parameters and estimate cryptographic key strength. We show for a complex channel that secret key generation can be accomplished on the order of 100 kb/s.

Young, Derek P.; Forman, Michael A.; Dowdle, Donald Ryan

2010-09-01T23:59:59.000Z

372

Secure Cryptographic Key Management System (CKMS) Considerations for Smart Grid Devices  

SciTech Connect (OSTI)

In this paper, we examine some unique challenges associated with key management in the Smart Grid and concomitant research initiatives: 1) effectively model security requirements and their implementations, and 2) manage keys and key distribution for very large scale deployments such as Smart Meters over a long period of performance. This will set the stage to: 3) develop innovative, low cost methods to protect keying material, and 4) provide high assurance authentication services. We will present our perspective on key management and will discuss some key issues within the life cycle of a cryptographic key designed to achieve the following: 1) control systems designed, installed, operated, and maintained to survive an intentional cyber assault with no loss of critical function, and 2) widespread implementation of methods for secure communication between remote access devices and control centers that are scalable and cost-effective to deploy.

Abercrombie, Robert K [ORNL] [ORNL; Sheldon, Frederick T [ORNL] [ORNL; Aldridge, Hal [ORNL] [ORNL; Duren, Mike [Sypris Electronics, LLC] [Sypris Electronics, LLC; Ricci, Tracy [Sypris Electronics, LLC] [Sypris Electronics, LLC; Bertino, Elisa [ORNL] [ORNL; Kulatunga, Athula [Purdue University] [Purdue University; Navaratne, Uditha Sudheera [Purdue University] [Purdue University

2011-01-01T23:59:59.000Z

373

Encrusting growth and retreat of Montastrea annularis (Anthozoa; Scleractinia) following the grounding of a freighter on Molasses Reef, Key Largo, Florida  

E-Print Network [OSTI]

). Because of its accessibility, it is one of the most visited reefs in the upper Florida Keys (Voss, 1984). Voss (1984) characterized the usage of Molasses Reef by divers as "heavya and use for fishing as "moderate". Structurally, ix, has s, well-developed... management, quantitative evaluation on destructive processes of coral is very necessary as well as that of constructive processes. It is suggested that the influence of previously discussed environmental factors on coral tissue retreat as well as growth...

Choi, Kwang-Sik

1987-01-01T23:59:59.000Z

374

Keys to success: Ten case studies of effective weatherization programs  

SciTech Connect (OSTI)

In 1990, DOE initiated a nationwide evaluation of its Weatherization Program, with assistance from Oak Ridge National Laboratory and an advisory group of 40 weatherization professionals, program managers, and researchers. The evaluation is comprised of three impact studies covering the Program`s major market segments: Single-family homes, mobile homes, and dwellings in small (2 to 4-unit) multifamily buildings (the Single-Family Study), Single-family homes heated primarily with fuel oil (the Fuel-Oil Study), and Dwellings in buildings with five or more units (the Multifamily Study). The Single-Family Study, the subject of this report, is a critical part of this coordinated evaluation effort. Its focus on single-family dwellings, mobile homes, and dwellings in small multifamily buildings covers 83% of the income-eligible population and 96% of the dwellings weatherized during Program Year 1989. The first phase of the Single-Family Study involved the analysis of a massive data base of information collected from 368 local weatherization agencies and 543 electric and gas utilities. This analysis resulted in energy-saving and cost-effectiveness estimates for the Weatherization Program and the identification of a set of ten high-performing agencies located throughout the country. The second phase, which is the subject of this report, involves a ``process`` evaluation of these ten high performers, aimed at identifying those weatherization practices that explain their documented success.

Brown, M.A.; Berry, L.G.; Kolb, J.O.; White, D.L. [Oak Ridge National Lab., TN (United States); Kinney, L.F.; Wilson, T. [Synertech Systems Corp., Syracuse, NY (United States)

1993-11-01T23:59:59.000Z

375

Centralized Cryptographic Key Management and Critical Risk Assessment - CRADA Final Report For CRADA Number NFE-11-03562  

SciTech Connect (OSTI)

The Department of Energy Office of Electricity Delivery and Energy Reliability (DOE-OE) Cyber Security for Energy Delivery Systems (CSEDS) industry led program (DE-FOA-0000359) entitled "Innovation for Increasing Cyber Security for Energy Delivery Systems (12CSEDS)," awarded a contract to Sypris Electronics LLC to develop a Cryptographic Key Management System for the smart grid (Scalable Key Management Solutions for Critical Infrastructure Protection). Oak Ridge National Laboratory (ORNL) and Sypris Electronics, LLC as a result of that award entered into a CRADA (NFE-11-03562) between ORNL and Sypris Electronics, LLC. ORNL provided its Cyber Security Econometrics System (CSES) as a tool to be modified and used as a metric to address risks and vulnerabilities in the management of cryptographic keys within the Advanced Metering Infrastructure (AMI) domain of the electric sector. ORNL concentrated our analysis on the AMI domain of which the National Electric Sector Cyber security Organization Resource (NESCOR) Working Group 1 (WG1) has documented 29 failure scenarios. The computational infrastructure of this metric involves system stakeholders, security requirements, system components and security threats. To compute this metric, we estimated the stakes that each stakeholder associates with each security requirement, as well as stochastic matrices that represent the probability of a threat to cause a component failure and the probability of a component failure to cause a security requirement violation. We applied this model to estimate the security of the AMI, by leveraging the recently established National Institute of Standards and Technology Interagency Report (NISTIR) 7628 guidelines for smart grid security and the International Electrotechnical Commission (IEC) 63351, Part 9 to identify the life cycle for cryptographic key management, resulting in a vector that assigned to each stakeholder an estimate of their average loss in terms of dollars per day of system operation. To further address probabilities of threats, information security analysis can be performed using game theory implemented in dynamic Agent Based Game Theoretic (ABGT) simulations. Such simulations can be verified with the results from game theory analysis and further used to explore larger scale, real world scenarios involving multiple attackers, defenders, and information assets. The strategy for the game was developed by analyzing five electric sector representative failure scenarios contained in the AMI functional domain from NESCOR WG1. From these five selected scenarios, we characterized them into three specific threat categories affecting confidentiality, integrity and availability (CIA). The analysis using our ABGT simulation demonstrated how to model the AMI functional domain using a set of rationalized game theoretic rules decomposed from the failure scenarios in terms of how those scenarios might impact the AMI network with respect to CIA.

Abercrombie, R. K. [ORNL] [ORNL; Peters, Scott [Sypris Electronics, LLC] [Sypris Electronics, LLC

2014-05-28T23:59:59.000Z

376

antitumor necrosis factor: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

single-nucleo- tide polymorphisms (SNPs) or haplotypes in the TNF Nyholt, Dale R. 10 Maximum-entropy network analysis reveals a role for tumor necrosis factor in peripheral...

377

Scatter factors assessment in microbeam radiation therapy  

SciTech Connect (OSTI)

Purpose: The success of the preclinical studies in Microbeam Radiation Therapy (MRT) paved the way to the clinical trials under preparation at the Biomedical Beamline of the European Synchrotron Radiation Facility. Within this framework, an accurate determination of the deposited dose is crucial. With that aim, the scatter factors, which translate the absolute dose measured in reference conditions (2 x 2 cm{sup 2} field size at 2 cm-depth in water) to peak doses, were assessed. Methods: Monte Carlo (MC) simulations were performed with two different widely used codes, PENELOPE and GEANT4, for the sake of safety. The scatter factors were obtained as the ratio of the doses that are deposited by a microbeam and by a field of reference size, at the reference depth. The calculated values were compared with the experimental data obtained by radiochromic (ISP HD-810) films and a PTW 34070 large area chamber. Results: The scatter factors for different microbeam field sizes assessed by the two MC codes were in agreement and reproduced the experimental data within uncertainty bars. Those correction factors were shown to be non-negligible for the future MRT clinical settings: an average 30% lower dose was deposited by a 50 {mu}m microbeam with respect to the reference conditions. Conclusions: For the first time, the scatter factors in MRT were systematically studied. They constitute an essential key to deposit accurate doses in the forthcoming clinical trials in MRT. The good agreement between the different calculations and the experimental data confirms the reliability of this challenging micrometric dose estimation.

Prezado, Y.; Martinez-Rovira, I.; Sanchez, M. [Laboratoire Imagerie et Modelisation en Neurobiologie et Cancerologie IMNC-UMR 8165, Centre National de la Recherche Scientifique (CNRS), Campus Universitaire, Bat. 440, 15 rue Georges Clemenceau, 91406 Orsay Cedex (France); Institut de Tecniques Energetiques, Universitat Politecnica de Catalunya, Diagonal 647, E-08028 Barcelona (Spain) and ID17 Biomedical Beamline, European Synchrotron Radiation Facility (ESRF), 6 Rue Jules Horowitz, B.P. 220, 38043 Grenoble Cedex (France); Servicio de Radiofisica, Complejo Hospitalario de Santiago de Compostela, Rua Choupana S/N, 15706 Santiago de Compostela (Spain)

2012-03-15T23:59:59.000Z

378

Nucleon and $?$ elastic and transition form factors  

E-Print Network [OSTI]

We compute nucleon and Delta elastic and transition form factors, and compare predictions made using a framework built upon a Faddeev equation kernel and interaction vertices that possess QCD-like momentum dependence with results obtained using a vector-vector contact-interaction. The comparison emphasises that experiment is sensitive to the momentum dependence of the running couplings and masses in the strong interaction sector of the Standard Model and highlights that the key to describing hadron properties is a veracious expression of dynamical chiral symmetry breaking in the bound-state problem. Amongst the results we describe, the following are of particular interest: $G_E^p(Q^2)/G_M^p(Q^2)$ possesses a zero at $Q^2=9.5GeV^2$; any change in the interaction which shifts a zero in the proton ratio to larger $Q^2$ relocates a zero in $G_E^n(Q^2)/G_M^n(Q^2)$ to smaller $Q^2$; and there is likely a value of momentum transfer above which $G_E^n>G_E^p$. Regarding the $\\Delta(1232)$-baryon, we find that, inter alia: the electric monopole form factor exhibits a zero; the electric quadrupole form factor is negative, large in magnitude, and sensitive to the nature and strength of correlations in the $\\Delta(1232)$ Faddeev amplitude; and the magnetic octupole form factor is negative so long as rest-frame P- and D-wave correlations are included. In connection with the N-to-Delta transition, the momentum-dependence of the magnetic transition form factor, $G_M^\\ast$, matches that of $G_M^n$ once the momentum transfer is high enough to pierce the meson-cloud; and the electric quadrupole ratio is a keen measure of diquark and orbital angular momentum correlations.

Jorge Segovia; Ian C. Cloet; Craig D. Roberts; Sebastian M. Schmidt

2014-09-03T23:59:59.000Z

379

Factors Affecting Photosynthesis!  

E-Print Network [OSTI]

Factors Affecting Photosynthesis! Temperature Eppley (1972) Light Sverdrup's Critical Depth-493, but the general concept is still valid! ! #12;PB opt & Temperature! #12;Photosynthesis & Temperature! Remember: in the laboratory, we can measure photosynthesis versus irradiance (PvsE) and calculate Ek, Pmax, and alpha

Kudela, Raphael M.

380

Public Health FAT FACTORS  

E-Print Network [OSTI]

: THE UNITED STATES SPENDS MORE ON HEALTH CARE THAN ANY OTHER COUNTRY. YET WE CONTINUE TO FALL FAR BEHIND States spends an astonishing percent of our gross domestic product on health care--significantly moreColumbia Public Health HOT TOPIC Climate Change FAT FACTORS Obesity Prevention BOOK SMART

Qian, Ning

Note: This page contains sample records for the topic "analysis key factors" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Utility & Regulatory Factors Affecting Cogeneration & Independent Power Plant Design & Operation  

E-Print Network [OSTI]

UTILITY & REGULATORY FACTORS AFFECTiNG COGENERATION & INDEPENDENT POWER PLANT DESIGN & OPERATION Richard P. Felak General Electric Company Schenectady, New York ABSTRACT In specifying a cogeneration or independent power plant, the owner... should be especially aware of the influences which electric utilities and regulatory bodies will have on key parameters such as size, efficiency, design. reliability/ availabilitY, operating capabilities and modes, etc. This paper will note examples...

Felak, R. P.

382

MATHEMATICAL ANALYSIS OF CONDUCTING AND SUPERCONDUCTING TRANSMISSION LINES  

E-Print Network [OSTI]

MATHEMATICAL ANALYSIS OF CONDUCTING AND SUPERCONDUCTING TRANSMISSION LINES ANNE-SOPHIE BONNET propagation in the microstrip transmission lines used in microelectronics. In the first part, the case of the perfectly conducting strip. Key words. superconducting transmission lines, waveguides, spectral analysis

Ramdani, Karim - Institut de Mathématiques �lie Cartan, Université Henri Poincaré

383

Attached sunspace design analysis  

SciTech Connect (OSTI)

An introduction to new design analysis information for attached sunspaces is presented. The 28 sunspace reference designs are described. Note is taken of those designs (the semi-enclosed geometries) analyzed more recently than the previously published reports. The role of sensitivity studies is discussed, and some sample plots of sunspace performance sensitivity to key design parameters are presented. The monthly solar load ratio (SLR) correlations are reviewed with emphasis on the modified SLR used in the sunspace analysis. The application of the sunspace SLR correlations to monthly design analysis is outlined.

Jones, R.W.; McFarland, R.D.

1981-01-01T23:59:59.000Z

384

Secure multi-party communication with quantum key distribution managed by trusted authority  

DOE Patents [OSTI]

Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD are extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.

Nordholt, Jane Elizabeth; Hughes, Richard John; Peterson, Charles Glen

2013-07-09T23:59:59.000Z

385

Tulenovo field holds key to new drilling in Bulgaria  

SciTech Connect (OSTI)

Tulenovo oil field is located on the Bulgarian Black Sea coast, 60 km northeast of the port of Varna and 25 km south of the Romanian border. The accumulation, second largest in Bulgaria, has several unusual technical features: shallow depth ({+-}350 m); cavernous porosity, giving excellent reservoir quality, oil recovery, and production flow rates; an effective chalk seal; controversial and unproven source rock; a secondary gas cap; and extensive well coverage yielding detailed reservoir data. The field`s gas cap is reported to contain 94% methane and > 5% nitrogen. The gas is not in equilibrium with the underlying oil and is interpreted to represent a secondary feature resulting from more recent thermal or biogenic gas generation. Carbon isotope analysis of the gas is not available to resolve this matter. The most likely source of the gas is the fore-deep to the Balkan mountains (the Kamchia depression), located south of the field. The paper describes the reservoir, its seal, oil and gas characteristics, structure, production performance, and development plans.

Bottomley, S.; Pritchard, G. [Balkan Explorers (Bulgaria) Ltd., London (United Kingdom)

1998-03-02T23:59:59.000Z

386

Daylight operation of a free space, entanglement-based quantum key distribution system  

E-Print Network [OSTI]

Many quantum key distribution (QKD) implementations using a free space transmission path are restricted to operation at night time in order to distinguish the signal photons used for a secure key establishment from background light. Here, we present a lean entanglement-based QKD system overcoming that imitation. By implementing spectral, spatial and temporal filtering techniques, we were able to establish a secure key continuously over several days under varying light and weather conditions.

Peloso, Matthew P; Ho, Caleb; Lamas-Linares, Antia; Kurtsiefer, Christian

2008-01-01T23:59:59.000Z

387

Daylight operation of a free space, entanglement-based quantum key distribution system  

E-Print Network [OSTI]

Many quantum key distribution (QKD) implementations using a free space transmission path are restricted to operation at night time in order to distinguish the signal photons used for a secure key establishment from background light. Here, we present a lean entanglement-based QKD system overcoming that imitation. By implementing spectral, spatial and temporal filtering techniques, we were able to establish a secure key continuously over several days under varying light and weather conditions.

Matthew P. Peloso; Ilja Gerhardt; Caleb Ho; Antia Lamas-Linares; Christian Kurtsiefer

2008-12-10T23:59:59.000Z

388

Scintillation has minimal impact on far-field Bennett-Brassard 1984 protocol quantum key distribution  

SciTech Connect (OSTI)

The effect of scintillation, arising from propagation through atmospheric turbulence, on the sift and error probabilities of a quantum key distribution (QKD) system that uses the weak-laser-pulse version of the Bennett-Brassard 1984 (BB84) protocol is evaluated. Two earth-space scenarios are examined: satellite-to-ground and ground-to-satellite transmission. Both lie in the far-field power-transfer regime. This work complements previous analysis of turbulence effects in near-field terrestrial BB84 QKD [J. H. Shapiro, Phys. Rev. A 67, 022309 (2003)]. More importantly, it shows that scintillation has virtually no impact on the sift and error probabilities in earth-space BB84 QKD, something that has been implicitly assumed in prior analyses for that application. This result contrasts rather sharply with what is known for high-speed laser communications over such paths, in which deep, long-lived scintillation fades present a major challenge to high-reliability operation.

Shapiro, Jeffrey H. [Research Laboratory of Electronics, Massachusetts Institute of Technology, Cambridge, Massachusetts 02139 (United States)

2011-09-15T23:59:59.000Z

389

E-Print Network 3.0 - apoptosis key players Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Summary: -publication: http:www.landesbioscience.comjournalsccabstract.php?id3262 KEY WORDS cyclin A, apoptosis, Xenopus... is Sufficient but not Required for the...

390

E-Print Network 3.0 - address key issues Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

term schedule. Summary: to their rental fees, before they obtain their locker key. Lockout situations can only be addressed through... of the renter to clean out hisher locker...

391

Modeling Metal Fatigue As a Key Step in PV Module Life Time Prediction (Presentation)  

SciTech Connect (OSTI)

This presentation covers modeling metal fatigue as a key step in photovoltaic (PV) module lifetime predictions. Described are time-dependent and time-independent case studies.

Bosco, N.

2012-02-01T23:59:59.000Z

392

Your biodiversity in my backyard : key local stakeholders' perceptions of biodiversity conservation in Gorontalo, Indonesia.  

E-Print Network [OSTI]

??The establishment of protected areas (PAs) has been the key national strategy in biodiversity conservation, through preserving the unique wildlife and ecosystems in Indonesia. As… (more)

Kartikasari, Sri Nurani

2008-01-01T23:59:59.000Z

393

Impact analysis of MBTA 2009 Key Bus Route Initiative program ; Impact analysis of Massachusetts Bay Transit Agency 2009 Key Bus Route Initiative program ; Impact analysis of Massachusetts Bay Transit Agency 2009 KBRI program .  

E-Print Network [OSTI]

??The Massachusetts Bay Transit Agency (MBTA) has the stated service objectives of customer service excellence, accessibility, reliability, and state-of-the-art technology. Over the last few years,… (more)

Woods, Gregory

2010-01-01T23:59:59.000Z

394

ADVANCED POWER SYSTEMS ANALYSIS TOOLS  

SciTech Connect (OSTI)

The use of Energy and Environmental Research Center (EERC) modeling tools and improved analytical methods has provided key information in optimizing advanced power system design and operating conditions for efficiency, producing minimal air pollutant emissions and utilizing a wide range of fossil fuel properties. This project was divided into four tasks: the demonstration of the ash transformation model, upgrading spreadsheet tools, enhancements to analytical capabilities using the scanning electron microscopy (SEM), and improvements to the slag viscosity model. The ash transformation model, Atran, was used to predict the size and composition of ash particles, which has a major impact on the fate of the combustion system. To optimize Atran key factors such as mineral fragmentation and coalescence, the heterogeneous and homogeneous interaction of the organically associated elements must be considered as they are applied to the operating conditions. The resulting model's ash composition compares favorably to measured results. Enhancements to existing EERC spreadsheet application included upgrading interactive spreadsheets to calculate the thermodynamic properties for fuels, reactants, products, and steam with Newton Raphson algorithms to perform calculations on mass, energy, and elemental balances, isentropic expansion of steam, and gasifier equilibrium conditions. Derivative calculations can be performed to estimate fuel heating values, adiabatic flame temperatures, emission factors, comparative fuel costs, and per-unit carbon taxes from fuel analyses. Using state-of-the-art computer-controlled scanning electron microscopes and associated microanalysis systems, a method to determine viscosity using the incorporation of grey-scale binning acquired by the SEM image was developed. The image analysis capabilities of a backscattered electron image can be subdivided into various grey-scale ranges that can be analyzed separately. Since the grey scale's intensity is dependent on the chemistry of the particle, it is possible to map chemically similar areas which can also be related to the viscosity of that compound at temperature. A second method was also developed to determine the elements associated with the organic matrix of the coals, which is currently determined by chemical fractionation. Mineral compositions and mineral densities can be determined for both included and excluded minerals, as well as the fraction of the ash that will be represented by that mineral on a frame-by-frame basis. The slag viscosity model was improved to provide improved predictions of slag viscosity and temperature of critical viscosity for representative Powder River Basin subbituminous and lignite coals.

Robert R. Jensen; Steven A. Benson; Jason D. Laumb

2001-08-31T23:59:59.000Z

395

Human Factors design and evaluation criteria applied to academic and instructional websites.  

E-Print Network [OSTI]

??This culminating project applies Human Factors principles to the analysis of various web designs. This culminating project consists of three major parts. The first chapter… (more)

Mendez, Veronica

2015-01-01T23:59:59.000Z

396

The Examination of Factors Associated in Motorcycle Crashes in Work Zones.  

E-Print Network [OSTI]

??This paper analyzes the factors associated in motorcycle crashes in work zones. This analysis was completed through the collection and inspection of three types of… (more)

Stakleff, Brandon Alexander

2013-01-01T23:59:59.000Z

397

Energy use and carbon dioxide emissions in the steel sector in key developing countries  

E-Print Network [OSTI]

intensities and the carbon emission factor for each process.through fuel switching. Carbon emissions factors used infor reduction in carbon emissions was slightly larger than

Price, Lynn; Phylipsen, Dian; Worrell, Ernst

2001-01-01T23:59:59.000Z

398

Management decisions for cogeneration : a survey analysis  

E-Print Network [OSTI]

This study explores the underlying factors in the decision by private, private non-profit, and public sector facility owners to invest in cogeneration technology. It employs alpha factor analysis techniques to develop ...

Radcliffe, Robert R.

1982-01-01T23:59:59.000Z

399

Major Long Haul Truck Idling Generators in Key States ELECTRIC POWER RESEARCH INSTITUTE  

E-Print Network [OSTI]

Major Long Haul Truck Idling Generators in Key States 1013776 #12;#12;ELECTRIC POWER RESEARCH-0813 USA 800.313.3774 650.855.2121 askepri@epri.com www.epri.com Major Long Haul Truck Idling Generators Haul Truck Idling Generators in Key States. EPRI, Palo Alto, CA: 2008. 1013776. #12;#12;v PRODUCT

400

The Continental Margin is a Key Source of Iron to the HNLC North Pacific Ocean  

E-Print Network [OSTI]

The Continental Margin is a Key Source of Iron to the HNLC North Pacific Ocean Phoebe J. Lam1 concentrations in the upper 500m of the Western Subarctic Pacific, an iron-limited High Nutrient Low Chlorophyll a key source of bioavailable Fe to the HNLC North Pacific. Keywords: iron, continental margin, HNLC 1

Note: This page contains sample records for the topic "analysis key factors" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

A Trustful Authentication and Key Exchange Scheme (TAKES) for Ad Hoc Networks  

E-Print Network [OSTI]

A Trustful Authentication and Key Exchange Scheme (TAKES) for Ad Hoc Networks Tony Cheneau National public key distribution scheme adapted to ad hoc networks called TAKES for Trustful Authentication, or even implementing a light naming system can be enabled on top of ad hoc networks. TAKES is formally

Paris-Sud XI, Université de

402

Granite Recrystallization The Key to an Alternative Strategy for HLW Disposal? Fergus G.F. Gibb  

E-Print Network [OSTI]

Granite Recrystallization ­ The Key to an Alternative Strategy for HLW Disposal? Fergus G.F. Gibb, and hence the key to the entire strategy, depends on whether sufficient melting of granite host rock can-temperature, high-pressure experiments reported here demonstrate that granite can be partially melted and completely

Sheffield, University of

403

A Single-Key Attack on 6-Round KASUMI Teruo Saito1  

E-Print Network [OSTI]

A Single-Key Attack on 6-Round KASUMI Teruo Saito1 NEC Software Hokuriku, Ltd. 1, Anyoji, Hakusan. In 2010, a related-key attack on full KASUMI was reported. The attack was very powerful and worked in practical complexity. However the attack was not a direct threat to full KASUMI because of the impractical

404

Band structures Optical absorption Summary Key concepts in Density Functional Theory (II)  

E-Print Network [OSTI]

Band structures Optical absorption Summary Key concepts in Density Functional Theory (II) Kohn, Belfast Key concepts in Density Functional Theory (II) Silvana Botti #12;Band structures Optical in Density Functional Theory (II) Silvana Botti #12;Band structures Optical absorption Summary Outline 1 From

Botti, Silvana

405

An efficient certificateless two-party authenticated key agreement scheme from  

E-Print Network [OSTI]

-based cryptography. Key agreement(KA) schemes are designed to provide secure communications between two or more proposed. However, these schemes need to compute at least one pairing on-line. In order to improve to finished the key agreement. Our scheme's overhead is lower than that of previous schemes [3

406

Modified Bennett-Brassard 1984 Quantum Key Distribution With Two-way Classical Communications  

E-Print Network [OSTI]

The quantum key distribution protocol without public announcement of bases is equipped with a two-way classical communication symmetric entanglement purification protocol. This modified key distribution protocol is unconditionally secure and has a higher tolerable error rate of 20%, which is higher than previous scheme without public announcement of bases.

Kai Wen; Gui Lu Long

2005-08-27T23:59:59.000Z

407

Linkages between coastal runoff and the Florida Keys ecosystem: A study of a dark plume event  

E-Print Network [OSTI]

of a dark water plume from near Charlotte Harbor, Florida, to the Dry Tortugas in the Florida Keys in mid, respectively. The dark color became increasingly dominated by colored dissolved organic matter, toward the DryLinkages between coastal runoff and the Florida Keys ecosystem: A study of a dark plume event

408

Public Key Encryption that Allows PIR Queries Dan Boneh # Eyal Kushilevitz + Rafail Ostrovsky #  

E-Print Network [OSTI]

Public Key Encryption that Allows PIR Queries Dan Boneh # Eyal Kushilevitz + Rafail Ostrovsky a public­key encryption scheme for Alice that allows PIR searching over encrypted documents. Our solution­trivially small communication complexity. The main technique of our solution also allows for Single­Database PIR

409

Energy Efficiency of Symmetric Key Cryptographic Algorithms in Wireless Sensor Networks  

E-Print Network [OSTI]

Energy Efficiency of Symmetric Key Cryptographic Algorithms in Wireless Sensor Networks Xueying-- In this paper, we examine the energy efficiency of symmetric key cryptographic algorithms applied in wireless energy efficiency with a level of security suitable for wireless sensor networks. Keywords - wireless

Heys, Howard

410

A Method for Obtaining Digital Signatures and PublicKey Cryptosystems  

E-Print Network [OSTI]

re­ vealing an encryption key does not thereby reveal the corresponding decryption key. This has two, or the entire work requires specific permission as does republication, or systematic or multiple reproduction . Formally, D(E(M) = M: (1) (b) Both E and D are easy to compute. (c) By publicly revealing E the user does

Goldwasser, Shafi

411

Direct quadrature phase shift keying modulator using six-port technology  

E-Print Network [OSTI]

Direct quadrature phase shift keying modulator using six-port technology Y. Zhao, C. Viereck, J.F. Frigon, R.G. Bosisio and K. Wu A direct quadrature phase shift keying modulator based on six-port technology is presented. The modulator comprises a six-port circuit, a switch matrix and open and short

Frigon, Jean-François

412

Structured Codes Improve the Bennett-Brassard-84 Quantum Key Rate  

E-Print Network [OSTI]

A central goal in information theory and cryptography is finding simple characterizations of optimal communication rates subject to various restrictions and security requirements. Ideally, the optimal key rate for a quantum key distribution (QKD) protocol would be given by {\\em single-letter formula} involving a simple optimization over a single use of an effective channel. We explore the possibility of such a formula for one of the simplest and most widely used QKD protocols--Bennett-Brassard-84 (BB84) with one way classical post-processing. We show that a conjectured single-letter key-rate formula is false, uncovering a deep ignorance about asymptotically good private codes and pointing towards unfortunate complications in the theory of QKD. These complications are not without benefit--with added complexity comes better key rates than previously thought possible. We improve the threshold for secure key generation from a bit error rate of 0.124 to 0.129.

Graeme Smith; Joseph M. Renes; John A. Smolin

2008-04-28T23:59:59.000Z

413

System theoretic approach for determining causal factors of quality loss in complex system design  

E-Print Network [OSTI]

Identifying the factors that could lead to the loss of quality is difficult for large, complex systems. Traditional design methods such as Failure Modes and Effects Analysis (FMEA), Fault Tree Analysis (FTA), and Robust ...

Goerges, Stephanie L

2013-01-01T23:59:59.000Z

414

System Theoretic Approach for Determining Causal Factors of Quality Loss in Complex System Design  

E-Print Network [OSTI]

. Traditional design methods such as Failure Modes and Effects Analysis (FMEA), Fault Tree Analysis (FTA to identify more causal factors for quality losses than FMEA or FTA, including component interactions

415

A QUICK KEY TO THE SUBFAMILIES AND GENERA OF ANTS OF THE SAVANNAH RIVER SITE  

SciTech Connect (OSTI)

This taxonomic key was devised to support development of a Rapid Bioassessment Protocol using ants at the Savannah River Site. The emphasis is on 'rapid' and, because the available keys contained a very large number of genera not known to occur at the Savannah River Site, we found that the available keys were unwieldy. Because these keys contained many more genera than we would ever encounter and because this larger number of genera required more couplets in the key and often required examination of characters that are difficult to assess without higher magnifications (60X or higher), more time was required to process samples. In developing this set of keys I emphasized character states that are easier for nonspecialists to recognize. I recognize that the character sets used may lead to some errors but I believe that the error rate will be small and, for the purpose of rapid bioassessment, this error rate will be acceptable provided that overall sample sizes are adequate. Oliver and Beattie (1996a, 1996b) found that for rapid assessment of biodiversity the same results were found when identifications were done to morphospecies by people with minimal expertise as when the same data sets were identified by subject matter experts. Basset et al. (2004) concluded that it was not as important to correctly identify all species as it was to be sure that the study included as many functional groups as possible. If your study requires high levels of accuracy, it is highly recommended that, when you key out a specimen and have any doubts concerning the identification, you should refer to keys in Bolton (1994) or to the other keys used to develop this area specific taxonomic key.

Martin, D

2007-09-04T23:59:59.000Z

416

Nucleon Electromagnetic Form Factors  

SciTech Connect (OSTI)

There has been much activity in the measurement of the elastic electromagnetic proton and neutron form factors in the last decade, and the quality of the data has greatly improved by performing double polarization experiments, in comparison with previous unpolarized data. Here we review the experimental data base in view of the new results for the proton, and neutron, obtained at JLab, MAMI, and MIT-Bates. The rapid evolution of phenomenological models triggered by these high-precision experiments will be discussed, including the recent progress in the determination of the valence quark generalized parton distributions of the nucleon, as well as the steady rate of improvements made in the lattice QCD calculations.

Marc Vanderhaeghen; Charles Perdrisat; Vina Punjabi

2007-10-01T23:59:59.000Z

417

E-Print Network 3.0 - analysis similarity analogy Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Proceedings of the 7 th World Conference on Information Security Education 910 June 2011, Lucerne, Switzerland Summary: and systems analysis was outside their experience. Key to...

418

Lifestyle Factors in U.S. Residential Electricity Consumption  

SciTech Connect (OSTI)

A multivariate statistical approach to lifestyle analysis of residential electricity consumption is described and illustrated. Factor analysis of selected variables from the 2005 U.S. Residential Energy Consumption Survey (RECS) identified five lifestyle factors reflecting social and behavioral choices associated with air conditioning, laundry usage, personal computer usage, climate zone of residence, and TV use. These factors were also estimated for 2001 RECS data. Multiple regression analysis using the lifestyle factors yields solutions accounting for approximately 40% of the variance in electricity consumption for both years. By adding the associated household and market characteristics of income, local electricity price and access to natural gas, variance accounted for is increased to approximately 54%. Income contributed only {approx}1% unique variance to the 2005 and 2001 models, indicating that lifestyle factors reflecting social and behavioral choices better account for consumption differences than income. This was not surprising given the 4-fold range of energy use at differing income levels. Geographic segmentation of factor scores is illustrated, and shows distinct clusters of consumption and lifestyle factors, particularly in suburban locations. The implications for tailored policy and planning interventions are discussed in relation to lifestyle issues.

Sanquist, Thomas F.; Orr, Heather M.; Shui, Bin; Bittner, Alvah C.

2012-03-30T23:59:59.000Z

419

Phase-remapping attack in practical quantum-key-distribution systems  

SciTech Connect (OSTI)

Quantum key distribution (QKD) can be used to generate secret keys between two distant parties. Even though QKD has been proven unconditionally secure against eavesdroppers with unlimited computation power, practical implementations of QKD may contain loopholes that may lead to the generated secret keys being compromised. In this paper, we propose a phase-remapping attack targeting two practical bidirectional QKD systems (the 'plug-and-play' system and the Sagnac system). We showed that if the users of the systems are unaware of our attack, the final key shared between them can be compromised in some situations. Specifically, we showed that, in the case of the Bennett-Brassard 1984 (BB84) protocol with ideal single-photon sources, when the quantum bit error rate (QBER) is between 14.6% and 20%, our attack renders the final key insecure, whereas the same range of QBER values has been proved secure if the two users are unaware of our attack; also, we demonstrated three situations with realistic devices where positive key rates are obtained without the consideration of Trojan horse attacks but in fact no key can be distilled. We remark that our attack is feasible with only current technology. Therefore, it is very important to be aware of our attack in order to ensure absolute security. In finding our attack, we minimize the QBER over individual measurements described by a general POVM, which has some similarity with the standard quantum state discrimination problem.

Fung, Chi-Hang Fred; Qi, Bing; Lo, Hoi-Kwong [Center for Quantum Information and Quantum Control, Department of Electrical and Computer Engineering and Department of Physics, University of Toronto, Toronto, Ontario (Canada); Tamaki, Kiyoshi [NTT Basic Research Laboratories, NTT Corporation, 3-1, Morinosato Wakamiya Atsugi-Shi, Kanagawa 243-0198, Japan and CREST, JST Agency, 4-1-8 Honcho, Kawaguchi, Saitama 332-0012 (Japan)

2007-03-15T23:59:59.000Z

420

Quantum key distribution over 25 km with an all-fiber continuous-variable system  

E-Print Network [OSTI]

We report on the implementation of a reverse-reconciliated coherent-state continuous-variable quantum key distribution system, with which we generated secret keys at a rate of more than 2 kb/s over 25 km of optical fiber. Time multiplexing is used to transmit both the signal and phase reference in the same optical fiber. Our system includes all experimental aspects required for a field implementation of a quantum key distribution setup. Real-time reverse reconciliation is achieved by using fast and efficient LDPC error correcting codes.

Jerome Lodewyck; Matthieu Bloch; Raul Garcia-Patron; Simon Fossier; Evgueni Karpov; Eleni Diamanti; Thierry Debuisschert; Nicolas J. Cerf; Rosa Tualle-Brouri; Steven W. McLaughlin; Philippe Grangier

2007-09-04T23:59:59.000Z

Note: This page contains sample records for the topic "analysis key factors" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

INT. J. CONTROL, 1989, VOL. 50, NO. 6, 25832597 Doubly coprime factorization, reduced-order observers, and dynamic  

E-Print Network [OSTI]

of the results in the factorization approach to multivariable control system analysis and synthesis. In work in the factorization approach to multivariable control system analysis and synthesis (Vidyasagar 1985). In an important by Nett d d, (1984), explicit state-space realizations of these factorization are derived using results

Moore, John Barratt

422

Key Collections  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-SeriesFlickrinformationPostdocs & Graduates > TheFoxLeads DOE's E-gov

423

Survival curves of heated bacterial spores:1 Effect of environmental factors on Weibull parameters2  

E-Print Network [OSTI]

be applied for canning process calculations.24 Key words:25 Weibull distribution, Heat treatment pH, recovery1 Survival curves of heated bacterial spores:1 Effect of environmental factors on Weibull heat13 resistance for non-log linear survival curves. One simple model derived from the Weibull14

Brest, Université de

424

Evaporation — a key mechanism for the thaumasite form of sulfate attack  

SciTech Connect (OSTI)

Understanding the mechanisms leading to chemical attack on concrete is crucial in order to prevent damage of concrete structures. To date, most studies on sulfate attack and thaumasite formation are based on empirical approaches, as the identification of associated reaction mechanisms and paths is known to be highly complex. In this study, sulfate damaged concrete from Austrian tunnels was investigated by mineralogical, chemical and isotope methods to identify the reactions which caused intense concrete alteration. Major, minor and trace elemental contents as well as isotope ratios of local ground water (GW), drainage water (DW) and interstitial solutions (IS), extracted from damaged concrete material, were analyzed. Locally occurring GW contained 3 to 545 mg L{sup ?1} of SO{sub 4} and is thus regarded as slightly aggressive to concrete in accordance to standard specifications (e.g. DIN EN 206-1). The concrete linings and drainage systems of the studied tunnels, however, have partly suffered from intensive sulfate attack. Heavily damaged concrete consisted mainly of thaumasite, secondary calcite, gypsum, and relicts of aggregates. Surprisingly, the concentrations of dissolved ions were extremely enriched in the IS with up to 30,000 and 12,000 mg L{sup ?1} of SO{sub 4} and Cl, respectively. Analyses of aqueous ions with a highly conservative behavior, e.g. K, Rb and Li, as well as {sup 2}H/H and {sup 18}O/{sup 16}O isotope ratios of H{sub 2}O of the IS showed an intensive accumulation of ions and discrimination of the light isotopes vs. the GW. These isotope signals of the IS clearly revealed evaporation at distinct relative humidities. From ion accumulation and isotope fractionation individual total and current evaporation degrees were estimated. Our combined elemental and isotopic approach verified wetting–drying cycles within a highly dynamic concrete-solution-atmosphere system. Based on these boundary conditions, key factors controlling thaumasite formation are discussed regarding the development of more sulfate-resistant concrete and concrete structures.

Mittermayr, Florian, E-mail: f.mittermayr@tugraz.at [Graz University of Technology, Institute of Applied Geosciences, Rechbauerstraße 12, 8010 GRAZ (Austria)] [Graz University of Technology, Institute of Applied Geosciences, Rechbauerstraße 12, 8010 GRAZ (Austria); Baldermann, Andre [Graz University of Technology, Institute of Applied Geosciences, Rechbauerstraße 12, 8010 GRAZ (Austria)] [Graz University of Technology, Institute of Applied Geosciences, Rechbauerstraße 12, 8010 GRAZ (Austria); Kurta, Christoph [University of Graz, Institute of Chemistry — Analytical Chemistry, Stremayrgasse 16/III, 8010 GRAZ (Austria)] [University of Graz, Institute of Chemistry — Analytical Chemistry, Stremayrgasse 16/III, 8010 GRAZ (Austria); Rinder, Thomas [Graz University of Technology, Institute of Applied Geosciences, Rechbauerstraße 12, 8010 GRAZ (Austria) [Graz University of Technology, Institute of Applied Geosciences, Rechbauerstraße 12, 8010 GRAZ (Austria); Observatoire Midi-Pyrénées, Laboratoire Géosciences Environnement Toulouse, 14, avenue Edouard Belin, 31400 TOULOUSE (France); Klammer, Dietmar [Graz University of Technology, Institute of Applied Geosciences, Rechbauerstraße 12, 8010 GRAZ (Austria)] [Graz University of Technology, Institute of Applied Geosciences, Rechbauerstraße 12, 8010 GRAZ (Austria); Leis, Albrecht [Joanneum Research, Resources — Institute for Water, Energy and Sustainability, Elisabethstraße 18/2, 8010 GRAZ (Austria)] [Joanneum Research, Resources — Institute for Water, Energy and Sustainability, Elisabethstraße 18/2, 8010 GRAZ (Austria); Tritthart, Josef [Graz University of Technology, Institute of Technology and Testing of Building Materials, Inffeldgasse 24, 8010 GRAZ (Austria)] [Graz University of Technology, Institute of Technology and Testing of Building Materials, Inffeldgasse 24, 8010 GRAZ (Austria); Dietzel, Martin [Graz University of Technology, Institute of Applied Geosciences, Rechbauerstraße 12, 8010 GRAZ (Austria)] [Graz University of Technology, Institute of Applied Geosciences, Rechbauerstraße 12, 8010 GRAZ (Austria)

2013-07-15T23:59:59.000Z

425

Color Key 1/25/2012 4.1.1 PTCS and Heat Pump Measures  

E-Print Network [OSTI]

Color Key 1/25/2012 4.1.1 PTCS and Heat Pump Measures Staff Summary of Ecotope Recommendation: Staff Response and Recommended Action: 4.1.3 Ductless Heat Pumps Staff Summary of Ecotope Recommendation

426

Exploiting KeyNote in WebCom: Architecture Neutral Glue for Trust Management  

E-Print Network [OSTI]

Exploiting KeyNote in WebCom: Architecture Neutral Glue for Trust Management Simon N. Foley, Thomas B. Quillinan, John P. Morrison, David A. Power, James J. Kennedy. Department of Computer Science

Foley, Simon

427

Broadband marine MT exploration of the East Pacific Rise at 9500 Kerry Key and Steven Constable  

E-Print Network [OSTI]

Broadband marine MT exploration of the East Pacific Rise at 9°°500 N Kerry Key and Steven Constable., and S. Constable, Broadband marine MT exploration of the East Pacific Rise at 9°500 N, Geophys. Res

Key, Kerry

428

Test Scanning Request Form Please complete one form for each test and key.  

E-Print Network [OSTI]

Test Scanning Request Form Please complete one form for each test and key. This Section: Test Name: Contact Person: Email Regarding This Scan Date Received Time Initials Number of Tests Scored: / / : A.M. P

Pantaleone, Jim

429

Environmental Activism as Collective Action Key words: Environmental activism, environmental behavior, collective action,  

E-Print Network [OSTI]

Environmental Activism as Collective Action Key words: Environmental activism, environmental behavior, collective action, environmentalism, collective interest model. Mark Lubell Department The literature on environmental activism has failed to produce a model of individual decision- making explicitly

Lubell, Mark

430

Vit Plant receives and sets key air filtration equipment for Low Activity Waste Facility  

Broader source: Energy.gov [DOE]

WTP lifted a nearly 100-ton carbon bed absorber into the Low-Activity Waste Facility. This key piece of air-filtration equipment will remove mercury and acidic gases before air is channeled through...

431

HES Human Environmental Sciences KEY: # = new course * = course changed = course dropped  

E-Print Network [OSTI]

HES Human Environmental Sciences KEY: # = new course * = course changed = course dropped SchoolofHumanEnvironmentalSciences HES 100 AN INTRODUCTION TO PROFESSIONS IN HUMAN ENVIRONMENTAL SCIENCES. (1) An orientation to human environmental sciences, its history, contemporary issues and philosophy

MacAdam, Keith

432

Security of the Quantum Key Distribution with Blind Polarization Bases against Impersonation Attack  

E-Print Network [OSTI]

In this paper, we briefly show how the quantum key distribution with blind polarization bases [Kye et al., Phys. Rev. Lett. 95, 040501 (2005)] can be made secure against the impersonation attack.

Won-Ho Kye; M. S. Kim

2006-02-24T23:59:59.000Z

433

Security against the Invisible Photon Attack for the Quantum Key Distribution with Blind Polarization Bases  

E-Print Network [OSTI]

In this paper, we briefly show how the quantum key distribution with blind polarization bases [Kye et al., Phys. Rev. Lett. 95, 040501 (2005)] can be made secure against the invisible photon attack.

Won-Ho Kye; M. S. Kim

2005-08-03T23:59:59.000Z

434

Scintillation has minimal impact on far-field Bennett-Brassard 1984 protocol quantum key distribution  

E-Print Network [OSTI]

The effect of scintillation, arising from propagation through atmospheric turbulence, on the sift and error probabilities of a quantum key distribution (QKD) system that uses the weak-laser-pulse version of the Bennett-Brassard ...

Shapiro, Jeffrey H.

435

A key extensional metamorphic complex reviewed and restored: The Menderes Massif of western Turkey  

E-Print Network [OSTI]

A key extensional metamorphic complex reviewed and restored: The Menderes Massif of western Turkey of the Menderes Massif in western Turkey, and subsequently a map-view restoration of its Neogene unroofing history

Utrecht, Universiteit

436

A Comparison of Key PV Backsheet and Module Properties from Fielded...  

Broader source: Energy.gov (indexed) [DOE]

of Key PV Backsheet and Module Properties from Fielded Module Exposures and Accelerated Test Conditions W. Gambogi 1 , O. Fu 2 , Y. Heta 3 , K. Hashimoto 3 , J. Kopchick 1...

437

V-159: RSA SecurID Agent Discloses Node Secret Encryption Key...  

Broader source: Energy.gov (indexed) [DOE]

Key to Local Users PLATFORM: RSA Authentication API versions prior to 8.1 SP1 RSA Web Agent for Apache Web Server versions prior to 5.3.5 RSA Web Agent for IIS versions...

438

Technology, Knowledge, Culture, and Management: the keys The shift from industrial societies to information societies  

E-Print Network [OSTI]

Technology, Knowledge, Culture, and Management: the keys to success Abstract The shift from to success: technology, knowledge, culture and management. Organizations employ technology with the goal of improving efficiency and reducing operational costs. Hence technology structures within organizations must

Kopec, Danny

439

Public Sector Digest | July 2010 | www.publicsectordigest.com Key Aspects of the Deliberative Democracy Movement  

E-Print Network [OSTI]

Public Sector Digest | July 2010 | www.publicsectordigest.com Key Aspects of the Deliberative Digest | July 2010 | www.publicsectordigest.com underlying tensions and tough choices inherent to most

440

Redox states of Desulfovibrio vulgaris DsrC, a key protein in...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Venceslau SS, JR Cort, ES Baker, RK Chu, EW Robinson, C Dahl, LM Saraiva, and IA Pereira.2013."Redox states of Desulfovibrio vulgaris DsrC, a key protein in dissimilatory...

Note: This page contains sample records for the topic "analysis key factors" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Tritium inventory control in ITER Charles Skinner with key contributions from  

E-Print Network [OSTI]

Tritium inventory control in ITER Charles Skinner with key contributions from Charles Gentile permitted" Tritium inventory control Worrisome issue: Once at the tritium limit there won't be any more

Princeton Plasma Physics Laboratory

442

Faculty & Information Centres Building Car Park Key Facilities Building Car Park  

E-Print Network [OSTI]

10 ORANGE A PURPLE Navitas 2 ORANGE A ORANGE North Australian Centre for Oil and Gas 7 PINK B PURPLE7 WATER TANK 5 4 18 S Faculty & Information Centres Building Car Park Key Facilities Building Car

443

Demand Response in the U.S.- Key trends and federal facility participation  

Broader source: Energy.gov [DOE]

Presentation—given at the Federal Utility Partnership Working Group (FUPWG) Fall 2008 meeting—provides demand response (DR) definition, current status of DR in the United States, key DR trends, and federal participation issues.

444

Practical free-space quantum key distribution over 10 km in daylight and at night  

E-Print Network [OSTI]

We have demonstrated quantum key distribution (QKD) over a 10-km, 1-airmass atmospheric range during daylight and at night. Secret random bit sequences of the quality required for the cryptographic keys used to initialize secure communications devices were transferred at practical rates with realistic security. By identifying the physical parameters that determine the system's secrecy efficiency, we infer that free-space QKD will be practical over much longer ranges under these and other atmospheric and instrumental conditions.

Richard J. Hughes; Jane E. Nordholt; Derek Derkacs; Charles G. Peterson

2002-06-14T23:59:59.000Z

445

A study of an optimum filter for a random phase-shift keyed signal  

E-Print Network [OSTI]

59 62 77 BIBLIOGRAPHY 85 LIST OF FIGURES Figure Page 1. Phase-shift key modulation 2, The filter problem 3. Block diagram representation of a delay modulator 12 4. A conceptual delay modulator for a phase- shift keyed signal 5. Random... PSK signal from the corruption of white noise. The fact that the PSK signal is random necessitates the use of a statistical theory of linear systems which was originated by Norbert Wiener. 3 The statistical filter problem is illustrated in Figure...

Barr, Frederick James

1968-01-01T23:59:59.000Z

446

Hydrogen Analysis  

Broader source: Energy.gov (indexed) [DOE]

(ANL) - DOE: Mark Paster, Roxanne Danz, Pete Devlin * Key Industrial Collaborators: AEP, Air Products, Areva, BOC, BP, ChevronTexaco, Conoco Phillips, Eastman Chemical, Entergy,...

447

Reliability and Validity: One Factor and Third Factor Tests  

E-Print Network [OSTI]

Chapter 7 Reliability and Validity: One Factor and Third Factor Tests D. White and A. Korotayev 26 Sept 2003 Html links are live Reliability and validity are crucial issues in research. Reliability may have high validity but low reliability, in which case its correlations with other high validity

White, Douglas R.

448

Akirin1 (Mighty), a novel promyogenic factor regulates muscle regeneration and cell chemotaxis  

SciTech Connect (OSTI)

Akirin1 (Mighty) is a downstream target gene of myostatin and has been shown to be a promyogenic factor. Although expressed in many tissues, akirin1 is negatively regulated by myostatin specifically in skeletal muscle tissue. In this manuscript we have characterized the possible function of akirin1 in postnatal muscle growth. Molecular and immunohistological analyses indicated that while low levels of akirin1 are associated with quiescent satellite cells (SC), higher levels of akirin1 are detected in activated proliferating SC indicating that akirin1 could be associated with satellite cell activation. In addition to SC, macrophages also express akirin1, and increased expression of akirin1 resulted in more efficient chemotaxis of both macrophages and myoblasts. Akirin1 appears to regulate chemotaxis of both macrophages and myoblasts by reorganising actin cytoskeleton, leading to more efficient lamellipodia formation via a PI3 kinase dependent pathway. Expression analysis during muscle regeneration also indicated that akirin1 expression is detected very early (day 2) in regenerating muscle, and expression gradually peaks to coincide the nascent myotube formation stage of muscle regeneration. Based on these results we propose that akirin1 could be acting as a transducer of early signals of muscle regeneration. Thus, we speculate that myostatin regulates key steps of muscle regeneration including chemotaxis of inflammatory cells, SC activation and migration through akirin1.

Salerno, Monica Senna; Dyer, Kelly; Bracegirdle, Jeremy; Platt, Leanne; Thomas, Mark; Siriett, Victoria [Functional Muscle Genomics, AgResearch, Hamilton (New Zealand)] [Functional Muscle Genomics, AgResearch, Hamilton (New Zealand); Kambadur, Ravi [Functional Muscle Genomics, AgResearch, Hamilton (New Zealand) [Functional Muscle Genomics, AgResearch, Hamilton (New Zealand); School of Biological Sciences, Nanyang Technological University, Singapore (Singapore); Sharma, Mridula, E-mail: bchmridu@nus.edu.sg [Functional Muscle Genomics, AgResearch, Hamilton (New Zealand)] [Functional Muscle Genomics, AgResearch, Hamilton (New Zealand)

2009-07-15T23:59:59.000Z

449

Multilinear (Tensor) Image Synthesis, Analysis, and Recognition  

E-Print Network [OSTI]

and a col- umn space. In a factor analysis of D, the SVD orthogonalizes these two spaces and decomposesMultilinear (Tensor) Image Synthesis, Analysis, and Recognition [exploratory DSP] M. Alex O analysis (PCA) and its refinement known as independ- ent components analysis (ICA) model single

Terzopoulos, Demetri

450

Weaknesses in the Key Scheduling Algorithm of Scott Fluhrer1, Itsik Mantin2, and Adi Shamir2  

E-Print Network [OSTI]

Weaknesses in the Key Scheduling Algorithm of RC4 Scott Fluhrer1, Itsik Mantin2, and Adi Shamir2 1 and previous results about its security. In Section 3 we consider a slightly mod- i ed variant of the Key

Sirer, Emin Gun

451

Power Systems Life Cycle Analysis Tool (Power L-CAT).  

SciTech Connect (OSTI)

The Power Systems L-CAT is a high-level dynamic model that calculates levelized production costs and tracks environmental performance for a range of electricity generation technologies: natural gas combined cycle (using either imported (LNGCC) or domestic natural gas (NGCC)), integrated gasification combined cycle (IGCC), supercritical pulverized coal (SCPC), existing pulverized coal (EXPC), nuclear, and wind. All of the fossil fuel technologies also include an option for including carbon capture and sequestration technologies (CCS). The model allows for quick sensitivity analysis on key technical and financial assumptions, such as: capital, O&M, and fuel costs; interest rates; construction time; heat rates; taxes; depreciation; and capacity factors. The fossil fuel options are based on detailed life cycle analysis reports conducted by the National Energy Technology Laboratory (NETL). For each of these technologies, NETL's detailed LCAs include consideration of five stages associated with energy production: raw material acquisition (RMA), raw material transport (RMT), energy conversion facility (ECF), product transportation and distribution (PT&D), and end user electricity consumption. The goal of the NETL studies is to compare existing and future fossil fuel technology options using a cradle-to-grave analysis. The NETL reports consider constant dollar levelized cost of delivered electricity, total plant costs, greenhouse gas emissions, criteria air pollutants, mercury (Hg) and ammonia (NH3) emissions, water withdrawal and consumption, and land use (acreage).

Andruski, Joel; Drennen, Thomas E.

2011-01-01T23:59:59.000Z

452

Building Chairs & Alternates by Building May 2014 Bldg/Key Name/Dept Location Email/EHS Contact  

E-Print Network [OSTI]

by Building May 2014 Bldg/Key Name/Dept Location Email/EHS Contact Hefter Conference Tom Bjornstad Hefter

Saldin, Dilano

453

Experimental realisation of Shor's quantum factoring algorithm using qubit recycling  

E-Print Network [OSTI]

Quantum computational algorithms exploit quantum mechanics to solve problems exponentially faster than the best classical algorithms. Shor's quantum algorithm for fast number factoring is a key example and the prime motivator in the international effort to realise a quantum computer. However, due to the substantial resource requirement, to date, there have been only four small-scale demonstrations. Here we address this resource demand and demonstrate a scalable version of Shor's algorithm in which the n qubit control register is replaced by a single qubit that is recycled n times: the total number of qubits is one third of that required in the standard protocol. Encoding the work register in higher-dimensional states, we implement a two-photon compiled algorithm to factor N=21. The algorithmic output is distinguishable from noise, in contrast to previous demonstrations. These results point to larger-scale implementations of Shor's algorithm by harnessing scalable resource reductions applicable to all physical architectures.

Enrique Martin-Lopez; Anthony Laing; Thomas Lawson; Roberto Alvarez; Xiao-Qi Zhou; Jeremy L. O'Brien

2012-10-24T23:59:59.000Z

454

Factors driving wind power development in the United States  

SciTech Connect (OSTI)

In the United States, there has been substantial recent growth in wind energy generating capacity, with growth averaging 24 percent annually during the past five years. About 1,700 MW of wind energy capacity was installed in 2001, while another 410 MW became operational in 2002. This year (2003) shows promise of significant growth with more than 1,500 MW planned. With this growth, an increasing number of states are experiencing investment in wind energy projects. Wind installations currently exist in about half of all U.S. states. This paper explores the key factors at play in the states that have achieved a substantial amount of wind energy investment. Some of the factors that are examined include policy drivers, such as renewable portfolio standards (RPS), federal and state financial incentives, and integrated resource planning; as well as market drivers, such as consumer demand for green power, natural gas price volatility, and wholesale market rules.

Bird, Lori A.; Parsons, Brian; Gagliano, Troy; Brown, Matthew H.; Wiser, Ryan H.; Bolinger, Mark

2003-05-15T23:59:59.000Z

455

Wellcome Trust SUBMISSION OF EVIDENCE Wellcome Trust response to Department for Education: Reforming Key Stage 4 qualifications  

E-Print Network [OSTI]

: Reforming Key Stage 4 qualifications December 2012 Department for Education: Reforming Key Stage 4 science skills. 2. We are pleased to have the opportunity to respond to the consultation on reforms to Key consultations on the reform to curriculum and assessment at various stages of schooling. There is an opportunity

Rambaut, Andrew

456

Deterministic quantum-public-key encryption: forward search attack and randomization  

E-Print Network [OSTI]

In the classical setting, public-key encryption requires randomness in order to be secure against a forward search attack, whereby an adversary compares the encryption of a guess of the secret message with that of the actual secret message. We show that this is also true in the information-theoretic setting -- where the public keys are quantum systems -- by defining and giving an example of a forward search attack for any deterministic quantum-public-key bit-encryption scheme. However, unlike in the classical setting, we show that any such deterministic scheme can be used as a black box to build a randomized bit-encryption scheme that is no longer susceptible to this attack.

Georgios M. Nikolopoulos; Lawrence M. Ioannou

2009-03-27T23:59:59.000Z

457

Multilevel Factor Analysis of Class and Student Achievement Components  

E-Print Network [OSTI]

fit into conventional software using the estimator of Muthen (1989, in press-press-a). Approximate values for chi-square tests of model fitpress-a).Thisanalysis pointsto a good individual-level Model5 addscorrelated fit.2 betweenerrorsto the MFA model resultingin a significantimprovement fit.

Bengt O. Muthén

2011-01-01T23:59:59.000Z

458

Analysis Of Factors Affecting Natural Source Slf Electromagnetic...  

Open Energy Info (EERE)

relationship between the sensor orientation and the received artificial electromagnetic interference, influence of weather conditions on the data quality and so on. The results...

459

Scoping Analysis of Source Term and Functional Containment Attenuation Factors  

SciTech Connect (OSTI)

In order to meet future regulatory requirements, the Next Generation Nuclear Plant (NGNP) Project must fully establish and validate the mechanistic modular high temperature gas-cooled reactor (HTGR) source term. This is not possible at this stage in the project, as significant uncertainties in the final design remain unresolved. In the interim, however, there is a need to establish an approximate characterization of the source term. The NGNP team developed a simplified parametric model to establish mechanistic source term estimates for a set of proposed HTGR configurations.

Pete Lowry

2012-10-01T23:59:59.000Z

460

Scoping Analysis of Source Term and Functional Containment Attenuation Factors  

SciTech Connect (OSTI)

In order to meet future regulatory requirements, the Next Generation Nuclear Plant (NGNP) Project must fully establish and validate the mechanistic modular high temperature gas-cooled reactor (HTGR) source term. This is not possible at this stage in the project, as significant uncertainties in the final design remain unresolved. In the interim, however, there is a need to establish an approximate characterization of the source term. The NGNP team developed a simplified parametric model to establish mechanistic source term estimates for a set of proposed HTGR configurations.

Pete Lowry

2012-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "analysis key factors" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Scoping Analysis of Source Term and Functional Containment Attenuation Factors  

SciTech Connect (OSTI)

In order to meet future regulatory requirements, the Next Generation Nuclear Plant (NGNP) Project must fully establish and validate the mechanistic modular high temperature gas-cooled reactor (HTGR) source term. This is not possible at this stage in the project, as significant uncertainties in the final design remain unresolved. In the interim, however, there is a need to establish an approximate characterization of the source term. The NGNP team developed a simplified parametric model to establish mechanistic source term estimates for a set of proposed HTGR configurations.

Pete Lowry

2012-02-01T23:59:59.000Z

462

Human Factors Engineering Analysis Tool - Energy Innovation Portal  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation ProposedUsingFun withconfinement plasmas inPortalAllBPA addressesHowHughHuman

463

Analysis Of Factors Affecting Natural Source Slf Electromagnetic  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address: 160 East 300Algoil JumpAltergyExperiments | Open EnergyRejection/Recycling

464

A cross-sectional study of the prevalence and risk factors for hypertension in rural Nepali women  

E-Print Network [OSTI]

and risk factors for hypertension in rural Nepali women. BMCHe J: Global burden of hypertension: analysis of worldwideNeupane RP: Prevalence of hypertension in a rural community

2013-01-01T23:59:59.000Z

465

Double blinding-attack on entanglement-based quantum key distribution protocols  

E-Print Network [OSTI]

We propose a double blinding-attack on entangled-based quantum key distribution protocols. The principle of the attack is the same as in existing blinding attack except that instead of blinding the detectors on one side only, Eve is blinding the detectors of both Alice and Bob. In the BBM92 protocol, the attack allows Eve to get a full knowledge of the key and remain undetected even if Alice and Bob are using 100% efficient detectors. The attack can be easily extended to Ekert protocol, with an efficiency as high as 85.3%.

Guillaume Adenier; Irina Basieva; Andrei Yu. Khrennikov; Masanori Ohya; Noboru Watanabe

2011-06-14T23:59:59.000Z

466

Optimum design for BB84 quantum key distribution in tree-type passive optical networks  

E-Print Network [OSTI]

We show that there is a tradeoff between the useful key distribution bit rate and the total length of deployed fiber in tree-type passive optical networks for BB84 quantum key distribution applications. A two stage splitting architecture where one splitting is carried in the central office and a second in the outside plant and figure of merit to account for the tradeoff are proposed. We find that there is an optimum solution for the splitting ratios of both stages in the case of Photon Number Splitting (PNS) attacks and Decoy State transmission. We then analyze the effects of the different relevant physical parameters of the PON on the optimum solution.

Jose Capmany; Carlos R. Fernandez-Pousa

2011-03-24T23:59:59.000Z

467

A 24 km fiber-based discretely signaled continuous variable quantum key distribution system  

E-Print Network [OSTI]

We report a continuous variable key distribution system that achieves a final secure key rate of 3.45 kb/sec over a distance of 24.2 km of optical fiber. The protocol uses discrete signaling and post-selection to improve reconciliation speed and quantifies security by means of quantum state tomography. Polarization multiplexing and a frequency translation scheme permit transmission of a continuous wave local oscillator and suppression of noise from guided acoustic wave Brillouin scattering by more than 27 dB.

Quyen Dinh Xuan; Zheshen Zhang; Paul L. Voss

2009-10-06T23:59:59.000Z

468

UBC Social Ecological Economic Development Studies (SEEDS) Student Report An Investigation Into The Social, Ecological, and Economic Factors To Conisder When  

E-Print Network [OSTI]

Into The Social, Ecological, and Economic Factors To Conisder When Planning Sustainble Housing Michael Lanki INTO THE SOCIAL, ECOLOGICAL, AND ECONOMIC FACTORS TO CONISDER WHEN PLANNING SUSTAINBLE HOUSING Prepared, and educating people on sustainability. Key ecological criteria are reduction of green house gases, reduction

469

Structural Reliability Analysis for One Dimensional, Two Phase Miscible Flow  

E-Print Network [OSTI]

Structural Reliability Analysis for One Dimensional, Two Phase Miscible Flow David A. Coker­3600 December 22, 1992 Abstract An analytic structural reliability analysis is performed for first contact mis of the permeability. Key words: miscible flow, reliability methods, sensitivity analysis AMS(MOS): 35R60, 62N05,

New York at Stoney Brook, State University of

470

Using CSP for protocol analysis: the Needham-Schroeder  

E-Print Network [OSTI]

Using CSP for protocol analysis: the Needham-Schroeder Public-Key Protocol Steve Schneider Royal approach for analysis and veri cation of authentication properties in CSP. It is illustrated to the analysis of authentication protocols, built on top of the general CSP semantic framework. This approach

Doran, Simon J.

471

Electrical and Production Load Factors  

E-Print Network [OSTI]

, Texas Abstract Load factors and operating hours of small and medium-sized industrial plants are analyzed to classify shift-work patterns and develop energy conservation diagnostic tools. This paper discusses two types of electric load factors... for each shift classification within major industry groups. The load factor based on billing hours (ELF) increases with operating hours from about 0.4 for a nominal one shift operation, to about 0.7 for around-the-clock operation. On the other hand...

Sen, T.; Heffington, W. M.

472

Liver-derived systemic factors drive ?-cell hyperplasia in insulin resistant states  

SciTech Connect (OSTI)

Integrative organ cross-talk regulates key aspects of energy homeostasis and its dysregulation may underlie metabolic disorders such as obesity and diabetes. To test the hypothesis that cross-talk between the liver and pancreatic islets modulates ?-cell growth in response to insulin resistance, we used the Liver-specific Insulin Receptor Knockout (LIRKO) mouse, a unique model that exhibits dramatic islet hyperplasia. Using complementary in vivo parabiosis and transplantation assays, and in vitro islet culture approaches, we demonstrate that humoral, non-neural, non-cell autonomous factor(s) induce ?-cell proliferation in LIRKO mice. Furthermore, we report that a hepatocyte-derived factor(s) stimulates mouse and human ?-cell proliferation in ex vivo assays, independent of ambient glucose and insulin levels. These data implicate the liver as a critical source of ?-cell growth factors in insulin resistant states.

El Ouaamari, Abdelfattah; Kawamori, Dan; Dirice, Ercument; Liew, Chong Wee; Shadrach, Jennifer L.; Hu, Jiang; Katsuta, Hitoshi; Hollister-Lock, Jennifer; Qian, Weijun; Wagers, Amy J.; Kulkarni, Rohit N.

2013-02-21T23:59:59.000Z

473

Prediction and Informative Risk Factor Selection of Bone Diseases  

E-Print Network [OSTI]

data and use these integrated features to effectively predict osteoporosis and bone fractures. We; disease memory; osteoporosis; bone fracture. ! 1 INTRODUCTION Risk factor (RF) analysis based on patients on the study of osteoporosis and bone fracture prediction. Over the past few decades, osteoporosis has been

Zhang, Aidong

474

SEISMIC WAVES ESTIMATION AND WAVE FIELD DECOMPOSITION WITH FACTOR GRAPHS  

E-Print Network [OSTI]

SEISMIC WAVES ESTIMATION AND WAVE FIELD DECOMPOSITION WITH FACTOR GRAPHS Stefano Maranò Christoph, Dept. Information Technology & Electr. Eng., 8092 Zürich ABSTRACT Physical wave fields are often from sensors of different kinds. In this paper we propose a technique for the analysis of vector wave

Loeliger, Hans-Andrea

475

Human Factors Evaluation of Advanced Electric Power Grid Visualization Tools  

SciTech Connect (OSTI)

This report describes initial human factors evaluation of four visualization tools (Graphical Contingency Analysis, Force Directed Graphs, Phasor State Estimator and Mode Meter/ Mode Shapes) developed by PNNL, and proposed test plans that may be implemented to evaluate their utility in scenario-based experiments.

Greitzer, Frank L.; Dauenhauer, Peter M.; Wierks, Tamara G.; Podmore, Robin

2009-04-01T23:59:59.000Z

476

Integer factorization is in P  

E-Print Network [OSTI]

can be solved by a deterministic Turing machine in polynomial time(see e.g.. Cormen et al. (2009)). Theorem 5. Integer factorization is in FP. Algorithm 2 can be ...

owner

2014-04-07T23:59:59.000Z

477

Automatic Test Factoring for Java  

E-Print Network [OSTI]

Test factoring creates fast, focused unit tests from slow system-widetests; each new unit test exercises only a subset of the functionalityexercised by the system test. Augmenting a test suite with factoredunit tests ...

Saff, David

2005-06-08T23:59:59.000Z

478

EFFICIENT STRUCTURED MULTIFRONTAL FACTORIZATION FOR ...  

E-Print Network [OSTI]

Such rank phenomenon is indeed observed for the .... Moreover, the HSS tree can help quickly identify any off-diagonal block of the ...... Table 4.1. Factorization cost ?fact, solution cost ?sol, and storage ?mem of the structured multifrontal.

2013-03-21T23:59:59.000Z

479

Human Factors of Reporting Systems  

E-Print Network [OSTI]

Johnson,C.W. P. Carayon (ed.), A Handbook of Human Factors and Ergonomics in Healthcare and Patient Safety, Lawrence Erlbaum, London, UK. pp 715-750 Lawrence Erlbaum Associates

Johnson, C.W.

480

E-Print Network 3.0 - adaptive key component Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Antwerpen, Universiteit, Departement Wiskunde & Informatica, Performance Analysis of Telecommunication Systems Group Collection: Engineering ; Computer Technologies and...

Note: This page contains sample records for the topic "analysis key factors" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Radiant-interchange configuration factors  

E-Print Network [OSTI]

RADIANT-INTERCHANGE CONFIGURATION FACTORS A Thesis By THOMAS E DW ARD RE D DIN Submitted to the Graduate College of the Texas A)M University in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE January 1965 Major... wife, Dorene, whose patience and encouragement have been a constant source of inspiration. TABLE OF CONTENTS CHAPTER I . INTRODUCTION PAGE ~ 0 1 II. THE GEOMETRY OF THE BLACK BODY CONFIGURATION FACTOR. . . , . . . . . . . . . . . . . . . . 3 1...

Reddin, Thomas Edward

1965-01-01T23:59:59.000Z

482

Level of Preparedness for Pandemic Influenza among Key Leaders in Brazos County  

E-Print Network [OSTI]

With the outbreak of the 2009 pandemic influenza A (H1N1) comes the need to evaluate the preparedness level of government entities that had preparedness plans. This study looks at the preparedness level for pandemic influenza among key leaders...

Kaster, Elizabeth

2012-02-14T23:59:59.000Z

483

Key to images: [1] Model system: fission yeast [2] Cryo-EM structure  

E-Print Network [OSTI]

Key to images: [1] Model system: fission yeast [2] Cryo-EM structure of the MCM helicase [3 combing [8] Model system: Xenopus [9] Extreme environments [10] Model system: C.elegans. Background image of the evolution of the replication machinery highlighted. BSRC B306 Email: sam31@st-and.ac.uk 1 2 3 4 5 6 7 8 9 10

Brierley, Andrew

484

Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems , Jinsong Han2  

E-Print Network [OSTI]

Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems Li Lu1 , Jinsong Han2 an emerging requirement ­ protecting user privacy [13] in RFID authentications. In most RFID systems, tags sensitive information. For example, without pri- vacy protection, any reader can identify a consumer's ID

Liu, Yunhao

485

Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems , Jinsong Han2  

E-Print Network [OSTI]

- sitive information. For example, without privacy pro- tection, any reader can identify a consumer's IDDynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems Li Lu1 , Jinsong Han2 an emerging requirement ­ protecting user privacy [13] in RFID authentications. In most RFID systems, tags

Liu, Yunhao

486

Confidence Valuation in a Public-Key Infrastructure based on Uncertain Evidence  

E-Print Network [OSTI]

Confidence Valuation in a Public-Key Infrastructure based on Uncertain Evidence Reto Kohlas Ueli an uncertain piece of evidence and have proposed ad hoc methods, sometimes referred to as trust management and the valuation of confidence values in the general context of reasoning based on uncertain evidence. Second, we

Maurer, Ueli

487

Confidence Valuation in a PublicKey Infrastructure based on Uncertain Evidence  

E-Print Network [OSTI]

Confidence Valuation in a Public­Key Infrastructure based on Uncertain Evidence Reto Kohlas Ueli an uncertain piece of evidence and have proposed ad hoc methods, sometimes referred to as trust management and the valuation of confidence values in the general context of reasoning based on uncertain evidence. Second, we

Maurer, Ueli

488

STUDENT FINANCE ENGLAND INFORMATION & KEY DATES FOR CONTINUING STUDENTS 2013/14  

E-Print Network [OSTI]

STUDENT FINANCE ENGLAND INFORMATION & KEY DATES FOR CONTINUING STUDENTS 2013/14 Are you returning to a full-time course at university or college in the autumn? If you applied for student finance that did NOT depend on your household income last year (non means tested) you should wait to hear from Student Finance

Dixon, Peter

489

STUDENT FINANCE ENGLAND INFORMATION & KEY DATES FOR NEW STUDENTS 2013/14  

E-Print Network [OSTI]

STUDENT FINANCE ENGLAND INFORMATION & KEY DATES FOR NEW STUDENTS 2013/14 Are you starting a full-time course at university or college in the autumn? · Find out what student finance is available to you finance. Apply online by 31 May 2013. · Giving Student Finance England your UK passport number and your

Dixon, Peter

490

STUDENT FINANCE ENGLAND INFORMATION & KEY DATES FOR CONTINUING STUDENTS 2012/13  

E-Print Network [OSTI]

STUDENT FINANCE ENGLAND INFORMATION & KEY DATES FOR CONTINUING STUDENTS 2012/13 Are you returning to a full-time course at university or college in the autumn? If you applied for student finance that did NOT depend on your household income last year (non means tested) you should wait to hear from Student Finance

Oakley, Jeremy

491

Capacity Development, Education & Training Integrated and sustained action is the key  

E-Print Network [OSTI]

Capacity Development, Education & Training Integrated and sustained action is the key Thematic Background Paper January 2004 Author: John Christensen Global Network on Energy for Sustainable Development to sustainable energy development. The rapid development of individual RE technologies along with basic changes

492

BUSINESSES AS ONE OF THE KEY ELEMENTS OF A REGION'S SUSTAINABLE DEVELOPMENT  

E-Print Network [OSTI]

BUSINESSES AS ONE OF THE KEY ELEMENTS OF A REGION'S SUSTAINABLE DEVELOPMENT of sustainable development should be taken into account by these actors. Businesses (especially SMEs) whose aim-words : sustainable development, territory, businesses, governance, stakeholders Mots-clés : développement durable

493

TERRESTRIAL ROCK VARNISH: A KEY TO UNDERSTANDING THE SURFACE COMPOSITION OF MARS. J. G. Ward1  

E-Print Network [OSTI]

TERRESTRIAL ROCK VARNISH: A KEY TO UNDERSTANDING THE SURFACE COMPOSITION OF MARS. J. G. Ward1 , L produces a strong spectral band contrast. This also gives varnish its shiny appearance. On Earth rock varnish may have a microbial origin [3]. Clays are transported from an external source and deposited

Kirkland, Laurel

494

A new key recovery attack on the ANSI retail MAC Chris J. Mitchell  

E-Print Network [OSTI]

A new key recovery attack on the ANSI retail MAC Chris J. Mitchell Information Security Group circumstances, enables a more efficient attack than was previously known to be launched against the ANSI retail with the message. 1.1 The ANSI retail MAC The ANSI retail MAC scheme [1], otherwise known as CBC-MAC-Y or ISO

Mitchell, Chris

495

Red Algae Lose Key Mitochondrial Genes in Response to Becoming Parasitic  

E-Print Network [OSTI]

Red Algae Lose Key Mitochondrial Genes in Response to Becoming Parasitic Lillian Hancock1 , Lynda independently evolved hundreds of times among the floridiophyte red algae. Much is known about the life history class of red algae, Plocamiocolax puvinata, has lost the atp8 gene entirely, indicating that this gene

Lane, Chris

496

Contributory Group Key Agreement Protocols, Revisited for Mobile Ad-Hoc Groups  

E-Print Network [OSTI]

Contributory Group Key Agreement Protocols, Revisited for Mobile Ad-Hoc Groups Mark Manulis Horst of various group-oriented applications for mo- bile ad-hoc groups requires a group secret shared between all- and wide-area wired networks, can also be used in ad-hoc sce- narios because of the similar security

Manulis, Mark

497

Better Technologies Key to Addressing Climate Change Energy Department official explains U.S. initiatives  

E-Print Network [OSTI]

policies and business models to create self-sustaining markets for financing energy efficiency, renewable on leveraging resources through partnerships with businesses, academia, and other countries. Therefore.S. initiatives 17 December 2004 More energy-efficient technologies will be key to reducing greenhouse gas

498

New species of Anthostomella on fynbos, with a key to the genus in South Africa  

E-Print Network [OSTI]

New species of Anthostomella on fynbos, with a key to the genus in South Africa Seonju LEE, South Africa. E-mail : slee@maties.sun.ac.za Received 3 April 2002; accepted 18 November 2002. A study of saprobic fungi occurring on the fynbos of the Western Cape Province of South Africa yielded four unknown

499

Differential-phase-shift quantum key distribution with segmented pulse trains  

SciTech Connect (OSTI)

We present a modified scheme of differential-phase-shift (DPS) quantum key distribution (QKD) for improving its performance. A transmitter sends a weak coherent pulse train segmented with vacant pulses. Then, a receiver can find eavesdropping by monitoring the photon detection rate at particular time slots. Simulations show that the proposed scheme is robust against a sequential attack and a general individual attack.

Kawahara, Hiroki; Inoue, Kyo [Osaka University, Osaka 565-0871 (Japan)

2011-06-15T23:59:59.000Z

500

Length Based Attack and Braid Groups: Cryptanalysis of Anshel-Anshel-Goldfeld Key  

E-Print Network [OSTI]

Length Based Attack and Braid Groups: Cryptanalysis of Anshel-Anshel-Goldfeld Key Exchange Protocol of Technology, Hoboken, New Jersey, USA, 07030 {amyasnik,aushakov}@stevens.edu Abstract. The length based attack and Tannenbaum in [9]. Several attempts have been made to implement the attack [6], but none of them had produced

Myasnikov, Aleksey