Sample records for analysis key factors

  1. E-Banking Diffusion in the Jordanian Banking Services Sector: An Empirical Analysis of Key Factors

    E-Print Network [OSTI]

    E-Banking Diffusion in the Jordanian Banking Services Sector: An Empirical Analysis of Key Factors influence e- banking adoption in Jordanian banks. This article added some constructs to (TOE) framework, availability of online revenues, competition intensity or pressure, and regulatory support environment) while e

  2. E-Business Value Creation in Jordanian Banking Services Industry: An Empirical Analysis of Key Factors

    E-Print Network [OSTI]

    E-Business Value Creation in Jordanian Banking Services Industry: An Empirical Analysis of Key an extended conceptual research model for assessing the value of e-business at the bank level environment) that may affect value creation of carrying out e- business in Jordanian banking sector. Survey

  3. Abstract--Distribution factors play a key role in many system security analysis and market applications. The injection shift

    E-Print Network [OSTI]

    for and the computationally efficient evaluation of LODFs under multiple- line outages. Index Terms--power transfer distribution factors, line outage distribution factors, multiple-line outages, system security. I. INTRODUCTION. Given the usefulness of LODFs in the study of security with many outaged lines, such as in blackouts

  4. NREL: Energy Analysis - Key Activities

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated CodesTransparency Visit | NationalWebmaster To contactK-12BSM -JEDI JobsKey

  5. Key Factors in Displacement Ventilation Systems for Better IAQ

    E-Print Network [OSTI]

    Wang, X.; Chen, J.; Li, Y.; Wang, Z.

    2006-01-01T23:59:59.000Z

    This paper sets up a mathematical model of three-dimensional steady turbulence heat transfer in an air-conditioned room of multi-polluting heat sources. Numerical simulation helps identify key factors in displacement ventilation systems that affect...

  6. Key Factors in Displacement Ventilation Systems for Better IAQ 

    E-Print Network [OSTI]

    Wang, X.; Chen, J.; Li, Y.; Wang, Z.

    2006-01-01T23:59:59.000Z

    This paper sets up a mathematical model of three-dimensional steady turbulence heat transfer in an air-conditioned room of multi-polluting heat sources. Numerical simulation helps identify key factors in displacement ventilation systems that affect...

  7. Finite key analysis for symmetric attacks in quantum key distribution

    SciTech Connect (OSTI)

    Meyer, Tim; Kampermann, Hermann; Kleinmann, Matthias; Bruss, Dagmar [Institut fuer Theoretische Physik III, Heinrich-Heine-Universitaet Duesseldorf, D-40225 Duesseldorf (Germany)

    2006-10-15T23:59:59.000Z

    We introduce a constructive method to calculate the achievable secret key rate for a generic class of quantum key distribution protocols, when only a finite number n of signals is given. Our approach is applicable to all scenarios in which the quantum state shared by Alice and Bob is known. In particular, we consider the six state protocol with symmetric eavesdropping attacks, and show that for a small number of signals, i.e., below n{approx}10{sup 4}, the finite key rate differs significantly from the asymptotic value for n{yields}{infinity}. However, for larger n, a good approximation of the asymptotic value is found. We also study secret key rates for protocols using higher-dimensional quantum systems.

  8. Key Factors for Digital Collections August 7, 2007

    E-Print Network [OSTI]

    by Fondren's Digital Library Initiative We evaluate digital projects on a case by case basis. There is no oneKey Factors for Digital Collections August 7, 2007 Rice University Digital Repository Supported formula for this process and in fact welcome open discussion on potential digital projects

  9. Key Response Planning Factors for the Aftermath of Nuclear Terrorism

    SciTech Connect (OSTI)

    Buddemeier, B R; Dillon, M B

    2009-01-21T23:59:59.000Z

    Despite hundreds of above-ground nuclear tests and data gathered from Hiroshima and Nagasaki, the effects of a ground-level, low-yield nuclear detonation in a modern urban environment are still the subject of considerable scientific debate. Extensive review of nuclear weapon effects studies and discussions with nuclear weapon effects experts from various federal agencies, national laboratories, and technical organizations have identified key issues and bounded some of the unknowns required to support response planning for a low-yield, ground-level nuclear detonation in a modern U.S. city. This study, which is focused primarily upon the hazards posed by radioactive fallout, used detailed fallout predictions from the advanced suite of three-dimensional (3-D) meteorology and plume/fallout models developed at Lawrence Livermore National Laboratory (LLNL), including extensive global Key Response Planning Factors for the Aftermath of Nuclear Terrorism geographical and real-time meteorological databases to support model calculations. This 3-D modeling system provides detailed simulations that account for complex meteorology and terrain effects. The results of initial modeling and analysis were presented to federal, state, and local working groups to obtain critical, broad-based review and feedback on strategy and messaging. This effort involved a diverse set of communities, including New York City, National Capitol Regions, Charlotte, Houston, Portland, and Los Angeles. The largest potential for reducing casualties during the post-detonation response phase comes from reducing exposure to fallout radiation. This can be accomplished through early, adequate sheltering followed by informed, delayed evacuation.B The response challenges to a nuclear detonation must be solved through multiple approaches of public education, planning, and rapid response actions. Because the successful response will require extensive coordination of a large number of organizations, supplemented by appropriate responses by local responders and the general population within the hazard zones, regional planning is essential to success. The remainder of this Executive Summary provides summary guidance for response planning in three areas: (1) Public Protection Strategy details the importance of early, adequate shelter followed by informed evacuation. (2) Responder Priorities identify how to protect response personnel, perform regional situational assessment, and support public safety. (3) Key Planning Considerations refute common myths and provide important information on planning how to respond in the aftermath of nuclear terrorism.

  10. Analysis of the factors and the roles of HRD in organizational learning styles as identified by key informants at selected corporations in the Republic of Korea

    E-Print Network [OSTI]

    Jeong, Jinchul

    2005-08-29T23:59:59.000Z

    what organizational learning styles exist; 2) to identify the factors that differentiate the organizations with different organizational learning styles; 3) to identify the roles of HRD to facilitate organizational learning within the organizations...

  11. analysis material key: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Temperature(C) 200 2 Finite key analysis for symmetric attacks in quantum key distribution Quantum Physics (arXiv) Summary: We introduce a constructive method to calculate...

  12. VSEAMS: A pipeline for variant set enrichment analysis using summary GWAS data identifies IKZF3, BATF and ESRRA as key transcription factors in type 1 diabetes

    E-Print Network [OSTI]

    Burren, Oliver S.; Guo, Hui; Wallace, Chris

    2014-08-27T23:59:59.000Z

    to be altered in LCLs, which emphasizes a need for transcription factor function to be studied in primary cells. Imprecise knowledge of regulatory variants for individual genes hampers any test of variant set enrichment. As regulatory variation may lie 200 kb...

  13. A Key Review On Exergetic Analysis And Assessment Of Renewable...

    Open Energy Info (EERE)

    thermodynamic parameters, such as fuel depletion ratio, relative irreversibility, productivity lack and exergetic factor) used in the analysis are presented first. Next,...

  14. Numerical analysis of decoy state quantum key distribution protocols

    SciTech Connect (OSTI)

    Harrington, Jim W [Los Alamos National Laboratory; Rice, Patrick R [Los Alamos National Laboratory

    2008-01-01T23:59:59.000Z

    Decoy state protocols are a useful tool for many quantum key distribution systems implemented with weak coherent pulses, allowing significantly better secret bit rates and longer maximum distances. In this paper we present a method to numerically find optimal three-level protocols, and we examine how the secret bit rate and the optimized parameters are dependent on various system properties, such as session length, transmission loss, and visibility. Additionally, we show how to modify the decoy state analysis to handle partially distinguishable decoy states as well as uncertainty in the prepared intensities.

  15. Key Factors for Information Dissemination on Communicating Products and Fixed Databases

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Key Factors for Information Dissemination on Communicating Products and Fixed Databases Sylvain, a multitude of informational vectors take place in such environments like fixed databases or manufactured products on which we are able to em- bed significant proportion of data. By considering distributed

  16. A key factor to the spin parameter of uniformly rotating compact stars: crust structure

    E-Print Network [OSTI]

    Qi, B; Sun, B Y; Wang, S Y; Gao, J H

    2014-01-01T23:59:59.000Z

    We study the key factor to determine the dimensionless spin parameter $j\\equiv cJ/(GM^2)$ of different kinds of uniformly rotating compact stars, including the traditional neutron stars, hyperonic neutron stars, and hybrid stars, and check the reliability of the results on various types of equations of state of dense matter. The equations of state from the relativistic mean field theory and the MIT bag model are adopted to simulate compact stars. Numerical calculations of rigidly rotating neutron stars are performed using the RNS code in the framework of general relativity by solving the Einstein equations for stationary axis-symmetric spacetime. The crust structure of compact stars is found to be a key factor to determine the maximum value of the spin parameter $j_{\\rm max}$. For the stars with inclusion of the crust, $j_{\\rm max}\\sim 0.7$ is sustained for various kinds of compact stars with $M>0.5 M_{\\odot}$, and is found to be insensitive to the mass of star and selected equations of state. For the traditi...

  17. Weak-Key Analysis of POET Mohamed Ahmed Abdelraheem, Andrey Bogdanov, and Elmar Tischhauser

    E-Print Network [OSTI]

    Weak-Key Analysis of POET Mohamed Ahmed Abdelraheem, Andrey Bogdanov, and Elmar Tischhauser,anbog,ewti}@dtu.dk Abstract. We evaluate the security of the recently proposed authenticated encryption scheme POET. We give explicit constructions for weak key classes not covered by POET's weak key testing strategy

  18. annihilation factor analysis: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    16 Correlated Bayesian Factor Analysis CiteSeer Summary: Factor analysis is a method in multivariate statistical analysis that can help scientists determine which variables to...

  19. Human Factors Engineering Program Review Model (NUREG-0711)Revision 3: Update Methodology and Key Revisions

    SciTech Connect (OSTI)

    OHara J. M.; Higgins, J.; Fleger, S.

    2012-07-22T23:59:59.000Z

    The U.S. Nuclear Regulatory Commission (NRC) reviews the human factors engineering (HFE) programs of applicants for nuclear power plant construction permits, operating licenses, standard design certifications, and combined operating licenses. The purpose of these safety reviews is to help ensure that personnel performance and reliability are appropriately supported. Detailed design review procedures and guidance for the evaluations is provided in three key documents: the Standard Review Plan (NUREG-0800), the HFE Program Review Model (NUREG-0711), and the Human-System Interface Design Review Guidelines (NUREG-0700). These documents were last revised in 2007, 2004 and 2002, respectively. The NRC is committed to the periodic update and improvement of the guidance to ensure that it remains a state-of-the-art design evaluation tool. To this end, the NRC is updating its guidance to stay current with recent research on human performance, advances in HFE methods and tools, and new technology being employed in plant and control room design. NUREG-0711 is the first document to be addressed. We present the methodology used to update NUREG-0711 and summarize the main changes made. Finally, we discuss the current status of the update program and the future plans.

  20. Factor Analysis for Skewed Data and Skew-Normal Maximum Likelihood Factor Analysis

    E-Print Network [OSTI]

    Gaucher, Beverly Jane

    2013-04-04T23:59:59.000Z

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 2.7.1 The Factor Analysis Model . . . . . . . . . . . . . . . . . 28 v 2.8 Model Selection . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 2.8.1 The Akaike Information Criterion . . . . . . . . . . . . . . 30 2.8.2 The Bayesian... Information Criterion . . . . . . . . . . . . . 31 2.9 Factor Scores . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 2.10 Non-uniqueness of Factor Loadings . . . . . . . . . . . . . . . . . . 32 2.10.1 The Rotation of Factor Loadings...

  1. Concise and Tight Security Analysis of the Bennett-Brassard 1984 Protocol with Finite Key Lengths

    E-Print Network [OSTI]

    Masahito Hayashi; Toyohiro Tsurumaru

    2012-05-17T23:59:59.000Z

    We present a tight security analysis of the Bennett-Brassard 1984 protocol taking into account the finite size effect of key distillation, and achieving unconditional security. We begin by presenting a concise analysis utilizing the normal approximation of the hypergeometric function. Then next we show that a similarly tight bound can also be obtained by a rigorous argument without relying on any approximation. In particular, for the convenience of experimentalists who wish to evaluate the security of their QKD systems, we also give explicit procedures of our key distillation, and also show how to calculate the secret key rate and the security parameter from a given set of experimental parameters. Besides the exact values of key rates and security parameters, we also present how to obtain their rough estimates using the normal approximation.

  2. Secure key generation using an ultra-long fiber laser: transient analysis and experiment

    E-Print Network [OSTI]

    Zadok, Avinoam

    Secure key generation using an ultra-long fiber laser: transient analysis and experiment Avi Zadok-optic components. In our Ultra-long Fiber Laser (UFL) system, each user places a randomly chosen, spectrally, based on establishing laser oscillation between two parties, which is realized using standard fiber

  3. Identification of Key Processes that Control Tumor Necrosis Factor Availability in a Tuberculosis Granuloma

    E-Print Network [OSTI]

    Kirschner, Denise

    /TNF receptor binding and trafficking processes. We used the results of sensitivity analysis as a tool://www.nih.gov/). The funders had no role in study design, data collection and analysis, decision to publish, or preparation infection can be reactivated years later leading to active tuberculosis. The risk of reactivatio

  4. Finite-size analysis of a continuous-variable quantum key distribution

    SciTech Connect (OSTI)

    Leverrier, Anthony [Institut Telecom / Telecom ParisTech, CNRS LTCI, 46 rue Barrault, 75634 Paris Cedex 13, France and ICFO-Institut de Ciences Fotoniques, E-08860 Castelldefels (Barcelona) (Spain); Grosshans, Frederic [Laboratoire de Photonique Quantique et Moleculaire, ENS de Cachan, UMR CNRS 8735, F-94235 Cachan Cedex (France); Grangier, Philippe [Laboratoire Charles Fabry, Institut d'Optique, CNRS, Universite Paris-Sud, Campus Polytechnique, RD 128, F-91127 Palaiseau Cedex (France)

    2010-06-15T23:59:59.000Z

    The goal of this paper is to extend the framework of finite-size analysis recently developed for quantum key distribution to continuous-variable protocols. We do not solve this problem completely here, and we mainly consider the finite-size effects on the parameter estimation procedure. Despite the fact that some questions are left open, we are able to give an estimation of the secret key rate for protocols which do not contain a postselection procedure. As expected, these results are significantly more pessimistic than those obtained in the asymptotic regime. However, we show that recent continuous-variable protocols are able to provide fully secure secret keys in the finite-size scenario, over distances larger than 50 km.

  5. KEY FACTORS THAT INFLUENCE THE PERFORMANCE PROPERTIES OF ARP/MCU SALTSTONE MIXES

    SciTech Connect (OSTI)

    Harbour, J.; Edwards, T.; Williams, V.

    2009-10-05T23:59:59.000Z

    At the Saltstone Production Facility (SPF), decontaminated salt solution (DSS) is combined with premix (a cementitious mixture of portland cement (PC), blast furnace slag (BFS) and Class F fly ash (FA)) in a Readco mixer to produce fresh (uncured) Saltstone. After transfer to the Saltstone Disposal Facility (SDF) the hydration reactions initiated during the contact of the premix and salt solution continue during the curing period to produce the hardened waste form product. The amount of heat generated from hydration and the resultant temperature increase in the vaults depend on the composition of the decontaminated salt solution being dispositioned as well as the grout formulation (mix design). This report details the results from Task 3 of the Saltstone Variability Study for FY09 which was performed to identify, and quantify when possible, those factors that drive the performance properties of the projected ARP/MCU Batches. A baseline ARP/MCU mix (at 0.60 water to cementitious materials (w/cm) ratio) was established and consisted of the normal premix composition and a salt solution that was an average of the projected compositions of the last three ARP/MCU batches developed by T. A. Le. This task introduced significant variation in (1) wt % slag, w/cm ratio, and wt % portland cement about the baseline mix and (2) the temperature of curing in order to better assess the dependence of the performance properties on these factors. Two separate campaigns, designated Phase 10 and Phase 11, were carried out under Task 3. Experimental designs and statistical analyses were used to search for correlation among properties and to develop linear models to predict property values based on factors such as w/cm ratio, slag concentration, and portland cement concentration. It turns out that the projected salt compositions contained relatively high amounts of aluminate (0.22 M) even though no aluminate was introduced due to caustic aluminate removal from High Level Waste. Previous studies revealed that increased levels of aluminate in the feed cause a significant increase in the heat generation. For Phase 10, a mix with 0.05 M aluminate was used as a comparison point for the mixes at 0.22 M aluminate. The temperature of curing in Task 3 ranged from 22 C to 75 C. Recent results demonstrated that it is not only the temperature of curing which is important but also the time/temperature sequence of curing. Therefore, this report also focuses on the impact of the sequencing of time and curing temperature on Saltstone properties.

  6. Geography: Critical Factors in the Analysis of Complex Systems

    E-Print Network [OSTI]

    Welch, Ivan

    2012-05-31T23:59:59.000Z

    Geography is a disciple of discovery and exploration. From earliest human endeavor until today, it remains the key to understanding human interaction with the landscape. A conceptual framework of geographic factors provides ...

  7. Some Physics And System Issues In The Security Analysis Of Quantum Key Distribution Protocols

    E-Print Network [OSTI]

    Horace P. Yuen

    2014-05-07T23:59:59.000Z

    In this paper we review a number of issues on the security of quantum key distribution (QKD) protocols that bear directly on the relevant physics or mathematical representation of the QKD cryptosystem. It is shown that the cryptosystem representation itself may miss out many possible attacks which are not accounted for in the security analysis and proofs. Hence the final security claims drawn from such analysis are not reliable, apart from foundational issues about the security criteria that are discussed elsewhere. The cases of continuous-variable QKD and multi-photon sources are elaborated upon.

  8. Key Factors for Determining Groundwater Impacts Due to Leakage from Geologic Carbon Sequestration Reservoirs

    SciTech Connect (OSTI)

    Carroll, Susan A.; Keating, Elizabeth; Mansoor, Kayyum; Dai, Zhenxue; Sun, Yunwei; Trainor-Guitton, Whitney; Brown, Christopher F.; Bacon, Diana H.

    2014-09-15T23:59:59.000Z

    The National Risk Assessment Partnership (NRAP) is developing a science-based toolset for the analysis of potential impacts to groundwater chemistry from CO2 injection (www.netldoe.gov/nrap). The toolset adopts a stochastic approach in which predictions address uncertainties in shallow groundwater and leakage scenarios. It is derived from detailed physics and chemistry simulation results that are used to train more computationally efficient models, referred to here as reduced-order models (ROMs), for each component system. In particular, these tools can be used to help regulators and operators understand the expected sizes and longevity of plumes in pH, TDS, and dissolved metals that could result from a leakage of brine and/or CO2 from a storage reservoir into aquifers. This information can inform, for example, decisions on monitoring strategies that are both effective and efficient. We have used this approach to develop predictive reduced-order models for two common types of reservoirs, but the approach could be used to develop a model for a specific aquifer or other common types of aquifers. In this paper we describe potential impacts to groundwater quality due to CO2 and brine leakage, discuss an approach to calculate thresholds under which no impact to groundwater occurs, describe the time scale for impact on groundwater, and discuss the probability of detecting a groundwater plume should leakage occur. To facilitate this, multi-phase flow and reactive transport simulations and emulations were developed for two classes of aquifers, considering uncertainty in leakage source terms and aquifer hydrogeology. We targeted an unconfined fractured carbonate aquifer based on the Edwards aquifer in Texas and a confined alluvium aquifer based on the High Plains Aquifer in Kansas, which share characteristics typical of many drinking water aquifers in the United States. The hypothetical leakage scenarios centered on the notion that wellbores are the most likely conduits for brine and CO2 leaks. Leakage uncertainty was based on hypothetical injection of CO2 for 50 years at a rate of 5 million tons per year into a depleted oil/gas reservoir with high permeability and, one or more wells provided leakage pathways from the storage reservoir to the overlying aquifer. This scenario corresponds to a storage site with historical oil/gas production and some poorly completed legacy wells that went undetected through site evaluation, operations, and post-closure. For the aquifer systems and leakage scenarios studied here, CO2 and brine leakage are likely to drive pH below and increase total dissolved solids (TDS) above the “no-impact thresholds;” and the subsequent plumes, although small, are likely to persist for long periods of time in the absence of remediation. In these scenarios, however, risk to human health may not be significant for two reasons. First, our simulated plume volumes are much smaller than the average inter-well spacing for these representative aquifers, so the impacted groundwater would be unlikely to be pumped for drinking water. Second, even within the impacted plume volumes little water exceeds the primary maximum contamination levels.

  9. Analysis Of Factors Affecting Natural Source Slf Electromagnetic...

    Open Energy Info (EERE)

    At Geothermal Wells Jump to: navigation, search OpenEI Reference LibraryAdd to library Journal Article: Analysis Of Factors Affecting Natural Source Slf Electromagnetic...

  10. Coupling Lemma and Its Application to The Security Analysis of Quantum Key Distribution

    E-Print Network [OSTI]

    Kentaro Kato

    2015-05-23T23:59:59.000Z

    It is known that the coupling lemma provides a useful tool in the study of probability theory and its related areas. It describes the relation between the variational distance of two probability distributions and the probability that outcomes from the two random experiments associated with each distribution are not identical. In this paper, the failure probability interpretation problem that has been presented by Yuen and Hirota is discussed from the viewpoint of the application of the coupling lemma. First, we introduce the coupling lemma, and investigate properties of it. Next, it is shown that the claims for this problem in the literatures are justified by using the coupling lemma. Consequently, we see that the failure probability interpretation is not adequate in the security analysis of quantum key distribution.

  11. Risk analysis of Trojan-horse attacks on practical quantum key distribution systems

    E-Print Network [OSTI]

    Nitin Jain; Birgit Stiller; Imran Khan; Vadim Makarov; Christoph Marquardt; Gerd Leuchs

    2014-12-19T23:59:59.000Z

    An eavesdropper Eve may probe a quantum key distribution (QKD) system by sending a bright pulse from the quantum channel into the system and analyzing the back-reflected pulses. Such Trojan-horse attacks can breach the security of the QKD system if appropriate safeguards are not installed or if they can be fooled by Eve. We present a risk analysis of such attacks based on extensive spectral measurements, such as transmittance, reflectivity, and detection sensitivity of some critical components used in typical QKD systems. Our results indicate the existence of wavelength regimes where the attacker gains considerable advantage as compared to launching an attack at 1550 nm. We also propose countermeasures to reduce the risk of such attacks.

  12. ACCIDENT ANALYSIS AND HAZARD ANALYSIS FOR HUMAN AND ORGANIZATIONAL FACTORS

    E-Print Network [OSTI]

    Leveson, Nancy

    culpable. An accident analysis method is needed that will guide the work, aid in the analysis of the role

  13. Noisy Independent Factor Analysis Model for Density Estimation and Classification

    E-Print Network [OSTI]

    Amato, U.

    2009-06-09T23:59:59.000Z

    We consider the problem of multivariate density estimation when the unknown density is assumed to follow a particular form of dimensionality reduction, a noisy independent factor analysis (IFA) model. In this model the ...

  14. An economic analysis of factors affecting the Texas potato market

    E-Print Network [OSTI]

    Asgill, Oladimagi Winsome

    1989-01-01T23:59:59.000Z

    AN ECONOMIC ANALYSIS OF FACTORS AFFECTING THE TEXAS POTATO MARKET A Thesis OLADIMAGI WINSOME ASGILL Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree of MASTER... OF SCIENCE May 1989 Major Subject: Agricultural Economics AN ECONOMIC ANALYSIS OP FACTORS AFFECTING THE TEXAS POTATO MARKET A Thesis OLADIMAGI WINSOME ASGILL Approved as to style and content by: H. L. Goodwin (Chair of Committee) S. W. Fuller (Member...

  15. CYBER THREAT ANALYSIS A KEY ENABLING TECHNOLOGY FOR THE OBJECTIVE FORCE (A CASE STUDY IN NETWORK INTRUSION DETECTION)

    E-Print Network [OSTI]

    Kumar, Vipin

    60000 90 91 92 93 94 95 96 97 98 99 00 01 Today computers control power, oil and gas deliveryCYBER THREAT ANALYSIS ­ A KEY ENABLING TECHNOLOGY FOR THE OBJECTIVE FORCE (A CASE STUDY IN NETWORK-of-systems technologies will enable decisive maneuver, both horizon- tal and vertical, during day and night, and in all

  16. Documentation of key factors for successful reconstruction of high volume roadways: two case study projects in Michigan

    E-Print Network [OSTI]

    De Las Casas Moncloa, Rodrigo

    2001-01-01T23:59:59.000Z

    identified factors and practices that contributed to the success of highway concrete rehabilitation and reconstruction projects. The research was conducted on four specific topics related to highway projects: constructibility, contracting, scheduling...

  17. Panel Data Analysis of Regulatory Factors Shaping Environmental Performance

    E-Print Network [OSTI]

    Earnhart, Dietrich H.

    2006-03-13T23:59:59.000Z

    and the influence of regulatory factors in general, this paper examines a specific demonstration of environmental perfor- mance: biological oxygen demand (BOD) wastewater dis- charges by large (“major”) municipal wastewater treatment plants in Kansas during... example, limit levels). To analyze the effects of these regulatory factors on envi- ronmental performance, this particular empirical analysis examines the wastewater discharges by large municipal wastewater treatment facilities in the state of Kansas...

  18. The KeY Platform for Verification and Analysis of Java Programs

    E-Print Network [OSTI]

    Mostowski, Wojciech

    pure functional verification. We use the current release of the KeY system as an example to explain and prove this claim. 1 Overview Motivation. Over the last decades the reach and power of verification of real world systems. The basic technologies of deductive program verification have matured. State

  19. Summary We investigated key factors controlling mass and energy exchange by a young (6-year-old) ponderosa pine

    E-Print Network [OSTI]

    Cohen, Ronald C.

    forest type in the western United States, occupying approximately 20% of unreserved forest area (Powell with tree size and age influence the ecosystem-scale energy balance, transpiration rates, and net carbon uptake. Our objective was to compare the factors con- trolling energy balance and net carbon uptake over

  20. Power Analysis of Atmel CryptoMemory Recovering Keys from Secure EEPROMs

    E-Print Network [OSTI]

    Verdult, Roel

    , [...] including physical attacks". We de- veloped a successful power analysis attack on the authentication step knowledge, this is the first power analysis attack on Atmel CryptoMemory products reported in the literature

  1. Key word:Daylight Factor Window Wall Ratio Pendentive dome Lighting design Tropical region Architecture and Interior design

    E-Print Network [OSTI]

    Mehrdad Mazloomi

    Abstract: Daylighting design plays important role in architecture of religious buildings such as churches and mosques where pendentive dome construction is frequently used. In daylighting design, many designers face difficulty in estimating the interior share of light which is usually expressed by daylight factor due to complexity of interior form. This study aims to provide designers with a rather high precision rule of thumb for average daylight factor in pendentive dome building. Thus, it investigates the Daylight Factor [DF] distribution of such buildings with reference to the tropics. It takes the Window Wall Ratio [WWR] into account and seeks its influence on daylight factor. By a 12 X 12 points grid, it examines five different ratios including 0.1, 0.2, 0.3, 0.4 and 0.5 on DF of the floor beneath the dome. The results endorse the direct relation of WWR and DF. The least WWR equal to 0.1 yields an average DF of 0.55 % while the greatest WWR of 0.5 yields in average DF of 2.56%. The intermediate WWR in steps of 0.2, 0.3 and 0.4 correspond to 1.04, 1.56 and 2.07 percent respectively. As a relatively precise rule of thumb, any increment in consequent steps of WWR with 0.1 intervals results in 0.5 % increase in DF. This can be employed by architects and interior designers for lighting design of pendentive dome buildings in tropical region.

  2. Performance analysis of parallel supernodal sparse LU factorization

    SciTech Connect (OSTI)

    Grigori, Laura; Li, Xiaoye S.

    2004-02-05T23:59:59.000Z

    We investigate performance characteristics for the LU factorization of large matrices with various sparsity patterns. We consider supernodal right-looking parallel factorization on a bi-dimensional grid of processors, making use of static pivoting. We develop a performance model and we validate it using the implementation in SuperLU-DIST, the real matrices and the IBM Power3 machine at NERSC. We use this model to obtain performance bounds on parallel computers, to perform scalability analysis and to identify performance bottlenecks. We also discuss the role of load balance and data distribution in this approach.

  3. Method for factor analysis of GC/MS data

    DOE Patents [OSTI]

    Van Benthem, Mark H; Kotula, Paul G; Keenan, Michael R

    2012-09-11T23:59:59.000Z

    The method of the present invention provides a fast, robust, and automated multivariate statistical analysis of gas chromatography/mass spectroscopy (GC/MS) data sets. The method can involve systematic elimination of undesired, saturated peak masses to yield data that follow a linear, additive model. The cleaned data can then be subjected to a combination of PCA and orthogonal factor rotation followed by refinement with MCR-ALS to yield highly interpretable results.

  4. An analysis of factors contributing to train-involved crashes

    E-Print Network [OSTI]

    Cooner, Scott Allen

    1995-01-01T23:59:59.000Z

    analyzed for the contributing factors. The contributing factors were classified into four categories: railroad factors, environmental factors, roadway factors, and driver/passenger factors. The accident data was analyzed using one and two-way classification...

  5. Sensitivity Analysis of Wind Plant Performance to Key Turbine Design Parameters: A Systems Engineering Approach; Preprint

    SciTech Connect (OSTI)

    Dykes, K.; Ning, A.; King, R.; Graf, P.; Scott, G.; Veers, P.

    2014-02-01T23:59:59.000Z

    This paper introduces the development of a new software framework for research, design, and development of wind energy systems which is meant to 1) represent a full wind plant including all physical and nonphysical assets and associated costs up to the point of grid interconnection, 2) allow use of interchangeable models of varying fidelity for different aspects of the system, and 3) support system level multidisciplinary analyses and optimizations. This paper describes the design of the overall software capability and applies it to a global sensitivity analysis of wind turbine and plant performance and cost. The analysis was performed using three different model configurations involving different levels of fidelity, which illustrate how increasing fidelity can preserve important system interactions that build up to overall system performance and cost. Analyses were performed for a reference wind plant based on the National Renewable Energy Laboratory's 5-MW reference turbine at a mid-Atlantic offshore location within the United States.

  6. Human factors review for Severe Accident Sequence Analysis (SASA)

    SciTech Connect (OSTI)

    Krois, P.A.; Haas, P.M.; Manning, J.J.; Bovell, C.R.

    1984-01-01T23:59:59.000Z

    The paper will discuss work being conducted during this human factors review including: (1) support of the Severe Accident Sequence Analysis (SASA) Program based on an assessment of operator actions, and (2) development of a descriptive model of operator severe accident management. Research by SASA analysts on the Browns Ferry Unit One (BF1) anticipated transient without scram (ATWS) was supported through a concurrent assessment of operator performance to demonstrate contributions to SASA analyses from human factors data and methods. A descriptive model was developed called the Function Oriented Accident Management (FOAM) model, which serves as a structure for bridging human factors, operations, and engineering expertise and which is useful for identifying needs/deficiencies in the area of accident management. The assessment of human factors issues related to ATWS required extensive coordination with SASA analysts. The analysis was consolidated primarily to six operator actions identified in the Emergency Procedure Guidelines (EPGs) as being the most critical to the accident sequence. These actions were assessed through simulator exercises, qualitative reviews, and quantitative human reliability analyses. The FOAM descriptive model assumes as a starting point that multiple operator/system failures exceed the scope of procedures and necessitates a knowledge-based emergency response by the operators. The FOAM model provides a functionally-oriented structure for assembling human factors, operations, and engineering data and expertise into operator guidance for unconventional emergency responses to mitigate severe accident progression and avoid/minimize core degradation. Operators must also respond to potential radiological release beyond plant protective barriers. Research needs in accident management and potential uses of the FOAM model are described. 11 references, 1 figure.

  7. Security analysis of the decoy method with the Bennett-Brassard 1984 protocol for finite key lengths

    E-Print Network [OSTI]

    Masahito Hayashi; Ryota Nakayama

    2013-11-19T23:59:59.000Z

    This paper provides a formula for the sacrifice bit-length for privacy amplification with the Bennett-Brassard 1984 protocol for finite key lengths when we employ the decoy method. Using the formula, we can guarantee the security parameter for realizable quantum key distribution system. The key generation rates with finite key lengths are numerically evaluated. The proposed method improves the existing key generation rate even in the asymptotic setting.

  8. Greece: Getting Here and Moving Forward: a short description of the lecture Professor Haliassos talk will focus on key factors that have brought Greece to its present fiscal state

    E-Print Network [OSTI]

    Rohs, Remo

    Greece: Getting Here and Moving Forward: a short description of the lecture Professor Haliassos talk will focus on key factors that have brought Greece to its present fiscal state. It will be argued that the factors contributing to Greece's predicament represent an interplay of economic

  9. Accelerated Gibbs Sampling for Infinite Sparse Factor Analysis

    SciTech Connect (OSTI)

    Andrzejewski, D M

    2011-09-12T23:59:59.000Z

    The Indian Buffet Process (IBP) gives a probabilistic model of sparse binary matrices with an unbounded number of columns. This construct can be used, for example, to model a fixed numer of observed data points (rows) associated with an unknown number of latent features (columns). Markov Chain Monte Carlo (MCMC) methods are often used for IBP inference, and in this technical note, we provide a detailed review of the derivations of collapsed and accelerated Gibbs samplers for the linear-Gaussian infinite latent feature model. We also discuss and explain update equations for hyperparameter resampling in a 'full Bayesian' treatment and present a novel slice sampler capable of extending the accelerated Gibbs sampler to the case of infinite sparse factor analysis by allowing the use of real-valued latent features.

  10. Using Factor Analysis to Generate Clusters of Agile (A Guide for Agile Process Improvement)

    E-Print Network [OSTI]

    Gravell, Andrew M.

    Using Factor Analysis to Generate Clusters of Agile Practices (A Guide for Agile Process. These factors with the associated practices can be used as a guide for agile process improvement. Correlations different agile practices. The analysis extracted 15 factors; each was associated with a list of practices

  11. Key distributionKey distribution Key distribution, symmetric encryption

    E-Print Network [OSTI]

    Fisher, Michael

    COMP 522 Key distributionKey distribution COMP 522 Key distribution, symmetric encryption From in a secure way and must keep the key secure" · Important issue: how to distribute secret keys? COMP 522 Key distribution, manual delivery For two parties A and B: · A key could be created by A and delivered physically

  12. Human Factors Considerations in New Nuclear Power Plants: Detailed Analysis.

    SciTech Connect (OSTI)

    OHara,J.; Higgins, J.; Brown, W.; Fink, R.

    2008-02-14T23:59:59.000Z

    This Nuclear Regulatory Commission (NRC) sponsored study has identified human-performance issues in new and advanced nuclear power plants. To identify the issues, current industry developments and trends were evaluated in the areas of reactor technology, instrumentation and control technology, human-system integration technology, and human factors engineering (HFE) methods and tools. The issues were organized into seven high-level HFE topic areas: Role of Personnel and Automation, Staffing and Training, Normal Operations Management, Disturbance and Emergency Management, Maintenance and Change Management, Plant Design and Construction, and HFE Methods and Tools. The issues where then prioritized into four categories using a 'Phenomena Identification and Ranking Table' methodology based on evaluations provided by 14 independent subject matter experts. The subject matter experts were knowledgeable in a variety of disciplines. Vendors, utilities, research organizations and regulators all participated. Twenty issues were categorized into the top priority category. This Brookhaven National Laboratory (BNL) technical report provides the detailed methodology, issue analysis, and results. A summary of the results of this study can be found in NUREG/CR-6947. The research performed for this project has identified a large number of human-performance issues for new control stations and new nuclear power plant designs. The information gathered in this project can serve as input to the development of a long-term strategy and plan for addressing human performance in these areas through regulatory research. Addressing human-performance issues will provide the technical basis from which regulatory review guidance can be developed to meet these challenges. The availability of this review guidance will help set clear expectations for how the NRC staff will evaluate new designs, reduce regulatory uncertainty, and provide a well-defined path to new nuclear power plant licensing.

  13. Consumer Acceptance of Genetically Modified Foods in Korea: Factor and Cluster Analysis

    E-Print Network [OSTI]

    Neimark, Alexander V.

    Consumer Acceptance of Genetically Modified Foods in Korea: Factor and Cluster Analysis Benjamin #12;Consumer Acceptance of Genetically Modified Foods In Korea: Factor and Cluster Analysis Abstract and desirability of food biotechnology 2 #12;Introduction Consumer acceptance of genetically modified (GM) 1 food

  14. SciTech Connect: Industrial Power Factor Analysis Guidebook.

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    factor is a way of measuring the percentage of reactive power in an electrical system. Reactive power represents wasted energy--electricity that does no useful work because the...

  15. Factor analysis of Galactic globular clusters on structural parameters

    E-Print Network [OSTI]

    O. Eigenson; O. Yatsyk

    2000-11-08T23:59:59.000Z

    Principal component method is used to study galactic globular clusters in 7- and 8-axis space of structural parameters. It is shown that the manifold properties of clusters with this set of parameters is determined mainly by two independent factors. This result may be useful for the theory of formation and evolution of clusters.

  16. Factors Analysis on Safety of Indoor Air Quality

    E-Print Network [OSTI]

    Luo, Q.; Liu, Z.; Xiong, J.

    2006-01-01T23:59:59.000Z

    . Handbook on Review and Detection of Indoor Environment [M]. Beijing: Mechanical Industry Press, 2003: 1-5.(In Chinese) [2] Pan Xiaochuan. Review on Indoor Air Pollution and Its Harmfulness to Health [J]. Chin. Prev. Med., 2002,3(3):167-169 (in... of Urban Construction, Nanhua University, Hengyang, P.R.China hunanluoqinghai@163.com Abstract: Influence factors on safety of indoor air quality (IAQ) were analyzed in this paper. Some regeneration compositions resulting from potential indoor...

  17. Human Reliability Analysis for Design: Using Reliability Methods for Human Factors Issues

    SciTech Connect (OSTI)

    Ronald Laurids Boring

    2010-11-01T23:59:59.000Z

    This paper reviews the application of human reliability analysis methods to human factors design issues. An application framework is sketched in which aspects of modeling typically found in human reliability analysis are used in a complementary fashion to the existing human factors phases of design and testing. The paper provides best achievable practices for design, testing, and modeling. Such best achievable practices may be used to evaluate and human system interface in the context of design safety certifications.

  18. RESEARCH Open Access Analysis of primary risk factors for oral cancer

    E-Print Network [OSTI]

    Ahmad, Sajjad

    RESEARCH Open Access Analysis of primary risk factors for oral cancer from select US states , Michelle Chino3 , Karl Kingsley1* Abstract Objectives: To examine the primary risk factor for oral cancer in oral cancer incidence and mortality. Methods: Population-based data on oral cancer morbidity

  19. 270 | VOL.9 NO.3 | MARCH2012 | nature methods Key requirements for methylation analysis of large sample sizes

    E-Print Network [OSTI]

    Cai, Long

    ). This method eliminates five steps from Illumina's library- construction protocol such that multiplexed and sequenced all at once in a single Illumina HiSeq flowcell. Additionally we designed barcodes to process 384 an analysis pipeline for read mapping and methylation quantification, called bisReadMapper (Supplementary Fig

  20. Molecular genetic analysis of activation-tagged transcription factors thought to be involved in photomorphogenesis

    SciTech Connect (OSTI)

    Neff, Michael M.

    2011-06-23T23:59:59.000Z

    This is a final report for Department of Energy Grant No. DE-FG02-08ER15927 entitled “Molecular Genetic Analysis of Activation-Tagged Transcription Factors Thought to be Involved in Photomorphogenesis”. Based on our preliminary photobiological and genetic analysis of the sob1-D mutant, we hypothesized that OBP3 is a transcription factor involved in both phytochrome and cryptochrome-mediated signal transduction. In addition, we hypothesized that OBP3 is involved in auxin signaling and root development. Based on our preliminary photobiological and genetic analysis of the sob2-D mutant, we also hypothesized that a related gene, LEP, is involved in hormone signaling and seedling development.

  1. Human Factors Engineering and Ergonomics Analysis for the Canister Storage Building (CSB) Results and Findings

    SciTech Connect (OSTI)

    GARVIN, L.J.

    1999-09-20T23:59:59.000Z

    The purpose for this supplemental report is to follow-up and update the information in SNF-3907, Human Factors Engineering (HFE) Analysis: Results and Findings. This supplemental report responds to applicable U.S. Department of Energy Safety Analysis Report review team comments and questions. This Human Factors Engineering and Ergonomics (HFE/Erg) analysis was conducted from April 1999 to July 1999; SNF-3907 was based on analyses accomplished in October 1998. The HFE/Erg findings presented in this report and SNF-3907, along with the results of HNF-3553, Spent Nuclear Fuel Project, Final Safety Analysis Report, Annex A, ''Canister Storage Building Final Safety Analysis Report,'' Chapter A3.0, ''Hazards and Accidents Analyses,'' provide the technical basis for preparing or updating HNF-3553. Annex A, Chaptex A13.0, ''Human Factors Engineering.'' The findings presented in this report allow the HNF-3553 Chapter 13.0, ''Human Factors,'' to respond fully to the HFE requirements established in DOE Order 5480.23, Nuclear Safety Analysis Reports.

  2. Preliminary Assessment of ICRP Dose Conversion Factor Recommendations for Accident Analysis Applications

    SciTech Connect (OSTI)

    Vincent, A.M.

    2002-03-13T23:59:59.000Z

    Accident analysis for U.S. Department of Energy (DOE) nuclear facilities is an integral part of the overall safety basis developed by the contractor to demonstrate facility operation can be conducted safely. An appropriate documented safety analysis for a facility discusses accident phenomenology, quantifies source terms arising from postulated process upset conditions, and applies a standardized, internationally-recognized database of dose conversion factors (DCFs) to evaluate radiological conditions to offsite receptors.

  3. Design and Analysis of TQS01, a 90 mm Nb3Sn Model Quadrupole for LHC Luminosity Upgrade Based on a Key and Bladder Assembly

    SciTech Connect (OSTI)

    Caspi, S.; Ambrosio, G.; Andreev, N.; Barzi, E.; Bossert, R.C.; Dietderich, D.R.; Ferracin, P.; Ghosh, A.; Gourlay, S.A.; Hafalia, A.R.; Hannaford, C.R.; Kashikhin, V.S.; Kashikhin, V.V.; Lietzke, A.F.; Mattafirri, S.; McInturff, A.D.; Novitsky, I.V.; Sabbi, G.L.; Turrioni, D.; Yamada, R.; Zlobin, A.V.

    2006-06-01T23:59:59.000Z

    The US LHC Accelerator Research Program (LARP) is developing Nb{sub 3}Sn accelerator magnet technology for the LHC luminosity upgrade. Two 90 mm 'Technology Quadrupole' models (TQS01, TQC01) are being developed in close collaboration between LBNL and FNAL, using identical coil design, but two different support structures. The TQS01 structure was developed and tested at LBNL. With this approach coils are supported by an outer aluminum shell and assembled using keys and bladders. In contrast, the second model TQC01, utilize stainless steel collars and a thick stainless steel skin. This paper describes the TQS01 model magnet, its 3D ANSYS stress analysis, and anticipated instrumentation and assembly procedure.

  4. analysis scepa project: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    the type and amount... diverse factors, such as, but no limited to: Fuel Considerations, Heat System Analysis, Electric Power Considerations, Key Technical Project Considerations,...

  5. Teaching Factor Analysis in Terms of Variable Space and Subject Space Using Multimedia

    E-Print Network [OSTI]

    Yu, Alex

    Teaching Factor Analysis in Terms of Variable Space and Subject Space Using Multimedia formed the basis for construction and implementation of a computer-based multimedia instructional program the findings, a multimedia program was developed to counteract those miscoceptions. The target audience

  6. Beta-Negative Binomial Process and Poisson Factor Analysis Mingyuan Zhou Lauren A. Hannah

    E-Print Network [OSTI]

    Carin, Lawrence

    Beta-Negative Binomial Process and Poisson Factor Analysis Mingyuan Zhou Lauren A. Hannah David B 27708, USA Abstract A beta-negative binomial (BNB) process is proposed, leading to a beta-gamma-Poisson process, which may be viewed as a "multi- scoop" generalization of the beta-Bernoulli process. The BNB

  7. ORIGINAL ARTICLE Spatial analysis of the driving factors of grassland degradation

    E-Print Network [OSTI]

    Wu, Jianguo "Jingle"

    ORIGINAL ARTICLE Spatial analysis of the driving factors of grassland degradation under conditions November 2011 Ó Springer-Verlag 2011 Abstract In recent years, steppe degradation in North China has become a serious environmental problem. Most research on steppe degradation is conducted at the level

  8. Parametric Analysis of the Factors Controlling the Costs of Sedimentary Geothermal Systems - Preliminary Results (Poster)

    SciTech Connect (OSTI)

    Augustine, C.

    2013-10-01T23:59:59.000Z

    Parametric analysis of the factors controlling the costs of sedimentary geothermal systems was carried out using a modified version of the Geothermal Electricity Technology Evaluation Model (GETEM). The sedimentary system modeled assumed production from and injection into a single sedimentary formation.

  9. SPATIAL FACTOR ANALYSIS OF STREAM SEDIMENT GEOCHEMISTRY DATA FROM SOUTH GREENLAND

    E-Print Network [OSTI]

    SPATIAL FACTOR ANALYSIS OF STREAM SEDIMENT GEOCHEMISTRY DATA FROM SOUTH GREENLAND Allan A. Nielsen1 and Greenland, Thoravej 8, DK-2400 København NV, Denmark. ast@geus.dk SUMMARY This paper describes from South Greenland. Kriged MAF images are compared with kriged images based on varimax rotated

  10. Use of Evolutionary Factor Analysis in the Spectroelectrochemistry of Escherichia coli Sulfite

    E-Print Network [OSTI]

    Reid, Scott A.

    , and their concentrations and spectra were determined by the use of the mass balance equation. The spectra of the one and a mass balance equation. Identification of the fifth species, which was probably the initial reduction that it was present in the same time region as the starting material. Factor analysis has been shown to be a powerful

  11. Bridging Domains with Words: Opinion Analysis with Matrix Tri-factorizations

    E-Print Network [OSTI]

    Li, Tao

    Bridging Domains with Words: Opinion Analysis with Matrix Tri-factorizations Tao Li Vikas Sindhwani Chris Ding Yi Zhang§ Abstract With the explosion of user-generated web2.0 content in the form of blogs manual effort? We outline a novel sentiment transfer mechanism based on constrained non-negative matrix

  12. Method for exploiting bias in factor analysis using constrained alternating least squares algorithms

    DOE Patents [OSTI]

    Keenan, Michael R. (Albuquerque, NM)

    2008-12-30T23:59:59.000Z

    Bias plays an important role in factor analysis and is often implicitly made use of, for example, to constrain solutions to factors that conform to physical reality. However, when components are collinear, a large range of solutions may exist that satisfy the basic constraints and fit the data equally well. In such cases, the introduction of mathematical bias through the application of constraints may select solutions that are less than optimal. The biased alternating least squares algorithm of the present invention can offset mathematical bias introduced by constraints in the standard alternating least squares analysis to achieve factor solutions that are most consistent with physical reality. In addition, these methods can be used to explicitly exploit bias to provide alternative views and provide additional insights into spectral data sets.

  13. A correlational analysis of two versions of the two-factor theory of job satisfaction

    E-Print Network [OSTI]

    Metoskie, John Arthur

    1971-01-01T23:59:59.000Z

    A CORRELATIONAL AIJA! YSIS OF TiiO VERSIONS OF Ti!E TWO-FACTOR THEORY OF JOB SATISFACTION A Thesis JOHN ARTHUR METOSKIE Submitted to the Graduate College of Texas ASM University in partial fulfillment of the requirement for the degree... of MASTER OF SCIENCE December lg71 Major Subject: Psychology A CORRELATIONAL ANALYSIS OF TWO VERSIONS OF THE TWO-FACTOR THEORY OF JOB SATISFACTION A Thesis JOHN ARTHUR METOSKIE Approved as to sty1e and content by: hairman o Commit ee Head...

  14. Public Key Cryptography and Key Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-02-15T23:59:59.000Z

    The use and management of certificate-based public key cryptography for the Department of Energy (DOE) requires the establishment of a public key infrastructure (PKI). This chapter defines the policy related to roles, requirements, and responsibilities for establishing and maintaining a DOE PKI and the documentation necessary to ensure that all certificates are managed in a manner that maintains the overall trust required to support a viable PKI. Canceled by DOE N 251.112.

  15. Key Milestones/Outlook

    Broader source: Energy.gov [DOE]

    Key Milestones/Outlook per the Department of Energy 2015 Congressional Budget Request, Environmental Management, March 2014

  16. analysis project 1987-1997: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    the type and amount... diverse factors, such as, but no limited to: Fuel Considerations, Heat System Analysis, Electric Power Considerations, Key Technical Project Considerations,...

  17. A Longitudinal Analysis of the Causal Factors in Major Aviation Accidents in the USA from 1976 to 2006

    E-Print Network [OSTI]

    Johnson, Chris

    A Longitudinal Analysis of the Causal Factors in Major Aviation Accidents in the USA from 1976.m.holloway@larc.nasa.gov Abstract This paper forms part of a long term analysis to understand the causes of aviation accidents. In this paper, we extend our analysis to include all major US aviation accidents between 1976 and 1984. We also

  18. Human Factors Analysis of Predator B Crash Geoff Carrigan, Dave Long, M.L. Cummings, John Duffner

    E-Print Network [OSTI]

    Cummings, Mary "Missy"

    accident analysis. While it has been used to analyze many manned aircraft accidents, its use for UAS accident analysis is limited. Thus, this report provides background into the Unmanned Aerial Vehicle (UAVHuman Factors Analysis of Predator B Crash Geoff Carrigan, Dave Long, M.L. Cummings, John Duffner

  19. Fusion integral experiments and analysis and the determination of design safety factors - I: Methodology

    SciTech Connect (OSTI)

    Youssef, M.Z.; Kumar, A.; Abdou, M.A. [Univ. of California, Los Angeles, CA (United States); Oyama, Y.; Maekawa, H. [Japan Atomic Energy Research Inst., Ibaraki (Japan)

    1995-09-01T23:59:59.000Z

    The role of the neutronics experimentation and analysis in fusion neutronics research and development programs is discussed. A new methodology was developed to arrive at estimates to design safety factors based on the experimental and analytical results from design-oriented integral experiments. In this methodology, and for a particular nuclear response, R, a normalized density function (NDF) is constructed from the prediction uncertainties, and their associated standard deviations, as found in the various integral experiments where that response, R, is measured. Important statistical parameters are derived from the NDF, such as the global mean prediction uncertainty, and the possible spread around it. The method of deriving safety factors from many possible NDFs based on various calculational and measuring methods (among other variants) is also described. Associated with each safety factor is a confidence level, designers may choose to have, that the calculated response, R, will not exceed (or will not fall below) the actual measured value. An illustrative example is given on how to construct the NDFs. The methodology is applied in two areas, namely the line-integrated tritium production rate and bulk shielding integral experiments. Conditions under which these factors could be derived and the validity of the method are discussed. 72 refs., 17 figs., 4 tabs.

  20. Assessing State Nuclear Weapons Proliferation: Using Bayesian Network Analysis of Social Factors

    SciTech Connect (OSTI)

    Coles, Garill A.; Brothers, Alan J.; Olson, Jarrod; Whitney, Paul D.

    2010-04-16T23:59:59.000Z

    A Bayesian network (BN) model of social factors can support proliferation assessments by estimating the likelihood that a state will pursue a nuclear weapon. Social factors including political, economic, nuclear capability, security, and national identity and psychology factors may play as important a role in whether a State pursues nuclear weapons as more physical factors. This paper will show how using Bayesian reasoning on a generic case of a would-be proliferator State can be used to combine evidence that supports proliferation assessment. Theories and analysis by political scientists can be leveraged in a quantitative and transparent way to indicate proliferation risk. BN models facilitate diagnosis and inference in a probabilistic environment by using a network of nodes and acyclic directed arcs between the nodes whose connections, or absence of, indicate probabilistic relevance, or independence. We propose a BN model that would use information from both traditional safeguards and the strengthened safeguards associated with the Additional Protocol to indicate countries with a high risk of proliferating nuclear weapons. This model could be used in a variety of applications such a prioritization tool and as a component of state safeguards evaluations. This paper will discuss the benefits of BN reasoning, the development of Pacific Northwest National Laboratory’s (PNNL) BN state proliferation model and how it could be employed as an analytical tool.

  1. Global analysis of proton elastic form factor data with two-photon exchange corrections

    SciTech Connect (OSTI)

    J. Arrington; W. Melnitchouk; J. A. Tjon

    2007-09-01T23:59:59.000Z

    We use the world's data on elastic electron-proton scattering and calculations of two-photon exchange effects to extract corrected values of the proton's electric and magnetic form factors over the full Q^2 range of the existing data. Our analysis combines the corrected Rosenbluth cross section and polarization transfer data, and is the first extraction of G_Ep and G_Mp including explicit two-photon exchange corrections and their associated uncertainties. In addition, we examine the angular dependence of the corrected cross sections, and discuss the possible nonlinearities of the cross section as a function of epsilon.

  2. Quantum dense key distribution

    SciTech Connect (OSTI)

    Degiovanni, I.P.; Ruo Berchera, I.; Castelletto, S.; Rastello, M.L.; Bovino, F.A.; Colla, A.M.; Castagnoli, G. [Istituto Elettrotecnico Nazionale G. Ferraris, Strada delle Cacce 91, 10135 Torino (Italy); ELSAG SpA, Via Puccini 2, 16154, Genova (Italy)

    2004-03-01T23:59:59.000Z

    This paper proposes a protocol for quantum dense key distribution. This protocol embeds the benefits of a quantum dense coding and a quantum key distribution and is able to generate shared secret keys four times more efficiently than the Bennet-Brassard 1984 protocol. We hereinafter prove the security of this scheme against individual eavesdropping attacks, and we present preliminary experimental results, showing its feasibility.

  3. Human Factors Process Failure Mode and Effects Analysis (HF PFMEA) Application in the Evaluation of Management Risks

    E-Print Network [OSTI]

    Soguilon, Nenita M.

    2009-12-18T23:59:59.000Z

    .3.1. Mechanisms of Prevention ............................................................................................... 11 2.4. Human Factors Process Failure Mode and Effects Analysis (HF PFMEA) ....................... 11 2.5. FMEA Components... ........................................................................................... 15 2.5.5. Risk Priority Number ....................................................................................................... 17 2.6. FMEA Model...

  4. Key Events Timeline

    Broader source: Energy.gov [DOE]

    This document lists key events beginning with the April 20 fire on the Deepwater Horizon through July 28th. Updated July 28, 2010.

  5. Key Request (Last) (First)

    E-Print Network [OSTI]

    Carrington, Emily

    will be accessing. For Johnson Hall exterior door access bring a copy of this form to the Earth & Space SciencesKey Request Form Name: (Last) (First) Contact Info Keys Cardswipe UW Email: Hitchcock Exterior Door Room:_________ Room:_________ Johnson Room:_________ Room:_________ Kincaid Exterior Door Room

  6. Economic Analysis of Hydrogen Energy Station Concepts: Are "H 2E-Stations" a Key Link to a Hydrogen Fuel Cell Vehicle Infrastructure?

    E-Print Network [OSTI]

    Lipman, Timothy E.; Edwards, Jennifer L.; Kammen, Daniel M.

    2002-01-01T23:59:59.000Z

    in the analysis of hydrogen energy stations, additionalattractiveness of the hydrogen energy station scheme in bothECONOMIC ANALYSIS OF HYDROGEN ENERGY STATION CONCEPTS: ARE '

  7. On quantum key distribution using ququarts

    SciTech Connect (OSTI)

    Kulik, S. P., E-mail: Sergei.Kulik@gmail.com; Shurupov, A. P. [Moscow State University (Russian Federation)

    2007-05-15T23:59:59.000Z

    A comparative analysis of quantum key distribution protocols using qubits and ququarts as information carriers is presented. Several schemes of incoherent attacks that can be used by an eavesdropper to obtain secret information are considered. The errors induced by the eavesdropper are analyzed for several key distribution protocols.

  8. A Longitudinal Analysis of the Causal Factors in Major Maritime Accidents in the USA and Canada (1996-2006)

    E-Print Network [OSTI]

    Williamson, John

    A Longitudinal Analysis of the Causal Factors in Major Maritime Accidents in the USA and Canada an analysis that extends across the findings presented over ten years investigations into maritime accidents, Hampton, VA 23681-2199, USA c.m.holloway@nasa.gov Abstract Accident reports provide important insights

  9. Optical key system

    DOE Patents [OSTI]

    Hagans, Karla G. (Livermore, CA); Clough, Robert E. (Danville, CA)

    2000-01-01T23:59:59.000Z

    An optical key system comprises a battery-operated optical key and an isolated lock that derives both its operating power and unlock signals from the correct optical key. A light emitting diode or laser diode is included within the optical key and is connected to transmit a bit-serial password. The key user physically enters either the code-to-transmit directly, or an index to a pseudorandom number code, in the key. Such person identification numbers can be retained permanently, or ephemeral. When a send button is pressed, the key transmits a beam of light modulated with the password information. The modulated beam of light is received by a corresponding optical lock with a photovoltaic cell that produces enough power from the beam of light to operate a password-screen digital logic. In one application, an acceptable password allows a two watt power laser diode to pump ignition and timing information over a fiberoptic cable into a sealed engine compartment. The receipt of a good password allows the fuel pump, spark, and starter systems to each operate. Therefore, bypassing the lock mechanism as is now routine with automobile thieves is pointless because the engine is so thoroughly disabled.

  10. Computational Analysis of Factors Influencing Enhancement of Thermal Conductivity of Nanofluids

    E-Print Network [OSTI]

    Okeke, George; Antony, Joseph; Ding, Yulong; 10.1007/s11051-011-0389-9

    2012-01-01T23:59:59.000Z

    Numerical investigations are conducted to study the effect of factors such as particle clustering and interfacial layer thickness on thermal conductivity of nanofluids. Based on this, parameters including Kapitza radius, and fractal and chemical dimension which have received little attention by previous research are rigorously investigated. The degree of thermal enhancement is analysed for increasing aggregate size, particle concentration, interfacial thermal resistance, and fractal and chemical dimensions. This analysis is conducted for water-based nanofluids of Alumina (Al2O3), CuO and Titania (TiO2) nanoparticles where the particle concentrations are varied up to 4vol%. Results from the numerical work are validated using available experimental data. For the case of aggregate size, particle concentration and interfacial thermal resistance; the aspect ratio (ratio of radius of gyration of aggregate to radius of primary particle, Rg/a) is varied between 2 to 60. It was found that the enhancement decreases wit...

  11. How Many Performance Shaping Factors are Necessary for Human Reliability Analysis?

    SciTech Connect (OSTI)

    Ronald L. Boring

    2010-06-01T23:59:59.000Z

    It has been argued that human reliability analysis (HRA) has expended considerable energy on creating detailed representations of human performance through an increasingly long list of performance shaping factors (PSFs). It is not clear, however, to what extent this refinement and expansion of PSFs has enhanced the quality of HRA. Indeed, there is considerable range in the number of PSFs provided by individual HRA methods, ranging from single factor models such as time-reliability curves, up to 50 or more PSFs in some current HRA models. The US Nuclear Regulatory Commission advocates 15 PSFs in its HRA Good Practices (NUREG-1792), while its SPAR-H method (NUREG/CR-6883) espouses the use of eight PSFs and its ATHEANA method (NUREG-1624) features an open-ended number of PSFs. The apparent differences in the optimal number of PSFs can be explained in terms of the diverse functions of PSFs in HRA. The purpose of this paper is to explore the role of PSFs across different stages of HRA, including identification of potential human errors, modeling of these errors into an overall probabilistic risk assessment, quantifying errors, and preventing errors.

  12. Leak-Path Factor Analysis for the Nuclear Materials Storage Facility

    SciTech Connect (OSTI)

    Shaffer, C.; Leonard, M.

    1999-06-13T23:59:59.000Z

    Leak-path factors (LPFs) were calculated for the Nuclear Materials Storage Facility (NMSF) located in the Plutonium Facility, Building 41 at the Los Alamos National Laboratory Technical Area 55. In the unlikely event of an accidental fire powerful enough to fail a container holding actinides, the subsequent release of oxides, modeled as PuO{sub 2} aerosols, from the facility and into the surrounding environment was predicted. A 1-h nondestructive assay (NDA) laboratory fire accident was simulated with the MELCOR severe accident analysis code. Fire-driven air movement along with wind-driven air infiltration transported a portion of these actinides from the building. This fraction is referred to as the leak-path factor. The potential effect of smoke aerosol on the transport of the actinides was investigated to verify the validity of neglecting the smoke as conservative. The input model for the NMSF consisted of a system of control volumes, flow pathways, and surfaces sufficient to model the thermal-hydraulic conditions within the facility and the aerosol transport data necessary to simulate the transport of PuO{sub 2} particles. The thermal-hydraulic, heat-transfer, and aerosol-transport models are solved simultaneously with data being exchanged between models. A MELCOR input model was designed such that it would reproduce the salient features of the fire per the corresponding CFAST calculation. Air infiltration into and out of the facility would be affected strongly by wind-driven differential pressures across the building. Therefore, differential pressures were applied to each side of the building according to guidance found in the ASHRAE handbook using a standard-velocity head equation with a leading multiplier to account for the orientation of the wind with the building. The model for the transport of aerosols considered all applicable transport processes, but the deposition within the building clearly was dominated by gravitational settling.

  13. NAPS 2003, 35th North American Power Symposium, University of Missouri-Rolla in Rolla, Missouri, October 20-21, 2003. pp. 559-566. Abstract--Security of supply has been always a key factor

    E-Print Network [OSTI]

    Catholic University of Chile (Universidad Católica de Chile)

    as a terrorist attack to some key power plants or transmission lines. Since September 11, 2001 the threat three kinds of threats over society: a) Attacks upon the power system. Here the target is the electricNAPS 2003, 35th North American Power Symposium, University of Missouri-Rolla in Rolla, Missouri

  14. Cryptographic Key Management System

    SciTech Connect (OSTI)

    No, author

    2014-02-21T23:59:59.000Z

    This report summarizes the outcome of U.S. Department of Energy (DOE) contract DE-OE0000543, requesting the design of a Cryptographic Key Management System (CKMS) for the secure management of cryptographic keys for the energy sector infrastructure. Prime contractor Sypris Electronics, in collaboration with Oak Ridge National Laboratories (ORNL), Electric Power Research Institute (EPRI), Valicore Technologies, and Purdue University's Center for Education and Research in Information Assurance and Security (CERIAS) and Smart Meter Integration Laboratory (SMIL), has designed, developed and evaluated the CKMS solution. We provide an overview of the project in Section 3, review the core contributions of all contractors in Section 4, and discuss bene#12;ts to the DOE in Section 5. In Section 6 we describe the technical construction of the CKMS solution, and review its key contributions in Section 6.9. Section 7 describes the evaluation and demonstration of the CKMS solution in different environments. We summarize the key project objectives in Section 8, list publications resulting from the project in Section 9, and conclude with a discussion on commercialization in Section 10 and future work in Section 11.

  15. Model-Based Analysis of the Role of Biological, Hydrological and Geochemical Factors Affecting Uranium Bioremediation

    SciTech Connect (OSTI)

    Zhao, Jiao; Scheibe, Timothy D.; Mahadevan, Radhakrishnan

    2011-01-24T23:59:59.000Z

    Uranium contamination is a serious concern at several sites motivating the development of novel treatment strategies such as the Geobacter-mediated reductive immobilization of uranium. However, this bioremediation strategy has not yet been optimized for the sustained uranium removal. While several reactive-transport models have been developed to represent Geobacter-mediated bioremediation of uranium, these models often lack the detailed quantitative description of the microbial process (e.g., biomass build-up in both groundwater and sediments, electron transport system, etc.) and the interaction between biogeochemical and hydrological process. In this study, a novel multi-scale model was developed by integrating our recent model on electron capacitance of Geobacter (Zhao et al., 2010) with a comprehensive simulator of coupled fluid flow, hydrologic transport, heat transfer, and biogeochemical reactions. This mechanistic reactive-transport model accurately reproduces the experimental data for the bioremediation of uranium with acetate amendment. We subsequently performed global sensitivity analysis with the reactive-transport model in order to identify the main sources of prediction uncertainty caused by synergistic effects of biological, geochemical, and hydrological processes. The proposed approach successfully captured significant contributing factors across time and space, thereby improving the structure and parameterization of the comprehensive reactive-transport model. The global sensitivity analysis also provides a potentially useful tool to evaluate uranium bioremediation strategy. The simulations suggest that under difficult environments (e.g., highly contaminated with U(VI) at a high migration rate of solutes), the efficiency of uranium removal can be improved by adding Geobacter species to the contaminated site (bioaugmentation) in conjunction with the addition of electron donor (biostimulation). The simulations also highlight the interactive effect of initial cell concentration and flow rate on U(VI) reduction.

  16. Functional genomics analysis of the arabidopsis ABI5 bZIP transcription factor

    E-Print Network [OSTI]

    Hur, Jung-Im

    2009-05-15T23:59:59.000Z

    zipper (bZIP) transcription factors are identified by interaction with ABA responsive cis-regulatory elements. The transcription factor ABI5 is one of these. It regulates gene expression during embryogenesis and in response to ABA. An ABA...

  17. Computational Analysis of Factors Influencing Enhancement of Thermal Conductivity of Nanofluids

    E-Print Network [OSTI]

    George Okeke; Sanjeeva Witharana; Joseph Antony; Yulong Ding

    2012-05-09T23:59:59.000Z

    Numerical investigations are conducted to study the effect of factors such as particle clustering and interfacial layer thickness on thermal conductivity of nanofluids. Based on this, parameters including Kapitza radius, and fractal and chemical dimension which have received little attention by previous research are rigorously investigated. The degree of thermal enhancement is analysed for increasing aggregate size, particle concentration, interfacial thermal resistance, and fractal and chemical dimensions. This analysis is conducted for water-based nanofluids of Alumina (Al2O3), CuO and Titania (TiO2) nanoparticles where the particle concentrations are varied up to 4vol%. Results from the numerical work are validated using available experimental data. For the case of aggregate size, particle concentration and interfacial thermal resistance; the aspect ratio (ratio of radius of gyration of aggregate to radius of primary particle, Rg/a) is varied between 2 to 60. It was found that the enhancement decreases with interfacial layer thickness. Also the rate of decrease is more significant after a given aggregate size. For a given interfacial resistance, the enhancement is mostly sensitive to Rg/a <20 indicated by the steep gradients of data plots. Predicted and experimental data for thermal conductivity enhancement are in good agreement.

  18. analysis-based prognostic factors: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Sciences Websites Summary: major contributions: Butterfly Analysis and Chrysalis Analysis, as well as extensions to both enabling explicit tracking of uncertainty....

  19. Analysis of some novel uterine extracellular matrix proteins and a growth factor

    E-Print Network [OSTI]

    Al Ramadan, Saeed Yaseen

    2009-05-15T23:59:59.000Z

    .................................................................. 20 Rationale, Hypotheses and Objectives................................................ 24 II EXPRESSION OF SOME MEMBERS OF THE SIBLING PROTEIN FAMILY IN THE UTERUS OF SHEEP ....................................................... 27 Overview... and factor H Factor H is a multidomain, multifunctional plasma protein that was first isolated in 1965, and is present in human plasma at a concentration of about 500 ?g/mL. In the immune system, Factor H is a central discriminator of self and non...

  20. SciTech Connect: Use of indexed sensitivity factors in the analysis...

    Office of Scientific and Technical Information (OSTI)

    and was influenced by the particular sheath material used in the thermocouple construction. Relative sensitivity factors, indexed by a matrix ion species ratio, were used to...

  1. Worldwide Trends in Energy Use and Efficiency: Key Insights from...

    Open Energy Info (EERE)

    Efficiency: Key Insights from International Energy Agency (IEA) Indicator Analysis in Support of the Group of Eight (G8) Plan of Action Jump to: navigation, search Tool Summary...

  2. Bioenergy Key Publications

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't Your Destiny: The FutureCommentsEnergyand SustainedBio-OilBioenergy 2015 AgendaBioenergyKEY

  3. NETL: Key Staff

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated Codes |IsLoveReferenceAgenda Workshop AgendaGraphic of aEnergy SystemsKey

  4. NSR Key Number Retrieval

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated CodesTransparency VisitSilver Toyota PriusNSR Key Number Retrieval Pease

  5. Key-shift transmission

    SciTech Connect (OSTI)

    Nemoto, S.

    1989-03-07T23:59:59.000Z

    A key-shift transmission is described, characterized by the speed-change shaft being divided into a pair of trough-shaped shaft halves each having an arched inner surface which defines a part of a cylindrical bore extending axially through the speed-change shaft thereby the shaft being formed into a hollow shaft, and by each of the shaft halves including a pair of flattened end surfaces which extend axially of each shaft half at both sides of the inner surface, one of the end surfaces having thereon an axially elongated projection and the other of the end surfaces having herein an axially elongated recess of a depth smaller than the height of the projection. The pair of shaft halves are engaged to each other co-rotatably by fitting the projections of the respective shaft halves into the recesses of the respective shaft halves so as to form in an outer surface of the speed-change shaft a pair of elongated axial grooves which are located radially outwardly of the elongated projections of the respective shaft halves and between the flattened end surfaces of the respective shaft halves. A pair of the shift keys are disposed within the pair of elongated axial grooves.

  6. Key recycling in authentication

    E-Print Network [OSTI]

    Christopher Portmann

    2014-09-29T23:59:59.000Z

    In their seminal work on authentication, Wegman and Carter propose that to authenticate multiple messages, it is sufficient to reuse the same hash function as long as each tag is encrypted with a one-time pad. They argue that because the one-time pad is perfectly hiding, the hash function used remains completely unknown to the adversary. Since their proof is not composable, we revisit it using a composable security framework. It turns out that the above argument is insufficient: if the adversary learns whether a corrupted message was accepted or rejected, information about the hash function is leaked, and after a bounded finite amount of rounds it is completely known. We show however that this leak is very small: Wegman and Carter's protocol is still $\\epsilon$-secure, if $\\epsilon$-almost strongly universal$_2$ hash functions are used. This implies that the secret key corresponding to the choice of hash function can be reused in the next round of authentication without any additional error than this $\\epsilon$. We also show that if the players have a mild form of synchronization, namely that the receiver knows when a message should be received, the key can be recycled for any arbitrary task, not only new rounds of authentication.

  7. Linear regression analysis of emissions factors when firing fossil fuels and biofuels in a commercial water-tube boiler

    SciTech Connect (OSTI)

    Sharon Falcone Miller; Bruce G. Miller [Pennsylvania State University, University Park, PA (United States). Energy Institute

    2007-12-15T23:59:59.000Z

    This paper compares the emissions factors for a suite of liquid biofuels (three animal fats, waste restaurant grease, pressed soybean oil, and a biodiesel produced from soybean oil) and four fossil fuels (i.e., natural gas, No. 2 fuel oil, No. 6 fuel oil, and pulverized coal) in Penn State's commercial water-tube boiler to assess their viability as fuels for green heat applications. The data were broken into two subsets, i.e., fossil fuels and biofuels. The regression model for the liquid biofuels (as a subset) did not perform well for all of the gases. In addition, the coefficient in the models showed the EPA method underestimating CO and NOx emissions. No relation could be studied for SO{sub 2} for the liquid biofuels as they contain no sulfur; however, the model showed a good relationship between the two methods for SO{sub 2} in the fossil fuels. AP-42 emissions factors for the fossil fuels were also compared to the mass balance emissions factors and EPA CFR Title 40 emissions factors. Overall, the AP-42 emissions factors for the fossil fuels did not compare well with the mass balance emissions factors or the EPA CFR Title 40 emissions factors. Regression analysis of the AP-42, EPA, and mass balance emissions factors for the fossil fuels showed a significant relationship only for CO{sub 2} and SO{sub 2}. However, the regression models underestimate the SO{sub 2} emissions by 33%. These tests illustrate the importance in performing material balances around boilers to obtain the most accurate emissions levels, especially when dealing with biofuels. The EPA emissions factors were very good at predicting the mass balance emissions factors for the fossil fuels and to a lesser degree the biofuels. While the AP-42 emissions factors and EPA CFR Title 40 emissions factors are easier to perform, especially in large, full-scale systems, this study illustrated the shortcomings of estimation techniques. 23 refs., 3 figs., 8 tabs.

  8. Program Information Key Dates |

    E-Print Network [OSTI]

    Hayes, Jane E.

    , International Studies, Sustainability, Sustainable Agriculture, and Textiles. Primary UK Program Director and the complex factors that impact living in a variety of geographic regions. Additionally, students will engage, architecture and environmental landscapes of the countries to be visited, and to be certain that all paperwork

  9. Dynamic Simulation and Analysis of Factors Impacting the Energy Consumption of Residential Buildings

    E-Print Network [OSTI]

    Lian, Y.; Hao, Y.

    2006-01-01T23:59:59.000Z

    Buildings have a close relationship with climate. There are a lot of important factors that influence building energy consumption such as building shape coefficient, insulation work of building envelope, covered area, and the area ratio of window...

  10. Dynamic Simulation and Analysis of Factors Impacting the Energy Consumption of Residential Buildings 

    E-Print Network [OSTI]

    Lian, Y.; Hao, Y.

    2006-01-01T23:59:59.000Z

    Buildings have a close relationship with climate. There are a lot of important factors that influence building energy consumption such as building shape coefficient, insulation work of building envelope, covered area, and the area ratio of window...

  11. Analysis of variation at transcription factor binding sites in Drosophila and humans

    E-Print Network [OSTI]

    Spivakov, Mikhail

    Background: Advances in sequencing technology have boosted population genomics and made it possible to map the positions of transcription factor binding sites (TFBSs) with high precision. Here we investigate TFBS variability ...

  12. Experimental and computational analysis of epidermal growth factor receptor pathway phosphorylation dynamics

    E-Print Network [OSTI]

    Kleiman, Laura B

    2010-01-01T23:59:59.000Z

    The epidermal growth factor receptor (EGFR, also known as ErbB 1) is a prototypical receptor tyrosine kinase (RTK) that activates multi-kinase phosphorylation cascades to regulate diverse cellular processes, including ...

  13. An analysis of factors that influence community college students' attitudes toward technology

    E-Print Network [OSTI]

    Fleming, Kathleen Literski

    2007-04-25T23:59:59.000Z

    This study investigated the factors that influence community college students' attitudes toward technology, particularly in teaching and learning experiences. Studies on post-secondary students' attitudes reported in the literature are limited...

  14. Team Building Toolkit KEYS -Keys to Enhance Your Supervisory Success

    E-Print Network [OSTI]

    Walker, Matthew P.

    Team Building Toolkit KEYS - Keys to Enhance Your Supervisory Success University of California to Enhance Your Supervisory Success 2 | P a g e Table of Contents Stages of Team Development ................................................................................................ 4 Team Building at a Glance

  15. A reactive contingency analysis algorithm using MW and MVAR distribution factors

    SciTech Connect (OSTI)

    Taylor, D.G.; Maahs, L.J. (Pennsylvania-New Jersey-Maryland Interconnection, Norristown, PA (US))

    1991-02-01T23:59:59.000Z

    This paper describes an algorithm that can be used in analyzing reactive power flow contingencies. This approach uses MW distribution factors (DFAX) in conjunction with newly developed VAR distribution factors (RDFAX) to solve for the post-contingency bus voltage magnitude changes of an interconnecter EHV system. A prototype version of the algorithm described in this paper is presently being tested at the Pennsylvania-New Jersey-Maryland (PJM) interconnection office.

  16. Data analysis and radionuclide scaling factor for the B-Cell waste stream

    SciTech Connect (OSTI)

    HILL, R.L.

    2000-04-25T23:59:59.000Z

    This report documents a statistical data analysis of radiological data obtained to characterize the 324 Facility B-Cell decontamination and decommissioning waste stream.

  17. Analysis of the J/psi --> pi^0 gamma^* transition form factor

    E-Print Network [OSTI]

    Bastian Kubis; Franz Niecknig

    2015-02-25T23:59:59.000Z

    In view of the first measurement of the branching fraction for J/psi --> pi^0 e^+ e^- by the BESIII collaboration, we analyze what can be learnt on the corresponding transition form factor using dispersion theory. We show that light-quark degrees of freedom dominate the spectral function, in particular two-pion intermediate states. Estimating the effects of multi-pion states as well as charmonium, we arrive at a prediction for the complete form factor that should be scrutinized experimentally in the future.

  18. Security proof of practical quantum key distribution schemes

    E-Print Network [OSTI]

    Yodai Watanabe

    2005-06-29T23:59:59.000Z

    This paper provides a security proof of the Bennett-Brassard (BB84) quantum key distribution protocol in practical implementation. To prove the security, it is not assumed that defects in the devices are absorbed into an adversary's attack. In fact, the only assumption in the proof is that the source is characterized. The proof is performed by lower-bounding adversary's Renyi entropy about the key before privacy amplification. The bound reveals the leading factors reducing the key generation rate.

  19. Formal Analysis and Systematic Construction of Two-factor Authentication Scheme

    E-Print Network [OSTI]

    , Duncan S. Wong1 , Huaxiong Wang2 , and Xiaotie Deng1 1 Department of Computer Science City University-factor authentication mechanisms is based on smart card and user's password. Throughout the years, there have been many-resistant hash functions. Keywords: Authentication, Password, Smart Card, Guessing Attack 1 Introduction Password

  20. Mind Your Manners: Socially Appropriate Wireless Key Establishment for Groups

    E-Print Network [OSTI]

    Xu, Wenyuan

    group key establish- ment. We identify seven social and situational factors which impact group formationMind Your Manners: Socially Appropriate Wireless Key Establishment for Groups Cynthia Kuo Ahren Studer Adrian Perrig Carnegie Mellon University {cykuo, astuder, perrig}@cmu.edu ABSTRACT Group

  1. Combined factor analysis of the WISC-III and CMS: does the resulting factor structure discriminate among children with and without clinical disorders?

    E-Print Network [OSTI]

    Siekierski, Becky Mayes

    2006-10-30T23:59:59.000Z

    . was the only one to report that it was the best model for the data. Examination of the factors in special populations and across ages. Slate and Jones (1997) compared male and female children with mental retardation on the WISC- III factor structure..., Coding, (and Picture Arrangement). Note that Slate and Jones allowed two subtests to load on two factors while Vocabulary did not contribute enough to warrant interpretation on any factor. 12 In a longitudinal study by Watkins and Canivez (2001...

  2. Institutional, Retrospective Analysis of 777 Patients With Brain Metastases: Treatment Outcomes and Diagnosis-Specific Prognostic Factors

    SciTech Connect (OSTI)

    Antoni, Delphine, E-mail: Dantoni@strasbourg.unicancer.fr [Radiotherapy Department, Paul Strauss Cancer Center, Strasbourg (France)] [Radiotherapy Department, Paul Strauss Cancer Center, Strasbourg (France); Clavier, Jean-Baptiste; Pop, Marius; Schumacher, Catherine [Radiotherapy Department, Paul Strauss Cancer Center, Strasbourg (France)] [Radiotherapy Department, Paul Strauss Cancer Center, Strasbourg (France); Lefebvre, François [Biostatistics Department, Strasbourg University, Strasbourg (France)] [Biostatistics Department, Strasbourg University, Strasbourg (France); Noël, Georges [Radiotherapy Department, Paul Strauss Cancer Center, Strasbourg (France)] [Radiotherapy Department, Paul Strauss Cancer Center, Strasbourg (France)

    2013-07-15T23:59:59.000Z

    Purpose: To retrospectively evaluate the prognostic factors and survival of a series of 777 patients with brain metastases (BM) from a single institution. Methods and Materials: Patients were treated with surgery followed by whole-brain radiation therapy (WBRT) or with WBRT alone in 16.3% and 83.7% of the cases, respectively. The patients were RPA (recursive partitioning analysis) class I, II, and III in 11.2%, 69.6%, and 18.4% of the cases, respectively; RPA class II-a, II-b, and II-c in 8.3%, 24.8%, and 66.9% of the cases, respectively; and with GPA (graded prognostic assessment) scores of 0-1.0, 1.5-2.0, 2.5-3.0, and 3.5-4.0 in 35%, 27.5%, 18.2%, and 8.6% of the cases, respectively. Results: The median overall survival (OS) times according to RPA class I, II, and III were 20.1, 5.1, and 1.3 months, respectively (P<.0001); according to RPA class II-a, II-b, II-c: 9.1, 8.9, and 4.0 months, respectively (P<.0001); and according to GPA score 0-1.0, 1.5-2.0, 2.5-3.0, and 3.5-4.0: 2.5, 4.4, 9.0, and 19.1 months, respectively (P<.0001). By multivariate analysis, the favorable independent prognostic factors for survival were as follows: for gastrointestinal tumor, a high Karnofsky performance status (KPS) (P=.0003) and an absence of extracranial metastases (ECM) (P=.003); for kidney cancer, few BM (P=.002); for melanoma, few BM (P=.01), an absence of ECM (P=.002), and few ECM (P=.0002); for lung cancer, age (P=.007), a high KPS (P<.0001), an absence of ECM (P<.0001), few ECM and BM (P<.0001 and P=.0006, respectively), and control of the primary tumor (P=.004); and for breast cancer, age (P=.001), a high KPS (P=.007), control of the primary tumor (P=.05), and few ECM and BM (P=.01 and P=.0002, respectively). The triple-negative subtype was a significant unfavorable factor (P=.007). Conclusion: Prognostic factors varied by pathology. Our analysis confirms the strength of prognostic factors used to determine the GPA score, including the genetic subtype for breast cancer.

  3. Wind Vision: Analysis Highlights and Key Results

    Wind Powering America (EERE)

    aviation & radar, public acceptance, etc. BENEFITS * Greenhouse gas emissions reduction * Air pollution impacts * Water usage reduction IMPACTS * Energy diversity and risk...

  4. Wind Vision: Analysis Highlights and Key Results

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del SolStrengtheningWildfires may contribute more to globalWind

  5. Analysis of silicon carbide based semiconductor power devices and their application in power factor correction

    E-Print Network [OSTI]

    Durrani, Yamin Qaisar

    2005-11-01T23:59:59.000Z

    electronic switching devices................. 22 2.4.1. SiC Schottky diode................................................................. 22 2.4.2. 4H-SiC PiN diode................................................................... 23 2.4.3. Si...C MOSFET.......................................................................... 23 2.4.4. SiC JFET................................................................................. 23 2.5. Analysis of SiC based Schottky diode...

  6. Multi-factor authentication

    DOE Patents [OSTI]

    Hamlet, Jason R; Pierson, Lyndon G

    2014-10-21T23:59:59.000Z

    Detection and deterrence of spoofing of user authentication may be achieved by including a cryptographic fingerprint unit within a hardware device for authenticating a user of the hardware device. The cryptographic fingerprint unit includes an internal physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a PUF value. Combining logic is coupled to receive the PUF value, combines the PUF value with one or more other authentication factors to generate a multi-factor authentication value. A key generator is coupled to generate a private key and a public key based on the multi-factor authentication value while a decryptor is coupled to receive an authentication challenge posed to the hardware device and encrypted with the public key and coupled to output a response to the authentication challenge decrypted with the private key.

  7. Diversity & Flexibility Key to Sustainability

    Broader source: Energy.gov [DOE]

    Plenary V: Biofuels and Sustainability: Acknowledging Challenges and Confronting MisconceptionsDiversity & Flexibility Key to SustainabilityDavid Babson, Senior Fuels Engineer, Union of...

  8. The relationship of social desirability responding and the Big Five: an investigation using confirmatory factor analysis

    E-Print Network [OSTI]

    Carlisle, Todd Dana

    2000-01-01T23:59:59.000Z

    Faking Substance v Style Summary Research Goals . . I 2 3 4 5 6 6 7 8 8 METHOD 10 Participants. Materials. Procedure Data Analysis Estimator Notation Goodness-of-fit Indices . Model Specification for Hl Model Specification for H2... (Tellegen, 1982), intentional distortion (Dunnett, Koun, & Barber, 1981), response distortion variance (e g, McDaniel, Douglas, & Snell, 1997), faking (e g. , Frei, Griffith, Snell, McDaniel, & Douglas, 1997), self-enhancement (Stires & Jones, 1969...

  9. Fake state attack on practically decoy state quantum key distribution

    E-Print Network [OSTI]

    Yong-gang Tan

    2012-02-15T23:59:59.000Z

    In this paper, security of practically decoy state quantum key distribution under fake state attack is considered. If quantum key distribution is insecure under this type of attack, decoy sources can not also provide it with enough security. Strictly analysis shows that Eve should eavesdrop with the aid of photon-number-resolving instruments. In practical implementation of decoy state quantum key distribution where statistical fluctuation is considered, however, Eve can attack it successfully with threshold detectors.

  10. Tomography increases key rates of quantum-key-distribution protocols

    E-Print Network [OSTI]

    Shun Watanabe; Ryutaroh Matsumoto; Tomohiko Uyematsu

    2008-07-22T23:59:59.000Z

    We construct a practically implementable classical processing for the BB84 protocol and the six-state protocol that fully utilizes the accurate channel estimation method, which is also known as the quantum tomography. Our proposed processing yields at least as high key rate as the standard processing by Shor and Preskill. We show two examples of quantum channels over which the key rate of our proposed processing is strictly higher than the standard processing. In the second example, the BB84 protocol with our proposed processing yields a positive key rate even though the so-called error rate is higher than the 25% limit.

  11. Quantum key distribution with key extracted from basis information

    E-Print Network [OSTI]

    Xiongfeng Ma

    2014-10-20T23:59:59.000Z

    In conventional quantum key distribution protocols, the secure key is normally extracted from the measurement outcomes of the system. Here, a different approach is proposed, where the secure key is extracted from the measurement bases, rather than outcomes. Compared to the original Bennett-Brassard-1984 protocol, the proposed protocol involves no hardware change but modifications in data postprocessing. We show that this protocol is more robust against detector efficiency attacks and photon-number-splitting attacks when practical detectors and photon sources are used.

  12. Cogeneration Project Analysis Update

    E-Print Network [OSTI]

    Robinson, A. M.; Garcia, L. N.

    diverse factors, such as, but no limited to: Fuel Considerations, Heat System Analysis, Electric Power Considerations, Key Technical Project Considerations, and Economic Analysis. INTRODUCTION The cogeneration systems being developed for industrial... power marched upward at a higher rate than fuel, capital equipment cost, and the prime interest rate. Typical Cogeneration System One system has been chosen as typical. This is one of the cogeneration systems which have proliferated over the past...

  13. Occupancy by key transcription factors is a more accurate predictor...

    Office of Scientific and Technical Information (OSTI)

    USDOE Country of Publication: United States Language: English Subject: functional genomics; gene regulation; TAL1; GATA1; histone modifications; enhancer assay Word Cloud More...

  14. Water storage key factor in coalbed methane production

    SciTech Connect (OSTI)

    Luckianow, B.J. (Taurus Exploration Inc., Birmingham, AL (US)); Hall, W.L. (Dames and Moore, Atlanta, GA (US))

    1991-03-11T23:59:59.000Z

    Storage ponds provide a cost-effective means to temporarily retain water produced with coalbed methane and permit gas production during times when stream flow rates drop. Normally, water produced with the gas is run into nearby streams, with the dilution rate closely monitored and controlled by environmental agencies. During low stream flow in the Black Warrior basin, Ala., large volumes of produced water must be stored to prevent shut-in of coalbed methane fields. The authors discuss how they constructed such production water facilities for the Cedar Cove field to eliminate periodic field shut-ins as a result of excess water production. The effectiveness of such a storage approach is governed by receiving stream flow variability, production water flow characteristics, and the economics of storage pond construction.

  15. Wigner distinguished lecturer Majumdar says scale-up factor key...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    a few decades ago, has raised natural gas's profile in the energy supply mix thanks to new drilling technologies. Petroleum is holding its own against demand due to technological...

  16. Security Notions for Quantum Public-Key Cryptography

    E-Print Network [OSTI]

    Takeshi Koshiba

    2007-02-19T23:59:59.000Z

    It is well known that Shor's quantum algorithm for integer factorization can break down the RSA public-key cryptosystem, which is widely used in many cryptographic applications. Thus, public-key cryptosystems in the quantum computational setting are longed for cryptology. In order to define the security notions of public-key cryptosystems, we have to model the power of the sender, receiver, adversary and channel. While we may consider a setting where quantum computers are available only to adversaries, we generally discuss what are the right security notions for (quantum) public-key cryptosystems in the quantum computational setting. Moreover, we consider the security of quantum public-key cryptosystems known so far.

  17. PTA of Infrapopliteal Arteries: Long-term Clinical Follow-up and Analysis of Factors Influencing Clinical Outcome

    SciTech Connect (OSTI)

    Peregrin, Jan H., E-mail: jape@medicon.cz; Koznar, Boris; Kovac, Josef; Lastovickova, Jarmila; Novotny, Jiri; Vedlich, Daniel [Institute for Clinical and Experimental Medicine, Department of Diagnostic and Interventional Radiology (Czech Republic); Skibova, Jelena [Institute for Clinical and Experimental Medicine, Department of Statistics (Czech Republic)

    2010-08-15T23:59:59.000Z

    This study was a retrospective analysis of patients with CLI who underwent infrapopliteal percutaneous transluminal angioplasty (PTA). The main goal was to evaluate clinical and morphological factors that influence the clinical outcome of PTA in long-term follow-up. A total of 1,445 PTA procedures were performed in 1,268 patients. Main indications for PTA included gangrene, nonhealing ulcers, or rest pain. The mean number of treated arteries was 1.77 artery/limb, and the majority of lesions were type TASC D. The technical success rate of PTA was 89% of intended-to-treat arteries. The main criterion of clinical success was functional limb salvage (LS). One-year follow-up involved 1,069 limbs. Primary and secondary 1-year LS rates were 76.1 and 84.4%, respectively. The effect of clinical and morphological parameters on the 1-year LS was that the only associated disease with an adverse effect on LS rate was DM combined with dialysis. Regarding limb preprocedural status, gangrene was clearly a negative predictor. The most important factor affecting LS was the number of patent arteries post-PTA: patients with 0, 1, 2, and 3 patent arteries had 1-year primary LS rates of 56.4, 73.1, 80.4, and 83%, respectively. Long-term follow-up of LS rates demonstrated secondary LS rates of 84.4, 78.8, and 73.3% at 1, 5, and 10 years. Every effort should be made to perform PTA for as many arteries as possible, even if TASC D type, to improve clinical outcome. Our study shows that repeat PTA is capable of keeping the long-term LS rate close to 75%.

  18. Key Issues | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport(FactDepartment ofLetter Report: I11IG002RTC3WASTE-TO-ENERGY:KenKeriKey Issues Key

  19. An Analysis of the Effects of Sociodemographic Factors on Daily Per Capita Residential Water Use in Texas Cities

    E-Print Network [OSTI]

    Murdock, Steve H.; Albrecht, Don E.; Hamm, Rita R.; Bachman, Kenneth; Parpia, Banoo

    consideration of numerous factors including hydrologic and physiographic factors, engineering feasibility and economic feasibility. At the same time, it is increasingly evident that water needs are closely tied to population growth and to the social, economic...

  20. Worker reproduction and policing in insect societies: an ESS analysis

    E-Print Network [OSTI]

    Wenseleers, Tom

    Worker reproduction and policing in insect societies: an ESS analysis T. WENSELEERS,* H. HELANTERA strategy (ESS) model to investigate factors that could explain these observed low levels of reproductive exploitation. Two key factors are identified: relatedness and policing. Relatedness affects the ESS proportion

  1. Key-Insulated Symmetric Key Cryptography and Mitigating Attacks against Cryptographic Cloud Software

    E-Print Network [OSTI]

    Dodis, Yevgeniy

    Key-Insulated Symmetric Key Cryptography and Mitigating Attacks against Cryptographic Cloud- sociated cryptographic keys in their entirety. In this paper, we investigate key-insulated symmetric key. To illustrate the feasibility of key-insulated symmetric key cryptography, we also report a proof

  2. Key Opportunities and Challenges for Program Sustainability ...

    Energy Savers [EERE]

    Key Opportunities and Challenges for Program Sustainability Key Opportunities and Challenges for Program Sustainability Better Buildings Neighborhood Program, Peer Exchange Call:...

  3. Keys for growth in Japan's mature mobile market

    E-Print Network [OSTI]

    Oto, Hiroyuki

    2005-01-01T23:59:59.000Z

    The objective of this thesis is to identify key factors that will produce further growth for NTT DoCoMo in Japan's mature mobile market. Since the early 1990s, the mobile phone market in Japan has grown rapidly, and ...

  4. Key Activities | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed off Energy.gov.Energy02.pdf7 OPAMEnergyInvestigativeCoggin AboutofKathleen HoganKenKeyAbout

  5. Key Activities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005 at IowaSecretaryDepartmentJointof Energy 30,ANDNovember 17,KeyThe

  6. Key Activities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005 at IowaSecretaryDepartmentJointof Energy 30,ANDNovember 17,KeyTheThe

  7. Quantum Key Distribution with Qubit Pairs

    E-Print Network [OSTI]

    Mohd Asad Siddiqui; Tabish Qureshi

    2014-07-17T23:59:59.000Z

    We propose a new Quantum Key Distribution method in which Alice sends pairs of qubits to Bob, each in one of four possible states. Bob uses one qubit to generate a secure key and the other to generate an auxiliary key. For each pair he randomly decides which qubit to use for which key. The auxiliary key has to be added to Bob's secure key in order to match Alice's secure key. This scheme provides an additional layer of security over the standard BB84 protocol.

  8. Quantum key distribution with entangled photon sources

    E-Print Network [OSTI]

    Xiongfeng Ma; Chi-Hang Fred Fung; Hoi-Kwong Lo

    2007-03-14T23:59:59.000Z

    A parametric down-conversion (PDC) source can be used as either a triggered single photon source or an entangled photon source in quantum key distribution (QKD). The triggering PDC QKD has already been studied in the literature. On the other hand, a model and a post-processing protocol for the entanglement PDC QKD are still missing. In this paper, we fill in this important gap by proposing such a model and a post-processing protocol for the entanglement PDC QKD. Although the PDC model is proposed to study the entanglement-based QKD, we emphasize that our generic model may also be useful for other non-QKD experiments involving a PDC source. Since an entangled PDC source is a basis independent source, we apply Koashi-Preskill's security analysis to the entanglement PDC QKD. We also investigate the entanglement PDC QKD with two-way classical communications. We find that the recurrence scheme increases the key rate and Gottesman-Lo protocol helps tolerate higher channel losses. By simulating a recent 144km open-air PDC experiment, we compare three implementations -- entanglement PDC QKD, triggering PDC QKD and coherent state QKD. The simulation result suggests that the entanglement PDC QKD can tolerate higher channel losses than the coherent state QKD. The coherent state QKD with decoy states is able to achieve highest key rate in the low and medium-loss regions. By applying Gottesman-Lo two-way post-processing protocol, the entanglement PDC QKD can tolerate up to 70dB combined channel losses (35dB for each channel) provided that the PDC source is placed in between Alice and Bob. After considering statistical fluctuations, the PDC setup can tolerate up to 53dB channel losses.

  9. COLLEGE AVE CAMPUS (CAC) KEY PICK UP

    E-Print Network [OSTI]

    COLLEGE AVE CAMPUS (CAC) KEY PICK UP NOTE TO ALL STUDENTS: ONLY YOU CAN PICK UP YOUR KEY. You in and key pick up. If you are unable to pick up your key by 5:00 p.m. on September 1st , please make prior in Clothier Hall on CAC. Keys not picked up during the above-noted hours can be picked up at the Housing

  10. Quantum key distribution with entangled photon sources

    E-Print Network [OSTI]

    Ma, X; Lo, H K; Ma, Xiongfeng; Fung, Chi-Hang Fred; Lo, Hoi-Kwong

    2007-01-01T23:59:59.000Z

    A parametric down-conversion (PDC) source can be used as either a triggered single photon source or an entangled photon source in quantum key distribution (QKD). The triggering PDC QKD has already been studied in the literature. On the other hand, a model and a post-processing protocol for the entanglement PDC QKD are still missing. In this paper, we fill in this important gap by proposing such a model and a post-processing protocol for the entanglement PDC QKD. Although the PDC model is proposed to study the entanglement-based QKD, we emphasize that our generic model may also be useful for other non-QKD experiments involving a PDC source. Since an entangled PDC source is a basis independent source, we apply Koashi-Preskill's security analysis to the entanglement PDC QKD. We also investigate the entanglement PDC QKD with two-way classical communications. We find that the recurrence scheme increases the key rate and Gottesman-Lo protocol helps tolerate higher channel losses. By simulating a recent 144km open-a...

  11. Self-referenced continuous-variable quantum key distribution

    E-Print Network [OSTI]

    Soh, Daniel B S; Coles, Patrick J; Lütkenhaus, Norbert; Camacho, Ryan M; Urayama, Junji; Sarovar, Mohan

    2015-01-01T23:59:59.000Z

    We introduce a new continuous-variable quantum key distribution (CV-QKD) protocol, self-referenced CV-QKD, that eliminates the need for transmission of a high-power local oscillator between the communicating parties. In this protocol, each signal pulse is accompanied by a reference pulse (or a pair of twin reference pulses), used to align Alice's and Bob's measurement bases. We present a proof-of-principle, fiber-based experimental demonstration of the protocol and quantify the expected secret key rates by expressing them in terms of experimental parameters. Our analysis of the secret key rate fully takes into account the inherent uncertainty associated with the quantum nature of the reference pulse(s) and quantifies the limit at which the theoretical key rate approaches that of the respective conventional protocol that requires local oscillator transmission. The self-referenced protocol greatly simplifies the hardware required for CV-QKD, especially for potential integrated photonics implementations of trans...

  12. Human factors engineering report for the cold vacuum drying facility

    SciTech Connect (OSTI)

    IMKER, F.W.

    1999-06-30T23:59:59.000Z

    The purpose of this report is to present the results and findings of the final Human Factors Engineering (HFE) technical analysis and evaluation of the Cold Vacuum Drying Facility (CVDF). Ergonomics issues are also addressed in this report, as appropriate. This report follows up and completes the preliminary work accomplished and reported by the Preliminary HFE Analysis report (SNF-2825, Spent Nuclear Fuel Project Cold Vacuum Drying Facility Human Factors Engineering Analysis: Results and Findings). This analysis avoids redundancy of effort except for ensuring that previously recommended HFE design changes have not affected other parts of the system. Changes in one part of the system may affect other parts of the system where those changes were not applied. The final HFE analysis and evaluation of the CVDF human-machine interactions (HMI) was expanded to include: the physical work environment, human-computer interface (HCI) including workstation and software, operator tasks, tools, maintainability, communications, staffing, training, and the overall ability of humans to accomplish their responsibilities, as appropriate. Key focal areas for this report are the process bay operations, process water conditioning (PWC) skid, tank room, and Central Control Room operations. These key areas contain the system safety-class components and are the foundation for the human factors design basis of the CVDF.

  13. Meta-analysis of the Alpha/Beta Ratio for Prostate Cancer in the Presence of an Overall Time Factor: Bad News, Good News, or No News?

    SciTech Connect (OSTI)

    Vogelius, Ivan R., E-mail: vogelius@gmail.com [Department of Radiation Oncology, Rigshospitalet, University of Copenhagen (Denmark); Bentzen, Soren M. [Department of Human Oncology, University of Wisconsin School of Medicine and Public Health, Madison, Wisconsin (United States)] [Department of Human Oncology, University of Wisconsin School of Medicine and Public Health, Madison, Wisconsin (United States)

    2013-01-01T23:59:59.000Z

    Purpose: To present a novel method for meta-analysis of the fractionation sensitivity of tumors as applied to prostate cancer in the presence of an overall time factor. Methods and Materials: A systematic search for radiation dose-fractionation trials in prostate cancer was performed using PubMed and by manual search. Published trials comparing standard fractionated external beam radiation therapy with alternative fractionation were eligible. For each trial the {alpha}/{beta} ratio and its 95% confidence interval (CI) were extracted, and the data were synthesized with each study weighted by the inverse variance. An overall time factor was included in the analysis, and its influence on {alpha}/{beta} was investigated. Results: Five studies involving 1965 patients were included in the meta-analysis of {alpha}/{beta}. The synthesized {alpha}/{beta} assuming no effect of overall treatment time was -0.07 Gy (95% CI -0.73-0.59), which was increased to 0.47 Gy (95% CI -0.55-1.50) if a single highly weighted study was excluded. In a separate analysis, 2 studies based on 10,808 patients in total allowed extraction of a synthesized estimate of a time factor of 0.31 Gy/d (95% CI 0.20-0.42). The time factor increased the {alpha}/{beta} estimate to 0.58 Gy (95% CI -0.53-1.69)/1.93 Gy (95% CI -0.27-4.14) with/without the heavily weighted study. An analysis of the uncertainty of the {alpha}/{beta} estimate showed a loss of information when the hypofractionated arm was underdosed compared with the normo-fractionated arm. Conclusions: The current external beam fractionation studies are consistent with a very low {alpha}/{beta} ratio for prostate cancer, although the CIs include {alpha}/{beta} ratios up to 4.14 Gy in the presence of a time factor. Details of the dose fractionation in the 2 trial arms have critical influence on the information that can be extracted from a study. Studies with unfortunate designs will supply little or no information about {alpha}/{beta} regardless of the number of subjects enrolled.

  14. Answering Key Fuel Cycle Questions

    SciTech Connect (OSTI)

    Steven J. Piet; Brent W. Dixon; J. Stephen Herring; David E. Shropshire; Mary Lou Dunzik-Gougar

    2003-10-01T23:59:59.000Z

    The Advanced Fuel Cycle Initiative (AFCI) program has both “outcome” and “process” goals because it must address both waste already accumulating as well as completing the fuel cycle in connection with advanced nuclear power plant concepts. The outcome objectives are waste geological repository capacity and cost, energy security and sustainability, proliferation resistance, fuel cycle economics, and safety. The process objectives are readiness to proceed and adaptability and robustness in the face of uncertainties. A classic decision-making approach to such a multi-attribute problem would be to weight individual quantified criteria and calculate an overall figure of merit. This is inappropriate for several reasons. First, the goals are not independent. Second, the importance of different goals varies among stakeholders. Third, the importance of different goals is likely to vary with time, especially the “energy future.” Fourth, some key considerations are not easily or meaningfully quantifiable at present. Instead, at this point, we have developed 16 questions the AFCI program should answer and suggest an approach of determining for each whether relevant options improve meeting each of the program goals. We find that it is not always clear which option is best for a specific question and specific goal; this helps identify key issues for future work. In general, we suggest attempting to create as many win-win decisions (options that are attractive or neutral to most goals) as possible. Thus, to help clarify why the program is exploring the options it is, and to set the stage for future narrowing of options, we have developed 16 questions, as follows: · What are the AFCI program goals? · Which potential waste disposition approaches do we plan for? · What are the major separations, transmutation, and fuel options? · How do we address proliferation resistance? · Which potential energy futures do we plan for? · What potential external triggers do we plan for? · Should we separate uranium? · If we separate uranium, should we recycle it, store it or dispose of it? · Is it practical to plan to fabricate and handle “hot” fuel? · Which transuranic elements (TRU) should be separated and transmuted? · Of those TRU separated, which should be transmuted together? · Should we separate and/or transmute Cs and Sr isotopes that dominate near-term repository heating? · Should we separate and/or transmute very long-lived Tc and I isotopes? · Which separation technology? · What mix of transmutation technologies? · What fuel technology best supports the above decisions?

  15. 2011 KEY ACCOMPLISHMENTS Fundamental & Computational

    E-Print Network [OSTI]

    : Department of Energy Office of Biological and Environmental Research and other agencies PNNL scientists have and renewable energy, new technologies that capture and store carbon dioxide, and changes in agricultural sulfur dioxide (SO2 ) emissions started rising again in 2000. An analysis by researchers at the Joint

  16. Quantum Key Distribution with Screening and Analyzing

    E-Print Network [OSTI]

    Won-Ho Kye

    2006-10-04T23:59:59.000Z

    We propose a quantum key distribution scheme by using screening angles and analyzing detectors which enable to notice the presence of Eve who eavesdrops the quantum channel, as the revised protocol of the recent quantum key distribution [Phys. Rev. Lett. 95, 040501 (2005)]. We discuss the security of the proposed quantum key distribution against various attacks including impersonation attack and Trojan Horse attack.

  17. Lightweight Key Establishment for Distributed Networking Environments

    E-Print Network [OSTI]

    Martin, Keith

    / COSIC Seminar 2007 Keith Martin #12;Lightweight Key Establishment/Introduction The plan 1. Wireless sensor networks 2. A key establishment framework 3. Key establishment for grids COSIC Seminar 2007 Keith Establishment/Wireless sensor networks The "classical" scenario COSIC Seminar 2007 Keith Martin #12;Lightweight

  18. Analysis and calibration of social factors in a consumer acceptance and adoption model for diffusion of diesel vehicle in Europe

    E-Print Network [OSTI]

    Zhang, Qi, S.M. Massachusetts Institute of Technology

    2008-01-01T23:59:59.000Z

    While large scale diffusion of alternative fuel vehicles (AFVs) is widely anticipated, the mechanisms that determine their success or failure are ill understood. Analysis of an AFV transition model developed at MIT has ...

  19. Counterfactual quantum key distribution with high efficiency

    SciTech Connect (OSTI)

    Sun Ying [State Key Laboratory of Networking and SwitchingTechnology, Beijing University of Posts and Telecommunications, Beijing 100876 (China); Beijing Electronic Science and Technology Institute, Beijing 100070 (China); Wen Qiaoyan [State Key Laboratory of Networking and SwitchingTechnology, Beijing University of Posts and Telecommunications, Beijing 100876 (China)

    2010-11-15T23:59:59.000Z

    In a counterfactual quantum key distribution scheme, a secret key can be generated merely by transmitting the split vacuum pulses of single particles. We improve the efficiency of the first quantum key distribution scheme based on the counterfactual phenomenon. This scheme not only achieves the same security level as the original one but also has higher efficiency. We also analyze how to achieve the optimal efficiency under various conditions.

  20. Florida Keys Electric Cooperative- Residential Rebate Program

    Broader source: Energy.gov [DOE]

    Florida Keys Electric Cooperative offers residential members rebates for installing energy efficient measures. To qualify for rebates, members must first call FKEC and make an appointment for a...

  1. Brain Receptor Structures Key to Future Therapeutics

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Brain Receptor Structures Key to Future Therapeutics Print With an aging population in America, it is more important than ever to discover ways to treat or prevent diseases...

  2. Secure key distribution by swapping quantum entanglement

    SciTech Connect (OSTI)

    Song, Daegene [National Institute of Standards and Technology, 100 Bureau Drive, MS 8910, Gaithersburg, Maryland 20899 (United States)

    2004-03-01T23:59:59.000Z

    We report two key distribution schemes achieved by swapping quantum entanglement. Using two Bell states, two bits of secret key can be shared between two distant parties that play symmetric and equal roles. We also address eavesdropping attacks against the schemes.

  3. Hydrogen Fuel Cell Performance in the Key Early Markets of Material Handling Equipment and Backup Power (Presentation)

    SciTech Connect (OSTI)

    Kurtz, J.; Sprik, S.; Ramsden, T.; Saur, G.; Ainscough, C.; Post, M.; Peters, M.

    2013-10-01T23:59:59.000Z

    This presentation summarizes the results of NREL's analysis of hydrogen fuel cell performance in the key early markets of material handling equipment (MHE) and backup power.

  4. Computational analysis of temperature rise phenomena in electric induction motors

    E-Print Network [OSTI]

    Melnik, Roderick

    machines in general, and induction motors in particular, temperature limits is a key factor affectingComputational analysis of temperature rise phenomena in electric induction motors Ying Huai Kraftwerkstechnik, PetersenstraÃ?e 30, 64287 Darmstadt, Germany b Faculty of Science and Engineering, Mads Clausen

  5. Consistent Query Answering Of Conjunctive Queries Under Primary Key Constraints

    E-Print Network [OSTI]

    Pema, Enela

    2014-01-01T23:59:59.000Z

    Queries and Primary Key Constraints . . . . . . . . . .of Employee w.r.t. the primary key SSN ? {name, salary} . .query answering under primary keys: a characterization of

  6. Captured key electrical safety lockout system

    SciTech Connect (OSTI)

    Darimont, Daniel E. (Aurora, IL)

    1995-01-01T23:59:59.000Z

    A safety lockout apparatus for an electrical circuit includes an electrical switch, a key, a lock and a blocking mechanism. The electrical switch is movable between an ON position at which the electrical circuit is energized and an OFF position at which the electrical circuit is deactivated. The lock is adapted to receive the key and is rotatable among a plurality of positions by the key. The key is only insertable and removable when the lock is at a preselected position. The lock is maintained in the preselected position when the key is removed from the lock. The blocking mechanism physically maintains the switch in its OFF position when the key is removed from the lock. The blocking mechanism preferably includes a member driven by the lock between a first position at which the electrical switch is movable between its ON and OFF positions and a second position at which the member physically maintains the electrical switch in its OFF position. Advantageously, the driven member's second position corresponds to the preselected position at which the key can be removed from and inserted into the lock.

  7. Captured key electrical safety lockout system

    DOE Patents [OSTI]

    Darimont, D.E.

    1995-10-31T23:59:59.000Z

    A safety lockout apparatus for an electrical circuit includes an electrical switch, a key, a lock and a blocking mechanism. The electrical switch is movable between an ON position at which the electrical circuit is energized and an OFF position at which the electrical circuit is deactivated. The lock is adapted to receive the key and is rotatable among a plurality of positions by the key. The key is only insertable and removable when the lock is at a preselected position. The lock is maintained in the preselected position when the key is removed from the lock. The blocking mechanism physically maintains the switch in its OFF position when the key is removed from the lock. The blocking mechanism preferably includes a member driven by the lock between a first position at which the electrical switch is movable between its ON and OFF positions and a second position at which the member physically maintains the electrical switch in its OFF position. Advantageously, the driven member`s second position corresponds to the preselected position at which the key can be removed from and inserted into the lock. 7 figs.

  8. Experimental study of high speed polarization-coding quantum key distribution with sifted-key

    E-Print Network [OSTI]

    and links 1. C. H. Bennet and G. Brassard, "Quantum cryptography: Public key distribution and coin tossing

  9. Time-to-Event Analysis of Fine Particle Air Pollution and Preterm Birth: Results from North Carolina, 2001-2005

    E-Print Network [OSTI]

    Reich, Brian J.

    1 Time-to-Event Analysis of Fine Particle Air Pollution and Preterm Birth: Results from North.chang@duke.edu #12;3 Abstract Exposures to air pollution during pregnancy have been suggested as risk factors good air quality. Key words: air pollution, particulate matter, preterm birth, survival analysis Word

  10. Final analysis of proton form factor ratio data at Q2 = 4.0, 4.8, and 5.6 GeV2

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Puckett, Andrew J.

    2012-04-01T23:59:59.000Z

    Recently published measurements of the proton electromagnetic form factor ratio R = ?p GEp/GMp at momentum transfers Q2 up to 8.5 GeV2 in Jefferson Lab Hall C deviate from the linear trend of previous measurements in Jefferson Lab Hall A, favoring a slower rate of decrease of R with Q2. While statistically compatible in the region of overlap with Hall A, the Hall C data hint at a systematic difference between the two experiments. This possibility was investigated in a reanalysis of the Hall A data. We find that the original analysis underestimated the background in the selection of elasticmore »events. The application of an additional cut to further suppress the background increases the results for R, improving the consistency between Halls A and C.« less

  11. Final analysis of proton form factor ratio data at Q2 = 4.0, 4.8, and 5.6 GeV2

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Puckett, Andrew J. [JLAB

    2012-04-01T23:59:59.000Z

    Recently published measurements of the proton electromagnetic form factor ratio R = ?p GEp/GMp at momentum transfers Q2 up to 8.5 GeV2 in Jefferson Lab Hall C deviate from the linear trend of previous measurements in Jefferson Lab Hall A, favoring a slower rate of decrease of R with Q2. While statistically compatible in the region of overlap with Hall A, the Hall C data hint at a systematic difference between the two experiments. This possibility was investigated in a reanalysis of the Hall A data. We find that the original analysis underestimated the background in the selection of elastic events. The application of an additional cut to further suppress the background increases the results for R, improving the consistency between Halls A and C.

  12. September 11, 2012 NIST Key Management Workshop 2012 Secure Key Storage

    E-Print Network [OSTI]

    September 11, 2012 NIST Key Management Workshop 2012 Secure Key Storage and True Random Number Storage via PUFs - Main Idea - Reliability - Randomness -- InstantiationsInstantiations 3. True Random, including side channel resistance ° Trusted security policy routines ° Secure and authentic key storage

  13. Key Implications of the Global Economic Environment

    E-Print Network [OSTI]

    Lansky, Joshua

    Key Implications of the Global Economic Environment For PCT Filings: A Survey of the Issues DMI...............................................................................9 Annex 1: Incentives for Patent Filing: The Analytical Framework...........................11 I-1 Intellectual property, innovation, and economic growth.................................13 2-2 Individual

  14. Extracting secret keys from integrated circuits

    E-Print Network [OSTI]

    Lim, Daihyun, 1976-

    2004-01-01T23:59:59.000Z

    Modern cryptographic protocols are based on the premise that only authorized participants can obtain secret keys and access to information systems. However, various kinds of tampering methods have been devised to extract ...

  15. BACK TO BASICS: YOUR KEYS TO SAFE

    E-Print Network [OSTI]

    Kirschner, Denise

    BACK TO BASICS: YOUR KEYS TO SAFE DRIVING FINE-TUNE THE FUNDAMENTALS DRIVE SAFELY WORK WEEK: FRIDAY an occasional refresher. In fact, most company fleet safety programs emphasize basic skills and defensive

  16. Mutual Dependence for Secret Key Agreement

    E-Print Network [OSTI]

    Chan, Chung

    A mutual dependence expression is established for the secret key agreement problem when all users are active. In certain source networks, the expression can be interpreted as certain notions of connectivity and network ...

  17. Multipartite secret key distillation and bound entanglement

    E-Print Network [OSTI]

    Remigiusz Augusiak; Pawel Horodecki

    2009-09-25T23:59:59.000Z

    Recently it has been shown that quantum cryptography beyond pure entanglement distillation is possible and a paradigm for the associated protocols has been established. Here we systematically generalize the whole paradigm to the multipartite scenario. We provide constructions of new classes of multipartite bound entangled states, i.e., those with underlying twisted GHZ structure and nonzero distillable cryptographic key. We quantitatively estimate the key from below with help of the privacy squeezing technique.

  18. Multipartite secret key distillation and bound entanglement

    SciTech Connect (OSTI)

    Augusiak, Remigiusz; Horodecki, Pawel [Faculty of Applied Physics and Mathematics, Gdansk University of Technology, Narutowicza 11/12, 80-952 Gdansk (Poland) and ICFO-Institute Ciencies Fotoniques, Mediterranean Technology Park, 08860 Castelldefels (Barcelona) (Spain); Faculty of Applied Physics and Mathematics, Gdansk University of Technology, Narutowicza 11/12, 80-952 Gdansk (Poland)

    2009-10-15T23:59:59.000Z

    Recently it has been shown that quantum cryptography beyond pure entanglement distillation is possible and a paradigm for the associated protocols has been established. Here we systematically generalize the whole paradigm to the multipartite scenario. We provide constructions of new classes of multipartite bound entangled states, i.e., those with underlying twisted Greenberger-Horne-Zeilinger (GHZ) structure and nonzero distillable cryptographic key. We quantitatively estimate the key from below with the help of the privacy squeezing technique.

  19. Effects of a Highway Improvement Project on Florida key Deer

    E-Print Network [OSTI]

    Parker, Israel D.; Braden, Anthony W.; Lopez, Roel R.; Silvy, Nova J.; Davis, Donald S.; Owen, Catherine B.

    2007-01-01T23:59:59.000Z

    the primary inter-island roadway in the Florida Keys. DVCsprimary source of mortality for the endangered Florida Key

  20. GREET Bioenergy Life Cycle Analysis and Key Issues for Woody...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Systems, Argonne National Laboratory wangbiomass2014.pdf More Documents & Publications Resource Assessment and Land Use Change Bioenergy Technologies Office Multi-Year Program...

  1. Advanced Analysis Software Key to New, Energy-Efficient Technologies -

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office511041cloth DocumentationProducts (VAP) VAP7-0973 1BP-14 Power and TransmissionAdolphus L.

  2. The key to minimizing minesite versus utility laboratory analyses on Powder River Basin coals

    SciTech Connect (OSTI)

    Rexin, M.G.

    1995-08-01T23:59:59.000Z

    Powder River Basin (PRB) coals are continuing to expand their areas of use into regions previously reserved for higher ranked coals. PRB coals are subbituminous by rank. Inherent moisture values of 25 to 30 percent are the norm. PRB coals, being lower rank in nature, also tend to oxidize very easily. These factors combined produce a coal which can cause analysis problems for laboratories unaccustomed to PRB coals. In fact, even laboratories that deal with this type of coal on a daily basis can experience analytical difficulties. Special care needs to be taken by both minesite laboratory and the utility laboratory to ensure accurate analyses. Cooperation between both parties is the key to reproducible analyses. Only by working together can parties fully analyze the situation and develop analytical methods acceptable to both. This paper will describe the methods employed by the Caballo Rojo Mine (CRM) and the Georgia Power Company (GPC) to resolve laboratory analysis differences found during shipments by CRM to GPC beginning in 1994. The following topics are discussed: initial comparative results, analytical investigations, the cooperative process, recent comparative results, and conclusions.

  3. Quantum key distribution with finite resources: Secret key rates via Renyi entropies

    SciTech Connect (OSTI)

    Abruzzo, Silvestre; Kampermann, Hermann; Mertz, Markus; Bruss, Dagmar [Institute for Theoretical Physics III, Heinrich-Heine-universitaet Duesseldorf, D-40225 Duesseldorf (Germany)

    2011-09-15T23:59:59.000Z

    A realistic quantum key distribution (QKD) protocol necessarily deals with finite resources, such as the number of signals exchanged by the two parties. We derive a bound on the secret key rate which is expressed as an optimization problem over Renyi entropies. Under the assumption of collective attacks by an eavesdropper, a computable estimate of our bound for the six-state protocol is provided. This bound leads to improved key rates in comparison to previous results.

  4. Reference-frame-independent quantum key distribution

    SciTech Connect (OSTI)

    Laing, Anthony; Rarity, John G.; O'Brien, Jeremy L. [Centre for Quantum Photonics, H. H. Wills Physics Laboratory and Department of Electrical and Electronic Engineering, University of Bristol, BS8 1UB (United Kingdom); Scarani, Valerio [Centre for Quantum Technologies and Department of Physics, National University of Singapore (Singapore)

    2010-07-15T23:59:59.000Z

    We describe a quantum key distribution protocol based on pairs of entangled qubits that generates a secure key between two partners in an environment of unknown and slowly varying reference frame. A direction of particle delivery is required, but the phases between the computational basis states need not be known or fixed. The protocol can simplify the operation of existing setups and has immediate applications to emerging scenarios such as earth-to-satellite links and the use of integrated photonic waveguides. We compute the asymptotic secret key rate for a two-qubit source, which coincides with the rate of the six-state protocol for white noise. We give the generalization of the protocol to higher-dimensional systems and detail a scheme for physical implementation in the three-dimensional qutrit case.

  5. Public key infrastructure for DOE security research

    SciTech Connect (OSTI)

    Aiken, R.; Foster, I.; Johnston, W.E. [and others

    1997-06-01T23:59:59.000Z

    This document summarizes the Department of Energy`s Second Joint Energy Research/Defence Programs Security Research Workshop. The workshop, built on the results of the first Joint Workshop which reviewed security requirements represented in a range of mission-critical ER and DP applications, discussed commonalties and differences in ER/DP requirements and approaches, and identified an integrated common set of security research priorities. One significant conclusion of the first workshop was that progress in a broad spectrum of DOE-relevant security problems and applications could best be addressed through public-key cryptography based systems, and therefore depended upon the existence of a robust, broadly deployed public-key infrastructure. Hence, public-key infrastructure ({open_quotes}PKI{close_quotes}) was adopted as a primary focus for the second workshop. The Second Joint Workshop covered a range of DOE security research and deployment efforts, as well as summaries of the state of the art in various areas relating to public-key technologies. Key findings were that a broad range of DOE applications can benefit from security architectures and technologies built on a robust, flexible, widely deployed public-key infrastructure; that there exists a collection of specific requirements for missing or undeveloped PKI functionality, together with a preliminary assessment of how these requirements can be met; that, while commercial developments can be expected to provide many relevant security technologies, there are important capabilities that commercial developments will not address, due to the unique scale, performance, diversity, distributed nature, and sensitivity of DOE applications; that DOE should encourage and support research activities intended to increase understanding of security technology requirements, and to develop critical components not forthcoming from other sources in a timely manner.

  6. Quantum repeaters and quantum key distribution: the impact of entanglement distillation on the secret key rate

    E-Print Network [OSTI]

    Sylvia Bratzik; Silvestre Abruzzo; Hermann Kampermann; Dagmar Bruß

    2013-03-14T23:59:59.000Z

    We investigate quantum repeaters in the context of quantum key distribution. We optimize the secret key rate per memory per second with respect to different distillation protocols and distillation strategies. For this purpose, we also derive an analytical expression for the average number of entangled pairs created by the quantum repeater, including classical communication times for entanglement swapping and entanglement distillation. We investigate the impact of this classical communication time on the secret key rate. We finally study the effect of the detector efficiency on the secret key rate.

  7. On the Security of Public Key Protocols

    E-Print Network [OSTI]

    Danny Dolev; et al.

    1983-01-01T23:59:59.000Z

    Recently the use of public key encryption to provide secure network communication has received considerable attention. Such public key systems are usually effective against passive eavesdroppers, who merely tap the lines and try to decipher the message. It has been pointed out, however, that an improperly designed protocol could be vulnerable to an active saboteur, one who may impersonate another user or alter the message being transmitted. Several models are formulated in which the security of protocols can be discussed precisely. Algorithms and characteri-zations that can be used to determine protocol security in these models are given.

  8. Key Renewable Energy Opportunities for Oklahoma Tribes

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport(FactDepartment ofLetter Report: I11IG002RTC3WASTE-TO-ENERGY:KenKeriKey IssuesKEY

  9. Security Issues Associated With Error Correction And Privacy Amplification In Quantum Key Distribution

    E-Print Network [OSTI]

    Horace Yuen

    2014-11-10T23:59:59.000Z

    Privacy amplification is a necessary step in all quantum key distribution protocols, and error correction is needed in each except when signals of many photons are used in the key communication in quantum noise approach. No security analysis of error correcting code information leak to the attacker has ever been provided, while an ad hoc formula is currently employed to account for such leak in the key generation rate. It is also commonly believed that privacy amplification allows the users to at least establish a short key of arbitrarily close to perfect security. In this paper we show how the lack of rigorous error correction analysis makes the otherwise valid privacy amplification results invalid, and that there exists a limit on how close to perfect a generated key can be obtained from privacy amplification. In addition, there is a necessary tradeoff between key rate and security, and the best theoretical values from current theories would not generate enough near-uniform key bits to cover the message authentication key cost in disturbance-information tradeoff protocols of the BB84 variety.

  10. An experimental study of a six key handprint chord keyboard

    E-Print Network [OSTI]

    Wolstein, Sheldon Aaron

    1986-01-01T23:59:59.000Z

    er Dr. R. Quinn Brackett Head o Department Dr. Leland T. Blank May 1986 ABSTRACT An Exper1mental Study of a Six Key Handprlnt Chord Keyboard (May 1986) Sheldon Aaron Wolstein, B. S. , Texas ASM University Cha1r of Advisory Committee: Dr... PRACTICE ARTICLE UITA 7Z 7B IUU IUB 1U7 11U 111 LIST OF TABLES Page TABLE I Results of Typing Test: Means and Standard Deviations 25 TABLE 2 Means and Variances for Letter Sequence Times 28 TABLE 3 Analysis of Variance for Letter Sequence...

  11. An efficient public key infrastructure revocation mechanism

    E-Print Network [OSTI]

    Collins, Tamara Lyn

    2000-01-01T23:59:59.000Z

    IMPLEMENTATION 35 PKI Structure Key/Certificate Storage in the Repository. PKI User Interface Communication Between Entities. User Interface to RA Communication . . RA to CA Communication CA to Repository Communication. User Interface to Repository... Communication. . . . 42 11 CA to Certificate Repository Communication. . . 43 12 User Interface to Certificate Repository Communication. . . . . . . 44 13 Certificate Creation Process. . . 46 14 Certificate Revocation Process. . 48 15 Certificate Retrieval...

  12. 2 Key Achievements 7 Greenhouse Gas Reduction

    E-Print Network [OSTI]

    Princeton University Reports Contents 2 Key Achievements 7 Greenhouse Gas Reduction Campus Energy was established in 2008, the University has invested $5.3 million in energy-savings projects, resulting in annual of a 5.2-megawatt solar collector field. · Audit the remaining 20 of the top 50 energy- consuming

  13. Roadmap for selected key measurements of LHCb

    E-Print Network [OSTI]

    The LHCb Collaboration; B. Adeva; M. Adinolfi; A. Affolder; Z. Ajaltouni; J. Albrecht; F. Alessio; M. Alexander; P. Alvarez Cartelle; A. A. Alves Jr; S. Amato; Y. Amhis; J. Amoraal; J. Anderson; O. Aquines Gutierrez; L. Arrabito; M. Artuso; E. Aslanides; G. Auriemma; S. Bachmann; Y. Bagaturia; D. S. Bailey; V. Balagura; W. Baldini; MdC. Barandela Pazos; R. J. Barlow; S. Barsuk; A. Bates; C. Bauer; Th. Bauer; A. Bay; I. Bediaga; K. Belous; I. Belyaev; M. Benayoun; G. Bencivenni; R. Bernet; M. -O. Bettler; A. Bizzeti; T. Blake; F. Blanc; C. Blanks; J. Blouw; S. Blusk; A. Bobrov; V. Bocci; A. Bondar; N. Bondar; W. Bonivento; S. Borghi; A. Borgia; E. Bos; T. J. V. Bowcock; C. Bozzi; J. Bressieux; S. Brisbane; M. Britsch; N. H. Brook; H. Brown; A. Büchler-Germann; J. Buytaert; J. -P. Cachemiche; S. Cadeddu; J. M. Caicedo Carvajal; O. Callot; M. Calvi; M. Calvo Gomez; A. Camboni; W. Cameron; P. Campana; A. Carbone; G. Carboni; A. Cardini; L. Carson; K. Carvalho Akiba; G. Casse; M. Cattaneo; M. Charles; Ph. Charpentier; A. Chlopik; P. Ciambrone; X. Cid Vidal; P. J. Clark; P. E. L. Clarke; M. Clemencic; H. V. Cliff; J. Closier; C. Coca; V. Coco; J. Cogan; P. Collins; F. Constantin; G. Conti; A. Contu; G. Corti; G. A. Cowan; B. D'Almagne; C. D'Ambrosio; D. G. d'Enterria; W. Da Silva; P. David; I. De Bonis; S. De Capua; M. De Cian; F. De Lorenzi; J. M. De Miranda; L. De Paula; P. De Simone; H. De Vries; D. Decamp; H. Degaudenzi; M. Deissenroth; L. Del Buono; C. Deplano; O. Deschamps; F. Dettori; J. Dickens; H. Dijkstra; M. Dima; S. Donleavy; A. C. dos Reis; A. Dovbnya; T. Du Pree; P. -Y. Duval; L. Dwyer; R. Dzhelyadin; C. Eames; S. Easo; U. Egede; V. Egorychev; F. Eisele; S. Eisenhardt; L. Eklund; D. Esperante Pereira; L. Estève; S. Eydelman; E. Fanchini; C. Färber; G. Fardell; C. Farinelli; S. Farry; V. Fave; V. Fernandez Albor; M. Ferro-Luzzi; S. Filippov; C. Fitzpatrick; F. Fontanelli; R. Forty; M. Frank; C. Frei; M. Frosini; J. L. Fungueirino Pazos; S. Furcas; A. Gallas Torreira; D. Galli; M. Gandelman; Y. Gao; J-C. Garnier; L. Garrido; C. Gaspar; N. Gauvin; M. Gersabeck; T. Gershon; Ph. Ghez; V. Gibson; Yu. Gilitsky; V. V. Gligorov; C. Göbel; D. Golubkov; A. Golutvin; A. Gomes; M. Grabalosa Gándara; R. Graciani Diaz; L. A. Granado Cardoso; E. Graugés; G. Graziani; A. Grecu; G. Guerrer; E. Gushchin; Yu. Guz; Z. Guzik; T. Gys; F. Hachon; G. Haefeli; S. C. Haines; T. Hampson; S. Hansmann-Menzemer; R. Harji; N. Harnew; P. F. Harrison; J. He; K. Hennessy; P. Henrard; J. A. Hernando Morata; A. Hicheur; E. Hicks; W. Hofmann; K. Holubyev; P. Hopchev; W. Hulsbergen; P. Hunt; T. Huse; R. S. Huston; D. Hutchcroft; V. Iakovenko; C. Iglesias Escudero; J. Imong; R. Jacobsson; M. Jahjah Hussein; E. Jans; F. Jansen; P. Jaton; B. Jean-Marie; M. John; C. R. Jones; B. Jost; F. Kapusta; T. M. Karbach; J. Keaveney; U. Kerzel; T. Ketel; A. Keune; S. Khalil; B. Khanji; Y. M. Kim; M. Knecht; J. Knopf; S. Koblitz; A. Konoplyannikov; P. Koppenburg; I. Korolko; A. Kozlinskiy; M. Krasowski; L. Kravchuk; P. Krokovny; K. Kruzelecki; M. Kucharczyk; I. Kudryashov; T. Kvaratskheliya; D. Lacarrere; A. Lai; R. W. Lambert; G. Lanfranchi; C. Langenbruch; T. Latham; R. Le Gac; R. Lefevre; A. Leflat; J. Lefrançois; O. Leroy; K. Lessnoff; L. Li; Y. Y. Li; J. Libby; M. Lieng; R. Lindner; S. Lindsey; C. Linn; B. Liu; G. Liu; J. H. Lopes; E. Lopez Asamar; J. Luisier; F. Machefert; I. Machikhiliyan; F. Maciuc; O. Maev; J. Magnin; A. Maier; R. M. D. Mamunur; G. Manca; G. Mancinelli; N. Mangiafave; U. Marconi; F. Marin; J. Marks; G. Martellotti; A. Martens; L. Martin; D. Martinez Santos; Z. Mathe; C. Matteuzzi; V. Matveev; A. Mazurov; G. McGregor; B. Mcharek; C. Mclean; R. McNulty; M. Merk; J. Merkel; M. Merkin; R. Messi; F. C. D. Metlica; J. Michalowski; S. Miglioranzi; M. -N. Minard; S. Monteil; D. Moran; J. V. Morris; R. Mountain; I. Mous; F. Muheim; R. Muresan; F. Murtas; B. Muryn; M. Musy; J. Mylroie-Smith; P. Naik; T. Nakada; R. Nandakumar; J. Nardulli; Z. Natkaniec; M. Nedos; M. Needham; N. Neufeld; L. Nicolas; S. Nies; V. Niess; N. Nikitin; A. Noor; A. Oblakowska-Mucha; V. Obraztsov; S. Oggero; O. Okhrimenko; R. Oldeman; M. Orlandea; A. Ostankov; J. Palacios; M. Palutan; J. Panman; A. Papadelis; A. Papanestis; M. Pappagallo; C. Parkes; G. Passaleva; G. D. Patel; M. Patel; S. K. Paterson; G. N. Patrick; E. Pauna; C. Pauna; C. Pavel; A. Pazos Alvarez; A. Pellegrino; G. Penso; M. Pepe Altarelli; S. Perazzini; D. L. Perego; A. Pérez-Calero Yzquierdo; E. Perez Trigo; P. Perret; G. Pessina; A. Petrella; A. Petrolini; B. Pietrzyk; D. Pinci; S. Playfer; M. Plo Casasus; G. Polok; A. Poluektov; E. Polycarpo; D. Popov; B. Popovici; S. Poss; C. Potterat; A. Powell; S. Pozzi; V. Pugatch; A. Puig Navarro; W. Qian; J. H. Rademacker; B. Rakotomiaramanana; I. Raniuk; G. Raven; S. Redford; W. Reece

    2010-11-23T23:59:59.000Z

    Six of the key physics measurements that will be made by the LHCb experiment, concerning CP asymmetries and rare B decays, are discussed in detail. The "road map" towards the precision measurements is presented, including the use of control channels and other techniques to understand the performance of the detector with the first data from the LHC.

  14. Key Management Challenges in Smart Grid

    SciTech Connect (OSTI)

    Sheldon, Frederick T [ORNL] [ORNL; Duren, Mike [Sypris Electronics, LLC] [Sypris Electronics, LLC

    2012-01-01T23:59:59.000Z

    Agenda Awarded in February 2011 Team of industry and research organizations Project Objectives Address difficult issues Complexity Diversity of systems Scale Longevity of solution Participate in standards efforts and working groups Develop innovative key management solutions Modeling and simulation ORNL Cyber Security Econometric Enterprise System Demonstrate effectiveness of solution Demonstrate scalability

  15. CHEMICAL ABBREVIATION KEY ABBREVIATION CHEMICAL NAME HAZARDS

    E-Print Network [OSTI]

    Pawlowski, Wojtek

    Corrosive - base LiCl Lithium chloride Harmful MeOH Methanol Flammable #12;CHEMICAL ABBREVIATION KEY Irritant destain Methanol,acetic acid,H2O Flammable, Corrosive - acid DI H2O Deionized water DCM FeCl3 Iron(III) chloride Corrosive - acid FeSO4 Iron(II) sulfate Toxic H2O Water HCl Hydrochloric

  16. BACK TO BASICS: YOUR KEYS TO SAFE

    E-Print Network [OSTI]

    Kirschner, Denise

    BACK TO BASICS: YOUR KEYS TO SAFE DRIVING BUCKLE UP! Seat belts should never have time off DRIVE the back seat to the front seat.4 ·The back is the best place for pets. According to AAA, similar. Never place the shoulder portion under your arm or behind your back! ·Drivers should sit with at least

  17. Rangeland ecology: Key global research issues & questions

    E-Print Network [OSTI]

    1 Rangeland ecology: Key global research issues & questions Robin Reid and Maria Fernandez-Gimenez This paper discusses developments in our understanding about rangeland ecology and rangeland dynamics in the last 20 years. Before the late 1980's, the mainstream view in range ecology was that livestock

  18. Rangeland ecology: Key global research issues & questions

    E-Print Network [OSTI]

    1 Rangeland ecology: Key global research issues & questions Robin Reid1 and Maria Fernandez Ecology Lab 2Associate Professor Colorado State University, Fort Collins, Colorado, USA Global Issues and Questions in Rangeland Ecology · Despite the focus here on global issues, we need to recognize that Mongolia

  19. Key facts about Argonne National Laboratory

    E-Print Network [OSTI]

    Kemner, Ken

    Key facts about Argonne National Laboratory Argonne National Laboratory occupies 1,500 wooded acres in southeast DuPage County near Chicago. Mission Argonne's mission is to apply a unique blend of world needs of our nation. Argonne conducts R&D in many areas of basic and applied science and engineering

  20. www.defra.gov.uk Environmental Key

    E-Print Network [OSTI]

    ;Environmental Key Performance Indicators Reporting Guidelines for UK Business #12;Department for Environment with the Crown. This publication (excluding the logo) may be reproduced free of charge in any format or medium they operate in, and their impact on the environment, are most likely to prosper in the long-term. At the same

  1. Chemical and Petroleum Engineering Key and Lab Space Agreement

    E-Print Network [OSTI]

    Calgary, University of

    Chemical and Petroleum Engineering Key and Lab Space Agreement Key Holder Information Last Name and Petroleum Engineering remain the property of the Department. I agree to pay a deposit for the keys/Graduate Student Study space that has been assigned. Keys Any keys issued to me from the Department of Chemical

  2. 100 km secure differential phase shift quantum key distribution with low jitter up-conversion detectors

    E-Print Network [OSTI]

    Eleni Diamanti; Hiroki Takesue; Carsten Langrock; M. M. Fejer; Yoshihisa Yamamoto

    2006-08-13T23:59:59.000Z

    We present a quantum key distribution experiment in which keys that were secure against all individual eavesdropping attacks allowed by quantum mechanics were distributed over 100 km of optical fiber. We implemented the differential phase shift quantum key distribution protocol and used low timing jitter 1.55 um single-photon detectors based on frequency up-conversion in periodically poled lithium niobate waveguides and silicon avalanche photodiodes. Based on the security analysis of the protocol against general individual attacks, we generated secure keys at a practical rate of 166 bit/s over 100 km of fiber. The use of the low jitter detectors also increased the sifted key generation rate to 2 Mbit/s over 10 km of fiber.

  3. Three key elements necessary for successful testing

    SciTech Connect (OSTI)

    Ehlig-Economides, C.A.; Hegeman, P. (Schlumberger Oilfield Services, Houston, TX (United States)); Clark, G. (Schlumberger Oilfield Services, Aberdeen (United Kingdom))

    1994-07-25T23:59:59.000Z

    Real-time surface readout during data acquisition, downhole shutting, and appropriate pressure gauges are three key elements for successful well tests. These elements are often overlooked in designing and implementing a successful well test. This second in a series of three articles on well testing shows how these elements affected the testing of an example well. Also reviewed are the capabilities of several new testing tools and techniques.

  4. Key Physical Mechanisms in Nanostructured Solar Cells

    SciTech Connect (OSTI)

    Dr Stephan Bremner

    2010-07-21T23:59:59.000Z

    The objective of the project was to study both theoretically and experimentally the excitation, recombination and transport properties required for nanostructured solar cells to deliver energy conversion efficiencies well in excess of conventional limits. These objectives were met by concentrating on three key areas, namely, investigation of physical mechanisms present in nanostructured solar cells, characterization of loss mechanisms in nanostructured solar cells and determining the properties required of nanostructured solar cells in order to achieve high efficiency and the design implications.

  5. Introducing Traffic Analysis Attacks, Defences and Public Policy Issues. . .

    E-Print Network [OSTI]

    Danezis, George

    Roots Traffic analysis is a key part of signal intelligence and electronic warfare. Michael Hermann, who

  6. Introducing Traffic Analysis George Danezis and Richard Clayton

    E-Print Network [OSTI]

    Danezis, George

    . 2 Military Roots Traffic analysis is a key component of signal intelligence and electronic warfare

  7. Building America Expert Meeting: Key Innovations for Adding Energy...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Key Innovations for Adding Energy Efficiency to Maintenance Projects Building America Expert Meeting: Key Innovations for Adding Energy Efficiency to Maintenance Projects This...

  8. authenticated key exchange: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    desirable attributes. Index Terms--Mutual Authentication; Key Management; SRP; Security; Smart Meter; Smart Leung, Victor C.M. 56 Authentication and Key Agreement via Memorable...

  9. Cooling Towers: Understanding Key Components of Cooling Towers...

    Office of Environmental Management (EM)

    Cooling Towers: Understanding Key Components of Cooling Towers and How to Improve Water Efficiency Cooling Towers: Understanding Key Components of Cooling Towers and How to Improve...

  10. Midstream Infrastructure Improvements Key to Realizing Full Potential...

    Office of Environmental Management (EM)

    Midstream Infrastructure Improvements Key to Realizing Full Potential of Domestic Natural Gas Midstream Infrastructure Improvements Key to Realizing Full Potential of Domestic...

  11. Possibility to Determine the Astrophysical S-Factor for the Be-7(p,gamma)b-8 Radiative-Capture from Analysis of the Be-7(he-3,d)b-8 Reaction

    E-Print Network [OSTI]

    Mukhamedzhanov, AM; Tribble, Robert E.; imofeyuk, N. K.

    1995-01-01T23:59:59.000Z

    PHYSICAL REVIEW C VOLUME 51, NUMBER 6 JUNE 1995 Possibility to determine the astrophysical S factor for the Be(p, p)sB radiative capture from analysis of the Be(sHe, d)sB reaction A. M. Mukhamedzhanov and R. E. Tribble Cyclotron Institute, Texas...) of the internal bound-state wave functions of B and Be, IsB'rB, (r) = ($?~~PsB), where r is the relative coordinate between the proton and the center of mass of Be, is approximated by S,&,B &P?, ?(r) . Here S887B is the spectroscopic factor of the configura...

  12. Min-entropy and quantum key distribution: Nonzero key rates for ''small'' numbers of signals

    SciTech Connect (OSTI)

    Bratzik, Sylvia; Mertz, Markus; Kampermann, Hermann; Bruss, Dagmar [Institute for Theoretical Physics III, Heinrich-Heine-Universitaet Duesseldorf, D-40225 Duesseldorf (Germany)

    2011-02-15T23:59:59.000Z

    We calculate an achievable secret key rate for quantum key distribution with a finite number of signals by evaluating the quantum conditional min-entropy explicitly. The min-entropy for a classical random variable is the negative logarithm of the maximal value in its probability distribution. The quantum conditional min-entropy can be expressed in terms of the guessing probability, which we calculate for d-dimensional systems. We compare these key rates to previous approaches using the von Neumann entropy and find nonzero key rates for a smaller number of signals. Furthermore, we improve the secret key rates by modifying the parameter estimation step. Both improvements taken together lead to nonzero key rates for only 10{sup 4}-10{sup 5} signals. An interesting conclusion can also be drawn from the additivity of the min-entropy and its relation to the guessing probability: for a set of symmetric tensor product states, the optimal minimum-error discrimination (MED) measurement is the optimal MED measurement on each subsystem.

  13. STGWG Key Outcomes for May 3, 2010

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011 Strategic2 OPAM615_CostNSARDevelopmental AssignmentApril 2,OCTOBER 2-3,|Key

  14. STGWG Key Outcomes for October 21, 2009

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011 Strategic2 OPAM615_CostNSARDevelopmental AssignmentApril 2,OCTOBER 2-3,|Key

  15. Key Associados Bradesco JV | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnual SiteofEvaluatingGroup |Jilin Zhongdiantou New EnergyKenosistec SrlKenyonKetchikan PublicKey

  16. Bioenergy Key Publications | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the YouTube platform isEnergyMeeting | Department ofTransportation Fuels | DepartmentKey

  17. Key Predistribution Techniques for Grid-Based Wireless Sensor Networks

    E-Print Network [OSTI]

    Key Predistribution Techniques for Grid-Based Wireless Sensor Networks Simon R. Blackburn1 , Tuvi sensor networks. Networks consisting of wireless sensor nodes ar- ranged in a grid pattern have many for the instantiation of these schemes. Key words: Key predistribution, wireless sensor networks; symmetric key

  18. The effect of sociocultural factors on the quality of relations of the United States with Hispaniola: analysis of the American military occupation of Haiti and the Dominican Republic (1915-1934)

    E-Print Network [OSTI]

    Alvarez, Fausto B.

    1988-01-01T23:59:59.000Z

    THE EFFECT OF SOCIOCULTURAL FACTORS ON THE QUALITY OF RELATIONS OF THE UNITED STATES WITH HISPANIOLA: ANALYSIS OF THE AMERICAN MILITARY OCCUPATION OF HAITI AND THE DOMINICAN REPUBLIC (1915-1934) A Thesis By FAUSTO B. ALVAREZ Submitted... WITH HISPANIOLA: ANALYSIS OF THE AMERICAN MILITARY OCCUPATION OF HAITI AND THE DOMINICAN REPUBLIC (1915-1934) A Thesis by FAUSTO B. ALVAREZ Approved as to style and content by: C arrperson o Co ee) ames H. Copp (Member) Wm. Alex McIntosh (Member) James...

  19. ACKNOWLEDGEMENTS ..................................................................................4 DEFINITIONS OF KEY TERMS .........................................................................6

    E-Print Network [OSTI]

    Escher, Christine

    ) means the chemical compound containing one atom of carbon and two atoms of oxygen. (2) "Carbon dioxide) "Global Warming Potential factor" (GWP) means the radiative forcing impact of one mass-based unit. For instance, methane (CH4) has a GWP of 23, meaning that every gram of methane will trap 23 times as much

  20. Final analysis of proton form factor ratio data at Q[superscript 2]=4.0, 4.8, and 5.6 GeV[superscript 2

    E-Print Network [OSTI]

    Bertozzi, William

    Precise measurements of the proton electromagnetic form factor ratio R=?[subscript p]G[subscript E][superscript p]/G[subscript M][superscript p] using the polarization transfer method at Jefferson Lab have revolutionized ...

  1. Quantitative analysis of 2D and 3D models for epidermal growth factor receptor-dependent cell migration in the context of the extracellular microenvironment

    E-Print Network [OSTI]

    Kim, Hyung-Do, Ph. D. Massachusetts Institute of Technology

    2009-01-01T23:59:59.000Z

    Major therapeutic efforts have been devoted to targeting the epidermal growth factor receptor (EGFR), which is aberrantly expressed in many cancers and is correlated with tumor progression and invasiveness. In the current ...

  2. One-way quantum key distribution: Simple upper bound on the secret key rate

    SciTech Connect (OSTI)

    Moroder, Tobias; Luetkenhaus, Norbert [Institute of Theoretical Physics I and Max-Planck Research Group, Institute of Optics, Information and Photonics, University Erlangen-Nuremberg, Staudtstrasse 7, 91058 Erlangen (Germany); Institute for Quantum Computing, University of Waterloo, 200 University Avenue West, Waterloo, Ontario, N2L 3G1 (Canada); Curty, Marcos [Institute of Theoretical Physics I and Max-Planck Research Group, Institute of Optics, Information and Photonics, University Erlangen-Nuremberg, Staudtstrasse 7, 91058 Erlangen (Germany)

    2006-11-15T23:59:59.000Z

    We present a simple method to obtain an upper bound on the achievable secret key rate in quantum key distribution (QKD) protocols that use only unidirectional classical communication during the public-discussion phase. This method is based on a necessary precondition for one-way secret key distillation; the legitimate users need to prove that there exists no quantum state having a symmetric extension that is compatible with the available measurements results. The main advantage of the obtained upper bound is that it can be formulated as a semidefinite program, which can be efficiently solved. We illustrate our results by analyzing two well-known qubit-based QKD protocols: the four-state protocol and the six-state protocol.

  3. Organizational Culture andOrganizational Culture and Human Factors in HealthcareHuman Factors in Healthcare

    E-Print Network [OSTI]

    Organizational Culture andOrganizational Culture and Human Factors in HealthcareHuman Factors;TEAMWORK!TEAMWORK! #12;OverviewOverview ·· Organizational culture and adaptationOrganizational cultureKey Objectives ·· Compare error response in differentCompare error response in different organizational

  4. Unconditional Security of Time-energy Entanglement Quantum Key Distribution using Dual-basis Interferometry

    E-Print Network [OSTI]

    Zheshen Zhang; Jacob Mower; Dirk Englund; Franco N. C. Wong; Jeffrey H. Shapiro

    2014-01-23T23:59:59.000Z

    High-dimensional quantum key distribution (HDQKD) offers the possibility of high secure-key rate with high photon-information efficiency. We consider HDQKD based on the time-energy entanglement produced by spontaneous parametric downconversion, and show that it is secure against collective attacks. Its security rests upon visibility data -- obtained from Franson and conjugate-Franson interferometers -- that probe photon-pair frequency correlations and arrival-time correlations. From these measurements an upper bound can be established on the eavesdropper's Holevo information by translating the Gaussian-state security analysis for continuous-variable quantum key distribution so that it applies to our protocol. We show that visibility data from just the Franson interferometer provides a weaker, but nonetheless useful, secure-key rate lower bound. To handle multiple-pair emissions, we incorporate the decoy-state approach into our protocol. Our results show that over 200\\,km transmission distance in optical fiber, time-energy entanglement HDQKD could permit a 700 bit/sec secure-key rate, and a photon information efficiency of 2 secure-key bits per photon coincidence in the key-generation phase using receivers with 15% system efficiency.

  5. Transfer Factors for Contaminant Uptake by Fruit and Nut Trees

    SciTech Connect (OSTI)

    Napier, Bruce A.; Fellows, Robert J.; Minc, Leah D.

    2013-11-20T23:59:59.000Z

    Transfer of radionuclides from soils into plants is one of the key mechanisms for long-term contamination of the human food chain. Nearly all computer models that address soil-to-plant uptake of radionuclides use empirically-derived transfer factors to address this process. Essentially all available soil-to-plant transfer factors are based on measurements in annual crops. Because very few measurements are available for tree fruits, samples were taken of alfalfa and oats and the stems, leaves, and fruits and nuts of almond, apple, apricot, carob, fig, grape, nectarine, pecan, pistachio (natural and grafted), and pomegranate, along with local surface soil. The samples were dried, ground, weighed, and analyzed for trace constituents through a combination of induction-coupled plasma mass spectrometry and instrumental neutron activation analysis for a wide range of naturally-occurring elements. Analysis results are presented and converted to soil-to-plant transfer factors. These are compared to commonly used and internationally recommended values. Those determined for annual crops are very similar to commonly-used values; those determined for tree fruits show interesting differences. Most macro- and micronutrients are slightly reduced in fruits; non-essential elements are reduced further. These findings may be used in existing computer models and may allow development of tree-fruit-specific transfer models.

  6. authenticated key agreement: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    desirable attributes. Index Terms--Mutual Authentication; Key Management; SRP; Security; Smart Meter; Smart Leung, Victor C.M. 53 On the security of some password-based key...

  7. "Turn-Key" Open Source Software Solutions for Energy Management...

    Energy Savers [EERE]

    "Turn-Key" Open Source Software Solutions for Energy Management of Small to Medium Sized Buildings (DE-FOA-0000822) "Turn-Key" Open Source Software Solutions for Energy Management...

  8. Quantum Key Distribution by Utilizing Four-Level Particles

    E-Print Network [OSTI]

    Tao Yan; Fengli Yan

    2010-02-09T23:59:59.000Z

    We present a quantum key distribution protocol based on four-level particles entanglement. Furthermore, a controlled quantum key distribution protocol is proposed by utilizing three four-level particles. We show that the two protocols are secure.

  9. The impacts of urbanization on endangered florida key deer

    E-Print Network [OSTI]

    Harveson, Patricia Moody

    2006-04-12T23:59:59.000Z

    for resources between man and wildlife continues, it is important to understand the effects of urbanization on species. Endangered Key deer (Odocoileus virginianus clavium) are endemic to the Florida Keys archipelago stretching southwest off the southern tip...

  10. Exploring the context : a small hotel in Key West

    E-Print Network [OSTI]

    VanBeuzekom, Edrick

    1984-01-01T23:59:59.000Z

    This thesis develops a personal method and approach for designing in a delicate context such as the Key West Historic District. This thesis is composed of two parts. The first part presents observations of Key West, focusing ...

  11. actual key success: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    key exchange over an insecure channel. The security of the proposed algorithm grows as NPm, where M, P are the size of the key and the computational commplexity fo the linear...

  12. access technologies key: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    key exchange over an insecure channel. The security of the proposed algorithm grows as NPm, where M, P are the size of the key and the computational commplexity fo the linear...

  13. Turn Your Key, Be Idle Free | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    Turn Your Key, Be Idle Free Turn Your Key, Be Idle Free April 13, 2010 - 7:30am Addthis Shannon Brescher Shea Communications Manager, Clean Cities Program What activity wastes...

  14. Low-density random matrices for secret key extraction

    E-Print Network [OSTI]

    Zhou, Hongchao

    Secret key extraction, the task of extracting a secret key from shared information that is partially known by an eavesdropper, has important applications in cryptography. Motivated by the requirements of high-speed quantum ...

  15. Secret key agreement using asymmetry in channel state knowledge

    E-Print Network [OSTI]

    Wornell, Gregory W.

    We study secret-key agreement protocols over a wiretap channel controlled by a state parameter. The secret-key capacity is established when the wiretap channel is discrete and memoryless, the sender and receiver are both ...

  16. Behaviors and housing inertia are key factors in determining the consequences of a shock in

    E-Print Network [OSTI]

    Boyer, Edmond

    reductions in oil consumption. Today, there- fore, heated debates are going on about the necessity of much of actions: policies aiming at reducing oil consumption can be either immediate or de- layed, in the wait'Environnement et le D´eveloppement, Paris, France bEcole Nationale des Ponts-et-Chauss´ees, Paris, France c

  17. Key factors affecting voltage oscillations of distribution networks with distributed generation and induction motor loads

    E-Print Network [OSTI]

    Pota, Himanshu Roy

    of distributed energy sources such as, combined heat and power (CHP), wind, solar, and fuel cells, are expected and IT, The University of New South Wales, Canberra, ACT 2600, Australia b Future Grid Research Centre, The University of Melbourne, Parkville, VIC 3010, Australia c Griffith School of Engineering, Griffith University

  18. Review paper Topography as a key factor driving atmospheric nitrogen exchanges in

    E-Print Network [OSTI]

    Grogan, Paul

    the response of northern systems to changes in climatic conditions. In this review we examine pathways of N British Columbia, Prince George, BC, Canada a r t i c l e i n f o Article history: Received 26 April 2013 important indirect roles in gaseous N cycling via evapotranspiration effects. Our review indicates

  19. For Immediate Release --Thursday, May 15, 2014 Managing mistakes a key factor in developing nursing

    E-Print Network [OSTI]

    Seldin, Jonathan P.

    mistakes impacts nursing students' clinical performance. He is looking to improve based on opinion alone and expect positive outcomes." Students are obviously in clinical settings. "Clinical is where nursing students really put everything

  20. FE-Funded Study Released on Key Factors Affecting China Shale...

    Broader source: Energy.gov (indexed) [DOE]

    government gives priority to the development of China's shale gas sector to help fight air pollution and reduce reliance on natural gas imports; and The U.S. government supports...

  1. Occupancy by key transcription factors is a more accurate predictor of

    Office of Scientific and Technical Information (OSTI)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItem Not Found Item Not Foundenhancer activity than histone modifications or chromatin

  2. FE-Funded Study Released on Key Factors Affecting China Shale Gas

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport in Representative Geologic MediaTreatment |SafeguardsAugustNovember| Department

  3. Wigner distinguished lecturer Majumdar says scale-up factor key to R&D

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over OurThe Iron SpinPrincetonUsingWhat is a “Shut-down”Whole AlgaeRateWhyWidesuccess |

  4. Occupancy by key transcription factors is a more accurate predictor of

    Office of Scientific and Technical Information (OSTI)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItem NotEnergy, science,Speeding access to scienceSpeedingSpeeding accessSpeeding

  5. Compression station key to Texas pipeline project

    SciTech Connect (OSTI)

    NONE

    1996-10-01T23:59:59.000Z

    This was probably the largest pipeline project in the US last year, and the largest in Texas in the last decade. The new compressor station is a key element in this project. TECO, its servicing dealer, and compression packager worked closely throughout the planning and installation stages of the project. To handle the amount of gas required, TECO selected the GEMINI F604-1 compressor, a four-throw, single-stage unit with a six-inch stroke manufactured by Weatherford Enterra Compression Co. (WECC) in Corpus Christi, TX. TECO also chose WECC to package the compressors. Responsibility for ongoing support of the units will be shared among TECO, the service dealer and the packager. TECO is sending people to be trained by WECC, and because the G3600 family of engines is still relatively new, both the Caterpillar dealer and WECC sent people for advanced training at Caterpillar facilities in Peoria, IL. As part of its service commitment to TECO, the servicing dealer drew up a detailed product support plan, encompassing these five concerns: Training, tooling; parts support; service support; and commissioning.

  6. Relationship between key events in Earth history

    E-Print Network [OSTI]

    Gillman, Michael

    2015-01-01T23:59:59.000Z

    A model of cyclical (sinusoidal) motion of the solar system, intercepting event lines distributed at fixed intervals, explains the pattern of timings of mass extinctions, earlier glaciations, largest impact craters and the largest known extrusions of magma in the history of the Earth. The model reveals links between several sets of key events, including the end-Cretaceous and end-Ordovician extinctions with the Marinoan glaciation, and the end-Permian with the end-Serpukhovian extinctions. The model is supported by significant clusters of events and a significant reduction of impact crater size with position (sine value). The pattern of event lines is sustained to the earliest-dated impact craters (2023 and 1849 Ma) and to the origin of the solar system, close to 4567.4 Ma. The implication is that, for the entirety of its existence, the solar system has passed in a consistent manner through a predictably structured galaxy. Dark matter is a possible contender for the structure determining the event lines.

  7. Residential Energy Efficiency Financing: Key Elements of Program Design

    Broader source: Energy.gov [DOE]

    Presents key programmatic elements and context of financing initiatives, including contractor support, rebates, quality assurance, and more.

  8. Apportionment of ambient primary and secondary fine particulate matter at the Pittsburgh National Energy Laboratory particulate matter characterization site using positive matrix factorization and a potential source contributions function analysis

    SciTech Connect (OSTI)

    Donald V. Martello; Natalie J. Pekney; Richard R. Anderson (and others) [U.S. Department of Energy, Pittsburgh, PA (United States). National Energy Technology Laboratory

    2008-03-15T23:59:59.000Z

    Fine particulate matter (PM2.5) concentrations associated with 202 24-hr samples collected at the National Energy Technology Laboratory particulate matter characterization site in south Pittsburgh from October 1999 through September 2001 were used to apportion PM2.5 into primary and secondary contributions using Positive Matrix Factorization (PMF2). Input included the concentrations of PM2.5 mass determined with a Federal Reference Method (FRM) sampler, semi-volatile PM2.5 organic material, elemental carbon (EC), and trace element components of PM2.5. A total of 11 factors were identified. The results of potential source contributions function analysis using PMF2 factors and HYSPLIT-calculated back-trajectories were used to identify those factors associated with specific meteorological transport conditions. The 11 factors were identified as being associated with emissions from various specific regions and facilities including crustal material, gasoline combustion, diesel combustion, and three nearby sources high in trace metals. Three sources associated with transport from coal-fired power plants to the southeast, a combination of point sources to the northwest, and a steel mill and associated sources to the west were identified. In addition, two secondary-material-dominated sources were identified, one was associated with secondary products of local emissions and one was dominated by secondary ammonium sulfate transported to the NETL site from the west and southwest. Of these 11 factors, the four largest contributors to PM2.5 were the secondary transported material, local secondary material, diesel combustion emissions, and gasoline combustion emissions. 26 refs., 10 figs., 1 tab.

  9. A Full Key Recovery Attack on HMAC-AURORA-512

    E-Print Network [OSTI]

    A Full Key Recovery Attack on HMAC-AURORA-512 Yu Sasaki NTT Information Sharing Platform.yu@lab.ntt.co.jp Abstract. In this note, we present a full key recovery attack on HMAC- AURORA-512 when 512-bit secret keys is 2259 AURORA-512 operations, which is significantly less than the complexity of the exhaustive search

  10. Why Hierarchical Key Distribution is Appropriate for Multicast Networks

    E-Print Network [OSTI]

    Zheng, Yuliang

    Why Hierarchical Key Distribution is Appropriate for Multicast Networks Chandana Gamage, Jussipekka rationale for many key distribution schemes for multicast networks are based on heuristic arguments on e of multicast group formation and network growth to look at the selection of a key distribution scheme from

  11. Secret-key generation with correlated sources and noisy channels

    E-Print Network [OSTI]

    Khisti, Ashish

    Secret-key generation with correlated sources and noisy channels Ashish Khisti EECS Dept. MIT for secret-key generation between remote terminals is considered. The sender communicates to the receiver discrete memoryless sources. Lower and upper bounds for the secret-key rate are presented and shown

  12. Interactive Secret Key Generation over Reciprocal Fading Channels

    E-Print Network [OSTI]

    Khisti, Ashish

    Interactive Secret Key Generation over Reciprocal Fading Channels Ashish Khisti Dept. of Electrical--We study a two-terminal secret-key generation problem over a two-way, approximately reciprocal, block of the secret-key is gen- erated from the correlated channel state sequences by creating omniscience between

  13. Protecting Secret Keys with Personal Entropy Carl Ellison

    E-Print Network [OSTI]

    Schneier, Bruce

    Protecting Secret Keys with Personal Entropy Carl Ellison Cybercash, Inc., cme@cybercash.com Chris technology often requires users to protect a secret key by selecting a password or passphrase. While a good to recover the secret key. As time passes, the ability to remember the passphrase fades and the user may

  14. Secret-Key Generation over Reciprocal Fading Channels

    E-Print Network [OSTI]

    Khisti, Ashish

    Secret-Key Generation over Reciprocal Fading Channels Ashish Khisti Department of Electrical and Computer Engineering University of Toronto Nov. 14, 2012 #12;Motivation Secret-Key Generation in Wireless, 2012 2/ 22 #12;Motivation Secret-Key Generation in Wireless Fading Channels A B KA KB Forward

  15. Secret-Key Generation from Channel Reciprocity: A Separation Approach

    E-Print Network [OSTI]

    Khisti, Ashish

    Secret-Key Generation from Channel Reciprocity: A Separation Approach Ashish Khisti Department: Secret-Key Generation Secure Message Transmission Physical Layer Authentication Jamming Resistance Feb 11, 2013 2/ 20 #12;Motivation Secret-Key Generation in Wireless Fading Channels A B KA KB Forward

  16. Security proof for quantum key distribution using qudit systems

    SciTech Connect (OSTI)

    Sheridan, Lana [Centre for Quantum Technologies, National University of Singapore (Singapore); Scarani, Valerio [Centre for Quantum Technologies, National University of Singapore (Singapore); Department of Physics, National University of Singapore (Singapore)

    2010-09-15T23:59:59.000Z

    We provide security bounds against coherent attacks for two families of quantum key distribution protocols that use d-dimensional quantum systems. In the asymptotic regime, both the secret key rate for fixed noise and the robustness to noise increase with d. The finite key corrections are found to be almost insensitive to d < or approx. 20.

  17. Secure Broadcasting of a Common Message with Independent Secret Keys

    E-Print Network [OSTI]

    Khisti, Ashish

    Secure Broadcasting of a Common Message with Independent Secret Keys Rafael F. Schaefer Department broadcasting with indepen- dent secret keys is studied. The particular scenario is analyzed where a common of it. The transmitter shares independent secret keys of arbitrary rates with both legitimate receivers

  18. Dynamic Key Ring Update Mechanism for Mobile Wireless Sensor Networks

    E-Print Network [OSTI]

    Yanikoglu, Berrin

    @sabanciuniv.edu Abstract--Key distribution is an important issue to provide security in Wireless Sensor Networks (WSNs. For the performance evaluation basis, we used our mechanism together with a location based key pre-distribution scheme Terms--mobile wireless sensor networks, key ring update, security, resiliency, connectivity I

  19. Compilation of Diversity Factors and Schedules for Energy and Cooling Load Calculations, Phase II Report - Identified Relevant Data Sets, Methods, and Variability Analysis

    E-Print Network [OSTI]

    Abushakra, B.; Haberl, J. S.; Claridge, D. E.

    1999-01-01T23:59:59.000Z

    for classifying the Office building categories; (3) the relevant methods for daytyping necessary for creating the typical load shapes for energy and cooling load calculation; (4) the relevant robust variability (uncertainty) analysis; (5) typical load shapes...

  20. Campus Environmental Factors Influencing Student Leadership Development and Civic Engagement

    E-Print Network [OSTI]

    Boren, Laura

    2012-02-14T23:59:59.000Z

    for the study. The researcher determined from participant responses that peer and mentor relationships, community identity, personal identity, and democratic experiences were key environmental factors influencing student leadership development and civic...

  1. Drift Degradation Analysis

    SciTech Connect (OSTI)

    D. Kicker

    2004-09-16T23:59:59.000Z

    Degradation of underground openings as a function of time is a natural and expected occurrence for any subsurface excavation. Over time, changes occur to both the stress condition and the strength of the rock mass due to several interacting factors. Once the factors contributing to degradation are characterized, the effects of drift degradation can typically be mitigated through appropriate design and maintenance of the ground support system. However, for the emplacement drifts of the geologic repository at Yucca Mountain, it is necessary to characterize drift degradation over a 10,000-year period, which is well beyond the functional period of the ground support system. This document provides an analysis of the amount of drift degradation anticipated in repository emplacement drifts for discrete events and time increments extending throughout the 10,000-year regulatory period for postclosure performance. This revision of the drift degradation analysis was developed to support the license application and fulfill specific agreement items between the U.S. Nuclear Regulatory Commission (NRC) and the U.S. Department of Energy (DOE). The earlier versions of ''Drift Degradation Analysis'' (BSC 2001 [DIRS 156304]) relied primarily on the DRKBA numerical code, which provides for a probabilistic key-block assessment based on realistic fracture patterns determined from field mapping in the Exploratory Studies Facility (ESF) at Yucca Mountain. A key block is defined as a critical block in the surrounding rock mass of an excavation, which is removable and oriented in an unsafe manner such that it is likely to move into an opening unless support is provided. However, the use of the DRKBA code to determine potential rockfall data at the repository horizon during the postclosure period has several limitations: (1) The DRKBA code cannot explicitly apply dynamic loads due to seismic ground motion. (2) The DRKBA code cannot explicitly apply loads due to thermal stress. (3) The DRKBA code, which determines structurally controlled key-block failure, is not applicable for stress-controlled failure in the lithophysal units. To address these limitations, additional numerical codes have been included that can explicitly apply seismic and thermal loads, providing significant improvements to the analysis of drift degradation and extending the validity of drift degradation models.

  2. Secret key distillation from shielded two-qubit states

    E-Print Network [OSTI]

    Joonwoo Bae

    2010-09-22T23:59:59.000Z

    The quantum states corresponding to a secret key are characterized using the so-called private states, where the key part consisting of a secret key is shielded by the additional systems. Based on the construction, it was shown that a secret key can be distilled from bound entangled states. In this work, I consider the shielded two-qubit states in a key-distillation scenario and derive the conditions under which a secret key can be distilled using the recurrence protocol or the two-way classical distillation, advantage distillation together with one-way postprocessing. From the security conditions, it is shown that a secret key can be distilled from bound entangled states in a much wider range. In addition, I consider the case that in which white noise is added to quantum states and show that the classical distillation protocol still works despite a certain amount of noise although the recurrence protocol does not.

  3. Secret key distillation from shielded two-qubit states

    SciTech Connect (OSTI)

    Bae, Joonwoo [School of Computational Sciences, Korea Institute for Advanced Study, Seoul 130-722 (Korea, Republic of)

    2010-05-15T23:59:59.000Z

    The quantum states corresponding to a secret key are characterized using the so-called private states, where the key part consisting of a secret key is shielded by the additional systems. Based on the construction, it was shown that a secret key can be distilled from bound entangled states. In this work, I consider the shielded two-qubit states in a key-distillation scenario and derive the conditions under which a secret key can be distilled using the recurrence protocol or the two-way classical distillation, advantage distillation together with one-way postprocessing. From the security conditions, it is shown that a secret key can be distilled from bound entangled states in a much wider range. In addition, I consider the case that in which white noise is added to quantum states and show that the classical distillation protocol still works despite a certain amount of noise although the recurrence protocol does not.

  4. Multi-Photon Quantum Key Distribution Based on Double-Lock Encryption

    E-Print Network [OSTI]

    Kam Wai Clifford Chan; Mayssaa El Rifai; Pramode K. Verma; Subhash Kak; Yuhua Chen

    2015-03-19T23:59:59.000Z

    This paper presents a multi-stage, multi-photon quantum key distribution protocol based on the double-lock cryptography. It exploits the asymmetry in the detection strategies between the legitimate users and the eavesdropper. The security analysis of the protocol is presented with coherent states under the intercept-resend attack, the photon number splitting attack, and the man-in-the-middle attack. It is found that the mean photon number can be much larger than one. This complements the recent interest in multi-photon quantum communication protocols that require a pre-shared key between the legitimate users.

  5. Chromidio: an interface for color tracking with key frames in Max and Nato

    E-Print Network [OSTI]

    Tucker, Amy Rebecca

    2002-01-01T23:59:59.000Z

    11 QuickTime Movie Input 11 Interactive Color Picking 12 Key Frames 12 Useful Output 14 File Management 16 C.play I 6 IV I M P L E M E N T A T I O N A N D RESULTS 17 Chromidio User Interface 17 QuickTime Movie Display and Playback 22 vi i... CHAPTER Page Interactive Color Picking 26 Key Frame Management 27 Data Analysis and Output 32 Project File Management 36 C.play 39 User Interface 39 Mathematical Functions and F ilters 41 MIDI Implementations 44 Output : 46 Results Using C...

  6. Factors Influencing Succession: Lessons from Large, Infrequent

    E-Print Network [OSTI]

    Turner, Monica G.

    intense disturbances of large and small extent. Key words: disturbance frequency; disturbance intensityFactors Influencing Succession: Lessons from Large, Infrequent Natural Disturbances Monica G ABSTRACT Disturbance events vary in intensity, size, and fre- quency, but few opportunities exist to study

  7. An Empirical Analysis of Factors That Influence the First Year to Second Year Retention of Students at One Large, Hispanic Serving Institution (HSI)

    E-Print Network [OSTI]

    Wilkerson, Steven Lamar

    2009-05-15T23:59:59.000Z

    -year seminar course. Both iv descriptive and univariate statistics were used to describe the sample population, as well as the similarities and differences found to exist among the seven Astin types. Three separate logistic regression analyses organized... ............................................................ 85 Preliminary Data Analysis.................................................... 86 Descriptive and Univariate Statistics for Astin Types........... 92 Logistic Regression Analyses.............................................. 112...

  8. Apportionment of ambient primary and secondary fine particulate matter at the Pittsburgh National Energy Laboratory particulate matter characterization site using positive matrix factorization and a potential source contributions function analysis

    SciTech Connect (OSTI)

    Martello, D.V.; Pekney, N.J.; Anderson, R.R.; Davidson, C.I. (Carnegie Mellon U., Pittsburgh, PA); Hopke, P.K. (Clarkson University, Potsdam, NY); Kim, E. (Clarkson University, Potsdam, NY); Christensen, W.F. (Brigham Young Univ., Provo, UT); Mangelson, N.F. (Brigham Young Univ., Provo, UT); Eatough, D.J. (Brigham Young Univ., Provo, UT)

    2008-03-01T23:59:59.000Z

    Fine particulate matter (PM2.5) concentrations associated with 202 24-hr samples collected at the National Energy Technology Laboratory (NETL) particulate matter (PM) characterization site in south Pittsburgh from October 1999 through September 2001 were used to apportion PM2.5 into primary and secondary contributions using Positive Matrix Factorization (PMF2). Input included the concentrations of PM2.5 mass determined with a Federal Reference Method (FRM) sampler, semi-volatile PM2.5 organic material, elemental carbon (EC), and trace element components of PM2.5. A total of 11 factors were identified. The results of potential source contributions function (PSCF) analysis using PMF2 factors and HYSPLIT-calculated back-trajectories were used to identify those factors associated with specific meteorological transport conditions. The 11 factors were identified as being associated with emissions from various specific regions and facilities including crustal material, gasoline combustion, diesel combustion, and three nearby sources high in trace metals. Three sources associated with transport from coal-fired power plants to the southeast, a combination of point sources to the northwest, and a steel mill and associated sources to the west were identified. In addition, two secondary-material-dominated sources were identified, one was associated with secondary products of local emissions and one was dominated by secondary ammonium sulfate transported to the NETL site from the west and southwest. Of these 11 factors, the four largest contributors to PM2.5 were the secondary transported material (dominated by ammonium sulfate) (47%), local secondary material (19%), diesel combustion emissions (10%), and gasoline combustion emissions (8%). The other seven factors accounted for the remaining 16% of the PM2.5 mass. The findings are consistent with the major source of PM2.5 in the Pittsburgh area being dominated by ammonium sulfate from distant transport and so decoupled from local activity emitting organic pollutants in the metropolitan area. In contrast, the major local secondary sources are dominated by organic material.

  9. Apportionment of ambient primary and secondary fine particulate matter at the Pittsburgh National Energy Laboratory particulate matter characterization site using positive matrix factorization and a potential source contributions function analysis

    SciTech Connect (OSTI)

    Martello, DV [Martello, Donald V.; Pekney, NJ [Pekney, Natalie J.; Anderson, RR [Anderson, Richard; R,; Davidson, CI [Davidson, Cliff I.; Hopke, PK [Hopke, Philip K.; Kim, E [Kim, Eugene; Christensen, WF; (Christensen, William F.); Mangelson, NF [Mangelson, Nolan F.; Eatough, DJ [Eatough, Delbert J.

    2008-03-01T23:59:59.000Z

    Fine particulate matter (PM2.5) concentrations associated with 202 24-hr amples collected at the National Energy Technology Laboratory (NETL) particulate matter (PM) characterization site in south Pittsburgh from October 1999 through September 2001 were used to apportion PM2.5 into primary and secondary contributions using Positive Matrix Factorization (PMF2). Input included the concentrations of PM2.5 mass determined with a Federal Reference Method (FRM) sampler, semi-volatile PM2.5, organic material, elemental carbon (EC), and trace element components of PM2.5. A total of 11 factors were identified. The results of potential source contributions function (PSCF) analysis using PMF2 factors and HYSPLIT-calculated back-trajectories were used to identify those factors associated with specific meteorological transport conditions. The 11 factors were identified as being associated with emissions from various specific regions and facilities including crustal material, gasoline combustion, diesel combustion, and three nearby sources high in trace metals. Three sources associated with transport from coal-fired power plants to the southeast, a combination of point sources to the northwest, and a steel mill and associated sources to the west were identified. In addition, two secondary-material-dominated sources were identified, one was associated with secondary products of local emissions and one was dominated by secondary ammonium sulfate transported to the NETL site from the west and southwest. Of these 11 factors, the four largest contributors to PM2.5, were the secondary transported material (dominated by ammonium sulfate) (47%), local secondary material (19%), diesel combustion emissions (10%), and gasoline combustion emissions (8%). The other seven factors accounted for the remaining 16% of the PM2.5 mass. The findings are consistent with the major source of PM2.5 in the Pittsburgh area being dominated by ammonium sulfate from distant transport and so decoupled from local activity emitting organic pollutants in the metropolitan area. In contrast, the major local secondary sources are dominated by organic material.

  10. Apportionment of Ambient Primary and Secondary Fine Particulate Matter at the Pittsburgh National Energy Laboratory Particulate Matter Characterization Site Using Positive Matrix Factorization and a Potential Source Contributions Function Analysis

    SciTech Connect (OSTI)

    Martello, Donald [National Energy Technology Lab. (NETL), Pittsburgh, PA, (United States); Pekney, Natalie [National Energy Technology Lab. (NETL), Pittsburgh, PA, (United States); Anderson, Richard [National Energy Technology Lab. (NETL), Pittsburgh, PA, (United States); Davidson, Cliff [Department of Civil and Environmental Engineering, Carnegie Mellon University, Pittsburgh, PA; Hopke, Philip [Clarkson Univ., Potsdam, NY (United States). Center for Air Resources Engineering and Science, and Dept. of Chemical Engineering; Kim, Eugene [Clarkson Univ., Potsdam, NY (United States). Center for Air Resources Engineering and Science, and Dept. of Chemical Engineering; Christensen, William [Brigham Young Univ., Provo, UT (United States). Dept. of Statistics; Mangelson, Nolan [Brigham Young Univ., Provo, UT (United States). Dept. of Chemistry and Biochemistry; Eatough, Delbert [Brigham Young Univ., Provo, UT (United States). Dept. of Chemistry and Biochemistry

    2008-03-01T23:59:59.000Z

    Fine particulate matter (PM2.5) concentrations associated with 202 24-hr samples collected at the National Energy Technology Laboratory (NETL) particulate matter (PM) characterization site in south Pittsburgh from October 1999 through September 2001 were used to apportion PM2.5 into primary and secondary contributions using Positive Matrix Factorization (PMF2). Input included the concentrations of PM2.5 mass determined with a Federal Reference Method (FRM) sampler, semi-volatile PM2.5, organic material, elemental carbon (EC), and trace element components of PM2.5. A total of 11 factors were identified. The results of potential source contributions function (PSCF) analysis using PMF2 factors and HYSPLIT-calculated back-trajectories were used to identify those factors associated with specific meteorological transport conditions. The 11 factors were identified as being associated with emissions from various specific regions and facilities including crustal material, gasoline combustion, diesel combustion, and three nearby sources high in trace metals. Three sources associated with transport from coal-fired power plants to the southeast, a combination of point sources to the northwest, and a steel mill and associated sources to the west were identified. In addition, two secondary-material-dominated sources were identified, one was associated with secondary products of local emissions and one was dominated by secondary ammonium sulfate transported to the NETL site from the west and southwest. Of these 11 factors, the four largest contributors to PM2.5, were the secondary transported material (dominated by ammonium sulfate) (47%), local secondary material (19%), diesel combustion emissions (10%), and gasoline combustion emissions (8%). The other seven factors accounted for the remaining 16% of the PM2.5 mass. The findings are consistent with the major source of PM2.5 in the Pittsburgh area being dominated by ammonium sulfate from distant transport and so decoupled from local activity emitting organic pollutants in the metropolitan area. In contrast, the major local secondary sources are dominated by organic material.

  11. Vacancy -Soil Science Climate change is a key challenge for both, science and society. The Cluster of Excellence

    E-Print Network [OSTI]

    Hamburg,.Universität

    1 Vacancy - Soil Science Climate change is a key challenge for both, science and society/in) with a strong background in Soil Science or terrestrial Biogeochemistry The successful applicant will study/she will conduct laboratory analysis, field research on permafrost soils and GIS analysis in thermokarst landscapes

  12. Provably-Secure Authenticated Group Diffie-Hellman KeyExchange

    SciTech Connect (OSTI)

    Bresson, Emmanuel; Chevassut, Olivier; Pointcheval, David

    2007-01-01T23:59:59.000Z

    Authenticated key exchange protocols allow two participantsA and B, communicating over a public network and each holding anauthentication means, to exchange a shared secret value. Methods designedto deal with this cryptographic problem ensure A (resp. B) that no otherparticipants aside from B (resp. A) can learn any information about theagreed value, and often also ensure A and B that their respective partnerhas actually computed this value. A natural extension to thiscryptographic method is to consider a pool of participants exchanging ashared secret value and to provide a formal treatment for it. Startingfrom the famous 2-party Diffie-Hellman (DH) key exchange protocol, andfrom its authenticated variants, security experts have extended it to themulti-party setting for over a decade and completed a formal analysis inthe framework of modern cryptography in the past few years. The presentpaper synthesizes this body of work on the provably-secure authenticatedgroup DH key exchange.

  13. QKD with finite resources: secret key rates via Rényi entropies

    E-Print Network [OSTI]

    Silvestre Abruzzo; Hermann Kampermann; Markus Mertz; Dagmar Bruß

    2011-05-27T23:59:59.000Z

    A realistic Quantum Key Distribution (QKD) protocol necessarily deals with finite resources, such as the number of signals exchanged by the two parties. We derive a bound on the secret key rate which is expressed as an optimization problem over R\\'enyi entropies. Under the assumption of collective attacks by an eavesdropper, a computable estimate of our bound for the six-state protocol is provided. This bound leads to improved key rates in comparison to previous results.

  14. Technique for information retrieval using enhanced latent semantic analysis generating rank approximation matrix by factorizing the weighted morpheme-by-document matrix

    DOE Patents [OSTI]

    Chew, Peter A; Bader, Brett W

    2012-10-16T23:59:59.000Z

    A technique for information retrieval includes parsing a corpus to identify a number of wordform instances within each document of the corpus. A weighted morpheme-by-document matrix is generated based at least in part on the number of wordform instances within each document of the corpus and based at least in part on a weighting function. The weighted morpheme-by-document matrix separately enumerates instances of stems and affixes. Additionally or alternatively, a term-by-term alignment matrix may be generated based at least in part on the number of wordform instances within each document of the corpus. At least one lower rank approximation matrix is generated by factorizing the weighted morpheme-by-document matrix and/or the term-by-term alignment matrix.

  15. Sandia Energy - Direct Measurement of Key Molecule Will Increase...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Direct Measurement of Key Molecule Will Increase Accuracy of Combustion Models Home Energy Transportation Energy CRF Facilities News News & Events Computational Modeling &...

  16. Key Practical Issues in Strengthening Safety Culture, INSAG-15

    Broader source: Energy.gov [DOE]

    Key Pratical Issues in Strengthening Safety Culture, INSAG-15. A report by the International Nuclear Safety Advisory Gorup, International Atomic Energy Agency, Vienna, 2002.

  17. MasterKey Cryptosystems AT&T Bell Labs

    E-Print Network [OSTI]

    Blaze, Matthew

    then be converted to a stream­ cipher via one of the usual block­chaining methods). We use the public­key encryption

  18. Pantex Plant Achieves Key Safety Milestone Ahead of Schedule...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Achieves Key Safety Milestone Ahead of Schedule | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

  19. Key Parameters Affecting DPF Performance Degradation and Impact...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Parameters Affecting DPF Performance Degradation and Impact on Lifetime Fuel Economy Key Parameters Affecting DPF Performance Degradation and Impact on Lifetime Fuel Economy...

  20. Sierra Geothermal's Key Find in Southern Nevada | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Geothermal's Key Find in Southern Nevada July 13, 2010 - 5:17pm Addthis Sierra Geothermal discovered temperatures hot enough for large-scale geothermal energy production at...

  1. Climate Action Planning: A Review of Best Practices, Key Elements...

    Open Energy Info (EERE)

    Planning: A Review of Best Practices, Key Elements, and Common Climate Strategies for Signatories to the American College & University Presidents' Climate Commitment Jump to:...

  2. Key Facts about the Biosciences Division | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    to understand biological mechanisms relevant to bioremediation, climate change, energy production, and the protection of human health. BiosciencesDivisionKeyFactsOct20...

  3. Water dynamics clue to key residues in protein folding

    SciTech Connect (OSTI)

    Gao, Meng [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Zhu, Huaiqiu, E-mail: hqzhu@pku.edu.cn [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Yao, Xin-Qiu [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China) [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Department of Biophysics, Kyoto University, Sakyo Kyoto 606-8502 (Japan); She, Zhen-Su, E-mail: she@pku.edu.cn [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)

    2010-01-29T23:59:59.000Z

    A computational method independent of experimental protein structure information is proposed to recognize key residues in protein folding, from the study of hydration water dynamics. Based on all-atom molecular dynamics simulation, two key residues are recognized with distinct water dynamical behavior in a folding process of the Trp-cage protein. The identified key residues are shown to play an essential role in both 3D structure and hydrophobic-induced collapse. With observations on hydration water dynamics around key residues, a dynamical pathway of folding can be interpreted.

  4. PPPL physicists win supercomputing time to simulate key energy...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    PPPL physicists win supercomputing time to simulate key energy and astrophysical phenomena By John Greenwald January 8, 2013 Tweet Widget Google Plus One Share on Facebook A...

  5. An Integrated Suite of Tools to support Human Factors Engineering

    SciTech Connect (OSTI)

    Jacques V Hugo

    2001-08-01T23:59:59.000Z

    Human Factors Engineering (HFE) work for the nuclear industry imposes special demands on the practitioner in terms of the scope, complexity and safety requirements for humans in nuclear installations. Unfortunately HFE lags behind other engineering disciplines in the development and use of modern, powerful tools for the full range of analysis and design processes. HFE does not appear to be an attractive market for software and hardware developers and as a result, HFE practitioners usually have to rely on inefficient general-purpose tools like standard office software, or they have to use expensive special-purpose tools that offer only part of the solution they require and which also do not easily integrate with other tools. There have been attempts to develop generic software tools to support the HFE analyst and also to achieve some order and consistency in format and presentation. However, in spite of many years of development, very few tools have emerged that have achieved these goals. This would suggest the need for special tools, but existing commercial products have been found inadequate and to date not a single tool has been developed that adequately supports the special requirements of HFE work for the nuclear industry. This paper describes an integrated suite of generic as well as purpose-built tools that facilitate information solicitation, issues tracking, work domain analysis, functional requirements analysis, function allocation, operational sequence analysis, task analysis and development of HSI design requirements. In combination, this suite of tools supports the analytical as well as the representational aspects of key HFE activities primarily for new NPPs, including capturing information from subject matter experts and various source documents directly into the appropriate tool and then linking, analyzing and extending that information further to represent detailed functional and task information, and ultimately HSI design requirements. The paper also describes a tool developed especially for functional requirements analysis, function allocation, and task analysis.

  6. Structural and functional analysis of the interaction between the nucleoporin Nup98 and the mRNA export factor Rae1

    SciTech Connect (OSTI)

    Ren, Yi; Seo, Hyuk-Soo; Blobel, Günter; Hoelz, André (Rockefeller)

    2010-07-23T23:59:59.000Z

    The export of mRNAs is a multistep process, involving the packaging of mRNAs into messenger ribonucleoprotein particles (mRNPs), their transport through nuclear pore complexes, and mRNP remodeling events prior to translation. Ribonucleic acid export 1 (Rae1) and Nup98 are evolutionarily conserved mRNA export factors that are targeted by the vesicular stomatitis virus matrix protein to inhibit host cell nuclear export. Here, we present the crystal structure of human Rae1 in complex with the Gle2-binding sequence (GLEBS) of Nup98 at 1.65 {angstrom} resolution. Rae1 forms a seven-bladed {beta}-propeller with several extensive surface loops. The Nup98 GLEBS motif forms an {approx} 50-{angstrom}-long hairpin that binds with its C-terminal arm to an essentially invariant hydrophobic surface that extends over the entire top face of the Rae1 {beta}-propeller. The C-terminal arm of the GLEBS hairpin is necessary and sufficient for Rae1 binding, and we identify a tandem glutamate element in this arm as critical for complex formation. The Rae1 {center_dot} Nup98{sup GLEBS} surface features an additional conserved patch with a positive electrostatic potential, and we demonstrate that the complex possesses single-stranded RNA-binding capability. Together, these data suggest that the Rae1 {center_dot} Nup98 complex directly binds to the mRNP at several stages of the mRNA export pathway.

  7. Structural analysis of the Sil1-Bip complex reveals the mechanism for Sil1 to function as a nucleotide-exchange factor

    SciTech Connect (OSTI)

    Yan, Ming; Li, Jingzhi; Sha, Bingdong (UAB)

    2013-01-16T23:59:59.000Z

    Sil1 functions as a NEF (nucleotide-exchange factor) for the ER (endoplasmic reticulum) Hsp70 (heat-shock protein of 70 kDa) Bip in eukaryotic cells. Sil1 may catalyse the ADP release from Bip by interacting directly with the ATPase domain of Bip. In the present study we show the complex crystal structure of the yeast Bip and the NEF Sil1 at the resolution of 2.3 {angstrom} (1 {angstrom} = 0.1 nm). In the Sil1-Bip complex structure, the Sil1 molecule acts as a 'clamp' which binds lobe IIb of the Bip ATPase domain. The binding of Sil1 causes the rotation of lobe IIb {approx} 13.5{sup o} away from the ADP-binding pocket. The complex formation also induces lobe Ib to swing in the opposite direction by {approx} 3.7{sup o}. These conformational changes open up the nucleotide-binding pocket in the Bip ATPase domain and disrupt the hydrogen bonds between Bip and bound ADP, which may catalyse ADP release. Mutation of the Sil1 residues involved in binding the Bip ATPase domain compromise the binding affinity of Sil1 to Bip, and these Sil1 mutants also abolish the ability to stimulate the ATPase activity of Bip.

  8. Public Key Encryption that Allows PIR Queries Eyal Kushilevitz

    E-Print Network [OSTI]

    Public Key Encryption that Allows PIR Queries Dan Boneh Eyal Kushilevitz Rafail Ostrovsky William E to create a public- key encryption scheme for Alice that allows PIR searching over encrypted documents. Our allows for Single-Database PIR writing with sublinear communication complexity, which we consider

  9. Public Key Encryption that Allows PIR Queries Eyal Kushilevitz

    E-Print Network [OSTI]

    Ostrovsky, Rafail

    Public Key Encryption that Allows PIR Queries Dan Boneh Eyal Kushilevitz Rafail Ostrovsky William E. In this paper, we show how to create a public-key encryption scheme for Alice that allows PIR searching over allows for Single-Database PIR writing with sublinear communication complexity, which we consider

  10. Key ornamental innovations facilitate diversification in an avian radiation

    E-Print Network [OSTI]

    Rubenstein, Dustin R.

    Key ornamental innovations facilitate diversification in an avian radiation Rafael Maiaa,1 , Dustin novel ways of interacting with the en- vironment (key innovations) play a fundamental role in promoting evolution of orna- mental traits. Because selection can operate only on existing vari- ation, the tendency

  11. Energy Security: A Key Requirement forSustainable Development

    E-Print Network [OSTI]

    1 Energy Security: A Key Requirement forSustainable Development Perspective and Action Plan Robert Card Under Secretary US Department of Energy August 30, 2002 Session One: Maintaining Energy Security WSSD Side Event Energy for Sustainable Development IEA/UNEP/Eskom #12;2 Energy Security is a Key

  12. Reflective cracking of shear keys in multi-beam bridges

    E-Print Network [OSTI]

    Sharpe, Graeme Peter

    2009-06-02T23:59:59.000Z

    ..............................................2 Figure 2: PCI 33? Box Girder with Shear Keys................................................................5 Figure 3: TxDOT 34? Box Girder with Shear Keys .........................................................5 Figure 4: Test Specimen... Under Tension.........................................................................12 Figure 5: Test Specimen in Bending ...............................................................................12 Figure 6: Test Specimen in Shear...

  13. USB KEY PROFILE MANAGER FOR MOZILLA A Project Report

    E-Print Network [OSTI]

    Pollett, Chris

    USB KEY PROFILE MANAGER FOR MOZILLA A Project Report Presented to The Faculty of the Department FOR THE UNIVERSITY _____________________________________________________ 3 #12;ABSTRACT USB KEY PROFILE MANAGER FOR MOZILLA By Yun Zhou Mozilla's profile manager allows users to save their private information

  14. Secret-Key Generation using Correlated Sources and Channels

    E-Print Network [OSTI]

    Khisti, Ashish

    1 Secret-Key Generation using Correlated Sources and Channels Ashish Khisti, Member, IEEE of generating a shared secret key between two terminals in a joint source-channel setup -- the terminals to correlated discrete memoryless source sequences. We establish lower and upper bounds on the secret

  15. Hybrid Secret Key Escrow Mechanisms as Counters Esa Hyytia

    E-Print Network [OSTI]

    Hyytiä, Esa

    Hybrid Secret Key Escrow Mechanisms as Counters Esa Hyyti¨a Telecommunications Research Center can be used in several ways. One interesting application of the Shamir's secret sharing scheme in the context of privacy aware traffic monitoring is to escrow a secret key after m suspicious events have been

  16. accident conditions key: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    accident conditions key First Page Previous Page 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Next Page Last Page Topic Index 1 Range Condition: Key to...

  17. The ISO/NASA Key Project on AGN Spectral Energy Distributions (Characteristics of the ISO Data)

    E-Print Network [OSTI]

    Eric J. Hooper; Belinda J. Wilkes; Kim K. McLeod; Martin S. Elvis; Chris D. Impey; Carol J. Lonsdale; Matt A. Malkan; Jonathan C. McDowell

    1999-02-05T23:59:59.000Z

    The U.S. ISO Key Project on quasar spectral energy distributions seeks to better understand the very broad-band emission features of quasars from radio to X-rays. A key element of this project is observations of 72 quasars with the ISOPHOT instrument at 8 bands, from 5 to 200 microns. The sample was chosen to span a wide range of redshifts and quasar types. This paper presents an overview of the analysis and reduction techniques, as well as general trends within the data set (comparisons with IRAS fluxes, uncertainties as a function of background sky brightness, and an analysis of vignetting corrections in chopped observing mode). A more detailed look at a few objects in the sample is presented in Wilkes et al. 1999, astro-ph/9902084.

  18. ON THE GAGE FACTOR FOR OPTICAL FIBER GRATING STRAIN GAGES

    E-Print Network [OSTI]

    Park, Yong-Lae

    ON THE GAGE FACTOR FOR OPTICAL FIBER GRATING STRAIN GAGES Richard J. Black1 , David Zare1 , Levy Oblea1 , Yong-Lae Park1 , Behzad Moslehi1 , and Craig Neslen2 1 Intelligent Fiber Optic Systems of grating and fiber types. KEY WORDS: Fiber-Optic Gratings, Fiber-Optic Sensors, Strain Gage Factor 1

  19. Initial Risk Analysis and Decision Making Framework

    SciTech Connect (OSTI)

    Engel, David W.

    2012-02-01T23:59:59.000Z

    Commercialization of new carbon capture simulation initiative (CCSI) technology will include two key elements of risk management, namely, technical risk (will process and plant performance be effective, safe, and reliable) and enterprise risk (can project losses and costs be controlled within the constraints of market demand to maintain profitability and investor confidence). Both of these elements of risk are incorporated into the risk analysis subtask of Task 7. Thus far, this subtask has developed a prototype demonstration tool that quantifies risk based on the expected profitability of expenditures when retrofitting carbon capture technology on a stylized 650 MW pulverized coal electric power generator. The prototype is based on the selection of specific technical and financial factors believed to be important determinants of the expected profitability of carbon capture, subject to uncertainty. The uncertainty surrounding the technical performance and financial variables selected thus far is propagated in a model that calculates the expected profitability of investments in carbon capture and measures risk in terms of variability in expected net returns from these investments. Given the preliminary nature of the results of this prototype, additional work is required to expand the scope of the model to include additional risk factors, additional information on extant and proposed risk factors, the results of a qualitative risk factor elicitation process, and feedback from utilities and other interested parties involved in the carbon capture project. Additional information on proposed distributions of these risk factors will be integrated into a commercial implementation framework for the purpose of a comparative technology investment analysis.

  20. Apparatus, system, and method for synchronizing a timer key

    DOE Patents [OSTI]

    Condit, Reston A; Daniels, Michael A; Clemens, Gregory P; Tomberlin, Eric S; Johnson, Joel A

    2014-04-22T23:59:59.000Z

    A timer key relating to monitoring a countdown time of a countdown routine of an electronic device is disclosed. The timer key comprises a processor configured to respond to a countdown time associated with operation of the electronic device, a display operably coupled with the processor, and a housing configured to house at least the processor. The housing has an associated structure configured to engage with the electronic device to share the countdown time between the electronic device and the timer key. The processor is configured to begin a countdown routine based at least in part on the countdown time, wherein the countdown routine is at least substantially synchronized with a countdown routine of the electronic device when the timer key is removed from the electronic device. A system and method for synchronizing countdown routines of a timer key and an electronic device are also disclosed.

  1. Practical issues in quantum-key-distribution postprocessing

    SciTech Connect (OSTI)

    Fung, C.-H. Fred; Chau, H. F. [Department of Physics and Center of Theoretical and Computational Physics, University of Hong Kong, Pokfulam Road (Hong Kong); Ma Xiongfeng [Institute for Quantum Computing and Department of Physics and Astronomy, University of Waterloo, 200 University Ave W., Waterloo, Ontario, Canada N2L 3G1 (Canada)

    2010-01-15T23:59:59.000Z

    Quantum key distribution (QKD) is a secure key generation method between two distant parties by wisely exploiting properties of quantum mechanics. In QKD, experimental measurement outcomes on quantum states are transformed by the two parties to a secret key. This transformation is composed of many logical steps (as guided by security proofs), which together will ultimately determine the length of the final secret key and its security. We detail the procedure for performing such classical postprocessing taking into account practical concerns (including the finite-size effect and authentication and encryption for classical communications). This procedure is directly applicable to realistic QKD experiments and thus serves as a recipe that specifies what postprocessing operations are needed and what the security level is for certain lengths of the keys. Our result is applicable to the BB84 protocol with a single or entangled photon source.

  2. Background Bayes Factor Simulation Study BF And PPP Using Bayes Factors for Model Selection in

    E-Print Network [OSTI]

    Wolfe, Patrick J.

    Background Bayes Factor Simulation Study BF And PPP Using Bayes Factors for Model Selection in High Study BF And PPP Model Comparison in Astrophysics Nested models (line detection in spectral analysis" to formally compare or select a model. #12;Background Bayes Factor Simulation Study BF And PPP Spectral

  3. Power Factor Compensation (PFC) Power Factor Compensation

    E-Print Network [OSTI]

    Knobloch,Jürgen

    Power Factor Compensation (PFC) Power Factor Compensation The power factor (PF) is defined as the ratio between the active power and the apparent power of a system. If the current and voltage are periodic with period , and [ ), then the active power is defined by ( ) ( ) (their inner product

  4. Regulation of vascular endothelial growth factor receptor-2 in pancreatic and breast cancer cells by Sp proteins 

    E-Print Network [OSTI]

    Higgins, Kelly Jean

    2007-09-17T23:59:59.000Z

    Vascular endothelial growth factor receptor-2 (VEGFR2) is a key angiogenic factor, and angiogenesis is an important physiological process associated with neovascularization, growth, and metastasis of many different tumors. The mechanism of VEGFR2...

  5. Daylight quantum key distribution over 1.6 km

    E-Print Network [OSTI]

    Buttler, W T; Lamoreaux, S K; Morgan, G L; Nordholt, J E; Peterson, C G

    2000-01-01T23:59:59.000Z

    Quantum key distribution (QKD) has been demonstrated over a point-to-point transmission distance brings QKD a step closer to surface-to-satellite and other long-distance applications.

  6. Reactive Support and Voltage Control Service: Key Issues and Challenges

    E-Print Network [OSTI]

    Gross, George

    reactive support and voltage control services. Keywords ­ Competitive Electricity Markets, Reactive PowerReactive Support and Voltage Control Service: Key Issues and Challenges George Gross^, Paolo Marannino° and Gianfranco Chicco* ^ Department of Electrical and Computer Engineering, University

  7. Detailed Description of Key NIF Milestones for NNSA Description

    E-Print Network [OSTI]

    1 Detailed Description of Key NIF Milestones for NNSA Short Description NIC EP Rev 4.0 Approved = Milestone Reporting Tool, which NNSA uses to support quarterly status reporting of NIC Level 1-2 milestones

  8. Intelligence perfecting the mute keys: Edgar Bowers and Music

    E-Print Network [OSTI]

    Smith, Kevin

    2003-01-01T23:59:59.000Z

    a Generation Know Its Story: The Edgar Bowers Conference andperfecting the mute keys: Edgar Bowers and Music” by C.and model for the poetry of Edgar Bowers. From his earliest

  9. Security bounds for efficient decoy-state quantum key distribution

    E-Print Network [OSTI]

    Marco Lucamarini; James F. Dynes; Bernd Fröhlich; Zhiliang Yuan; Andrew J. Shields

    2015-03-25T23:59:59.000Z

    Information-theoretical security of quantum key distribution (QKD) has been convincingly proven in recent years and remarkable experiments have shown the potential of QKD for real world applications. Due to its unique capability of combining high key rate and security in a realistic finite-size scenario, the efficient version of the BB84 QKD protocol endowed with decoy states has been subject of intensive research. Its recent experimental implementation finally demonstrated a secure key rate beyond 1 Mbps over a 50 km optical fiber. However the achieved rate holds under the restrictive assumption that the eavesdropper performs collective attacks. Here, we review the protocol and generalize its security. We exploit a map by Ahrens to rigorously upper bound the Hypergeometric distribution resulting from a general eavesdropping. Despite the extended applicability of the new protocol, its key rate is only marginally smaller than its predecessor in all cases of practical interest.

  10. Efficiency in Quantum Key Distribution Protocols using entangled Gaussian states

    E-Print Network [OSTI]

    Carles Rodó

    2010-05-14T23:59:59.000Z

    Efficiency is a key issue in any real implementation of a cryptographic protocol since the physical resources are not unlimited. We will first show that Quantum Key Distribution is possible with an "Entanglement based" scheme with NPPT symmetric Gaussian states in spite of the fact that these systems cannot be distilled with Gaussian operations (they are all bound entangled). In this work we analyze the secrecy properties of Gaussian states under Gaussian operations. Although such operations are useless for quantum distillation, we prove that it is possible to distill efficiently a secret key secure against finite coherent attacks from sufficiently entangled Gaussian states with non-positive partial transposition. Moreover, all such states allow for efficient key distillation, when the eavesdropper is assumed to perform individual attacks before in an efficient way.

  11. Secret-Key Generation Using Correlated Sources and Channels

    E-Print Network [OSTI]

    Khisti, Ashish

    We study the secret-key capacity in a joint source-channel coding setup-the terminals are connected over a discrete memoryless channel and have access to side information, modelled as a pair of discrete memoryless source ...

  12. A Key Target for Diabetes Drugs | Advanced Photon Source

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    2001 | 2000 | 1998 | Subscribe to APS Science Highlights rss feed A Key Target for Diabetes Drugs JULY 26, 2013 Bookmark and Share The structure of the human glucagon receptor,...

  13. Platforms and Methods for Acoustic Detection and Monitoring of Key

    E-Print Network [OSTI]

    Hawai'i at Manoa, University of

    #12;Platforms and Methods for Acoustic Detection and Monitoring of Key Ecosystem Properties Nils Olav Handegard #12;· Introduction · Platforms carrying acoustics · Methods · Applications ­ What we have done · Applications ­ What we would like to do #12;· Introduction · Platforms carrying acoustics

  14. W-like bound entangled states and secure key distillation

    E-Print Network [OSTI]

    Remigiusz Augusiak; Pawel Horodecki

    2009-09-09T23:59:59.000Z

    We construct multipartite entangled states with underlying W-type structure satisfying positive partial transpose (PPT) condition under any (N-1)|1 partition. Then we show how to distill N-partite secure key form the states using two different methods: direct application of local filtering and novel random key distillation scheme in which we adopt the idea form recent results on entanglement distillation. Open problems and possible implications are also discussed.

  15. Security of quantum key distribution with arbitrary individual imperfections

    E-Print Network [OSTI]

    Øystein Marøy; Lars Lydersen; Johannes Skaar

    2010-06-01T23:59:59.000Z

    We consider the security of the Bennett-Brassard 1984 (BB84) protocol for Quantum Key Distribution (QKD), with arbitrary individual imperfections simultaneously in the source and detectors. We provide the secure key generation rate, and show that only two parameters must be bounded to ensure security; the basis dependence of the source and a detector blinding parameter. The system may otherwise be completely uncharacterized and contain large losses.

  16. Quantum Public-Key Encryption with Information Theoretic Security

    E-Print Network [OSTI]

    Jiangyou Pan; Li Yang

    2012-02-20T23:59:59.000Z

    We propose a definition for the information theoretic security of a quantum public-key encryption scheme, and present bit-oriented and two-bit-oriented encryption schemes satisfying our security definition via the introduction of a new public-key algorithm structure. We extend the scheme to a multi-bitoriented one, and conjecture that it is also information theoretically secure, depending directly on the structure of our new algorithm.

  17. Securing a Quantum Key Distribution Network Using Secret Sharing

    E-Print Network [OSTI]

    Barnett, Stephen M

    2012-01-01T23:59:59.000Z

    We present a simple new technique to secure quantum key distribution relay networks using secret sharing. Previous techniques have relied on creating distinct physical paths in order to create the shares. We show, however, how this can be achieved on a single physical path by creating distinct logical channels. The technique utilizes a random 'drop-out' scheme to ensure that an attacker must compromise all of the relays on the channel in order to access the key.

  18. Passive decoy-state quantum key distribution with practical light sources

    SciTech Connect (OSTI)

    Curty, Marcos [ETSI Telecomunicacion, Department of Signal Theory and Communications, University of Vigo, Campus Universitario, E-36310 Vigo (Pontevedra) (Spain); Ma, Xiongfeng [Institute for Quantum Computing and Department of Physics and Astronomy, University of Waterloo, N2L 3G1 Waterloo, Ontario (Canada); Qi, Bing [Center for Quantum Information and Quantum Control, Department of Physics and Department of Electrical and Computer Engineering, University of Toronto, M5S 3G4 Toronto, Ontario (Canada); Moroder, Tobias [Institute for Quantum Computing and Department of Physics and Astronomy, University of Waterloo, N2L 3G1 Waterloo, Ontario (Canada); Quantum Information Theory Group, Institute of Theoretical Physics I, University of Erlangen-Nuernberg, D-91058 Erlangen (Germany); Max Planck Institute for the Science of Light, D-91058 Erlangen (Germany)

    2010-02-15T23:59:59.000Z

    Decoy states have been proven to be a very useful method for significantly enhancing the performance of quantum key distribution systems with practical light sources. Although active modulation of the intensity of the laser pulses is an effective way of preparing decoy states in principle, in practice passive preparation might be desirable in some scenarios. Typical passive schemes involve parametric down-conversion. More recently, it has been shown that phase-randomized weak coherent pulses (WCP) can also be used for the same purpose [M. Curty et al., Opt. Lett. 34, 3238 (2009).] This proposal requires only linear optics together with a simple threshold photon detector, which shows the practical feasibility of the method. Most importantly, the resulting secret key rate is comparable to the one delivered by an active decoy-state setup with an infinite number of decoy settings. In this article we extend these results, now showing specifically the analysis for other practical scenarios with different light sources and photodetectors. In particular, we consider sources emitting thermal states, phase-randomized WCP, and strong coherent light in combination with several types of photodetectors, like, for instance, threshold photon detectors, photon number resolving detectors, and classical photodetectors. Our analysis includes as well the effect that detection inefficiencies and noise in the form of dark counts shown by current threshold detectors might have on the final secret key rate. Moreover, we provide estimations on the effects that statistical fluctuations due to a finite data size can have in practical implementations.

  19. A Review of Loss Mechanisms and Key Design Choices for High Intensity Hadron Rings

    SciTech Connect (OSTI)

    Warsop, C.M. [Rutherford Appleton Laboratory, Oxfordshire (United Kingdom)

    2005-06-08T23:59:59.000Z

    The peak performance reached in a high intensity ring is closely related to the ability to minimise and control beam loss. The need to increase intensity has to be balanced against possible increased induction of radioactivity and the risk of interrupted operations. Losses are dependent on many factors and influence most aspects of machine design. In principle, only one aspect of low loss design needs to be sub-optimal to impose severe intensity limitations. Here, an outline is given of the key factors that need to be considered, focussing primarily on low to medium energy proton machines. Topics include space charge, instabilities, electron effects, injection and main lattice choices. Finally, we note that major progress has been made in refining low loss designs but there is still important work to be done in predicting loss levels and distributions in detail.

  20. Unveiling Microbial Carbon Cycling Processes in Key U.S. Soils using “Omics”

    SciTech Connect (OSTI)

    Myrold, David D. [Oregon State University; Bottomely, Peter J. [Oregon State University; Jumpponen, Ari [Kansas State University; Rice, Charles W. [Kansas State University; Zeglin, Lydia H. [Kansas State University; David, Maude M. [Lawrence Berkeley National Laboratory; Jansson, Janet K. [Lawrence Berkeley National Laboratory; Prestat, Emmanuel [Lawrence Berkeley National Laboratory; Hettich, Robert L. [Oak Ridge National Laboratory

    2014-09-17T23:59:59.000Z

    Soils process and store large amounts of C; however, considerable uncertainty still exists about the details of that influence microbial partitioning of C into soil C pools, and what are the main influential forces that control the fraction of the C input that is stabilized. The soil microbial community is genotypically and phenotypically diverse. Despite our ability to predict the kinds of regional environmental changes that will accompany global climate change, it is not clear how the microbial community will respond to climate-induced modification of precipitation and inter-precipitation intervals, and if this response will affect the fate of C deposited into soil by the local plant community. Part of this uncertainty lies with our ignorance of how the microbial community adapts genotypically and physiologically to changes in soil moisture brought about by shifts in precipitation. Our overarching goal is to harness the power of multiple meta-omics tools to gain greater understanding of the functioning of whole-soil microbial communities and their role in C cycling. We will do this by meeting the following three objectives: 1. Further develop and optimize a combination of meta-omics approaches to study how environmental factors affect microbially-mediated C cycling processes. 2. Determine the impacts of long-term changes in precipitation timing on microbial C cycling using an existing long-term field manipulation of a tallgrass prairie soil. 3. Conduct laboratory experiments that vary moisture and C inputs to confirm field observations of the linkages between microbial communities and C cycling processes. We took advantage of our state-of-the-art expertise in community “omics” to better understand the functioning soil C cycling within the Great Prairie ecosystem, including our ongoing Konza Prairie soil metagenome flagship project at JGI and the unique rainfall manipulation plots (RaMPs) established at this site more than a decade ago. We employed a systems biology approach, considering the complex soil microbial community as a functioning system and using state-of-the-art metatranscriptomic, metaproteomic, and metabolomic approaches. These omics tools were refined, applied to field experiments, and confirmed with controlled laboratory studies. Our experiments were designed to specifically identify microbial community members and processes that are instrumental players in processing of C in the prairie soils and how these processes are impacted by wetting and drying events. This project addresses a key ecosystem in the United States that current climate models predict will be subjected to dramatic changes in rainfall patterns as a result of global warming. Currently Mollisols, such as those of the tallgrass prairie, are thought to sequester more C than is released into the atmosphere, but it is not known what changes in rainfall patterns will have on future C fluxes. Through an analysis of the molecular response of the soil microbial community to shifts in precipitation cycles that are accompanied by phenologically driven changes in quality of plant C rhizodeposits, we gained deeper insight into how the metabolism of microbes has adapted to different precipitation regimes and the impact of this adaption on the fate of C deposited into soil. In doing so, we addressed key questions about the microbial cycling of C in soils that have been identified by the DOE.

  1. EVALUATING NATIONAL ENVIRONMENTAL SUSTAINABILITY: PERFORMANCE MEASURES AND INFLUENTIAL FACTORS FOR

    E-Print Network [OSTI]

    development, industrial structure, energy prices, environmental governance, pollution abatement and control, environmental governance, and energy prices are major influential factors, with energy prices the most important components factor analysis to help build subindices measuring waste and pollution, sustainable energy

  2. Grid Parity for Residential Photovoltaics in the United States: Key Drivers and Sensitivities; Preprint

    SciTech Connect (OSTI)

    Ong, S.; Denholm, P.; Clark, N.

    2012-08-01T23:59:59.000Z

    In this report, we analyze PV break-even costs for U.S. residential customers. We evaluate some key drivers of grid parity both regionally and over time. We also examine the impact of moving from flat to time-of-use (TOU) rates, and we evaluate individual components of the break-even cost, including effect of rate structure and various incentives. Finally, we examine how PV markets might evolve on a regional basis considering the sensitivity of the break-even cost to four major drivers: technical performance, financing parameters, electricity prices and rates, and policies. We find that electricity price rather than technical parameters are in general the key drivers of the break-even cost of PV. Additionally, this analysis provides insight about the potential viability of PV markets.

  3. Energy Price Indices and Discount Factors for Life-Cycle Cost...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0 Energy Price Indices and Discount Factors for Life-Cycle Cost Analysis - 2010 Report describes the 2010 edition of energy price indices and discount factors for performing...

  4. Connate Water Saturation -Irreducible or Not: the Key to Reliable Hydraulic Rock Typing in Reservoirs Straddling Multiple Capillary Windows

    E-Print Network [OSTI]

    Torres-Verdín, Carlos

    of flow capacity. High in-situ capillary pressure causes connate water saturation in reservoir rocks petrophysical analysis based solely on conventional logs, including gamma ray, neutron porosity, bulk densitySPE 166082 Connate Water Saturation - Irreducible or Not: the Key to Reliable Hydraulic Rock Typing

  5. Transportation Energy Futures: Key Opportunities and Tools for Decision Makers (Brochure)

    SciTech Connect (OSTI)

    Not Available

    2012-12-01T23:59:59.000Z

    The Transportation Energy Futures (TEF) project examines underexplored greenhouse gas-abatement and oil-savings opportunities by consolidating transportation energy knowledge, conducting advanced analysis, and exploring additional opportunities for sound strategic action. Led by NREL, in collaboration with Argonne National Laboratory, the project's primary goal is to provide analysis to accompany DOE-EERE's long-term transportation energy planning by addressing high-priority questions, informing domestic decisions about transportation energy strategies, priorities, and investments. Research and analysis were conducted with an eye toward short-term actions that support long-term energy goals The project looks beyond technology to examine each key question in the context of the marketplace, consumer behavior, industry capabilities, and infrastructure. This updated fact sheet includes a new section on initial project findings.

  6. Assessment of International Work on Organizational Factors

    SciTech Connect (OSTI)

    Wall, Ian

    2002-06-01T23:59:59.000Z

    This report describes the concept of organizational factors and includes a consensus definition. It summarizes existing methods for assessing organizations from a safety culture perspective, for analyzing past incidents at plants to assess the role of safety culture, and for using such incident analysis to provide a database supporting organizational factors models. It describes existing methods that potentially could be extended to quantify organizational factors in a Probabilistic Safety Analysis. It concludes that no method is clearly superior for this purpose and recommends the organization of a workshop to clarify important issues prior to selecting a method.

  7. Potential Application Of Radionuclide Scaling Factors To High Level Waste Characterization

    SciTech Connect (OSTI)

    Reboul, S. H.

    2013-09-30T23:59:59.000Z

    Production sources, radiological properties, relative solubilities in waste, and laboratory analysis techniques for the forty-five radionuclides identified in Hanford?s Waste Treatment and Immobilization Plant (WTP) Feed Acceptance Data Quality Objectives (DQO) document are addressed in this report. Based on Savannah River Site (SRS) experience and waste characteristics, thirteen of the radionuclides are judged to be candidates for potential scaling in High Level Waste (HLW) based on the concentrations of other radionuclides as determined through laboratory measurements. The thirteen radionuclides conducive to potential scaling are: Ni-59, Zr-93, Nb-93m, Cd-113m, Sn-121m, Sn-126, Cs-135, Sm-151, Ra-226, Ra-228, Ac-227, Pa-231, and Th-229. The ability to scale radionuclides is useful from two primary perspectives: 1) it provides a means of checking the radionuclide concentrations that have been determined by laboratory analysis; and 2) it provides a means of estimating radionuclide concentrations in the absence of a laboratory analysis technique or when a complex laboratory analysis technique fails. Along with the rationale for identifying and applying the potential scaling factors, this report also provides examples of using the scaling factors to estimate concentrations of radionuclides in current SRS waste and into the future. Also included in the report are examples of independent laboratory analysis techniques that can be used to check results of key radionuclide analyses. Effective utilization of radionuclide scaling factors requires understanding of the applicable production sources and the chemistry of the waste. As such, the potential scaling approaches identified in this report should be assessed from the perspective of the Hanford waste before reaching a decision regarding WTP applicability.

  8. Efficiency in Quantum Key Distribution Protocols with Entangled Gaussian States

    E-Print Network [OSTI]

    C. Rodó; O. Romero-Isart; K. Eckert; A. Sanpera

    2007-03-21T23:59:59.000Z

    Quantum key distribution (QKD) refers to specific quantum strategies which permit the secure distribution of a secret key between two parties that wish to communicate secretly. Quantum cryptography has proven unconditionally secure in ideal scenarios and has been successfully implemented using quantum states with finite (discrete) as well as infinite (continuous) degrees of freedom. Here, we analyze the efficiency of QKD protocols that use as a resource entangled gaussian states and gaussian operations only. In this framework, it has already been shown that QKD is possible (M. Navascu\\'es et al. Phys. Rev. Lett. 94, 010502 (2005)) but the issue of its efficiency has not been considered. We propose a figure of merit (the efficiency $E$) to quantify the number of classical correlated bits that can be used to distill a key from a sample of $N$ entangled states. We relate the efficiency of the protocol to the entanglement and purity of the states shared between the parties.

  9. Field Test of Measurement-Device-Independent Quantum Key Distribution

    E-Print Network [OSTI]

    Yan-Lin Tang; Hua-Lei Yin; Si-Jing Chen; Yang Liu; Wei-Jun Zhang; Xiao Jiang; Lu Zhang; Jian Wang; Li-Xing You; Jian-Yu Guan; Dong-Xu Yang; Zhen Wang; Hao Liang; Zhen Zhang; Nan Zhou; Xiongfeng Ma; Teng-Yun Chen; Qiang Zhang; Jian-Wei Pan

    2014-08-11T23:59:59.000Z

    A main type of obstacles of practical applications of quantum key distribution (QKD) network is various attacks on detection. Measurement-device-independent QKD (MDIQKD) protocol is immune to all these attacks and thus a strong candidate for network security. Recently, several proof-of-principle demonstrations of MDIQKD have been performed. Although novel, those experiments are implemented in the laboratory with secure key rates less than 0.1 bps. Besides, they need manual calibration frequently to maintain the system performance. These aspects render these demonstrations far from practicability. Thus, justification is extremely crucial for practical deployment into the field environment. Here, by developing an automatic feedback MDIQKD system operated at a high clock rate, we perform a field test via deployed fiber network of 30 km total length, achieving a 16.9 bps secure key rate. The result lays the foundation for a global quantum network which can shield from all the detection-side attacks.

  10. Conjugate Gradient Methods in Confirmatory Factor Analysis

    E-Print Network [OSTI]

    Jamshardian, Mortaza; Jennrich, Robert

    1993-01-01T23:59:59.000Z

    R. I. (1988), "Conjugate Gradient Methods in Confirmatoryapply generalized conjugate gradient methods in an attemptby used. The conjugate gradient method, which is simple and

  11. A Key to Common Caterpillar Pests of Vegetables 

    E-Print Network [OSTI]

    Sparks Jr., Alton N.; Liu, Tong-Xian

    2001-08-10T23:59:59.000Z

    of the head capsule. The proximity of the juncture of the adfrontal and epicranial sutures to the vertical triangle is used in separating armyworms and cutworms. Using the key The key will help you identify the most destructive and most com- mon caterpillar...; sp=spiracle Figure 3. Common arrangement of crochets on prolegs. A?complete circle B?semicircle C?two rows D?single row Figure 4. Head capsule of a caterpillar. vt=vertical triangle; epi=epicranial suture; adf=adfrontal suture 3 1 Body has numerous...

  12. BUSCH CAMPUS KEY PICK UP INSTRUCTIONS: ALL STUDENTS: ONLY YOU CAN PICK UP YOUR KEY. You will be required to present photo

    E-Print Network [OSTI]

    BUSCH CAMPUS KEY PICK UP INSTRUCTIONS: ALL STUDENTS: ONLY YOU CAN PICK UP YOUR KEY. You at the Housing and Residence Life Office, 581 Taylor Road, Busch Campus. If you are unable to pick up your key. _____________________________________________________________________________________ FIRST-YEAR STUDENTS MOVE-IN DAY KEY PICK UP BUSCH CAMPUS SATURDAY, AUGUST 28th 8:00 a.m. ­ 2:00 p

  13. Unconditional security of the Bennett 1992 quantum key-distribution scheme with strong reference pulse

    E-Print Network [OSTI]

    Kiyoshi Tamaki; Norbert Lütkenhaus; Masato Koashi; Jamie Batuwantudawe

    2009-09-03T23:59:59.000Z

    We prove the unconditional security of the original Bennett 1992 protocol with strong reference pulse. We show that we may place a projection onto suitably defined qubit spaces before the receiver, which makes the analysis as simple as qubit-based protocols. Unlike the single-photon-based qubits, the qubits identified in this scheme are almost surely detected by the receiver even after a lossy channel. This leads to the key generation rate that is proportional to the channel transmission rate for proper choices of experimental parameters.

  14. Turbulence may be key to "fast magnetic reconnection" mystery

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over OurThe Iron Spin Transition in2,EHSS A-Zand Analysis UtilitiesTurbulence may be key

  15. In 2010 a group of key forestry players

    E-Print Network [OSTI]

    Forestry Skills Action Plan #12;Summary #12;In 2010 a group of key forestry players came together to start a movement across the sector to upskill the current, and train the future, forestry workforce. #12;In May 2010 Forestry Commission England convened a small cross- sector task and finish group

  16. Key issues of FED/INTOR impurity control system

    SciTech Connect (OSTI)

    Abdou, M.A.

    1982-10-01T23:59:59.000Z

    A key part of the FED/INTOR activity over the past year has focused on examining the critical issues and developing credible physics and engineering solutions for the impurity control system. The primary emphasis of the work was on the edge-region physics, plasma-wall interaction, materials, engineering and magnetic considerations of the poloidal divertor and pump limiter.

  17. Public-Key Locally-Decodable Codes Brett Hemenway

    E-Print Network [OSTI]

    Ostrovsky, Rafail

    Semantically-Secure Public Key En- cryption (SS-PKE) and any Private Information Retrieval (PIR) protocol. Since Homomorphic encryption implies PIR, we also show a reduction from any Homomorphic encryption protocol to PKLDC. Applying our construction to the best known PIR protocol (that of Gentry and Ramzan), we

  18. The Key Coal Producers ONLINE SUPPORTING MATERIALS to

    E-Print Network [OSTI]

    Patzek, Tadeusz W.

    The Key Coal Producers ONLINE SUPPORTING MATERIALS to A Global Coal Production Forecast with Multi's most important coal-producing area is North-Central China. The provinces of Inner Mongolia, Ningxia, Shaanxi and Shanxi together accounted for 83 percent of China's proven coal reserves in 2000, and Shanxi

  19. Key Management with Policy-based Access Control Christian Cachin

    E-Print Network [OSTI]

    Cachin, Christian

    a crucial role for the security of network-based key management. Modern access-control systems are policy in policies. In this presentation we discuss how to integrate a policy-based access control system using XACMLKey Management with Policy-based Access Control Christian Cachin Divay Bansal G¨unter Karjoth 27

  20. Dictionaries Using Variable-Length Keys and Data, with Applications *

    E-Print Network [OSTI]

    Blelloch, Guy E.

    (Isil- logn, 1) + Itil) and Isil is the length of bit string si. We assume a word length w > log m. We present string Isil > 1, Itil > 1 for all bit-strings si and ti. Fox' fixed-length keys the dictionary problem

  1. The Seven Keys to Success in Energy Management and Conservation

    E-Print Network [OSTI]

    Darby, D. F.

    1984-01-01T23:59:59.000Z

    This paper is a summary of the seven key elements of the Deere & Company Energy Management and Conservation Program. These elements have been found to be essential for the ultimate success of any company-wide energy management program. The process...

  2. Efficient Algorithms for Implementing Elliptic Curve PublicKey Schemes

    E-Print Network [OSTI]

    Efficient Algorithms for Implementing Elliptic Curve Public­Key Schemes by Dan Beauregard A Thesis Cyganski Thesis Advisor Thesis Committee Dr. Stanley Selkow Dr. John Orr Thesis Committee Department Head #12; Preface This thesis describes the research which I conducted while completing my graduate work

  3. Termites, elephants and fire are key drivers of tree mortality

    E-Print Network [OSTI]

    mortality: 2 dominated by elephant damage, 2 by termite attack and 1 by fire. Wind and human activity wereTermites, elephants and fire are key drivers of tree mortality 5 plots suffered substantial tree not major causes of tree mortality. Sample sizes are too small to reasonably determine the most significant

  4. Daylight quantum key distribution over 1.6 km

    E-Print Network [OSTI]

    W. T. Buttler; R. J. Hughes; S. K. Lamoreaux; G. L. Morgan; J. E. Nordholt; C. G. Peterson

    2000-01-25T23:59:59.000Z

    Quantum key distribution (QKD) has been demonstrated over a point-to-point $\\sim1.6$-km atmospheric optical path in full daylight. This record transmission distance brings QKD a step closer to surface-to-satellite and other long-distance applications.

  5. LBNL-63807, REV. 1 International Experience with Key

    E-Print Network [OSTI]

    -setting agreement programs calls for establishment of a coordinated set of policies that provide strong economic incentives as well as technical and financial support to participating industries. The key program elements protocols, development of incentives and supporting policies, monitoring progress toward targets

  6. Highly Efficient Quantum Key Distribution Immune to All Detector Attacks

    E-Print Network [OSTI]

    Wen-Fei Cao; Yi-Zheng Zhen; Yu-Lin Zheng; Zeng-Bing Chen; Nai-Le Liu; Kai Chen; Jian-Wei Pan

    2014-10-10T23:59:59.000Z

    Vulnerabilities and imperfections of single-photon detectors have been shown to compromise security for quantum key distribution (QKD). The measurement-device-independent QKD (MDI-QKD) appears to be the most appealing solution to solve the issues. However, in practice one faces severe obstacles of having significantly lower key generation rate, difficult two photon interferences, and remote synchronization etc. In this letter, we propose a highly efficient and simple quantum key distribution scheme to remove all of these drawbacks. Our proposal can be implemented with only small modifications over the standard decoy BB84 system. Remarkably it enjoys both the advantages of high key generation rate (being almost two orders of magnitude higher than that based on conventional MDI-QKD) comparable to the normal decoy system, and security against any detector side channel attacks. Most favorably one can achieve complete Bell state measurements with resort to single photon interference, which reduces significantly experimental costs. Our approach enables utilization of high speed and efficient secure communication, particularly in real-life scenario of both metropolitan and intercity QKD network, with an attack free fashion from arbitrary detector side channels.

  7. Offshore Wind Power Experiences, Potential and Key Issues for

    E-Print Network [OSTI]

    offshore wind farms are installed in British, Swedish and Danish waters, and present-day costs in 2015, 2030 and 2050 14 3.1 Offshore wind farms under construction and in planning stage 14 3Offshore Wind Power Experiences, Potential and Key Issues for Deployment Jørgen Lemming, Poul Erik

  8. Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks

    E-Print Network [OSTI]

    Bystroff, Chris

    Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks Seyit A. C¸amtepe1 of the most challenging security issues in wireless sensor networks where sensor nodes are randomly scattered-chain sizes. 1 Introduction and Problem Definition In this work, we consider a sensor network in which sensor

  9. Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks

    E-Print Network [OSTI]

    Bystroff, Chris

    Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks Seyit A. C� amtepe of the most challenging security issues in wireless sensor networks where sensor nodes are randomly scattered­chain sizes. 1 Introduction and Problem Definition In this work, we consider a sensor network in which sensor

  10. Putting cancer in focusPathologists key to picking the

    E-Print Network [OSTI]

    Eichman, Brandt F.

    Putting cancer in focusPathologists key to picking the right path to a cure momentum IN THIS ISSUE without cancer. #12;EDITOR Heather Newman DESIGN Diana Duren DIRECTOR OF PUBLICATIONS Wayne Wood ASSOCIATE / Photo Researchers, Inc. EDITORIAL OFFICE Vanderbilt-Ingram Cancer Center 691 Preston Building Nashville

  11. Page 1 of 4 Creating and Submitting a Key Request

    E-Print Network [OSTI]

    Howitt, Ivan

    of employees. Enter search criteria in the search fields available and select the down red arrow to filter the terms. #12;Page 3 of 4 13. On the Key Request Form - Room List windowpane, select Add New. 14 use the Select Drawing button after entering the building and floor to display the floor plan

  12. Using Key Performance Indicators to Manage Energy Costs

    E-Print Network [OSTI]

    Van Gorp, J. C.

    2005-01-01T23:59:59.000Z

    -effective to collect much more data than ever before, many energy managers find themselves drowning in the volume of data generated. Business information systems faced a similar challenge a decade ago, and it is now common practice to use Key Performance Indicators...

  13. Architecture of the Secoqc Quantum Key Distribution network

    E-Print Network [OSTI]

    Mehrdad Dianati; Romain Alleaume

    2006-10-25T23:59:59.000Z

    The European projet Secoqc (Secure Communication based on Quantum Cryptography) aims at developing a global network for unconditionally secure key distribution. This paper specifies the requirements and presents the principles guiding the design of this network, and relevant to its architecture and protocols.

  14. Families First: Keys to Successful Family Functioning An Introduction

    E-Print Network [OSTI]

    Liskiewicz, Maciej

    . publication 350-090 #12;KEY CHARACTERISTICS OF HEALTHY FAMILIES Research has identified several; and the aging family. Crisis tasks are family hardship events such as ill- ness, job loss, accidents, relocation Virginia Cooperative Extension programs and employment are open to all, regardless of race, color, national

  15. USB Key Profile Manager for Advisor: Dr. Chris Pollett

    E-Print Network [OSTI]

    Pollett, Chris

    . · Search for profiles. · Load the profile to Mozilla's registry. · Clean up at shutdown. #12;Feature 2USB Key Profile Manager for Mozilla by Yun Zhou Advisor: Dr. Chris Pollett Committee Members: Dr. Design and Implementation · Event-driven structure · USB profile loader · User authentication · Bulk

  16. The Design of a Group Key Agreement API Giuseppe Ateniese

    E-Print Network [OSTI]

    Kim, Dae-Shik

    and communication-independent API. The rest of this paper is organized as follows. We be- gin with the notationThe Design of a Group Key Agreement API Giuseppe Ateniese Computer Science Department Johns Hopkins describes a protocol suite and an API geared for securing collab- orative applications. The API is based

  17. Cryptanalysis of two knapsack public-key cryptosystems

    E-Print Network [OSTI]

    Han1 {jguobi,hanlidong}@sdu.edu.cn mengxm@sdfi.edu.cn 1 Key Laboratory of Cryptologic Technology is useless to the security of the cryptosystem. Because of the special super increasing structure, we can. We show that the permutation algorithm is useless to avoid the low-density attack and the density

  18. PEM FUEL CELL TECHNOLOGY Key Research Needs and Approaches

    E-Print Network [OSTI]

    Developer University #12;8 FUEL CELL RESEARCH NEEDS MEA optimization should focus on new materials Pt (full1 PEM FUEL CELL TECHNOLOGY Key Research Needs and Approaches Tom Jarvi UTC Power South Windsor, CT 06074 23 January 2008 #12;2 UTC POWER MARKET FOCUS Transportation Fuel Cells On-Site Power Solutions #12

  19. The U.S. ISO Key Project on Quasars

    E-Print Network [OSTI]

    Eric Hooper; Belinda Wilkes; Kim McLeod; Jonathan McDowell; Martin Elvis; Matthew Malkan; Carol Lonsdale; Chris Impey

    1998-09-22T23:59:59.000Z

    Observations for the U.S. key project on quasars using ISO were completed in April when the satellite's cryogen supply expired. This proceeding presents an update of the project, including information on the final sample, a discussion of some of the data reduction challenges and current efforts to meet them, plus a comparison of preliminary results with IRAS fluxes.

  20. absorption line key: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    absorption line key First Page Previous Page 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Next Page Last Page Topic Index 1 The Hubble Space Telescope Quasar...

  1. On the Performance of Group Key Management Protocols in MANETs

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    . In this paper, we present an evaluation method for group key management protocols within ad hoc networks based the NS2 network simulator. To present our contribution, we structure this paper as follows. Section 22010 Author manuscript, published in "Joint Conference on Security in Network Architectures

  2. 7/6/12 Florida Blue Key Homecoming 1/8fbk.org/homecoming/

    E-Print Network [OSTI]

    Latchman, Haniph A.

    7/6/12 Florida Blue Key Homecoming 1/8fbk.org/homecoming/ Since 1923, Florida Blue Key has served in the fall, Homecoming and Gator Growl are produced by a team of over 500 students working in Florida Blue Blue Key on Facebo 430 people like Florida Blue Key Like Florida Blue Key via Growl & UF Homecoming

  3. Key-Insulated Signcryption (Science and Technology on Communication Security Laboratory,

    E-Print Network [OSTI]

    Zheng, Yuliang

    Key-Insulated Signcryption Jia Fan 1 (Science and Technology on Communication Security Laboratory addresses the issue of key exposure by proposing a key-insulated signcryption technique. We define a security model for key-insulated signcryption and prove that the key- insulated signcryption technique

  4. Systems analysis of multiple regulator perturbations allows discoveryo...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Systems analysis of multiple regulator perturbations allows discoveryof virulence factors in Salmonella. Systems analysis of multiple regulator perturbations allows discoveryof...

  5. Power Factor Improvement

    E-Print Network [OSTI]

    Viljoen, T. A.

    1979-01-01T23:59:59.000Z

    Power factor control is a necessary ingredient in any successful Energy Management Program. Many companies are operating with power factors of 70% or less and are being penalized through the electrical utility bill. This paper starts by describing...

  6. Characterization of Two Sigma Factors in Plant Pathogenesis by Pseudomonas syringae pv. syringae B728a 

    E-Print Network [OSTI]

    Basu Thakur, Poulami

    2012-07-11T23:59:59.000Z

    function (ECF) sigma (?) factors serve as important regulatory factors in responding to various environmental signals. Bioinformatic analysis of the B728a genome has revealed 10 ECF sigma factors, five of which have high levels of sequence similarity...

  7. Statistical Hot Channel Analysis for the NBSR

    SciTech Connect (OSTI)

    Cuadra A.; Baek J.

    2014-05-27T23:59:59.000Z

    A statistical analysis of thermal limits has been carried out for the research reactor (NBSR) at the National Institute of Standards and Technology (NIST). The objective of this analysis was to update the uncertainties of the hot channel factors with respect to previous analysis for both high-enriched uranium (HEU) and low-enriched uranium (LEU) fuels. Although uncertainties in key parameters which enter into the analysis are not yet known for the LEU core, the current analysis uses reasonable approximations instead of conservative estimates based on HEU values. Cumulative distribution functions (CDFs) were obtained for critical heat flux ratio (CHFR), and onset of flow instability ratio (OFIR). As was done previously, the Sudo-Kaminaga correlation was used for CHF and the Saha-Zuber correlation was used for OFI. Results were obtained for probability levels of 90%, 95%, and 99.9%. As an example of the analysis, the results for both the existing reactor with HEU fuel and the LEU core show that CHFR would have to be above 1.39 to assure with 95% probability that there is no CHF. For the OFIR, the results show that the ratio should be above 1.40 to assure with a 95% probability that OFI is not reached.

  8. Energy Price Indices and Discount Factors for Life-Cycle Cost...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2 Energy Price Indices and Discount Factors for Life-Cycle Cost Analysis - 2012 Report provides tables of present-value factors for use in the life-cycle cost analysis of capital...

  9. Energy Price Indices and Discount Factors for Life-Cycle Cost...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Price Indices and Discount Factors for Life-Cycle Cost Analysis-2014 Energy Price Indices and Discount Factors for Life-Cycle Cost Analysis-2014 Handbook describes the...

  10. An Attack on RSA Using LSBs of Multiples of the Prime Factors

    E-Print Network [OSTI]

    Nitaj, Abderrahmane

    An Attack on RSA Using LSBs of Multiples of the Prime Factors Abderrahmane Nitaj Laboratoire de attack on RSA with d in polynomial time under special conditions. For example, various partial key exposure attacks on RSA and some

  11. Structure of an active N-terminal fragment of human complement factor

    E-Print Network [OSTI]

    Hocking, Henry G.

    Factor H (FH) is a key regulator of the complement system, the principal molecular component of innate immunity in humans. The tight regulation of the alternative pathway (AP) of complement by FH occurs on host cells as ...

  12. Public key Steganography Using Discrete Cross-Coupled Chaotic Maps

    E-Print Network [OSTI]

    Sodeif Ahadpour; Mahdiyeh Majidpour; Yaser Sadra

    2012-11-01T23:59:59.000Z

    By cross-coupling two logistic maps a novel method is proposed for the public key steganography in JPEG image. Chaotic maps entail high complexity in the used algorithm for embedding secret data in a medium. In this paper, discrete cross- coupled chaotic maps are used to specifying the location of the different parts of the secret data in the image. Modifying JPEG format during compressing and decompressing, and also using public key enhanced difficulty of the algorithm. Simulation results show that in addition to excessive capacity, this method has high robustness and resistance against hackers and can be applicable in secret communication. Also the PSNR value is high compared to the other works.

  13. $\\beta$-decay of key titanium isotopes in stellar environment

    E-Print Network [OSTI]

    Nabi, Jameel-Un; 10.1142/S0218301311018174

    2011-01-01T23:59:59.000Z

    Amongst iron regime nuclei, $\\beta$-decay rates on titanium isotopes are considered to be important during the late phases of evolution of massive stars. The key $\\beta$-decay isotopes during presupernova evolution were searched from available literature and a microscopic calculation of the decay rates were performed using the proton-neutron quasiparticle random phase approximation (pn-QRPA) theory. As per earlier simulation results electron capture and $\\beta$-decay on certain isotopes of titanium are considered to be important for the presupernova evolution of massive stars. Earlier the stellar electron capture rates and neutrino energy loss rates due to relevant titanium isotopes were presented. In this paper we finally present the $\\beta$-decay rates of key titanium isotopes in stellar environment. The results are also compared against previous calculations. The pn-QRPA $\\beta$-decay rates are bigger at high stellar temperatures and smaller at high stellar densities compared to the large scale shell model...

  14. Secure password-based authenticated key exchange for web services

    SciTech Connect (OSTI)

    Liang, Fang; Meder, Samuel; Chevassut, Olivier; Siebenlist, Frank

    2004-11-22T23:59:59.000Z

    This paper discusses an implementation of an authenticated key-exchange method rendered on message primitives defined in the WS-Trust and WS-SecureConversation specifications. This IEEE-specified cryptographic method (AuthA) is proven-secure for password-based authentication and key exchange, while the WS-Trust and WS-Secure Conversation are emerging Web Services Security specifications that extend the WS-Security specification. A prototype of the presented protocol is integrated in the WSRF-compliant Globus Toolkit V4. Further hardening of the implementation is expected to result in a version that will be shipped with future Globus Toolkit releases. This could help to address the current unavailability of decent shared-secret-based authentication options in the Web Services and Grid world. Future work will be to integrate One-Time-Password (OTP) features in the authentication protocol.

  15. Flexible quantum private queries based on quantum key distribution

    E-Print Network [OSTI]

    Fei Gao; Bin Liu; Qiao-Yan Wen; Hui Chen

    2011-11-07T23:59:59.000Z

    We present a flexible quantum-key-distribution-based protocol for quantum private queries. Similar to M. Jakobi et al's protocol [Phys. Rev. A 83, 022301 (2011)], it is loss tolerant, practical and robust against quantum memory attack. Furthermore, our protocol is more flexible and controllable. We show that, by adjusting the value of $\\theta$, the average number of the key bits Alice obtains can be located on any fixed value the users wanted for any database size. And the parameter $k$ is generally smaller (even $k=1$ can be achieved) when $\\theta<\\pi/4$, which implies lower complexity of both quantum and classical communications. Furthermore, the users can choose a smaller $\\theta$ to get better database security, or a larger $\\theta$ to obtain a lower probability with which Bob can correctly guess the address of Alice's query.

  16. Distribution Statistics and Random Matrix Formalism of Multicarrier Continuous-Variable Quantum Key Distribution

    E-Print Network [OSTI]

    Laszlo Gyongyosi

    2014-10-30T23:59:59.000Z

    We propose a combined mathematical framework of order statistics and random matrix theory for multicarrier continuous-variable (CV) quantum key distribution (QKD). In a multicarrier CVQKD scheme, the information is granulated into Gaussian subcarrier CVs, and the physical Gaussian link is divided into Gaussian sub-channels. The sub-channels are dedicated to the conveying of the subcarrier CVs. The distribution statistics analysis covers the study of the distribution of the sub-channel transmittance coefficients in the presence of a Gaussian noise and the utilization of the moment generation function (MGF) in the error analysis. We reveal the mathematical formalism of sub-channel selection and formulation of the transmittance coefficients, and show a reduced complexity progressive sub-channel scanning method. We define a random matrix formalism for multicarrier CVQKD to evaluate the statistical properties of the information flowing process. Using random matrix theory, we express the achievable secret key rates and study the efficiency of the AMQD-MQA (adaptive multicarrier quadrature division-multiuser quadrature allocation) multiple-access multicarrier CVQKD. The proposed combined framework is particularly convenient for the characterization of the physical processes of experimental multicarrier CVQKD.

  17. Single-photon quantum key distribution in the presence of loss

    SciTech Connect (OSTI)

    Curty, Marcos [Center for Quantum Information and Quantum Control, Department of Physics and Department of Electrical and Computer Engineering, University of Toronto, Toronto, Ontario, Canada M5S 3G4 (Canada); Institute for Quantum Computing, University of Waterloo, 200 University Avenue West, Waterloo, Ontario, Canada N2L 3G1 (Canada); Moroder, Tobias [Institute for Quantum Computing, University of Waterloo, 200 University Avenue West, Waterloo, Ontario, Canada N2L 3G1 (Canada); Quantum Information Theory Group, Institut fuer Theoretische Physik I, and Max-Planck Research Group, Institute of Optics, Information and Photonics, Universitaet Erlangen-Nuernberg, D-91058 Erlangen (Germany)

    2007-05-15T23:59:59.000Z

    We investigate two-way and one-way single-photon quantum key distribution (QKD) protocols in the presence of loss introduced by the quantum channel. Our analysis is based on a simple precondition for secure QKD in each case. In particular, the legitimate users need to prove that there exists no separable state (in the case of two-way QKD), or that there exists no quantum state having a symmetric extension (one-way QKD), that is compatible with the available measurements results. We show that both criteria can be formulated as a convex optimization problem known as a semidefinite program, which can be efficiently solved. Moreover, we prove that the solution to the dual optimization corresponds to the evaluation of an optimal witness operator that belongs to the minimal verification set of them for the given two-way (or one-way) QKD protocol. A positive expectation value of this optimal witness operator states that no secret key can be distilled from the available measurements results. We apply such analysis to several well-known single-photon QKD protocols under losses.

  18. The HST Key Project on the Extragalactic Distance Scale XVII. The Cepheid Distance to NGC 4725

    E-Print Network [OSTI]

    Brad K. Gibson; Shaun M. G. Hughes; Peter B. Stetson; Wendy L. Freedman; Robert C. Kennicutt, Jr.; Jeremy R. Mould; Fabio Bresolin; Laura Ferrarese; Holland C. Ford; John A. Graham; Mingsheng Han; Paul Harding; John G. Hoessel; John P. Huchra; Garth D. Illingworth; Daniel D. Kelson; Lucas M. Macri; Barry F. Madore; Randy L. Phelps; Charles F. Prosser; Abhijit Saha; Shoko Sakai; Kim M. Sebo; Nancy A. Silbermann; Anne M. Turner

    1998-10-01T23:59:59.000Z

    The distance to NGC 4725 has been derived from Cepheid variables, as part of the Hubble Space Telescope Key Project on the Extragalactic Distance Scale. Thirteen F555W (V) and four F814W (I) epochs of cosmic-ray-split Wide Field and Planetary Camera 2 observations were obtained. Twenty Cepheids were discovered, with periods ranging from 12 to 49 days. Adopting a Large Magellanic Cloud distance modulus and extinction of 18.50+/-0.10 mag and E(V-I)=0.13 mag, respectively, a true reddening-corrected distance modulus (based on an analysis employing the ALLFRAME software package) of 30.50 +/- 0.16 (random) +/- 0.17 (systematic) mag was determined for NGC 4725. The corresponding of distance of 12.6 +/- 1.0 (random) +/- 1.0 (systematic) Mpc is in excellent agreement with that found with an independent analysis based upon the DoPHOT photometry package. With a foreground reddening of only E(V-I)=0.02, the inferred intrinsic reddening of this field in NGC 4725, E(V-I)=0.19, makes it one of the most highly-reddened, encountered by the HST Key Project, to date.

  19. 1. Aim of the Code of Practice 2. Key points

    E-Print Network [OSTI]

    Roelleke, Thomas

    family leave provisions 1August 2011 #12;1 Aim of the Code of Practice The aim is to: 1 promote good1. Aim of the Code of Practice 2. Key points 3. Maternity leave and pay 4. Ante-natal leave 5. Compassionate leave for family and other reasons 1 1 3 4 5 7 8 9 10 HR Code of Practice 14. Maternity and other

  20. Low Timing Jitter Detector for Gigahertz Quantum Key Distribution

    E-Print Network [OSTI]

    R. J. Collins; R. H. Hadfield; V. Fernandez; S. W. Nam; G. S. Buller

    2007-02-23T23:59:59.000Z

    A superconducting single-photon detector based on a niobium nitride nanowire is demonstrated in an optical-fibre-based quantum key distribution test bed operating at a clock rate of 3.3 GHz and a transmission wavelength of 850 nm. The low jitter of the detector leads to significant reduction in the estimated quantum bit error rate and a resultant improvement in the secrecy efficiency compared to previous estimates made by use of silicon single-photon avalanche detectors.

  1. A correct security evaluation of quantum key distribution

    E-Print Network [OSTI]

    Osamu Hirota

    2014-09-21T23:59:59.000Z

    There is no doubt that quantum key distribution is an excellent result as a science. However, this paper presents a view on quantum key distribution (QKD) wherein QKD may have a difficulty to provide a sufficient security and good communication performance in real world networks. In fact, a one-time pad forwarded by QKD model with $\\bar{\\epsilon}=10^{-6}$ may be easily decrypted by key estimation. Despite that researchers know several criticisms on the theoretical incompleteness on the security evaluation, Portmann and Rennner, and others still avert from the discussion on criticism, and experimental groups tend to make exaggerated claims about their own work by making it seems that QKD is applicable to commercial communication systems. All such claims are based on a misunderstanding of the meaning of criteria of information theoretic security in cryptography. A severe situation has arisen as a result, one that will impair a healthy development of quantum information science (QIS). Thus, the author hopes that this paper will help to stimulate discussions on developing a more detailed theory.

  2. Semiquantum-key distribution using less than four quantum states

    SciTech Connect (OSTI)

    Zou Xiangfu [Department of Computer Science, Zhongshan University, Guangzhou 510275 (China); Department of Mathematics and Physics, Wuyi University, Jiangmen 529020 (China); Qiu Daowen [Department of Computer Science, Zhongshan University, Guangzhou 510275 (China); SQIG-Instituto de Telecomunicacoes, IST, TULisbon, Av. Rovisco Pais 1049-001, Lisbon (Portugal); Li Lvzhou; Wu Lihua; Li Lvjun [Department of Computer Science, Zhongshan University, Guangzhou 510275 (China)

    2009-05-15T23:59:59.000Z

    Recently Boyer et al. [Phys. Rev. Lett. 99, 140501 (2007)] suggested the idea of semiquantum key distribution (SQKD) in which Bob is classical and they also proposed a semiquantum key distribution protocol (BKM2007). To discuss the security of the BKM2007 protocol, they proved that their protocol is completely robust. This means that nonzero information acquired by Eve on the information string implies the nonzero probability that the legitimate participants can find errors on the bits tested by this protocol. The BKM2007 protocol uses four quantum states to distribute a secret key. In this paper, we simplify their protocol by using less than four quantum states. In detail, we present five different SQKD protocols in which Alice sends three quantum states, two quantum states, and one quantum state, respectively. Also, we prove that all the five protocols are completely robust. In particular, we invent two completely robust SQKD protocols in which Alice sends only one quantum state. Alice uses a register in one SQKD protocol, but she does not use any register in the other. The information bit proportion of the SQKD protocol in which Alice sends only one quantum state but uses a register is the double as that in the BKM2007 protocol. Furthermore, the information bit rate of the SQKD protocol in which Alice sends only one quantum state and does not use any register is not lower than that of the BKM2007 protocol.

  3. Accident analysis and hazard analysis for human and organizational factors

    E-Print Network [OSTI]

    Stringfellow, Margaret Virgina

    2011-01-01T23:59:59.000Z

    Pressures and incentives to operate complex socio-technical aerospace systems in a high-risk state are ever present. Without consideration of the role humans and organizations play in system safety during the development ...

  4. Practical Training in Microalgae Utilization with Key Industry Engineering Group Key Industry Engineering Group s.r.o. has developed a biotechnology for the production of an animal

    E-Print Network [OSTI]

    Practical Training in Microalgae Utilization with Key Industry Engineering Group Key Industry on a suspension of Planktochlorella microalgae. The product consists of a suspension of algae in the growing

  5. Epimorphin Functions as a Key Morphoregulator for Mammary Epithelial Cells

    SciTech Connect (OSTI)

    Hirai, H.; Lochter, A.; Galosy, S.; Koshida, S.; Niwa, S.; Bissell, M.J.

    1997-10-13T23:59:59.000Z

    Hepatocyte growth factor (HGF) and EGF have been reported to promote branching morphogenesis of mammary epithelial cells. We now show that it is epimorphin that is primarily responsible for this phenomenon. In vivo, epimorphin was detected in the stromal compartment but not in lumenal epithelial cells of the mammary gland; in culture, however, a subpopulation of mammary epithelial cells produced significant amounts of epimorphin. When epimorphin-expressing epithelial cell clones were cultured in collagen gels they displayed branching morphogenesis in the presence of HGF, EGF, keratinocyte growth factor, or fibroblast growth factor, a process that was inhibited by anti-epimorphin but not anti-HGF antibodies. The branch length, however, was roughly proportional to the ability of the factors to induce growth. Accordingly, epimorphin-negative epithelial cells simply grew in a cluster in response to the growth factors and failed to branch. When recombinant epimorphin was added to these collagen gels, epimorphin-negative cells underwent branching morphogenesis. The mode of action of epimorphin on morphogenesis of the gland, however, was dependent on how it was presented to the mammary cells. If epimorphin was overexpressed in epimorphin-negative epithelial cells under regulation of an inducible promoter or was allowed to coat the surface of each epithelial cell in a nonpolar fashion, the cells formed globular, alveoli-like structures with a large central lumen instead of branching ducts. This process was enhanced also by addition of HGF, EGF, or other growth factors and was inhibited by epimorphin antibodies. These results suggest that epimorphin is the primary morphogen in the mammary gland but that growth factors are necessary to achieve the appropriate cell numbers for the resulting morphogenesis to be visualized.

  6. Developing health-based pre-planning clearance goals for airport remediation following chemical terrorist attack: Introduction and key assessment considerations

    SciTech Connect (OSTI)

    Watson, Annetta Paule [ORNL; Raber, Ellen [Lawrence Livermore National Laboratory (LLNL); Dolislager, Frederick [University of Tennessee, Knoxville (UTK); Hauschild, Veronique [U.S. Army Center for Health Promotion and Preventive Medicine; Hall, Dr. Linda [ENVIRON International Corporation; Love, Dr. Adam [Johnson Wright, Inc.

    2011-01-01T23:59:59.000Z

    In the event of a chemical terrorist attack on a transportation hub, post-event remediation and restoration activities necessary to attain unrestricted facility re-use and re-entry could require hours to multiple days. While restoration timeframes are dependent on numerous variables, a primary controlling factor is the level of pre-planning and decision-making completed prior to chemical terrorist release. What follows is the first of a two-part analysis identifying key considerations, critical information, and decision criteria to facilitate post-attack and post-decontamination consequence management activities. A conceptual site model and human health-based exposure guidelines are developed and reported as an aid to site-specific pre-planning in the current absence of U.S. state or Federal values designated as compound-specific remediation or re-entry concentrations, and to safely expedite facility recovery to full operational status. Chemicals of concern include chemical warfare nerve and vesicant agents and the toxic industrial compounds phosgene, hydrogen cyanide, and cyanogen chloride. This work has been performed as a national case study conducted in partnership with the Los Angeles International Airport and The Bradley International Terminal. All recommended guidelines have been selected for consistency with airport scenario release parameters of a one-time, short-duration, finite airborne release from a single source followed by compound-specific decontamination.

  7. SUBTASK 1.7 EVALUATION OF KEY FACTORS AFFECTING SUCCESSFUL OIL PRODUCTION IN THE BAKKEN FORMATION, NORTH DAKOTA PHASE II

    SciTech Connect (OSTI)

    Darren D. Schmidt; Steven A. Smith; James A. Sorensen; Damion J. Knudsen; John A. Harju; Edward N. Steadman

    2011-10-31T23:59:59.000Z

    Production from the Bakken and Three Forks Formations continues to trend upward as forecasts predict significant production of oil from unconventional resources nationwide. As the U.S. Geological Survey reevaluates the 3.65 billion bbl technically recoverable estimate of 2008, technological advancements continue to unlock greater unconventional oil resources, and new discoveries continue within North Dakota. It is expected that the play will continue to expand to the southwest, newly develop in the northeastern and northwestern corners of the basin in North Dakota, and fully develop in between. Although not all wells are economical, the economic success rate has been near 75% with more than 90% of wells finding oil. Currently, only about 15% of the play has been drilled, and recovery rates are less than 5%, providing a significant future of wells to be drilled and untouched hydrocarbons to be pursued through improved stimulation practices or enhanced oil recovery. This study provides the technical characterizations that are necessary to improve knowledge, provide characterization, validate generalizations, and provide insight relative to hydrocarbon recovery in the Bakken and Three Forks Formations. Oil-saturated rock charged from the Bakken shales and prospective Three Forks can be produced given appropriate stimulation treatments. Highly concentrated fracture stimulations with ceramic- and sand-based proppants appear to be providing the best success for areas outside the Parshall and Sanish Fields. Targeting of specific lithologies can influence production from both natural and induced fracture conductivity. Porosity and permeability are low, but various lithofacies units within the formation are highly saturated and, when targeted with appropriate technology, release highly economical quantities of hydrocarbons.

  8. Economic Life Cycle Assessment as element of sustainability certification – a key success factor moving beyond Life Cycle Costing

    E-Print Network [OSTI]

    Trinius, W.; Hirsch, H.

    Target topic: achieving sustainability, saving energy, and improving occupant comfort? Lead Author Wolfram Trinius, PhD, Ingenieurb?ro Trinius, Hamburg, Germany and University of Gavle, Sweden Co Authors Harry Hirsch, HH Consulting, Baden...

  9. A genome-wide regulatory network identifies key transcription factors for memory CD8[superscript +] T-cell development

    E-Print Network [OSTI]

    Hu, Guangan

    Memory CD8[superscript +] T-cell development is defined by the expression of a specific set of memory signature genes. Despite recent progress, many components of the transcriptional control of memory CD8[superscript +] ...

  10. Cost per-User as Key Factor in Project Prioritization: A Case Study of the San Francisco Bay Area

    E-Print Network [OSTI]

    Nuworsoo, Cornelius; Parks, Kamala; Deakin, Elizabeth

    2006-01-01T23:59:59.000Z

    The total estimated investment cost of network-related. ll0Vdistribution of capital investment costs and consequentlyThe total estimated investment cost of service-related

  11. Economic Life Cycle Assessment as element of sustainability certification – a key success factor moving beyond Life Cycle Costing 

    E-Print Network [OSTI]

    Trinius, W.; Hirsch, H.

    2009-01-01T23:59:59.000Z

    considering environmental impacts in building design, commissioning and operation to the consideration of sustainability aspects has significantly enlarged the scope of aspects to be addressed, especially in assessment schemes. While assessments now turn...

  12. Quality factors and dynamical tunneling in annular microcavities

    E-Print Network [OSTI]

    Arnd Bäcker; Roland Ketzmerick; Steffen Löck; Jan Wiersig; Martina Hentschel

    2009-06-02T23:59:59.000Z

    The key characteristic of an optical mode in a microcavity is its quality factor describing the optical losses. The numerical computation of this quantity can be very demanding for present-day devices. Here we show for a certain class of whispering-gallery cavities that the quality factor is related to dynamical tunneling, a phenomenon studied in the field of quantum chaos. We extend a recently developed approach for determining dynamical tunneling rates to open cavities. This allows us to derive an analytical formula for the quality factor which is in very good agreement with full solutions of Maxwell's equations.

  13. Device calibration impacts security of quantum key distribution

    E-Print Network [OSTI]

    Nitin Jain; Christoffer Wittmann; Lars Lydersen; Carlos Wiechers; Dominique Elser; Christoph Marquardt; Vadim Makarov; Gerd Leuchs

    2011-09-16T23:59:59.000Z

    Characterizing the physical channel and calibrating the cryptosystem hardware are prerequisites for establishing a quantum channel for quantum key distribution (QKD). Moreover, an inappropriately implemented calibration routine can open a fatal security loophole. We propose and experimentally demonstrate a method to induce a large temporal detector efficiency mismatch in a commercial QKD system by deceiving a channel length calibration routine. We then devise an optimal and realistic strategy using faked states to break the security of the cryptosystem. A fix for this loophole is also suggested.

  14. Key results from SB8 simulant flowsheet studies

    SciTech Connect (OSTI)

    Koopman, D. C.

    2013-04-26T23:59:59.000Z

    Key technically reviewed results are presented here in support of the Defense Waste Processing Facility (DWPF) acceptance of Sludge Batch 8 (SB8). This report summarizes results from simulant flowsheet studies of the DWPF Chemical Process Cell (CPC). Results include: Hydrogen generation rate for the Sludge Receipt and Adjustment Tank (SRAT) and Slurry Mix Evaporator (SME) cycles of the CPC on a 6,000 gallon basis; Volume percent of nitrous oxide, N2O, produced during the SRAT cycle; Ammonium ion concentrations recovered from the SRAT and SME off-gas; and, Dried weight percent solids (insoluble, soluble, and total) measurements and density.

  15. Effects of color coding on keying time and errors

    E-Print Network [OSTI]

    Wooldridge, Brenda Gail

    1983-01-01T23:59:59.000Z

    were to determine the effects if any oi' color coding upon the error rate and location time of special func- tion keys on a computer keyboard. An ACT-YA CRT keyboard interfaced with a Kromemco microcomputer was used. There were 84 high schoool... to comnunicate with more and more computer-like devices. The most common computer/human interface is the terminal, consisting of a display screen, and keyboard. The format and layout on the display screen of computer-generated information is generally...

  16. Orthogonal-state-based protocols of quantum key agreement

    E-Print Network [OSTI]

    Chitra Shukla; Nasir Alam; Anirban Pathak

    2013-10-05T23:59:59.000Z

    Two orthogonal-state-based protocols of quantum key agreement (QKA) are proposed. The first protocol of QKA proposed here is designed for two-party QKA, whereas the second protocol is designed for multi-party QKA. Security of these orthogonal-state-based protocols arise from monogamy of entanglement. This is in contrast to the existing protocols of QKA where security arises from the use of non-orthogonal state (non-commutativity principle). Further, it is shown that all the quantum systems that are useful for implementation of quantum dialogue and most of the protocols of secure direct quantum communication can be modified to implement protocols of QKA.

  17. DOE Announces More Key Administration Posts | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 111 1,613PortsmouthBartlesvilleAbout » Contact UsDepartmentConsumersDevelopmentDepartmentofKey

  18. Key Parameters Affecting DPF Performance Degradation and Impact on Lifetime

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport(FactDepartment ofLetter Report: I11IG002RTC3WASTE-TO-ENERGY:KenKeriKey Issues

  19. Key Renewable Energy Opportunities for Oklahoma Tribes | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport(FactDepartment ofLetter Report: I11IG002RTC3WASTE-TO-ENERGY:KenKeriKey

  20. Technology Key to Harnessing Natural Gas Potential | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently AskedEnergyIssuesEnergy Solar Decathlon |1999Energy- FORTechnology Key to

  1. Key Activities in Wind Energy | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed off Energy.gov.Energy02.pdf7 OPAMEnergyInvestigativeCoggin AboutofKathleen HoganKenKey

  2. KeyTex Energy LLC | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are8COaBulkTransmissionSitingProcess.pdfGetecGtelInteriasIowa:Washington: EnergyFacility | OpenBiscayne,West,KeyTex

  3. Key Renewable Energy Opportunities for Oklahoma Tribes | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the.pdfBreaking ofOil & Gas » MethaneJohnson ControlsJoyceEnergy Key Renewable

  4. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del(ANL-IN-03-032) -Less isNFebruaryOctober 2, AlgeriaQ1 Q2youKINETIC S'FUDY OFA Key

  5. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del(ANL-IN-03-032) -Less isNFebruaryOctober 2, AlgeriaQ1 Q2youKINETIC S'FUDY OFA KeyA

  6. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del(ANL-IN-03-032) -Less isNFebruaryOctober 2, AlgeriaQ1 Q2youKINETIC S'FUDY OFA KeyAA

  7. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del(ANL-IN-03-032) -Less isNFebruaryOctober 2, AlgeriaQ1 Q2youKINETIC S'FUDY OFA KeyAAA

  8. Technology Key to Harnessing Natural Gas Potential | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the.pdfBreakingMayDepartment ofEnergyTeamDevelopment Advances EM CleanupDepartmentKey to

  9. Catalysis Center for Energy Innovation KEY ACCOMPLISHMENTS AND CORE CAPABILITIES

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItem NotEnergy,ARMForms About Batteriesmetal-organic frameworks |A photo ofMay 2015andKEY

  10. Iron is the Key to Preserving Dinosaur Soft Tissue

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHigh SchoolIn12 Investigation Peer ReviewIron is the Key to Preserving

  11. Iron is the Key to Preserving Dinosaur Soft Tissue

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHigh SchoolIn12 Investigation Peer ReviewIron is the Key to PreservingIron

  12. GE Key Partner in Innovation Institutes | GE Global Research

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC) Environmental AssessmentsGeoffrey Campbell isOklahoma City, USA OklahomaTiratIs Key

  13. Key Dates | U.S. DOE Office of Science (SC)

    Office of Science (SC) Website

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over OurThe Iron4(SC) MappingOctober 12,U.S.U.S. DOEJoanKaye D. Lathrop,KevinKey

  14. NERSC Played Key Role in Nobel Laureate's Discovery

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated Codes |IsLove Your1AllocationsNOVAPlayed Key Role in Nobel Laureate's

  15. Minimum Energy Per Bit for Secret Key Acquisition Over Multipath Wireless Channels

    E-Print Network [OSTI]

    Sayeed, Akbar M.

    Minimum Energy Per Bit for Secret Key Acquisition Over Multipath Wireless Channels Tzu-Han Chou the secret key capacity. We analyze the low-SNR regime to quantify the minimum energy per secret key bit of conventional channel capacity, there is a non-zero SNR that achieves the minimum energy per key bit. A time

  16. Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys Beno^it Libert1 in Identity-Based Encryption. In this model, if the Private Key Generator (PKG) maliciously re' public keys are public identifiers (e.g. email addresses) and the matching private keys are derived

  17. Encryption Key Search using Java-based ALiCE Grid

    E-Print Network [OSTI]

    Virkar, Ameya

    Encryption Key Search is a compute-intensive operation that consists of a brute-force search of a particular key in a given key space. Sequential execution time for a 56-bit encryption key search is approximately 200,000 ...

  18. Power Factor Reactive Power

    E-Print Network [OSTI]

    motor power: 117.7 V x 5.1 A = 600 W? = 0.6 kW? NOT the power measured by meter #12;Page 9 PSERC: displacement power factor: angle between voltage and current = 0 degrees pf = cos(0 degrees) = 1.0 true powerPage 1 PSERC Power Factor and Reactive Power Ward Jewell Wichita State University Power Systems

  19. $?$-decay of key titanium isotopes in stellar environment

    E-Print Network [OSTI]

    Jameel-Un Nabi; Irgaziev Bakhadir

    2011-08-04T23:59:59.000Z

    Amongst iron regime nuclei, $\\beta$-decay rates on titanium isotopes are considered to be important during the late phases of evolution of massive stars. The key $\\beta$-decay isotopes during presupernova evolution were searched from available literature and a microscopic calculation of the decay rates were performed using the proton-neutron quasiparticle random phase approximation (pn-QRPA) theory. As per earlier simulation results electron capture and $\\beta$-decay on certain isotopes of titanium are considered to be important for the presupernova evolution of massive stars. Earlier the stellar electron capture rates and neutrino energy loss rates due to relevant titanium isotopes were presented. In this paper we finally present the $\\beta$-decay rates of key titanium isotopes in stellar environment. The results are also compared against previous calculations. The pn-QRPA $\\beta$-decay rates are bigger at high stellar temperatures and smaller at high stellar densities compared to the large scale shell model results. This study can prove useful for the core-collapse simulators.

  20. Break-Even Cost for Residential Solar Water Heating in the United States: Key Drivers and Sensitivities

    SciTech Connect (OSTI)

    Cassard, H.; Denholm, P.; Ong, S.

    2011-02-01T23:59:59.000Z

    This paper examines the break-even cost for residential rooftop solar water heating (SWH) technology, defined as the point where the cost of the energy saved with a SWH system equals the cost of a conventional heating fuel purchased from the grid (either electricity or natural gas). We examine the break-even cost for the largest 1,000 electric and natural gas utilities serving residential customers in the United States as of 2008. Currently, the break-even cost of SWH in the United States varies by more than a factor of five for both electricity and natural gas, despite a much smaller variation in the amount of energy saved by the systems (a factor of approximately one and a half). The break-even price for natural gas is lower than that for electricity due to a lower fuel cost. We also consider the relationship between SWH price and solar fraction and examine the key drivers behind break-even costs. Overall, the key drivers of the break-even cost of SWH are a combination of fuel price, local incentives, and technical factors including the solar resource location, system size, and hot water draw.

  1. Friction Factor Measurement, Analysis, and Modeling for Flat-Plates with 12.15 mm Diameter Hole-Pattern, Tested with Air at Different Clearances, Inlet Pressures, and Pressure Ratios

    E-Print Network [OSTI]

    Deva Asirvatham, Thanesh

    2011-02-22T23:59:59.000Z

    of 800, 1000, and 1200 psi respectively). These nine combinations of clearance and inlet pressure will give a range of friction factor. The following objectives are considered. 17 Figure 10. Detailed view of a 3.175 mm diameter hole...

  2. Fusion integral experiments and analysis and the determination of design safety factors - II: Application to the prediction uncertainty of tritium production rate from the U.S. DOE/JAERI collaborative program on fusion blanket neutronics

    SciTech Connect (OSTI)

    Youssef, M.Z.; Kumar, A.; Abdou, M.A. [Univ. of California, Los Angeles, CA (United States)] [and others

    1995-09-01T23:59:59.000Z

    Many fusion integral experiments were performed during the last decade within a well-established collaboration between the United States and Japan on fusion breeder neutronics. The tritium production rate (TPR) has the prime focus among other reactions. The experimental and calculational data sets of local TPR in each experiment were interpolated to give an estimate of the prediction uncertainty, and the standard deviation, of the line-integrated TPR, a quantity that is closely related to the total breeding ratio (TBR) in the test assembly. A novel methodology developed during the collaboration was applied to arrive at estimates to design safety factors that fusion blanket designers can use to ensure that the achievable TBR in a blanket does not fall below a minimum required value. Associated with each safety factor is a confidence level, designers may choose to have, that calculated TPR will not exceed the actual measured value. Higher confidence levels require larger safety factors. Tabular and graphical forms for these factors are given, as derived independently for TPR from Li-6(T{sub 6}), Li-7 (T{sub 7}), and natural lithium (T{sub n}). Furthermore, distinction was made between safety factors based on the technique applied, discrete ordinates methods, and Monte Carlo methods in the U.S. calculations, JAERI`s calculations, and in both calculations considered simultaneously. The derived factors are applicable to TPR in Li{sub 2}O breeding material, 48 refs., 51 figs., 7 tabs.

  3. Key Elements of and Materials Performance Targets for Highly

    E-Print Network [OSTI]

    and Technology, Høgskoleringen 7A, NO-7491 Trondheim, Norway Abstract The thermal performance of windows of the transmission losses though the building envelope, even if their area fraction of the envelope is far less. The reason for this can be found by comparing the thermal transmittance (U-factor) of windows to the U

  4. Embedded Software Security through Key-Based Control Flow Obfuscation

    E-Print Network [OSTI]

    Bhunia, Swarup

    ], as they are expected to run more computation-intensive software. An example is that cutting-edge cellular devices. The threat is a two-edged sword - on one hand, malicious software installed in an embedded system can harm, and physically the portable embedded sys- tems are often severely constrained by form factor, resulting

  5. Breakeven Cost for Residential Photovoltaics in the United States: Key Drivers and Sensitivities (Report Summary) (Presentation)

    SciTech Connect (OSTI)

    Denholm, P.; Margolis, R. M.; Ong, S.; Roberts, B.

    2009-12-01T23:59:59.000Z

    "Break-even cost" for photovoltaic (PV) technology is defined as the point where the cost of PV-generated electricity equals the cost of electricity purchased from the grid. Break-even cost is expressed in $/W of an installed system. Achieving break-even cost is a function of many variables. Consequently, break-even costs vary by location and time for a country, such as the United States, with a diverse set of resources, electricity prices, and other variables. In this presentation, we introduce an analysis of PV break-even costs for residential customers in the United States, including an evaluation of some of the key drivers of PV breakeven both regionally and over time. This presentation includes our methodology and presents results for both near-term residential breakeven costs(2009) and future market sensitivities of break-even costs (2015). See also the the report "Break-Even Cost for Residential Photovoltaics in the United States: Key Drivers and Sensitivities". Presentation for NREL/TP-6A2-45991.

  6. Break-Even Cost for Residential Photovoltaics in the United States: Key Drivers and Sensitivities

    SciTech Connect (OSTI)

    Denholm, P.; Margolis, R. M.; Ong, S.; Roberts, B.

    2009-12-01T23:59:59.000Z

    Grid parity--or break-even cost--for photovoltaic (PV) technology is defined as the point where the cost of PV-generated electricity equals the cost of electricity purchased from the grid. Break-even cost is expressed in $/W of an installed system. Achieving break-even cost is a function of many variables. Consequently, break-even costs vary by location and time for a country, such as the United States, with a diverse set of resources, electricity prices, and other variables. In this report, we analyze PV break-even costs for U.S. residential customers. We evaluate some key drivers of grid parity both regionally and over time. We also examine the impact of moving from flat to time-of-use (TOU) rates, and we evaluate individual components of the break-even cost, including effect of rate structure and various incentives. Finally, we examine how PV markets might evolve on a regional basis considering the sensitivity of the break-even cost to four major drivers: technical performance, financing parameters, electricity prices and rates, and policies. We find that local incentives rather than ?technical? parameters are in general the key drivers of the break-even cost of PV. Additionally, this analysis provides insight about the potential viability of PV markets.

  7. Passive faraday mirror attack in practical two-way quantum key distribution system

    E-Print Network [OSTI]

    Shi-Hai Sun; Mu-Sheng Jiang; Lin-Mei Liang

    2012-03-04T23:59:59.000Z

    The faraday mirror (FM) plays a very important role in maintaining the stability of two way plug-and-play quantum key distribution (QKD) system. However, the practical FM is imperfect, which will not only introduce additional quantum bit error rate (QBER) but also leave a loophole for Eve to spy the secret key. In this paper, we propose a passive faraday mirror attack in two way QKD system based on the imperfection of FM. Our analysis shows that, if the FM is imperfect, the dimension of Hilbert space spanned by the four states sent by Alice is three instead of two. Thus Eve can distinguish these states with a set of POVM operators belonging to three dimension space, which will reduce the QBER induced by her attack. Furthermore, a relationship between the degree of the imperfection of FM and the transmittance of the practical QKD system is obtained. The results show that, the probability that Eve loads her attack successfully depends on the degree of the imperfection of FM rapidly, but the QBER induced by Eve's attack changes with the degree of the imperfection of FM slightly.

  8. Passive Faraday-mirror attack in a practical two-way quantum-key-distribution system

    SciTech Connect (OSTI)

    Sun Shihai; Jiang Musheng; Liang Linmei [Department of Physics, National University of Defense Technology, Changsha 410073 (China)

    2011-06-15T23:59:59.000Z

    The Faraday mirror (FM) plays a very important role in maintaining the stability of two-way plug-and-play quantum key distribution (QKD) systems. However, the practical FM is imperfect, which will not only introduce an additional quantum bit error rate (QBER) but also leave a loophole for Eve to spy the secret key. In this paper we propose a passive Faraday mirror attack in two-way QKD system based on the imperfection of FM. Our analysis shows that if the FM is imperfect, the dimension of Hilbert space spanned by the four states sent by Alice is three instead of two. Thus Eve can distinguish these states with a set of Positive Operator Valued Measure (POVM) operators belonging to three-dimension space, which will reduce the QBER induced by her attack. Furthermore, a relationship between the degree of the imperfection of FM and the transmittance of the practical QKD system is obtained. The results show that the probability that Eve loads her attack successfully depends on the degree of the imperfection of FM rapidly, but the QBER induced by Eve's attack changes slightly with the degree of the FM imperfection.

  9. Lyapunov-Based Distributed Control of the Safety Factor Profile in a Tokamak Plasma

    E-Print Network [OSTI]

    Boyer, Edmond

    Lyapunov-Based Distributed Control of the Safety Factor Profile in a Tokamak Plasma Federico safety-factor profile in a tokamak plasma. Using relevant physical models and simplifying assumptions within a tokamak plasma is a key issue to achieve (and maintain) in a safe manner high

  10. SCIAMACHY MONITORING FACTORS: OBSERVATION AND END-TO-END CORRECTION OF INSTRUMENT PERFORMANCE DEGRADATION

    E-Print Network [OSTI]

    Tilstra, Gijsbert

    DEGRADATION Klaus Bramstedt1 , Stefan No¨el1 , Heinrich Bovensmann1 , John P. Burrows1 , Christophe Lerot2-factors. Key words: SCIAMACHY; m-factors; degradation; mon- itoring. 1. INTRODUCTION SCIAMACHY [1] is now seven's precursor Global Ozone Monitoring Experiment (GOME), the performance of the instrument is degrading

  11. Uncertainty Analysis for Photovoltaic Degradation Rates (Poster)

    SciTech Connect (OSTI)

    Jordan, D.; Kurtz, S.; Hansen, C.

    2014-04-01T23:59:59.000Z

    Dependable and predictable energy production is the key to the long-term success of the PV industry. PV systems show over the lifetime of their exposure a gradual decline that depends on many different factors such as module technology, module type, mounting configuration, climate etc. When degradation rates are determined from continuous data the statistical uncertainty is easily calculated from the regression coefficients. However, total uncertainty that includes measurement uncertainty and instrumentation drift is far more difficult to determine. A Monte Carlo simulation approach was chosen to investigate a comprehensive uncertainty analysis. The most important effect for degradation rates is to avoid instrumentation that changes over time in the field. For instance, a drifting irradiance sensor, which can be achieved through regular calibration, can lead to a substantially erroneous degradation rates. However, the accuracy of the irradiance sensor has negligible impact on degradation rate uncertainty emphasizing that precision (relative accuracy) is more important than absolute accuracy.

  12. Guidance on Life-Cycle Cost Analysis Required by Executive Order...

    Energy Savers [EERE]

    Documents & Publications Energy Price Indices and Discount Factors for Life-Cycle Cost Analysis - 2010 Energy Price Indices and Discount Factors for Life-Cycle Cost Analysis -...

  13. Practical security bounds against the Trojan-horse attack in quantum key distribution

    E-Print Network [OSTI]

    Marco Lucamarini; Iris Choi; Martin B. Ward; James F. Dynes; Zhiliang Yuan; Andrew J. Shields

    2015-06-05T23:59:59.000Z

    In the quantum version of a Trojan-horse attack, photons are injected into the optical modules of a quantum key distribution system in an attempt to read information direct from the encoding devices. To stop the Trojan photons, the use of passive optical components has been suggested. However, to date, there is no quantitative bound that specifies such components in relation to the security of the system. Here, we turn the Trojan-horse attack into an information leakage problem. This allows us quantify the system security and relate it to the specification of the optical elements. The analysis is supported by the experimental characterization of reflectivity and transmission of the optical components most relevant to security.

  14. Provenance analysis as a key to orogenic exhumation: a case study from the East Carpathians (Romania)

    E-Print Network [OSTI]

    Utrecht, Universiteit

    (Romania) Cristina E. Panaiotu,1 Iuliana Vasiliev,2 Cristian G. Panaiotu,3 Wout Krijgsman2 and Cor G. Langereis2 1 Faculty of Geology and Geophysics, University of Bucharest, Bucharest, Romania; 2 Paleomagnetic, Bucharest, Romania Introduction and Geological overview The East Carpathians (Fig. 1) repre- sent

  15. Analysis and mitigation of key losses in a multi-stage 25-100 K cryocooler

    E-Print Network [OSTI]

    Segado, Martin Alan

    2014-01-01T23:59:59.000Z

    A need exists for small, robust, and efficient cryocoolers operating in the 25-100 K range; however, while technological advances have enabled the development of such machines, a greater understanding of the losses affecting ...

  16. An Analysis of Bridge Abutment Shear Key Behavior due to Embankment Modeling and Earthquake Intensity

    E-Print Network [OSTI]

    Wasef, Nardin Mofid

    Lsp2 ?? 4.8m W sp2 ?? Lsp2 ? W deck ? 0.761 ? MN Lsp3 ?? 4mW sp3 ?? Lsp3 ? W deck ? 0.635 ? MN Lsp4 ?? 3.8m W sp4 ??

  17. The Related-Key Analysis of Feistel Constructions Manuel Barbosa1 and Pooya Farshim2

    E-Print Network [OSTI]

    to relatively simple physical attacks, when these exploit implementation aspects that were abstracted away the original work of Knudsen and Biham, there have been many reported cases of successful related

  18. Key worker housing : a demand analysis of middle-income workforce housing in eastern Massachusetts

    E-Print Network [OSTI]

    Sacks, Sean D

    2005-01-01T23:59:59.000Z

    The Boston Metropolitan Area is one of the most expensive places to live in the United States. In recent years studies have speculated that middle-income workers have had to endure increased commute times as they have moved ...

  19. Key worker housing : a demographic analysis of working families in eastern Massachusetts

    E-Print Network [OSTI]

    Wagner, Margaret Fitzgerald

    2005-01-01T23:59:59.000Z

    As housing costs have soared nationwide, many policy makers have grown increasingly aware of working families' housing needs. Currently, having a full-time job does not guarantee decent and affordable housing. Many housing ...

  20. GREET Bioenergy Life Cycle Analysis and Key Issues for Woody Feedstocks |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport inEnergy0.pdfTechnologiesNATIONAL ENVIRONMENTALnaturalGENII2Department of

  1. A Key Review On Exergetic Analysis And Assessment Of Renewable Energy

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealand Jump to:Ezfeedflag JumpID-fTriWildcat 1 WindtheEnergy Information FlashingEvaluation |

  2. Security of Power Packet Dispatching Using Differential Chaos Shift Keying

    E-Print Network [OSTI]

    Yanzi Zhou; Ryo Takahashi; Takashi Hikihara

    2015-02-19T23:59:59.000Z

    This paper investigates and confirms one advantageous function of a power packet dispatching system, which has been proposed by authors' group with being apart from the conventional power distribution system. Here is focused on the function to establish the security of power packet dispatching for prohibiting not only information but also power of power packet from being stolen by attackers. For the purpose of protecting power packets, we introduce a simple encryption of power packets before sending them. Encryption scheme based on chaotic signal is one possibility for this purpose. This paper adopts the Differential Chaos Shift Keying (DCSK) scheme for the encryption, those are partial power packet encryption and whole power packet encryption.

  3. Key Science Observations of AGNs with KaVA Array

    E-Print Network [OSTI]

    Kino, Motoki; Zhao, Guang-Yao; Sohn, Bong Won

    2015-01-01T23:59:59.000Z

    KaVA (KVN and VERA Array) is a new combined VLBI array with KVN (Korean VLBI Network) and VERA (VLBI Exploration of Radio Astrometry). First, we briefly review the imaging capabilities of KaVA array which actually achieves more than three times better dynamic range than that achieved by VERA alone. The KaVA images clearly show detailed structures of extended radio jets in AGNs. Next, we represent the key science program to be led by KaVA AGN sub working group. We will conduct the monitoring observations of Sgr A* and M87 because of the largeness of their central super-massive black hole angular sizes. The main science goals of the program are (i) testing magnetically-driven-jet paradigm by mapping velocity fields of the M87 jet, and (ii) obtaining tight constraints on physical properties of radio emitting region in Sgr A*.

  4. Quantum public-key algorithms to encrypt and authenticate quantum messages with information-theoretic security

    E-Print Network [OSTI]

    Liang, Min

    2012-01-01T23:59:59.000Z

    Public-key cryptosystems for quantum messages are considered from two aspects: public-key encryption and public-key authentication. Firstly, we propose a general construction of quantum public-key encryption scheme, and then construct an information-theoretic secure instance. Then, we propose a quantum public-key authentication scheme, which can protect the integrity of quantum messages. This scheme can both encrypt and authenticate quantum messages. It is information-theoretic secure with regard to encryption, and the success probability of tampering decreases exponentially with the security parameter with regard to authentication. Compared with classical public-key cryptosystems, one private-key in our schemes corresponds to an exponential number of public-keys, and every quantum public-key used by the sender is an unknown quantum state to the sender.

  5. Quantum public-key algorithms to encrypt and authenticate quantum messages with information-theoretic security

    E-Print Network [OSTI]

    Min Liang; Li Yang

    2012-05-10T23:59:59.000Z

    Public-key cryptosystems for quantum messages are considered from two aspects: public-key encryption and public-key authentication. Firstly, we propose a general construction of quantum public-key encryption scheme, and then construct an information-theoretic secure instance. Then, we propose a quantum public-key authentication scheme, which can protect the integrity of quantum messages. This scheme can both encrypt and authenticate quantum messages. It is information-theoretic secure with regard to encryption, and the success probability of tampering decreases exponentially with the security parameter with regard to authentication. Compared with classical public-key cryptosystems, one private-key in our schemes corresponds to an exponential number of public-keys, and every quantum public-key used by the sender is an unknown quantum state to the sender.

  6. analysis reveals candidate: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Biham 1 Adi Shamir 2 1 Computer consider Kocher's power analysis technique, which targets smart card inplementations and extracts their key by analysing their power consumption...

  7. analysis center fy: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    University of 4 Office of Planning and Analysis, FY13 Key Performance Indicators April, 2014 10,000,000 Environmental Sciences and Ecology Websites Summary: Office of Planning...

  8. Evaluation of selected binding domains for the analysis of ubiquitinat...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    been shown to be involved in many critical eukaryotic cellular functions. Affinity enrichment of ubiquitinated proteins has enabled the global analysis of this key modification....

  9. FGF growth factor analogs

    DOE Patents [OSTI]

    Zamora, Paul O. (Gaithersburg, MD); Pena, Louis A. (Poquott, NY); Lin, Xinhua (Plainview, NY); Takahashi, Kazuyuki (Germantown, MD)

    2012-07-24T23:59:59.000Z

    The present invention provides a fibroblast growth factor heparin-binding analog of the formula: ##STR00001## where R.sub.1, R.sub.2, R.sub.3, R.sub.4, R.sub.5, X, Y and Z are as defined, pharmaceutical compositions, coating compositions and medical devices including the fibroblast growth factor heparin-binding analog of the foregoing formula, and methods and uses thereof.

  10. Electromagetic proton form factors

    E-Print Network [OSTI]

    M Y Hussein

    2006-10-31T23:59:59.000Z

    The electromagnetic form factors are crucial to our understanding of the proton internal structure, and thus provide a strong constraint of the distributions of the charge and magnetization current within the proton. We adopted the quark-parton model for calculating and understanding the charge structure of the proton interms of the electromagnetic form factors. A remarkable agreement with the available experimental evidence is found.

  11. The Origins of the SPAR-H Method's Performance Shaping Factor Multipliers

    SciTech Connect (OSTI)

    Ronald L. Boring; Harold S. Blackman

    2007-08-01T23:59:59.000Z

    The Standardized Plant Analysis Risk-Human Reliability Analysis (SPAR-H) method has proved to be a reliable, easy-to-use method for human reliability analysis. Calculation of human error probability (HEP) rates is especially straightforward, starting with pre-defined nominal error rates for cognitive vs. action oriented tasks, and incorporating performance shaping factor (PSF) multipliers upon those nominal error rates. SPAR-H uses eight PSFs with multipliers typically corresponding to nominal, degraded, and severely degraded human performance for individual PSFs. Additionally, some PSFs feature multipliers to reflect enhanced performance. Although SPAR-H enjoys widespread use among industry and regulators, current source documents on SPAR-H such as NUREG/CR-6883 do not provide a clear account of the origin of these multipliers. The present paper redresses this shortcoming and documents the historic development of the SPAR-H PSF multipliers, from the initial use of nominal error rates, to the selection of the eight PSFs, to the mapping of multipliers to available data sources such as a Technique for Human Error Rate Prediction (THERP). Where error rates were not readily derived from THERP and other sources, expert judgment was used to extrapolate appropriate values. In documenting key background information on the multipliers, this paper provides a much needed cross-reference for human reliability practitioners and researchers of SPAR-H to validate analyses and research findings.

  12. Principal Canopy Factors of Sweet Corn and Relationships to Competitive Ability with Wild-Proso Millet (Panicum miliaceum)

    E-Print Network [OSTI]

    Sims, Gerald K.

    -season ``canopy closure'' factor (e.g., leaf area index and intercepted photosynthetically active radiation at six', `Quickie', `Rocker', `SCH7006RR', `Spirit', `Spring Treat', and `Sugar Buns'. Key words: Competition, crop

  13. Framework for Identifying Key Environmental Concerns in Marine Renewable Energy Projects- Appendices

    SciTech Connect (OSTI)

    Sharon Kramer; Mirko Previsic; Peter Nelson; Sheri Woo

    2010-06-17T23:59:59.000Z

    Marine wave and tidal energy technology could interact with marine resources in ways that are not well understood. As wave and tidal energy conversion projects are planned, tested, and deployed, a wide range of stakeholders will be engaged; these include developers, state and federal regulatory agencies, environmental groups, tribal governments, recreational and commercial fishermen, and local communities. Identifying stakeholders’ environmental concerns in the early stages of the industry’s development will help developers address and minimize potential environmental effects. Identifying important concerns will also assist with streamlining siting and associated permitting processes, which are considered key hurdles by the industry in the U.S. today. In September 2008, RE Vision consulting, LLC was selected by the Department of Energy (DoE) to conduct a scenario-based evaluation of emerging hydrokinetic technologies. The purpose of this evaluation is to identify and characterize environmental impacts that are likely to occur, demonstrate a process for analyzing these impacts, identify the “key” environmental concerns for each scenario, identify areas of uncertainty, and describe studies that could address that uncertainty. This process is intended to provide an objective and transparent tool to assist in decision-making for siting and selection of technology for wave and tidal energy development. RE Vision worked with H. T. Harvey & Associates, to develop a framework for identifying key environmental concerns with marine renewable technology. This report describes the results of this study. This framework was applied to varying wave and tidal power conversion technologies, scales, and locations. The following wave and tidal energy scenarios were considered: ? 4 wave energy generation technologies ? 3 tidal energy generation technologies ? 3 sites: Humboldt coast, California (wave); Makapu’u Point, Oahu, Hawaii (wave); and the Tacoma Narrows, Washington (tidal) ? 3 project sizes: pilot, small commercial, and large commercial The possible combinations total 24 wave technology scenarios and 9 tidal technology scenarios. We evaluated 3 of the 33 scenarios in detail: 1. A small commercial OPT Power Buoy project off the Humboldt County, California coast 2. A small commercial Pelamis Wave Power P-2 project off Makapu’u Point, Oahu, Hawaii 3. A pilot MCT SeaGen tidal project, sited in the Tacoma Narrows, Washington This framework document used information available from permitting documents that were written to support actual wave or tidal energy projects, but the results obtained here should not be confused with those of the permitting documents1. The main difference between this framework document and permitting documents of currently proposed pilot projects is that this framework identifies key environmental concerns and describes the next steps in addressing those concerns; permitting documents must identify effects, find or declare thresholds of significance, evaluate the effects against the thresholds, and find mitigation measures that will minimize or avoid the effects so they can be considered less-than-significant. Two methodologies, 1) an environmental effects analysis and 2) Raptools, were developed and tested to identify potential environmental effects associated with wave or tidal energy conversion projects. For the environmental effects analysis, we developed a framework based on standard risk assessment techniques. The framework was applied to the three scenarios listed above. The environmental effects analysis addressed questions such as: ? What is the temporal and spatial exposure of a species at a site? ? What are the specific potential project effects on that species? ? What measures could minimize, mitigate, or eliminate negative effects? ? Are there potential effects of the project, or species’ response to the effect, that are highly uncertain and warrant additional study? The second methodology, Raptools, is a collaborative approach useful for evaluating multiple characteristi

  14. Direct Proof of Security of Wegman-Carter Authentication with Partially Known Key

    E-Print Network [OSTI]

    Direct Proof of Security of Wegman-Carter Authentication with Partially Known Key Aysajan Abidin by Wegman and Carter [24], in the case of partially known key. The scheme is based on secretly selecting

  15. Unconditional Security of Time-Energy Entanglement Quantum Key Distribution Using Dual-Basis Interferometry

    E-Print Network [OSTI]

    Zhang, Zheshen

    High-dimensional quantum key distribution (HDQKD) offers the possibility of high secure-key rate with high photon-information efficiency. We consider HDQKD based on the time-energy entanglement produced by spontaneous ...

  16. Sixth Northwest Conservation and Electric Power Plan Chapter 2: Key Assumptions

    E-Print Network [OSTI]

    at zero and increase to $47 per ton of CO2 emissions by 2030. Higher electricity prices reduce demandSixth Northwest Conservation and Electric Power Plan Chapter 2: Key Assumptions Summary of Key................................................................ 10 Wholesale Electricity Prices

  17. Lowest Engine-Out Emissions as the Key to the Future of the Heavy...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Lowest Engine-Out Emissions as the Key to the Future of the Heavy-Duty Diesel Engine: New Development Rersults Lowest Engine-Out Emissions as the Key to the Future of the...

  18. Direct and Reverse Secret-Key Capacities of a Quantum Channel

    E-Print Network [OSTI]

    Braunstein, Samuel L.

    We define the direct and reverse secret-key capacities of a memoryless quantum channel as the optimal rates that entanglement-based quantum-key-distribution protocols can reach by using a single forward classical communication ...

  19. Key Geomechanics Issues at the Waste Isolation Pilot Plant Geomechanics

    SciTech Connect (OSTI)

    HANSEN,FRANCIS D.

    1999-09-01T23:59:59.000Z

    Mechanical and hydrological properties of rock salt provide excellent bases for geological isolation of hazardous materials. Regulatory compliance determinations for the Waste Isolation Pilot Plant (WIPP) stand as testament to the widely held conclusion that salt provides excellent isolation properties. The WIPP saga began in the 1950s when the U.S. National Academy of Sciences (NAS) recommended a salt vault as a promising solution to the national problem of nuclear waste disposal. For over 20 years, the Scientific basis for the NAS recommendation has been fortified by Sandia National Laboratories through a series of large scale field tests and laboratory investigations of salt properties. These scientific investigations helped develop a comprehensive understanding of salt's 4 reformational behavior over an applicable range of stresses and temperatures. Sophisticated constitutive modeling, validated through underground testing, provides the computational ability to model long-term behavior of repository configurations. In concert with advancement of the mechanical models, fluid flow measurements showed not only that the evaporite lithology was essentially impermeable but that the WIPP setting was hydrologically inactive. Favorable mechanical properties ensure isolation of materials placed in a salt geological setting. Key areas of the geomechanics investigations leading to the certification of WIPP are in situ experiments, laboratory tests, and shaft seal design.

  20. Origin of a complex key innovation in an obligate insectplant mutualism

    E-Print Network [OSTI]

    Krenn, Harald W.

    Origin of a complex key innovation in an obligate insect­plant mutualism Olle Pellmyr* and Harald W, and approved January 30, 2002 (received for review November 2, 2001) Evolutionary key innovations give for studies of coevolution, and it relies on the key innovation in the moths of complex tentacles used

  1. Private Key Recovery Combination Attacks: On Extreme Fragility of Popular Bitcoin

    E-Print Network [OSTI]

    Private Key Recovery Combination Attacks: On Extreme Fragility of Popular Bitcoin Key Management and practical operational security in bitcoin digital currency storage systems. We study the security two most used bitcoin HD Wallet key management solutions (e.g. in BIP032 and in earlier systems). These systems

  2. The GH Public-key Cryptosystem Guang Gong, Lein Harn , and Huapeng Wu

    E-Print Network [OSTI]

    Gong, Guang

    The GH Public-key Cryptosystem Guang Gong, Lein Harn #3; , and Huapeng Wu #3;#3; Department-order characteristic sequences which was proposed by Gong and Harn in 1999. Key words. Public-key cryptosystem, digital signature, third-order linear feedback shift register sequences over #12;nite #12;elds. 1 Introduction Gong

  3. On the security of some password-based key agreement schemes

    E-Print Network [OSTI]

    on Jablon's scheme, namely the first password- based key agreement mechanism in ISO/IEC FCD 11770 further show that other password-based key agreement mechanisms, including those in ISO/IEC FCD 11770 a session key, they first compute g = pw2 mod p. Note that in the first mechanism of ISO/IEC FCD 11770-4 [19

  4. Attacks On An ISO/IEC 11770-2 Key Establishment Protocol Zhaohui Cheng

    E-Print Network [OSTI]

    Attacks On An ISO/IEC 11770-2 Key Establishment Protocol Zhaohui Cheng and Richard Comley September) on a key establishment protocol (mechanism 12) standardised in ISO/IEC 11770-2 are described and two standardised as key establishment mechanism 12 in ISO/IEC 11770-2 [7] is vulnerable to a replay attack and also

  5. Attacks On An ISO/IEC 117702 Key Establishment Protocol Zhaohui Cheng # and Richard Comley

    E-Print Network [OSTI]

    Attacks On An ISO/IEC 11770­2 Key Establishment Protocol Zhaohui Cheng # and Richard Comley) on a key establishment protocol (mechanism 12) standardised in ISO/IEC 11770­2 are described and two standardised as key establishment mechanism 12 in ISO/IEC 11770­2 [7] is vulnerable to a replay attack and also

  6. A Framework for Distributed Key Management Schemes in Heterogeneous Wireless Sensor Networks

    E-Print Network [OSTI]

    Hu, Jiankun

    A Framework for Distributed Key Management Schemes in Heterogeneous Wireless Sensor Networks Kejie propose a framework for key management schemes in distributed wireless sensor networks with heterogeneous, the wireless sensor network can achieve higher key connectivity and higher resilience. I. INTRODUCTION Wireless

  7. Imnaha Subbasin Assessment May 2004259 1.2.10.3 Key Environmental Correlates

    E-Print Network [OSTI]

    Imnaha Subbasin Assessment May 2004259 1.2.10.3 Key Environmental Correlates Key environmental conditions. Key environmental correlates are the finest scale features that help to define wildlife habitat the environmental correlates exert of the realized fitness of a species (Johnson and O'Neil 2001). They include

  8. Evaluation of the effects of a highway improvement project on Key deer

    E-Print Network [OSTI]

    Braden, Anthony Wayne

    2006-10-30T23:59:59.000Z

    assessed the potential impacts of the US 1 corridor project to Key deer movements by comparing (1) radio-collared Key deer annual ranges (2) radio-collared deer corridor movements, and (3) assessing Key deer underpass and corridor use. Female and male...

  9. A Remark on Secret-Key Generation over Correlated Fading Channels

    E-Print Network [OSTI]

    Khisti, Ashish

    A Remark on Secret-Key Generation over Correlated Fading Channels Ashish Khisti ECE Dept. Univ@ee.ucla.edu Abstract-- We study secret-key agreement with public discussion over a flat-fading wiretap channel model. INTRODUCTION In recent years there has been a significant interest in developing secret-key agreement protocols

  10. Secret-Key Agreement over Non-Coherent Block-Fading Channels with Public Discussion

    E-Print Network [OSTI]

    Khisti, Ashish

    1 Secret-Key Agreement over Non-Coherent Block-Fading Channels with Public Discussion Ashish Khisti Member, IEEE Abstract Fundamental limits of secret-key generation over a two-way, reciprocal and block establish upper and lower bounds on the secret-key generation capacity with public discussion. The upper

  11. Secret-key Agreement with Channel State Information at the Transmitter

    E-Print Network [OSTI]

    Khisti, Ashish

    1 Secret-key Agreement with Channel State Information at the Transmitter Ashish Khisti, Member of secret-key agreement over a wiretap channel with state parameters. The transmitter com- municates discussion channel is available. We derive lower and upper bounds on the secret-key capacity. The lower bound

  12. Secret-Key Agreement Capacity over Reciprocal Fading Channels: A Separation Approach

    E-Print Network [OSTI]

    Khisti, Ashish

    1 Secret-Key Agreement Capacity over Reciprocal Fading Channels: A Separation Approach Ashish: akhisti@comm.utoronto.ca Abstract--Fundamental limits of secret-key agreement over reciprocal wireless source generation. The resulting secret-key involves contributions of both channel sequences and source

  13. Non-Coherent Capacity of Secret-Key Agreement with Public Discussion

    E-Print Network [OSTI]

    Khisti, Ashish

    1 Non-Coherent Capacity of Secret-Key Agreement with Public Discussion Anurag Agrawal, Zouheir-coherent capacity of secret-key agreement with public discussion, where neither the sender nor the receivers have Signal-to-Noise Ratio (SNR), the secret-key capacity is bounded in SNR, regardless of the number

  14. Distribution and abundance of endangered Florida Key deer on outer islands

    E-Print Network [OSTI]

    Watts, Dominque Elijah

    2007-04-25T23:59:59.000Z

    parameters has limited status assessment and management of Key deer on outer islands. Traditional survey techniques for Key deer on Big Pine and No Name keys include road-counts, strip-counts, and mark-recapture methods. However, practical limitations render...

  15. antitumor necrosis factor: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    single-nucleo- tide polymorphisms (SNPs) or haplotypes in the TNF Nyholt, Dale R. 10 Maximum-entropy network analysis reveals a role for tumor necrosis factor in peripheral...

  16. Nucleon and $?$ elastic and transition form factors

    E-Print Network [OSTI]

    Jorge Segovia; Ian C. Cloet; Craig D. Roberts; Sebastian M. Schmidt

    2014-09-03T23:59:59.000Z

    We compute nucleon and Delta elastic and transition form factors, and compare predictions made using a framework built upon a Faddeev equation kernel and interaction vertices that possess QCD-like momentum dependence with results obtained using a vector-vector contact-interaction. The comparison emphasises that experiment is sensitive to the momentum dependence of the running couplings and masses in the strong interaction sector of the Standard Model and highlights that the key to describing hadron properties is a veracious expression of dynamical chiral symmetry breaking in the bound-state problem. Amongst the results we describe, the following are of particular interest: $G_E^p(Q^2)/G_M^p(Q^2)$ possesses a zero at $Q^2=9.5GeV^2$; any change in the interaction which shifts a zero in the proton ratio to larger $Q^2$ relocates a zero in $G_E^n(Q^2)/G_M^n(Q^2)$ to smaller $Q^2$; and there is likely a value of momentum transfer above which $G_E^n>G_E^p$. Regarding the $\\Delta(1232)$-baryon, we find that, inter alia: the electric monopole form factor exhibits a zero; the electric quadrupole form factor is negative, large in magnitude, and sensitive to the nature and strength of correlations in the $\\Delta(1232)$ Faddeev amplitude; and the magnetic octupole form factor is negative so long as rest-frame P- and D-wave correlations are included. In connection with the N-to-Delta transition, the momentum-dependence of the magnetic transition form factor, $G_M^\\ast$, matches that of $G_M^n$ once the momentum transfer is high enough to pierce the meson-cloud; and the electric quadrupole ratio is a keen measure of diquark and orbital angular momentum correlations.

  17. Factors Affecting Photosynthesis!

    E-Print Network [OSTI]

    Kudela, Raphael M.

    Factors Affecting Photosynthesis! Temperature Eppley (1972) Light Sverdrup's Critical Depth-493, but the general concept is still valid! ! #12;PB opt & Temperature! #12;Photosynthesis & Temperature! Remember: in the laboratory, we can measure photosynthesis versus irradiance (PvsE) and calculate Ek, Pmax, and alpha

  18. Public Health FAT FACTORS

    E-Print Network [OSTI]

    Qian, Ning

    : THE UNITED STATES SPENDS MORE ON HEALTH CARE THAN ANY OTHER COUNTRY. YET WE CONTINUE TO FALL FAR BEHIND States spends an astonishing percent of our gross domestic product on health care--significantly moreColumbia Public Health HOT TOPIC Climate Change FAT FACTORS Obesity Prevention BOOK SMART

  19. Utility & Regulatory Factors Affecting Cogeneration & Independent Power Plant Design & Operation

    E-Print Network [OSTI]

    Felak, R. P.

    UTILITY & REGULATORY FACTORS AFFECTiNG COGENERATION & INDEPENDENT POWER PLANT DESIGN & OPERATION Richard P. Felak General Electric Company Schenectady, New York ABSTRACT In specifying a cogeneration or independent power plant, the owner... should be especially aware of the influences which electric utilities and regulatory bodies will have on key parameters such as size, efficiency, design. reliability/ availabilitY, operating capabilities and modes, etc. This paper will note examples...

  20. Encrusting growth and retreat of Montastrea annularis (Anthozoa; Scleractinia) following the grounding of a freighter on Molasses Reef, Key Largo, Florida

    E-Print Network [OSTI]

    Choi, Kwang-Sik

    1987-01-01T23:59:59.000Z

    ). Because of its accessibility, it is one of the most visited reefs in the upper Florida Keys (Voss, 1984). Voss (1984) characterized the usage of Molasses Reef by divers as "heavya and use for fishing as "moderate". Structurally, ix, has s, well-developed... management, quantitative evaluation on destructive processes of coral is very necessary as well as that of constructive processes. It is suggested that the influence of previously discussed environmental factors on coral tissue retreat as well as growth...

  1. Los Alamos Explosives Performance Key to Stockpile Stewardship

    ScienceCinema (OSTI)

    Dattelbaum, Dana

    2015-01-05T23:59:59.000Z

    As the U.S. Nuclear Deterrent ages, one essential factor in making sure that the weapons will continue to perform as designed is understanding the fundamental properties of the high explosives that are part of a nuclear weapons system. As nuclear weapons go through life extension programs, some changes may be advantageous, particularly through the addition of what are known as "insensitive" high explosives that are much less likely to accidentally detonate than the already very safe "conventional" high explosives that are used in most weapons. At Los Alamos National Laboratory explosives research includes a wide variety of both large- and small-scale experiments that include small contained detonations, gas and powder gun firings, larger outdoor detonations, large-scale hydrodynamic tests, and at the Nevada Nuclear Security Site, underground sub-critical experiments.

  2. Secure Cryptographic Key Management System (CKMS) Considerations for Smart Grid Devices

    SciTech Connect (OSTI)

    Abercrombie, Robert K [ORNL] [ORNL; Sheldon, Frederick T [ORNL] [ORNL; Aldridge, Hal [ORNL] [ORNL; Duren, Mike [Sypris Electronics, LLC] [Sypris Electronics, LLC; Ricci, Tracy [Sypris Electronics, LLC] [Sypris Electronics, LLC; Bertino, Elisa [ORNL] [ORNL; Kulatunga, Athula [Purdue University] [Purdue University; Navaratne, Uditha Sudheera [Purdue University] [Purdue University

    2011-01-01T23:59:59.000Z

    In this paper, we examine some unique challenges associated with key management in the Smart Grid and concomitant research initiatives: 1) effectively model security requirements and their implementations, and 2) manage keys and key distribution for very large scale deployments such as Smart Meters over a long period of performance. This will set the stage to: 3) develop innovative, low cost methods to protect keying material, and 4) provide high assurance authentication services. We will present our perspective on key management and will discuss some key issues within the life cycle of a cryptographic key designed to achieve the following: 1) control systems designed, installed, operated, and maintained to survive an intentional cyber assault with no loss of critical function, and 2) widespread implementation of methods for secure communication between remote access devices and control centers that are scalable and cost-effective to deploy.

  3. The generation of shared cryptographic keys through channel impulse response estimation at 60 GHz.

    SciTech Connect (OSTI)

    Young, Derek P.; Forman, Michael A.; Dowdle, Donald Ryan

    2010-09-01T23:59:59.000Z

    Methods to generate private keys based on wireless channel characteristics have been proposed as an alternative to standard key-management schemes. In this work, we discuss past work in the field and offer a generalized scheme for the generation of private keys using uncorrelated channels in multiple domains. Proposed cognitive enhancements measure channel characteristics, to dynamically change transmission and reception parameters as well as estimate private key randomness and expiration times. Finally, results are presented on the implementation of a system for the generation of private keys for cryptographic communications using channel impulse-response estimation at 60 GHz. The testbed is composed of commercial millimeter-wave VubIQ transceivers, laboratory equipment, and software implemented in MATLAB. Novel cognitive enhancements are demonstrated, using channel estimation to dynamically change system parameters and estimate cryptographic key strength. We show for a complex channel that secret key generation can be accomplished on the order of 100 kb/s.

  4. MATHEMATICAL ANALYSIS OF CONDUCTING AND SUPERCONDUCTING TRANSMISSION LINES

    E-Print Network [OSTI]

    Ramdani, Karim - Institut de Mathématiques �lie Cartan, Université Henri Poincaré

    MATHEMATICAL ANALYSIS OF CONDUCTING AND SUPERCONDUCTING TRANSMISSION LINES ANNE-SOPHIE BONNET propagation in the microstrip transmission lines used in microelectronics. In the first part, the case of the perfectly conducting strip. Key words. superconducting transmission lines, waveguides, spectral analysis

  5. Centralized Cryptographic Key Management and Critical Risk Assessment - CRADA Final Report For CRADA Number NFE-11-03562

    SciTech Connect (OSTI)

    Abercrombie, R. K. [ORNL] [ORNL; Peters, Scott [Sypris Electronics, LLC] [Sypris Electronics, LLC

    2014-05-28T23:59:59.000Z

    The Department of Energy Office of Electricity Delivery and Energy Reliability (DOE-OE) Cyber Security for Energy Delivery Systems (CSEDS) industry led program (DE-FOA-0000359) entitled "Innovation for Increasing Cyber Security for Energy Delivery Systems (12CSEDS)," awarded a contract to Sypris Electronics LLC to develop a Cryptographic Key Management System for the smart grid (Scalable Key Management Solutions for Critical Infrastructure Protection). Oak Ridge National Laboratory (ORNL) and Sypris Electronics, LLC as a result of that award entered into a CRADA (NFE-11-03562) between ORNL and Sypris Electronics, LLC. ORNL provided its Cyber Security Econometrics System (CSES) as a tool to be modified and used as a metric to address risks and vulnerabilities in the management of cryptographic keys within the Advanced Metering Infrastructure (AMI) domain of the electric sector. ORNL concentrated our analysis on the AMI domain of which the National Electric Sector Cyber security Organization Resource (NESCOR) Working Group 1 (WG1) has documented 29 failure scenarios. The computational infrastructure of this metric involves system stakeholders, security requirements, system components and security threats. To compute this metric, we estimated the stakes that each stakeholder associates with each security requirement, as well as stochastic matrices that represent the probability of a threat to cause a component failure and the probability of a component failure to cause a security requirement violation. We applied this model to estimate the security of the AMI, by leveraging the recently established National Institute of Standards and Technology Interagency Report (NISTIR) 7628 guidelines for smart grid security and the International Electrotechnical Commission (IEC) 63351, Part 9 to identify the life cycle for cryptographic key management, resulting in a vector that assigned to each stakeholder an estimate of their average loss in terms of dollars per day of system operation. To further address probabilities of threats, information security analysis can be performed using game theory implemented in dynamic Agent Based Game Theoretic (ABGT) simulations. Such simulations can be verified with the results from game theory analysis and further used to explore larger scale, real world scenarios involving multiple attackers, defenders, and information assets. The strategy for the game was developed by analyzing five electric sector representative failure scenarios contained in the AMI functional domain from NESCOR WG1. From these five selected scenarios, we characterized them into three specific threat categories affecting confidentiality, integrity and availability (CIA). The analysis using our ABGT simulation demonstrated how to model the AMI functional domain using a set of rationalized game theoretic rules decomposed from the failure scenarios in terms of how those scenarios might impact the AMI network with respect to CIA.

  6. Microsoft Word - fact sheet alternatives and key findings 090214.docx

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA Approved:AdministrationAnalysis andB - H, Page i PART I2MAY

  7. Sandia Energy - Resolving a Key to How Stars Transmit Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What's PossibleRadiationImplementing Nonlinear757Kelley RuehlReportPeter H. KobosRandallAnalysis

  8. Keys to success: Ten case studies of effective weatherization programs

    SciTech Connect (OSTI)

    Brown, M.A.; Berry, L.G.; Kolb, J.O.; White, D.L. [Oak Ridge National Lab., TN (United States); Kinney, L.F.; Wilson, T. [Synertech Systems Corp., Syracuse, NY (United States)

    1993-11-01T23:59:59.000Z

    In 1990, DOE initiated a nationwide evaluation of its Weatherization Program, with assistance from Oak Ridge National Laboratory and an advisory group of 40 weatherization professionals, program managers, and researchers. The evaluation is comprised of three impact studies covering the Program`s major market segments: Single-family homes, mobile homes, and dwellings in small (2 to 4-unit) multifamily buildings (the Single-Family Study), Single-family homes heated primarily with fuel oil (the Fuel-Oil Study), and Dwellings in buildings with five or more units (the Multifamily Study). The Single-Family Study, the subject of this report, is a critical part of this coordinated evaluation effort. Its focus on single-family dwellings, mobile homes, and dwellings in small multifamily buildings covers 83% of the income-eligible population and 96% of the dwellings weatherized during Program Year 1989. The first phase of the Single-Family Study involved the analysis of a massive data base of information collected from 368 local weatherization agencies and 543 electric and gas utilities. This analysis resulted in energy-saving and cost-effectiveness estimates for the Weatherization Program and the identification of a set of ten high-performing agencies located throughout the country. The second phase, which is the subject of this report, involves a ``process`` evaluation of these ten high performers, aimed at identifying those weatherization practices that explain their documented success.

  9. Security of the Bennett 1992 quantum-key distribution protocol against individual attack over a realistic channel

    SciTech Connect (OSTI)

    Tamaki, Kiyoshi; Koashi, Masato; Imoto, Nobuyuki [CREST Research Team for Interacting Carrier Electronics, School of Advanced Sciences, Graduate University for Advanced Studies (SOKENDAI), Hayama, Kanagawa 240-0193 (Japan)

    2003-03-01T23:59:59.000Z

    The security of two-state quantum-key distribution against individual attack is estimated when the channel has losses and noises. We assume that Alice and Bob use two nonorthogonal single-photon polarization states. To make our analysis simple, we propose a modified B92 protocol in which Alice and Bob make use of inconclusive results, and Bob performs a kind of symmetrization of received states. Using this protocol, Alice and Bob can estimate Eve's information gain as a function of a few parameters that reflect the imperfections of devices, or Eve's disturbance. In some parameter regions, Eve's maximum information gain shows counterintuitive behavior, namely, it decreases as the amount of disturbances increases. For a small noise rate, Eve can extract perfect information in the case where the angle between Alice's two states is small or large, while she cannot extract perfect information for intermediate angles. We also estimate the secret key gain, which is the net growth of the secret key per pulse. We show the region where the modified B92 protocol over a realistic channel is secure against individual attack.

  10. How to implement decoy-state quantum key distribution for a satellite uplink with 50-dB channel loss

    SciTech Connect (OSTI)

    Meyer-Scott, Evan; Yan, Zhizhong; MacDonald, Allison; Bourgoin, Jean-Philippe; Huebel, Hannes; Jennewein, Thomas [Institute for Quantum Computing, University of Waterloo, 200 University Avenue W, Waterloo ON, Canada N2L 3G1 (Canada)

    2011-12-15T23:59:59.000Z

    Quantum key distribution (QKD) takes advantage of fundamental properties of quantum physics to allow two distant parties to share a secret key; however, QKD is hampered by a distance limitation of a few hundred kilometers on Earth. The most immediate solution for global coverage is to use a satellite, which can receive separate QKD transmissions from two or more ground stations and act as a trusted node to link these ground stations. In this article we report on a system capable of performing QKD in the high loss regime expected in an uplink to a satellite using weak coherent pulses and decoy states. Such a scenario profits from the simplicity of its receiver payload, but has so far been considered to be infeasible due to very high transmission losses (40-50 dB). The high loss is overcome by implementing an innovative photon source and advanced timing analysis. Our system handles up to 57 dB photon loss in the infinite key limit, confirming the viability of the satellite uplink scenario. We emphasize that while this system was designed with a satellite uplink in mind, it could just as easily overcome high losses on any free space QKD link.

  11. Journal Information Journal Impact Factor

    E-Print Network [OSTI]

    Krejcí, Pavel

    Journal Information Journal Impact Factor 5-Year Journal Impact Factor Journal Self Cites Journal Immediacy Index Journal Cited Half-Life 2012 JCR Science Edition Journal: CZECHOSLOVAK MATHEMATICAL JOURNAL Mark Journal Title ISSN Total Cites Impact Factor 5-Year Impact Factor Immediacy Index Citable Items

  12. Measurement of the ??*?? and ??*??' transition form factors

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    del Amo Sanchez, P.; Lees, J. P.; Poireau, V.; Prencipe, E.; Tisserand, V.; Garra Tico, J.; Grauges, E.; Martinelli, M.; Milanes, D. A.; Palano, A.; Pappagallo, M.; Eigen, G.; Stugu, B.; Sun, L.; Brown, D. N.; Kerth, L. T.; Kolomensky, Yu.?G.; Lynch, G.; Osipenkov, I. L.; Koch, H.; Schroeder, T.; Asgeirsson, D. J.; Hearty, C.; Mattison, T. S.; McKenna, J. A.; Khan, A.; Blinov, V. E.; Botov, A. A.; Buzykaev, A. R.; Druzhinin, V. P.; Golubev, V. B.; Kravchenko, E. A.; Onuchin, A. P.; Serednyakov, S. I.; Skovpen, Yu.?I.; Solodov, E. P.; Todyshev, K.?Yu.; Yushkov, A. N.; Bondioli, M.; Curry, S.; Kirkby, D.; Lankford, A. J.; Mandelkern, M.; Martin, E. C.; Stoker, D. P.; Atmacan, H.; Gary, J. W.; Liu, F.; Long, O.; Vitug, G. M.; Campagnari, C.; Hong, T. M.; Kovalskyi, D.; Richman, J. D.; West, C. A.; Eisner, A. M.; Heusch, C. A.; Kroseberg, J.; Lockman, W. S.; Martinez, A. J.; Schalk, T.; Schumm, B. A.; Seiden, A.; Winstrom, L. O.; Cheng, C. H.; Doll, D. A.; Echenard, B.; Hitlin, D. G.; Ongmongkolkul, P.; Porter, F. C.; Rakitin, A. Y.; Andreassen, R.; Dubrovin, M. S.; Meadows, B. T.; Sokoloff, M. D.; Bloom, P. C.; Ford, W. T.; Gaz, A.; Nagel, M.; Nauenberg, U.; Smith, J. G.; Wagner, S. R.; Ayad, R.; Toki, W. H.; Jasper, H.; Petzold, A.; Spaan, B.; Kobel, M. J.; Schubert, K. R.; Schwierz, R.; Bernard, D.; Verderi, M.; Clark, P. J.; Playfer, S.; Watson, J. E.; Andreotti, M.; Bettoni, D.; Bozzi, C.; Calabrese, R.; Cecchi, A.; Cibinetto, G.; Fioravanti, E.; Franchini, P.; Garzia, I.; Luppi, E.; Munerato, M.; Negrini, M.; Petrella, A.; Piemontese, L.; Baldini-Ferroli, R.; Calcaterra, A.; de Sangro, R.; Finocchiaro, G.; Nicolaci, M.; Pacetti, S.; Patteri, P.; Peruzzi, I. M.; Piccolo, M.; Rama, M.; Zallo, A.; Contri, R.; Guido, E.; Lo Vetere, M.; Monge, M. R.; Passaggio, S.; Patrignani, C.; Robutti, E.; Bhuyan, B.; Prasad, V.; Lee, C. L.; Morii, M.; Edwards, A. J.; Adametz, A.; Marks, J.; Uwer, U.; Bernlochner, F. U.; Ebert, M.; Lacker, H. M.; Lueck, T.; Volk, A.; Dauncey, P. D.; Tibbetts, M.; Behera, P. K.; Mallik, U.; Chen, C.; Cochran, J.; Crawley, H. B.; Meyer, W. T.; Prell, S.; Rosenberg, E. I.; Rubin, A. E.; Gritsan, A. V.; Guo, Z. J.; Arnaud, N.; Davier, M.; Derkach, D.; Firmino da Costa, J.; Grosdidier, G.; Le Diberder, F.; Lutz, A. M.; Malaescu, B.; Perez, A.; Roudeau, P.; Schune, M. H.; Serrano, J.; Sordini, V.; Stocchi, A.; Wang, L.; Wormser, G.; Lange, D. J.; Wright, D. M.; Bingham, I.; Chavez, C. A.; Coleman, J. P.; Fry, J. R.; Gabathuler, E.; Hutchcroft, D. E.; Payne, D. J.; Touramanis, C.; Bevan, A. J.; Di Lodovico, F.; Sacco, R.; Sigamani, M.; Cowan, G.; Paramesvaran, S.; Wren, A. C.; Brown, D. N.; Davis, C. L.; Denig, A. G.; Fritsch, M.; Gradl, W.; Hafner, A.; Alwyn, K. E.; Bailey, D.; Barlow, R. J.; Jackson, G.; Lafferty, G. D.; Anderson, J.; Cenci, R.; Jawahery, A.; Roberts, D. A.; Simi, G.; Tuggle, J. M.; Dallapiccola, C.; Salvati, E.; Cowan, R.; Dujmic, D.; Sciolla, G.; Zhao, M.; Lindemann, D.; Patel, P. M.; Robertson, S. H.; Schram, M.; Biassoni, P.; Lazzaro, A.; Lombardo, V.; Palombo, F.; Stracka, S.; Cremaldi, L.; Godang, R.; Kroeger, R.; Sonnek, P.; Summers, D. J.; Nguyen, X.; Simard, M.; Taras, P.; De Nardo, G.; Monorchio, D.; Onorato, G.; Sciacca, C.; Raven, G.; Snoek, H. L.; Jessop, C. P.; Knoepfel, K. J.; LoSecco, J. M.; Wang, W. F.; Corwin, L. A.; Honscheid, K.; Kass, R.; Blount, N. L.; Brau, J.; Frey, R.; Igonkina, O.; Kolb, J. A.; Rahmat, R.; Sinev, N. B.; Strom, D.; Strube, J.; Torrence, E.; Castelli, G.; Feltresi, E.; Gagliardi, N.; Margoni, M.; Morandin, M.; Posocco, M.; Rotondo, M.; Simonetto, F.; Stroili, R.; Ben-Haim, E.; Bomben, M.; Bonneaud, G. R.; Briand, H.; Calderini, G.; Chauveau, J.; Hamon, O.; Leruste, Ph.; Marchiori, G.; Ocariz, J.; Prendki, J.; Sitt, S.; Biasini, M.; Manoni, E.; Rossi, A.; Angelini, C.; Batignani, G.; Bettarini, S.; Carpinelli, M.; Casarosa, G.; Cervelli, A.; Forti, F.; Giorgi, M. A.; Lusiani, A.; Neri, N.; Paoloni, E.; Rizzo, G.; Walsh, J. J.; Lopes Pegna, D.; Lu, C.; Olsen, J.; Smith, A. J. S.; Telnov, A. V.; Anulli, F.; Baracchini, E.; Cavoto, G.; Faccini, R.; Ferrarotto, F.; Ferroni, F.; Gaspero, M.; Li Gioi, L.; Mazzoni, M. A.; Piredda, G.; Renga, F.; Buenger, C.; Hartmann, T.; Leddig, T.; Schröder, H.; Waldi, R.; Adye, T.; Olaiya, E. O.; Wilson, F. F.; Emery, S.; Hamel de Monchenault, G.; Vasseur, G.; Yèche, Ch.; Allen, M. T.; Aston, D.; Bard, D. J.; Bartoldus, R.; Benitez, J. F.; Cartaro, C.; Convery, M. R.; Dorfan, J.; Dubois-Felsmann, G. P.; Dunwoodie, W.; Field, R. C.; Franco Sevilla, M.; Fulsom, B. G.; Gabareen, A. M.; Graham, M. T.; Grenier, P.; Hast, C.; Innes, W. R.; Kelsey, M. H.; Kim, H.; Kim, P.; Kocian, M. L.; Leith, D. W. G. S.; Lewis, P.; Li, S.; Lindquist, B.; Luitz, S.; Luth, V.; Lynch, H. L.

    2011-09-01T23:59:59.000Z

    We study the reactions e?e??e?e??(') in the single-tag mode and measure the ??*??(') transition form factors in the momentum-transfer range from 4 to 40 GeV². The analysis is based on 469 fb?¹ of integrated luminosity collected at PEP-II with the BABAR detector at e?e? center-of-mass energies near 10.6 GeV.

  13. Attached sunspace design analysis

    SciTech Connect (OSTI)

    Jones, R.W.; McFarland, R.D.

    1981-01-01T23:59:59.000Z

    An introduction to new design analysis information for attached sunspaces is presented. The 28 sunspace reference designs are described. Note is taken of those designs (the semi-enclosed geometries) analyzed more recently than the previously published reports. The role of sensitivity studies is discussed, and some sample plots of sunspace performance sensitivity to key design parameters are presented. The monthly solar load ratio (SLR) correlations are reviewed with emphasis on the modified SLR used in the sunspace analysis. The application of the sunspace SLR correlations to monthly design analysis is outlined.

  14. Finite Element Analysis in Vertebrate Biomechanics

    E-Print Network [OSTI]

    Finite Element Analysis in Vertebrate Biomechanics CALLUM F. ROSS* Department of Organismal Biology presents a series of papers that apply the method of finite element analysis (FEA) to questions ontogenetic or phylogenetic transformations. © 2005 Wiley-Liss, Inc. Key words: finite-element analysis

  15. Understanding the dynamical structure of pulsating stars: The Baade-Wesselink projection factor of the delta Scuti stars AI Vel and beta Cas

    E-Print Network [OSTI]

    Guiglion, G; Mathias, P; de Souza, A Domiciano; Poretti, E; Rainer, M; Fokin, A; Mourard, D; Gieren, W; 10.1051/0004-6361/201220780

    2013-01-01T23:59:59.000Z

    Aims. The Baade-Wesselink method of distance determination is based on the oscillations of pulsating stars. The key parameter of this method is the projection factor used to convert the radial velocity into the pulsation velocity. Our analysis was aimed at deriving for the first time the projection factor of delta Scuti stars, using high-resolution spectra of the high-amplitude pulsator AI Vel and of the fast rotator beta Cas. Methods. The geometric component of the projection factor (i.e. p0) was calculated using a limb-darkening model of the intensity distribution for AI Vel, and a fast-rotator model for beta Cas. Then, using SOPHIE/OHP data for beta Cas and HARPS/ESO data for AI Vel, we compared the radial velocity curves of several spectral lines forming at different levels in the atmosphere and derived the velocity gradient associated to the spectral-line-forming regions in the atmosphere of the star. This velocity gradient was used to derive a dynamical projection factor p. Results. We find a flat veloc...

  16. Diabetes Risk Factors, Diabetes Risk Algorithms, and the Prediction of Future Frailty: the Whitehall II Prospective Cohort Study

    E-Print Network [OSTI]

    Boyer, Edmond

    1 Diabetes Risk Factors, Diabetes Risk Algorithms, and the Prediction of Future Frailty.ac.uk Running head Diabetes risk scores and frailty Key Words Ageing, frailty, diabetes risk scores, diabetes;2 Abstract Objective: To examine whether established diabetes risk factors and diabetes risk algorithms

  17. Secure multi-party communication with quantum key distribution managed by trusted authority

    DOE Patents [OSTI]

    Nordholt, Jane Elizabeth; Hughes, Richard John; Peterson, Charles Glen

    2013-07-09T23:59:59.000Z

    Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD are extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.

  18. Generalized decoding, effective channels, and simplified security proofs in quantum key distribution

    SciTech Connect (OSTI)

    Renes, Joseph M. [IAKS Prof. Beth, Arbeitsgruppe Quantum Computing, Universitaet Karlsruhe, Am Fasanengarten 5, D-76131 Karlsruhe (Germany); Quantum Information Theory Group, Institut fuer Theoretische Physik I, and Max-Planck-Forschungsgruppe, Institut fuer Optik, Information und Photonik, Universitaet Erlangen-Nuernberg, Staudtstrasse 7, D-91058 Erlangen (Germany); Grassl, Markus [IAKS Prof. Beth, Arbeitsgruppe Quantum Computing, Universitaet Karlsruhe, Am Fasanengarten 5, D-76131 Karlsruhe (Germany)

    2006-08-15T23:59:59.000Z

    Prepare and measure quantum key distribution protocols can be decomposed into two basic steps: delivery of the signals over a quantum channel and distillation of a secret key from the signal and measurement records by classical processing and public communication. Here we formalize the distillation process for a general protocol in a purely quantum-mechanical framework and demonstrate that it can be viewed as creating an 'effective' quantum channel between the legitimate users Alice and Bob. The process of secret key generation can then be viewed as entanglement distribution using this channel, which enables application of entanglement-based security proofs to essentially any prepare and measure protocol. To ensure secrecy of the key, Alice and Bob must be able to estimate the channel noise from errors in the key, and we further show how symmetries of the distillation process simplify this task. Applying this method, we prove the security of several key distribution protocols based on equiangular spherical codes.

  19. ADVANCED POWER SYSTEMS ANALYSIS TOOLS

    SciTech Connect (OSTI)

    Robert R. Jensen; Steven A. Benson; Jason D. Laumb

    2001-08-31T23:59:59.000Z

    The use of Energy and Environmental Research Center (EERC) modeling tools and improved analytical methods has provided key information in optimizing advanced power system design and operating conditions for efficiency, producing minimal air pollutant emissions and utilizing a wide range of fossil fuel properties. This project was divided into four tasks: the demonstration of the ash transformation model, upgrading spreadsheet tools, enhancements to analytical capabilities using the scanning electron microscopy (SEM), and improvements to the slag viscosity model. The ash transformation model, Atran, was used to predict the size and composition of ash particles, which has a major impact on the fate of the combustion system. To optimize Atran key factors such as mineral fragmentation and coalescence, the heterogeneous and homogeneous interaction of the organically associated elements must be considered as they are applied to the operating conditions. The resulting model's ash composition compares favorably to measured results. Enhancements to existing EERC spreadsheet application included upgrading interactive spreadsheets to calculate the thermodynamic properties for fuels, reactants, products, and steam with Newton Raphson algorithms to perform calculations on mass, energy, and elemental balances, isentropic expansion of steam, and gasifier equilibrium conditions. Derivative calculations can be performed to estimate fuel heating values, adiabatic flame temperatures, emission factors, comparative fuel costs, and per-unit carbon taxes from fuel analyses. Using state-of-the-art computer-controlled scanning electron microscopes and associated microanalysis systems, a method to determine viscosity using the incorporation of grey-scale binning acquired by the SEM image was developed. The image analysis capabilities of a backscattered electron image can be subdivided into various grey-scale ranges that can be analyzed separately. Since the grey scale's intensity is dependent on the chemistry of the particle, it is possible to map chemically similar areas which can also be related to the viscosity of that compound at temperature. A second method was also developed to determine the elements associated with the organic matrix of the coals, which is currently determined by chemical fractionation. Mineral compositions and mineral densities can be determined for both included and excluded minerals, as well as the fraction of the ash that will be represented by that mineral on a frame-by-frame basis. The slag viscosity model was improved to provide improved predictions of slag viscosity and temperature of critical viscosity for representative Powder River Basin subbituminous and lignite coals.

  20. Daylight operation of a free space, entanglement-based quantum key distribution system

    E-Print Network [OSTI]

    Peloso, Matthew P; Ho, Caleb; Lamas-Linares, Antia; Kurtsiefer, Christian

    2008-01-01T23:59:59.000Z

    Many quantum key distribution (QKD) implementations using a free space transmission path are restricted to operation at night time in order to distinguish the signal photons used for a secure key establishment from background light. Here, we present a lean entanglement-based QKD system overcoming that imitation. By implementing spectral, spatial and temporal filtering techniques, we were able to establish a secure key continuously over several days under varying light and weather conditions.