National Library of Energy BETA

Sample records for analysis key factors

  1. Key Factors in Displacement Ventilation Systems for Better IAQ 

    E-Print Network [OSTI]

    Wang, X.; Chen, J.; Li, Y.; Wang, Z.

    2006-01-01

    This paper sets up a mathematical model of three-dimensional steady turbulence heat transfer in an air-conditioned room of multi-polluting heat sources. Numerical simulation helps identify key factors in displacement ventilation systems that affect...

  2. Key Factors for Digital Collections August 7, 2007

    E-Print Network [OSTI]

    by Fondren's Digital Library Initiative We evaluate digital projects on a case by case basis. There is no oneKey Factors for Digital Collections August 7, 2007 Rice University Digital Repository Supported formula for this process and in fact welcome open discussion on potential digital projects

  3. Key Response Planning Factors for the Aftermath of Nuclear Terrorism

    SciTech Connect (OSTI)

    Buddemeier, B R; Dillon, M B

    2009-01-21

    Despite hundreds of above-ground nuclear tests and data gathered from Hiroshima and Nagasaki, the effects of a ground-level, low-yield nuclear detonation in a modern urban environment are still the subject of considerable scientific debate. Extensive review of nuclear weapon effects studies and discussions with nuclear weapon effects experts from various federal agencies, national laboratories, and technical organizations have identified key issues and bounded some of the unknowns required to support response planning for a low-yield, ground-level nuclear detonation in a modern U.S. city. This study, which is focused primarily upon the hazards posed by radioactive fallout, used detailed fallout predictions from the advanced suite of three-dimensional (3-D) meteorology and plume/fallout models developed at Lawrence Livermore National Laboratory (LLNL), including extensive global Key Response Planning Factors for the Aftermath of Nuclear Terrorism geographical and real-time meteorological databases to support model calculations. This 3-D modeling system provides detailed simulations that account for complex meteorology and terrain effects. The results of initial modeling and analysis were presented to federal, state, and local working groups to obtain critical, broad-based review and feedback on strategy and messaging. This effort involved a diverse set of communities, including New York City, National Capitol Regions, Charlotte, Houston, Portland, and Los Angeles. The largest potential for reducing casualties during the post-detonation response phase comes from reducing exposure to fallout radiation. This can be accomplished through early, adequate sheltering followed by informed, delayed evacuation.B The response challenges to a nuclear detonation must be solved through multiple approaches of public education, planning, and rapid response actions. Because the successful response will require extensive coordination of a large number of organizations, supplemented by appropriate responses by local responders and the general population within the hazard zones, regional planning is essential to success. The remainder of this Executive Summary provides summary guidance for response planning in three areas: (1) Public Protection Strategy details the importance of early, adequate shelter followed by informed evacuation. (2) Responder Priorities identify how to protect response personnel, perform regional situational assessment, and support public safety. (3) Key Planning Considerations refute common myths and provide important information on planning how to respond in the aftermath of nuclear terrorism.

  4. Wind Vision: Analysis Highlights and Key Results

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Highlights and Key Results Eric Lantz (NREL) Ryan Wiser (LBNL) July 15, 2015 2 | Wind and Water Power Technologies Office eere.energy.gov Presentation Overview Wind...

  5. Comparative Analysis of Software Libraries for Public Key Cryptography

    E-Print Network [OSTI]

    Gaj, Krzysztof

    Comparative Analysis of Software Libraries for Public Key Cryptography Ashraf Abusharekh1 and Kris libraries implementing such operations exist both commercially and in the public domain, in this paper, we, using performance and support of public key primitive operations. The performance of all libraries

  6. A Key Review On Exergetic Analysis And Assessment Of Renewable...

    Open Energy Info (EERE)

    A Key Review On Exergetic Analysis And Assessment Of Renewable Energy Resources For A Sustainable Future Jump to: navigation, search OpenEI Reference LibraryAdd to library Journal...

  7. Time-cost analysis of a quantum key distribution system clocked at 100 MHz

    E-Print Network [OSTI]

    Xiaofan Mo; Itzel Lucio Martinez; Philip Chan; Chris Healey; Steve Hosier; Wolfgang Tittel

    2011-05-18

    We describe the realization of a quantum key distribution (QKD) system clocked at 100 MHz. The system includes classical postprocessing implemented via software, and is operated over a 12 km standard telecommunication dark fiber in a real-world environment. A time-cost analysis of the sifted, error-corrected, and secret key rates relative to the raw key rate is presented, and the scalability of our implementation with respect to higher secret key rates is discussed.

  8. Structuring institutional analysis for urban ecosystems: A key to sustainable urban forest management

    E-Print Network [OSTI]

    Evans, Tom

    Structuring institutional analysis for urban ecosystems: A key to sustainable urban forest in urban settings with a specific focus on sustainable urban forest management. We conclude that urban management . Urban forest policy. Institutional analysis . Ecosystem services . Public goods . Sustainability

  9. Occupancy by key transcription factors is a more accurate predictor of enhancer activity than histone modifications or chromatin accessibility

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Dogan, Nergiz; Wu, Weisheng; Morrissey, Christapher S.; Chen, Kuan-Bei; Stonestrom, Aaron; Long, Maria; Keller, Cheryl A.; Cheng, Yong; Jain, Deepti; Visel, Axel; et al

    2015-04-23

    Regulated gene expression controls organismal development, and variation in regulatory patterns has been implicated in complex traits. Thus accurate prediction of enhancers is important for further understanding of these processes. Genome-wide measurement of epigenetic features, such as histone modifications and occupancy by transcription factors, is improving enhancer predictions, but the contribution of these features to prediction accuracy is not known. Given the importance of the hematopoietic transcription factor TAL1 for erythroid gene activation, we predicted candidate enhancers based on genomic occupancy by TAL1 and measured their activity. Contributions of multiple features to enhancer prediction were evaluated based on the resultsmore »of these and other studies. Results: TAL1-bound DNA segments were active enhancers at a high rate both in transient transfections of cultured cells (39 of 79, or 56%) and transgenic mice (43 of 66, or 65%). The level of binding signal for TAL1 or GATA1 did not help distinguish TAL1-bound DNA segments as active versus inactive enhancers, nor did the density of regulation-related histone modifications. A meta-analysis of results from this and other studies (273 tested predicted enhancers) showed that the presence of TAL1, GATA1, EP300, SMAD1, H3K4 methylation, H3K27ac, and CAGE tags at DNase hypersensitive sites gave the most accurate predictors of enhancer activity, with a success rate over 80% and a median threefold increase in activity. Chromatin accessibility assays and the histone modifications H3K4me1 and H3K27ac were sensitive for finding enhancers, but they have high false positive rates unless transcription factor occupancy is also included. Conclusions: Occupancy by key transcription factors such as TAL1, GATA1, SMAD1, and EP300, along with evidence of transcription, improves the accuracy of enhancer predictions based on epigenetic features.« less

  10. Human Factors Engineering Program Review Model (NUREG-0711)Revision 3: Update Methodology and Key Revisions

    SciTech Connect (OSTI)

    OHara J. M.; Higgins, J.; Fleger, S.

    2012-07-22

    The U.S. Nuclear Regulatory Commission (NRC) reviews the human factors engineering (HFE) programs of applicants for nuclear power plant construction permits, operating licenses, standard design certifications, and combined operating licenses. The purpose of these safety reviews is to help ensure that personnel performance and reliability are appropriately supported. Detailed design review procedures and guidance for the evaluations is provided in three key documents: the Standard Review Plan (NUREG-0800), the HFE Program Review Model (NUREG-0711), and the Human-System Interface Design Review Guidelines (NUREG-0700). These documents were last revised in 2007, 2004 and 2002, respectively. The NRC is committed to the periodic update and improvement of the guidance to ensure that it remains a state-of-the-art design evaluation tool. To this end, the NRC is updating its guidance to stay current with recent research on human performance, advances in HFE methods and tools, and new technology being employed in plant and control room design. NUREG-0711 is the first document to be addressed. We present the methodology used to update NUREG-0711 and summarize the main changes made. Finally, we discuss the current status of the update program and the future plans.

  11. A Semantic Analysis of Key Management Protocols for Wireless Sensor Networks$

    E-Print Network [OSTI]

    Merro, Massimo

    analysis of three well-known key management protocols for wireless sensor networks: µTESLA, LEAP+ and Li. Introduction Wireless sensors are small and cheap devices powered by low-energy batteries, equipped with radio protocol. Due to resource limitations, all key management protocols for WSNs, such as µTESLA [1], LiSP [2

  12. Multilevel Factor Analysis of Class and Student Achievement Components

    E-Print Network [OSTI]

    Bengt O. Muthén

    2011-01-01

    Multilevel Factor Analysis of Class and Student AchievementMultilevel Factor Analysis of Class and Student Achievementof students observed within classes, classes within schools,

  13. GREET Bioenergy Life Cycle Analysis and Key Issues for Woody Feedstocks

    Broader source: Energy.gov [DOE]

    Breakout Session 2D—Building Market Confidence and Understanding II: Carbon Accounting and Woody Biofuels GREET Bioenergy Life Cycle Analysis and Key Issues for Woody Feedstocks Michael Wang, Senior Scientist, Energy Systems, Argonne National Laboratory

  14. Factors Analysis on Safety of Indoor Air Quality 

    E-Print Network [OSTI]

    Luo, Q.; Liu, Z.; Xiong, J.

    2006-01-01

    Influence factors on safety of indoor air quality (IAQ) were analyzed in this paper. Some regeneration compositions resulting from potential indoor chemical reactions may be more harmful to habitants. A few building flaws may be key factors...

  15. Factor Analysis for Skewed Data and Skew-Normal Maximum Likelihood Factor Analysis 

    E-Print Network [OSTI]

    Gaucher, Beverly Jane

    2013-04-04

    This research explores factor analysis applied to data from skewed distributions for the general skew model, the selection-elliptical model, the selection-normal model, the skew-elliptical model and the skew-normal model ...

  16. Factoring RSA keys from certified smart cards: Coppersmith in the wild

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    taking deeper advantage of randomness-generation failures: first using the shared primes as a springboard- loaded from Taiwan's national "Citizen Digital Certificate" database. These keys were generated by government-issued smart cards that have built-in hardware random-number generators and that are advertised

  17. Economic Life Cycle Assessment as element of sustainability certification – a key success factor moving beyond Life Cycle Costing 

    E-Print Network [OSTI]

    Trinius, W.; Hirsch, H.

    2009-01-01

    Lakenbrink, DU Diederichs Project Management, Munich, Germany Title Economic Life Cycle Assessment as element of sustainability certification ? a key success factor moving beyond Life Cycle Costing The move from considering environmental impacts... on sustainability of construction works, and relating to the emerging European standards in this field, the recently established German Sustainable Building Council (GeSBC / DGNB) presented a certification scheme applying a holistic life cycle model. While...

  18. Graph-theoretic design and analysis of key predistribution schemes Michelle Kendall Keith M. Martin

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Graph-theoretic design and analysis of key predistribution schemes Michelle Kendall Keith M. Martin, a general understanding of the design prin- ciples on which to base such constructions is somewhat lacking as a sound design principle. Second, we propose the use of incidence graphs and concurrence graphs as tools

  19. Key factors for determining groundwater impacts due to leakage from geologic carbon sequestration reservoirs

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Carroll, Susan A.; Keating, Elizabeth; Mansoor, Kayyum; Dai, Zhenxue; Sun, Yunwei; Trainor-Guitton, Whitney; Brown, Chris; Bacon, Diana

    2014-09-07

    The National Risk Assessment Partnership (NRAP) is developing a science-based toolset for the analysis of potential impacts to groundwater chemistry from CO2 injection (www.netldoe.gov/nrap). The toolset adopts a stochastic approach in which predictions address uncertainties in shallow groundwater and leakage scenarios. It is derived from detailed physics and chemistry simulation results that are used to train more computationally efficient models, referred to here as reduced-order models (ROMs), for each component system. In particular, these tools can be used to help regulators and operators understand the expected sizes and longevity of plumes in pH, TDS, and dissolved metals that could resultmore »from a leakage of brine and/or CO2 from a storage reservoir into aquifers. This information can inform, for example, decisions on monitoring strategies that are both effective and efficient. We have used this approach to develop predictive reduced-order models for two common types of reservoirs, but the approach could be used to develop a model for a specific aquifer or other common types of aquifers. In this paper we describe potential impacts to groundwater quality due to CO2 and brine leakage, discuss an approach to calculate thresholds under which no impact to groundwater occurs, describe the time scale for impact on groundwater, and discuss the probability of detecting a groundwater plume should leakage occur. To facilitate this, multi-phase flow and reactive transport simulations and emulations were developed for two classes of aquifers, considering uncertainty in leakage source terms and aquifer hydrogeology. We targeted an unconfined fractured carbonate aquifer based on the Edwards aquifer in Texas and a confined alluvium aquifer based on the High Plains Aquifer in Kansas, which share characteristics typical of many drinking water aquifers in the United States. The hypothetical leakage scenarios centered on the notion that wellbores are the most likely conduits for brine and CO2 leaks. Leakage uncertainty was based on hypothetical injection of CO2 for 50 years at a rate of 5 million tons per year into a depleted oil/gas reservoir with high permeability and, one or more wells provided leakage pathways from the storage reservoir to the overlying aquifer. This scenario corresponds to a storage site with historical oil/gas production and some poorly completed legacy wells that went undetected through site evaluation, operations, and post-closure. For the aquifer systems and leakage scenarios studied here, CO2 and brine leakage are likely to drive pH below and increase total dissolved solids (TDS) above the “no-impact thresholds;” and the subsequent plumes, although small, are likely to persist for long periods of time in the absence of remediation. In these scenarios, however, risk to human health may not be significant for two reasons. First, our simulated plume volumes are much smaller than the average inter-well spacing for these representative aquifers, so the impacted groundwater would be unlikely to be pumped for drinking water. Second, even within the impacted plume volumes little water exceeds the primary maximum contamination levels.« less

  20. Key factors for determining groundwater impacts due to leakage from geologic carbon sequestration reservoirs

    SciTech Connect (OSTI)

    Carroll, Susan A.; Keating, Elizabeth; Mansoor, Kayyum; Dai, Zhenxue; Sun, Yunwei; Trainor-Guitton, Whitney; Brown, Christopher F.; Bacon, Diana H.

    2014-10-01

    The National Risk Assessment Partnership (NRAP) is developing a science-based toolset for the analysis of potential impacts to groundwater chemistry from CO2 injection (www.netldoe.gov/nrap). The toolset adopts a stochastic approach in which predictions address uncertainties in shallow groundwater and leakage scenarios. It is derived from detailed physics and chemistry simulation results that are used to train more computationally efficient models, referred to here as reduced-order models (ROMs), for each component system. In particular, these tools can be used to help regulators and operators understand the expected sizes and longevity of plumes in pH, TDS, and dissolved metals that could result from a leakage of brine and/or CO2 from a storage reservoir into aquifers. This information can inform, for example, decisions on monitoring strategies that are both effective and efficient. We have used this approach to develop predictive reduced-order models for two common types of reservoirs, but the approach could be used to develop a model for a specific aquifer or other common types of aquifers. In this paper we describe potential impacts to groundwater quality due to CO2 and brine leakage, discuss an approach to calculate thresholds under which no impact to groundwater occurs, describe the time scale for impact on groundwater, and discuss the probability of detecting a groundwater plume should leakage occur. To facilitate this, multi-phase flow and reactive transport simulations and emulations were developed for two classes of aquifers, considering uncertainty in leakage source terms and aquifer hydrogeology. We targeted an unconfined fractured carbonate aquifer based on the Edwards aquifer in Texas and a confined alluvium aquifer based on the High Plains Aquifer in Kansas, which share characteristics typical of many drinking water aquifers in the United States. The hypothetical leakage scenarios centered on the notion that wellbores are the most likely conduits for brine and CO2 leaks. Leakage uncertainty was based on hypothetical injection of CO2 for 50 years at a rate of 5 million tons per year into a depleted oil/gas reservoir with high permeability and, one or more wells provided leakage pathways from the storage reservoir to the overlying aquifer. This scenario corresponds to a storage site with historical oil/gas production and some poorly completed legacy wells that went undetected through site evaluation, operations, and post-closure. For the aquifer systems and leakage scenarios studied here, CO2 and brine leakage are likely to drive pH below and increase total dissolved solids (TDS) above the “no-impact thresholds;” and the subsequent plumes, although small, are likely to persist for long periods of time in the absence of remediation. In these scenarios, however, risk to human health may not be significant for two reasons. First, our simulated plume volumes are much smaller than the average inter-well spacing for these representative aquifers, so the impacted groundwater would be unlikely to be pumped for drinking water. Second, even within the impacted plume volumes little water exceeds the primary maximum contamination levels.

  1. Nominal Performance Biosphere Dose Conversion Factor Analysis

    SciTech Connect (OSTI)

    Wasiolek, Maryla A.

    2000-12-21

    The purpose of this report was to document the process leading to development of the Biosphere Dose Conversion Factors (BDCFs) for the postclosure nominal performance of the potential repository at Yucca Mountain. BDCF calculations concerned twenty-four radionuclides. This selection included sixteen radionuclides that may be significant nominal performance dose contributors during the compliance period of up to 10,000 years, five additional radionuclides of importance for up to 1 million years postclosure, and three relatively short-lived radionuclides important for the human intrusion scenario. Consideration of radionuclide buildup in soil caused by previous irrigation with contaminated groundwater was taken into account in the BDCF development. The effect of climate evolution, from the current arid conditions to a wetter and cooler climate, on the BDCF values was evaluated. The analysis included consideration of different exposure pathway's contribution to the BDCFs. Calculations of nominal performance BDCFs used the GENII-S computer code in a series of probabilistic realizations to propagate the uncertainties of input parameters into the output. BDCFs for the nominal performance, when combined with the concentrations of radionuclides in groundwater allow calculation of potential radiation doses to the receptor of interest. Calculated estimates of radionuclide concentration in groundwater result from the saturated zone modeling. The integration of the biosphere modeling results (BDCFs) with the outcomes of the other component models is accomplished in the Total System Performance Assessment (TSPA) to calculate doses to the receptor of interest from radionuclides postulated to be released to the environment from the potential repository at Yucca Mountain.

  2. Industrial Power Factor Analysis Guidebook. Electrotek Concepts...

    Office of Scientific and Technical Information (OSTI)

    low power factors, increased conductor and transformer losses, and lower voltages. Utilities must supply both active and reactive power and compensate for these losses. Power...

  3. Passive-scheme analysis for solving untrusted source problem in quantum key distribution

    E-Print Network [OSTI]

    Xiang Peng; Bingjie Xu; Hong Guo

    2010-04-28

    As a practical method, the passive scheme is useful to monitor the photon statistics of an untrusted source in a "Plug & Play" quantum key distribution (QKD) system. In a passive scheme, three kinds of monitor mode can be adopted: average photon number (APN) monitor, photon number analyzer (PNA) and photon number distribution (PND) monitor. In this paper, the security analysis is rigorously given for APN monitor, while for PNA, the analysis including statistical fluctuation and random noise, is addressed with a confidence level. The results show that the PNA can achieve better performance than the APN monitor and can asymptotically approach the theoretical limit of the PND monitor. Also, the passive scheme with the PNA works efficiently when the signal-to-noise ratio ($R^{SN}$) is not too low and so is highly applicable to solve the untrusted source problem in the QKD system.

  4. The Areal Reduction Factor (ARF) : a multifractal analysis

    E-Print Network [OSTI]

    Langousis, Andreas, 1981-

    2005-01-01

    The Areal Reduction Factor (ARF) [eta] is a key parameter in the design for hydrologic extremes. For a basin of area A, [eta](A, D, 7) is the ratio between the area-average rainfall intensity over a duration D with return ...

  5. ACCIDENT ANALYSIS AND HAZARD ANALYSIS FOR HUMAN AND ORGANIZATIONAL FACTORS

    E-Print Network [OSTI]

    Leveson, Nancy

    culpable. An accident analysis method is needed that will guide the work, aid in the analysis of the role

  6. Risk analysis of Trojan-horse attacks on practical quantum key distribution systems

    E-Print Network [OSTI]

    Nitin Jain; Birgit Stiller; Imran Khan; Vadim Makarov; Christoph Marquardt; Gerd Leuchs

    2014-12-19

    An eavesdropper Eve may probe a quantum key distribution (QKD) system by sending a bright pulse from the quantum channel into the system and analyzing the back-reflected pulses. Such Trojan-horse attacks can breach the security of the QKD system if appropriate safeguards are not installed or if they can be fooled by Eve. We present a risk analysis of such attacks based on extensive spectral measurements, such as transmittance, reflectivity, and detection sensitivity of some critical components used in typical QKD systems. Our results indicate the existence of wavelength regimes where the attacker gains considerable advantage as compared to launching an attack at 1550 nm. We also propose countermeasures to reduce the risk of such attacks.

  7. Conditioning analysis of incomplete Cholesky factorizations with orthogonal dropping

    SciTech Connect (OSTI)

    Napov, Artem

    2012-03-16

    The analysis of preconditioners based on incomplete Cholesky factorization in which the neglected (dropped) components are orthogonal to the approximations being kept is presented. General estimate for the condition number of the preconditioned system is given which only depends on the accuracy of individual approximations. The estimate is further improved if, for instance, only the newly computed rows of the factor are modified during each approximation step. In this latter case it is further shown to be sharp. The analysis is illustrated with some existing factorizations in the context of discretized elliptic partial differential equations.

  8. Author's personal copy An economic and technological analysis of the key factors affecting

    E-Print Network [OSTI]

    Bertini, Robert L.

    , OR 97201, United States a r t i c l e i n f o Article history: Received 7 August 2011 Received in revised of Department of Energy (DOE) grants to ``accelerate the manufacturing and deployment of the next generation

  9. The KeY Platform for Verification and Analysis of Java Programs

    E-Print Network [OSTI]

    Mostowski, Wojciech

    pure functional verification. We use the current release of the KeY system as an example to explain and prove this claim. 1 Overview Motivation. Over the last decades the reach and power of verification of real world systems. The basic technologies of deductive program verification have matured. State

  10. Method for factor analysis of GC/MS data

    DOE Patents [OSTI]

    Van Benthem, Mark H; Kotula, Paul G; Keenan, Michael R

    2012-09-11

    The method of the present invention provides a fast, robust, and automated multivariate statistical analysis of gas chromatography/mass spectroscopy (GC/MS) data sets. The method can involve systematic elimination of undesired, saturated peak masses to yield data that follow a linear, additive model. The cleaned data can then be subjected to a combination of PCA and orthogonal factor rotation followed by refinement with MCR-ALS to yield highly interpretable results.

  11. Human factors review for Severe Accident Sequence Analysis (SASA)

    SciTech Connect (OSTI)

    Krois, P.A.; Haas, P.M.; Manning, J.J.; Bovell, C.R.

    1984-01-01

    The paper will discuss work being conducted during this human factors review including: (1) support of the Severe Accident Sequence Analysis (SASA) Program based on an assessment of operator actions, and (2) development of a descriptive model of operator severe accident management. Research by SASA analysts on the Browns Ferry Unit One (BF1) anticipated transient without scram (ATWS) was supported through a concurrent assessment of operator performance to demonstrate contributions to SASA analyses from human factors data and methods. A descriptive model was developed called the Function Oriented Accident Management (FOAM) model, which serves as a structure for bridging human factors, operations, and engineering expertise and which is useful for identifying needs/deficiencies in the area of accident management. The assessment of human factors issues related to ATWS required extensive coordination with SASA analysts. The analysis was consolidated primarily to six operator actions identified in the Emergency Procedure Guidelines (EPGs) as being the most critical to the accident sequence. These actions were assessed through simulator exercises, qualitative reviews, and quantitative human reliability analyses. The FOAM descriptive model assumes as a starting point that multiple operator/system failures exceed the scope of procedures and necessitates a knowledge-based emergency response by the operators. The FOAM model provides a functionally-oriented structure for assembling human factors, operations, and engineering data and expertise into operator guidance for unconventional emergency responses to mitigate severe accident progression and avoid/minimize core degradation. Operators must also respond to potential radiological release beyond plant protective barriers. Research needs in accident management and potential uses of the FOAM model are described. 11 references, 1 figure.

  12. An Analysis of Bridge Abutment Shear Key Behavior due to Embankment Modeling and Earthquake Intensity

    E-Print Network [OSTI]

    Wasef, Nardin Mofid

    Tan, B. S. (August 1990). Bridge Abutments: Formulation ofLinear Analysis of Ordinary Bridges Crossing Fault-RuptureZones. Journal of Bridge Engineering, ASCE , 203-215. 15.

  13. Vascular endothelial growth factor-D is a key molecule that enhances lymphatic metastasis of soft tissue sarcomas

    SciTech Connect (OSTI)

    Yanagawa, Takashi; Shinozaki, Tetsuya; Watanabe, Hideomi; Saito, Kenichi; Raz, Avraham; Takagishi, Kenji

    2012-04-15

    Studies on lymph node metastasis of soft tissue sarcomas are insufficient because of its rarity. In this study, we examined the expressions of vascular endothelial growth factor (VEGF)-C and VEGF-D in soft tissue sarcomas metastasized to lymph nodes. In addition, the effects of the two molecules on the barrier function of a lymphatic endothelial cell monolayer against sarcoma cells were analyzed. We examined 7 patients who had soft tissue sarcomas with lymph node metastases and who had undergone neither chemotherapy nor radiotherapy before lymphadenectomy. Immunohistochemistry revealed that 2 of 7 sarcomas that metastasized to lymph nodes expressed VEGF-C both in primary and metastatic lesions. On the other hand, VEGF-D expression was detected in 4 of 7 primary and 7 of 7 metastatic lesions, respectively. Interestingly, 3 cases that showed no VEGF-D expression at primary sites expressed VEGF-D in metastatic lesions. Recombinant VEGF-C at 10{sup -8} and VEGF-D at 10{sup -7}and 10{sup -8} g/ml significantly increased the random motility of lymphatic endothelial cells compared with controls. VEGF-D significantly increased the migration of sarcoma cells through lymphatic endothelial monolayers. The fact that VEGF-D induced the migration of fibrosarcomas through the lymphatic endothelial monolayer is the probable reason for the strong relationship between VEGF-D expression and lymph node metastasis in soft tissue sarcomas. The important propensities of this molecule for the increase of lymph node metastases are not only lymphangiogenesis but also down-regulation of the barrier function of lymphatic endothelial monolayers, which facilitates sarcoma cells entering the lymphatic circulation.

  14. Failure Impact Analysis of Key Management in AMI Using Cybernomic Situational Assessment (CSA)

    SciTech Connect (OSTI)

    Abercrombie, Robert K; Sheldon, Frederick T; Hauser, Katie R; Lantz, Margaret W; Mili, Ali

    2013-01-01

    In earlier work, we presented a computational framework for quantifying the security of a system in terms of the average loss a stakeholder stands to sustain as a result of threats to the system. We named this system, the Cyberspace Security Econometrics System (CSES). In this paper, we refine the framework and apply it to cryptographic key management within the Advanced Metering Infrastructure (AMI) as an example. The stakeholders, requirements, components, and threats are determined. We then populate the matrices with justified values by addressing the AMI at a higher level, rather than trying to consider every piece of hardware and software involved. We accomplish this task by leveraging the recently established NISTR 7628 guideline for smart grid security. This allowed us to choose the stakeholders, requirements, components, and threats realistically. We reviewed the literature and selected an industry technical working group to select three representative threats from a collection of 29 threats. From this subset, we populate the stakes, dependency, and impact matrices, and the threat vector with realistic numbers. Each Stakeholder s Mean Failure Cost is then computed.

  15. Sensitivity Analysis of Wind Plant Performance to Key Turbine Design Parameters: A Systems Engineering Approach; Preprint

    SciTech Connect (OSTI)

    Dykes, K.; Ning, A.; King, R.; Graf, P.; Scott, G.; Veers, P.

    2014-02-01

    This paper introduces the development of a new software framework for research, design, and development of wind energy systems which is meant to 1) represent a full wind plant including all physical and nonphysical assets and associated costs up to the point of grid interconnection, 2) allow use of interchangeable models of varying fidelity for different aspects of the system, and 3) support system level multidisciplinary analyses and optimizations. This paper describes the design of the overall software capability and applies it to a global sensitivity analysis of wind turbine and plant performance and cost. The analysis was performed using three different model configurations involving different levels of fidelity, which illustrate how increasing fidelity can preserve important system interactions that build up to overall system performance and cost. Analyses were performed for a reference wind plant based on the National Renewable Energy Laboratory's 5-MW reference turbine at a mid-Atlantic offshore location within the United States.

  16. KEY PERSONNEL

    National Nuclear Security Administration (NNSA)

    KEY PERSONNEL 7062015 TITLE NAME President Christopher C. Gentile Vice President, Engineering Robin Stubenhofer Vice President, Integrated Supply Chain Rick Lavelock Director,...

  17. Using Factor Analysis to Generate Clusters of Agile (A Guide for Agile Process Improvement)

    E-Print Network [OSTI]

    Gravell, Andrew M.

    Using Factor Analysis to Generate Clusters of Agile Practices (A Guide for Agile Process. These factors with the associated practices can be used as a guide for agile process improvement. Correlations different agile practices. The analysis extracted 15 factors; each was associated with a list of practices

  18. Iteration of Target Matrices in Exploratory Factor Analysis

    E-Print Network [OSTI]

    Moore, Tyler Maxwell

    2013-01-01

    extraction methods .Performance of factor extraction methods Several methodshere. How well an extraction method performs is influenced

  19. Human Factors Considerations in New Nuclear Power Plants: Detailed Analysis.

    SciTech Connect (OSTI)

    OHara,J.; Higgins, J.; Brown, W.; Fink, R.

    2008-02-14

    This Nuclear Regulatory Commission (NRC) sponsored study has identified human-performance issues in new and advanced nuclear power plants. To identify the issues, current industry developments and trends were evaluated in the areas of reactor technology, instrumentation and control technology, human-system integration technology, and human factors engineering (HFE) methods and tools. The issues were organized into seven high-level HFE topic areas: Role of Personnel and Automation, Staffing and Training, Normal Operations Management, Disturbance and Emergency Management, Maintenance and Change Management, Plant Design and Construction, and HFE Methods and Tools. The issues where then prioritized into four categories using a 'Phenomena Identification and Ranking Table' methodology based on evaluations provided by 14 independent subject matter experts. The subject matter experts were knowledgeable in a variety of disciplines. Vendors, utilities, research organizations and regulators all participated. Twenty issues were categorized into the top priority category. This Brookhaven National Laboratory (BNL) technical report provides the detailed methodology, issue analysis, and results. A summary of the results of this study can be found in NUREG/CR-6947. The research performed for this project has identified a large number of human-performance issues for new control stations and new nuclear power plant designs. The information gathered in this project can serve as input to the development of a long-term strategy and plan for addressing human performance in these areas through regulatory research. Addressing human-performance issues will provide the technical basis from which regulatory review guidance can be developed to meet these challenges. The availability of this review guidance will help set clear expectations for how the NRC staff will evaluate new designs, reduce regulatory uncertainty, and provide a well-defined path to new nuclear power plant licensing.

  20. Sample size in factor analysis: The role of model error

    E-Print Network [OSTI]

    MacCallum, R. C.; Widaman, K. F.; Preacher, Kristopher J.; Hong, Sehee

    2001-01-01

    Equation 1: (2) H9018 yy = H9011H9021H9011H11032 + H9008 2 where H9018 yy is the p ? p population covariance matrix for the measured variables and H9021 is the r ? r population correlation matrix for the common factors (assuming factors are standardized... in the population). This is the standard version of the common factor model for a population covariance matrix. Following similar algebraic procedures, we could derive a structure for a sample covariance matrix, C yy . However, in such a derivation we can...

  1. Geography: Critical Factors in the Analysis of Complex Systems

    E-Print Network [OSTI]

    Welch, Ivan

    2012-05-31

    is needed for a systematic study of geostrategic issues for the purposes of policy making and strategic planning. Geographic scale, its impact on human action and incorporation into human culture, is pervasive. These factors of geography and their variables...

  2. An analysis of factors contributing to train-involved crashes 

    E-Print Network [OSTI]

    Cooner, Scott Allen

    1995-01-01

    , light conditions, driver race and sex, accident severity, location type, and roadway class were statistically different compared to the corresponding national and statewide frequency distributions. The analysis of the research hypotheses showed...

  3. Preliminary Review of Models, Assumptions, and Key Data used in Performance Assessments and Composite Analysis at the Idaho National Laboratory

    SciTech Connect (OSTI)

    Arthur S. Rood; Swen O. Magnuson

    2009-07-01

    This document is in response to a request by Ming Zhu, DOE-EM to provide a preliminary review of existing models and data used in completed or soon to be completed Performance Assessments and Composite Analyses (PA/CA) documents, to identify codes, methodologies, main assumptions, and key data sets used.

  4. Human Reliability Analysis for Design: Using Reliability Methods for Human Factors Issues

    SciTech Connect (OSTI)

    Ronald Laurids Boring

    2010-11-01

    This paper reviews the application of human reliability analysis methods to human factors design issues. An application framework is sketched in which aspects of modeling typically found in human reliability analysis are used in a complementary fashion to the existing human factors phases of design and testing. The paper provides best achievable practices for design, testing, and modeling. Such best achievable practices may be used to evaluate and human system interface in the context of design safety certifications.

  5. BIFURCATION ANALYSIS OF A POWER-FACTOR-CORRECTION BOOST CONVERTER: UNCOVERING FAST-SCALE INSTABILITY

    E-Print Network [OSTI]

    Tse, Chi K. "Michael"

    BIFURCATION ANALYSIS OF A POWER-FACTOR-CORRECTION BOOST CONVERTER: UNCOVERING FAST to a power-factor-correc- tion (PFC) boost converter to examine the fast-scale insta- bility problem to a current-programmed boost converter. In this paper, we study the onset of period-doubling (fast-scale) in

  6. Detailed Analysis of Factors Affecting Team Success and Failure in the America's Army Game*

    E-Print Network [OSTI]

    Detailed Analysis of Factors Affecting Team Success and Failure in the America's Army Game* CASOS Mellon University School of Computer Science ISRI - Institute for Software Research International CASOS level, team level, and clan level. Statistical analysis methods are used to examine the data at those

  7. Static Security Analysis based on Vulnerability Index (VI) and Network Contribution Factor

    E-Print Network [OSTI]

    1 Static Security Analysis based on Vulnerability Index (VI) and Network Contribution Factor (NCF introduces a new approach of power system static security analysis based on the Vulnerability Index (VI with the full AC power flow method shows that this approach is promising for fast and accurate static security

  8. Molecular genetic analysis of activation-tagged transcription factors thought to be involved in photomorphogenesis

    SciTech Connect (OSTI)

    Neff, Michael M.

    2011-06-23

    This is a final report for Department of Energy Grant No. DE-FG02-08ER15927 entitled “Molecular Genetic Analysis of Activation-Tagged Transcription Factors Thought to be Involved in Photomorphogenesis”. Based on our preliminary photobiological and genetic analysis of the sob1-D mutant, we hypothesized that OBP3 is a transcription factor involved in both phytochrome and cryptochrome-mediated signal transduction. In addition, we hypothesized that OBP3 is involved in auxin signaling and root development. Based on our preliminary photobiological and genetic analysis of the sob2-D mutant, we also hypothesized that a related gene, LEP, is involved in hormone signaling and seedling development.

  9. Human Factors Engineering and Ergonomics Analysis for the Canister Storage Building (CSB) Results and Findings

    SciTech Connect (OSTI)

    GARVIN, L.J.

    1999-09-20

    The purpose for this supplemental report is to follow-up and update the information in SNF-3907, Human Factors Engineering (HFE) Analysis: Results and Findings. This supplemental report responds to applicable U.S. Department of Energy Safety Analysis Report review team comments and questions. This Human Factors Engineering and Ergonomics (HFE/Erg) analysis was conducted from April 1999 to July 1999; SNF-3907 was based on analyses accomplished in October 1998. The HFE/Erg findings presented in this report and SNF-3907, along with the results of HNF-3553, Spent Nuclear Fuel Project, Final Safety Analysis Report, Annex A, ''Canister Storage Building Final Safety Analysis Report,'' Chapter A3.0, ''Hazards and Accidents Analyses,'' provide the technical basis for preparing or updating HNF-3553. Annex A, Chaptex A13.0, ''Human Factors Engineering.'' The findings presented in this report allow the HNF-3553 Chapter 13.0, ''Human Factors,'' to respond fully to the HFE requirements established in DOE Order 5480.23, Nuclear Safety Analysis Reports.

  10. Parametric Analysis of the Factors Controlling the Costs of Sedimentary Geothermal Systems - Preliminary Results (Poster)

    SciTech Connect (OSTI)

    Augustine, C.

    2013-10-01

    Parametric analysis of the factors controlling the costs of sedimentary geothermal systems was carried out using a modified version of the Geothermal Electricity Technology Evaluation Model (GETEM). The sedimentary system modeled assumed production from and injection into a single sedimentary formation.

  11. SFmap: a web server for motif analysis and prediction of splicing factor binding sites

    E-Print Network [OSTI]

    Mandel-Gutfreund, Yael

    SFmap: a web server for motif analysis and prediction of splicing factor binding sites Inbal Paz1) that bind to sequence elements on the RNA. SFmap is a web server for predicting putative SF binding sites by the user. SFmap results are provided both as a text file and as a graphical web interface. INTRODUCTION

  12. Multi-factor impact analysis of agricultural production in Bangladesh with climate change

    E-Print Network [OSTI]

    Multi-factor impact analysis of agricultural production in Bangladesh with climate change Alex C, Washington, DC, United States d Bangladesh Centre for Advanced Studies (BCAS), Dhaka, Bangladesh e Bangladesh Agricultural Research Council (BARC), Dhaka, Bangladesh f Institute of Water Modelling (IWM), Dhaka, Bangladesh

  13. Energy Price Indices and Discount Factors for Life-Cycle Cost Analysis- 2012

    Broader source: Energy.gov [DOE]

    Report provides tables of present-value factors for use in the life-cycle cost analysis of capital investment projects for federal facilities. It also provides energy price indices based on the U.S. Department of Energy (DOE) forecasts from 2012 to 2042.

  14. Method for exploiting bias in factor analysis using constrained alternating least squares algorithms

    DOE Patents [OSTI]

    Keenan, Michael R. (Albuquerque, NM)

    2008-12-30

    Bias plays an important role in factor analysis and is often implicitly made use of, for example, to constrain solutions to factors that conform to physical reality. However, when components are collinear, a large range of solutions may exist that satisfy the basic constraints and fit the data equally well. In such cases, the introduction of mathematical bias through the application of constraints may select solutions that are less than optimal. The biased alternating least squares algorithm of the present invention can offset mathematical bias introduced by constraints in the standard alternating least squares analysis to achieve factor solutions that are most consistent with physical reality. In addition, these methods can be used to explicitly exploit bias to provide alternative views and provide additional insights into spectral data sets.

  15. Global analysis of nucleon strange form factors at low Q{sup 2}

    SciTech Connect (OSTI)

    Liu Jianglai; McKeown, Robert D.; Ramsey-Musolf, Michael J. [W. K. Kellogg Radiation Laboratory, California Institute of Technology, Pasadena, California 91125 (United States)

    2007-08-15

    We perform a global analysis of all recent experimental data from elastic parity-violating electron scattering at low Q{sup 2}. The values of the electric and magnetic strange form factors of the nucleon are determined at Q{sup 2}=0.1 GeV/c{sup 2} to be G{sub E}{sup s}=-0.008{+-}0.016 and G{sub M}{sup s}=0.29{+-}0.21.

  16. Economic Analysis of Hydrogen Energy Station Concepts: Are "H 2E-Stations" a Key Link to a Hydrogen Fuel Cell Vehicle Infrastructure?

    E-Print Network [OSTI]

    Lipman, Timothy E.; Edwards, Jennifer L.; Kammen, Daniel M.

    2002-01-01

    A KEY LINK TO A HYDROGEN FUEL CELL VEHICLE INFRASTRUCTURE?"a Key Link to a Hydrogen Fuel Cell Vehicle Infrastructure?is assessed based on neat hydrogen fuel input rather than

  17. NREL: Energy Analysis - Key Activities

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJessework usesof EnergyY-12 NationalNOHydrogenWebmaster ToEnergyBSM -AJEDI

  18. Assessing State Nuclear Weapons Proliferation: Using Bayesian Network Analysis of Social Factors

    SciTech Connect (OSTI)

    Coles, Garill A.; Brothers, Alan J.; Olson, Jarrod; Whitney, Paul D.

    2010-04-16

    A Bayesian network (BN) model of social factors can support proliferation assessments by estimating the likelihood that a state will pursue a nuclear weapon. Social factors including political, economic, nuclear capability, security, and national identity and psychology factors may play as important a role in whether a State pursues nuclear weapons as more physical factors. This paper will show how using Bayesian reasoning on a generic case of a would-be proliferator State can be used to combine evidence that supports proliferation assessment. Theories and analysis by political scientists can be leveraged in a quantitative and transparent way to indicate proliferation risk. BN models facilitate diagnosis and inference in a probabilistic environment by using a network of nodes and acyclic directed arcs between the nodes whose connections, or absence of, indicate probabilistic relevance, or independence. We propose a BN model that would use information from both traditional safeguards and the strengthened safeguards associated with the Additional Protocol to indicate countries with a high risk of proliferating nuclear weapons. This model could be used in a variety of applications such a prioritization tool and as a component of state safeguards evaluations. This paper will discuss the benefits of BN reasoning, the development of Pacific Northwest National Laboratory’s (PNNL) BN state proliferation model and how it could be employed as an analytical tool.

  19. Human factors evaluation of remote afterloading brachytherapy. Volume 2, Function and task analysis

    SciTech Connect (OSTI)

    Callan, J.R.; Gwynne, J.W. III; Kelly, T.T.; Muckler, F.A. [Pacific Science and Engineering Group, San Diego, CA (United States); Saunders, W.M.; Lepage, R.P.; Chin, E. [University of California San Diego Medical Center, CA (United States). Div. of Radiation Oncology; Schoenfeld, I.; Serig, D.I. [Nuclear Regulatory Commission, Washington, DC (United States). Div. of Systems Technology

    1995-05-01

    A human factors project on the use of nuclear by-product material to treat cancer using remotely operated afterloaders was undertaken by the Nuclear Regulatory Commission. The purpose of the project was to identify factors that contribute to human error in the system for remote afterloading brachytherapy (RAB). This report documents the findings from the first phase of the project, which involved an extensive function and task analysis of RAB. This analysis identified the functions and tasks in RAB, made preliminary estimates of the likelihood of human error in each task, and determined the skills needed to perform each RAB task. The findings of the function and task analysis served as the foundation for the remainder of the project, which evaluated four major aspects of the RAB system linked to human error: human-system interfaces; procedures and practices; training and qualifications of RAB staff; and organizational practices and policies. At its completion, the project identified and prioritized areas for recommended NRC and industry attention based on all of the evaluations and analyses.

  20. Global analysis of proton elastic form factor data with two-photon exchange corrections

    SciTech Connect (OSTI)

    J. Arrington; W. Melnitchouk; J. A. Tjon

    2007-09-01

    We use the world's data on elastic electron-proton scattering and calculations of two-photon exchange effects to extract corrected values of the proton's electric and magnetic form factors over the full Q^2 range of the existing data. Our analysis combines the corrected Rosenbluth cross section and polarization transfer data, and is the first extraction of G_Ep and G_Mp including explicit two-photon exchange corrections and their associated uncertainties. In addition, we examine the angular dependence of the corrected cross sections, and discuss the possible nonlinearities of the cross section as a function of epsilon.

  1. Public Key Cryptography and Key Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-02-15

    The use and management of certificate-based public key cryptography for the Department of Energy (DOE) requires the establishment of a public key infrastructure (PKI). This chapter defines the policy related to roles, requirements, and responsibilities for establishing and maintaining a DOE PKI and the documentation necessary to ensure that all certificates are managed in a manner that maintains the overall trust required to support a viable PKI. Canceled by DOE N 251.112.

  2. Key Milestones/Outlook

    Broader source: Energy.gov [DOE]

    Key Milestones/Outlook per the Department of Energy 2015 Congressional Budget Request, Environmental Management, March 2014

  3. Vertebral Compression Fracture (VCF) After Spine Stereotactic Body Radiation Therapy (SBRT): Analysis of Predictive Factors

    SciTech Connect (OSTI)

    Cunha, Marcelo V.R.; Al-Omair, Ameen; Atenafu, Eshetu G.; Masucci, Giuseppina Laura; Letourneau, Daniel; Korol, Renee; Yu, Eugene; Howard, Peter; Lochray, Fiona; Costa, Leodante B. da; Fehlings, Michael G.; Sahgal, Arjun; Department of Radiation Oncology, Sunnybrook Health Sciences Centre, University of Toronto, Toronto, Ontario

    2012-11-01

    Purpose: Vertebral compression fractures (VCFs) are increasingly observed after spine stereotactic body radiation therapy (SBRT). The aim of this study was to determine the risk of VCF after spine SBRT and identify clinical and dosimetric factors predictive for VCF. The analysis incorporated the recently described Spinal Instability Neoplastic Score (SINS) criteria. Methods and Materials: The primary endpoint of this study was the development of a de novo VCF (ie, new endplate fracture or collapse deformity) or fracture progression based on an existing fracture at the site of treatment after SBRT. We retrospectively scored 167 spinal segments in 90 patients treated with spine SBRT according to each of the 6 SINS criteria. We also evaluated the presence of paraspinal extension, prior radiation, various dosimetric parameters including dose per fraction ({>=}20 Gy vs <20 Gy), age, and histology. Results: The median follow-up was 7.4 months. We identified 19 fractures (11%): 12 de novo fractures (63%) and 7 cases of fracture progression (37%). The mean time to fracture after SBRT was 3.3 months (range, 0.5-21.6 months). The 1-year fracture-free probability was 87.3%. Multivariate analysis confirmed that alignment (P=.0003), lytic lesions (P=.007), lung (P=.03) and hepatocellular (P<.0001) primary histologies, and dose per fraction of 20 Gy or greater (P=.004) were significant predictors of VCF. Conclusions: The presence of kyphotic/scoliotic deformity and the presence of lytic tumor were the only predictive factors of VCF based on the original 6 SINS criteria. We also report that patients with lung and hepatocellular tumors and treatment with SBRT of 20 Gy or greater in a single fraction are at a higher risk of VCF.

  4. How Many Performance Shaping Factors are Necessary for Human Reliability Analysis?

    SciTech Connect (OSTI)

    Ronald L. Boring

    2010-06-01

    It has been argued that human reliability analysis (HRA) has expended considerable energy on creating detailed representations of human performance through an increasingly long list of performance shaping factors (PSFs). It is not clear, however, to what extent this refinement and expansion of PSFs has enhanced the quality of HRA. Indeed, there is considerable range in the number of PSFs provided by individual HRA methods, ranging from single factor models such as time-reliability curves, up to 50 or more PSFs in some current HRA models. The US Nuclear Regulatory Commission advocates 15 PSFs in its HRA Good Practices (NUREG-1792), while its SPAR-H method (NUREG/CR-6883) espouses the use of eight PSFs and its ATHEANA method (NUREG-1624) features an open-ended number of PSFs. The apparent differences in the optimal number of PSFs can be explained in terms of the diverse functions of PSFs in HRA. The purpose of this paper is to explore the role of PSFs across different stages of HRA, including identification of potential human errors, modeling of these errors into an overall probabilistic risk assessment, quantifying errors, and preventing errors.

  5. Cytological Sampling Versus Forceps Biopsy During Percutaneous Transhepatic Biliary Drainage and Analysis of Factors Predicting Success

    SciTech Connect (OSTI)

    Tapping, C. R.; Byass, O. R.; Cast, J. E. I., E-mail: james.cast@hey.nhs.uk [Hull Royal Infirmary, Department of Radiology (United Kingdom)

    2012-08-15

    Purpose: To assess the accuracy of cytological sampling and forceps biopsy in obstructing biliary lesions and to identify factors predictive of success. Methods: Consecutive patients (n = 119) with suspected malignant inoperable obstructive jaundice treated with percutaneous transhepatic biliary drainage during 7 years were included (60 male; mean age 72.5 years). All patients underwent forceps biopsy plus cytological sampling by washing the forceps device in cytological solution. Patient history, procedural and pathological records, and clinical follow-up were reviewed. Statistical analysis included chi-square test and multivariate regression analysis. Results: Histological diagnosis after forceps biopsy was more successful than cytology: Sensitivity was 78 versus 61%, and negative predictive value was 30 versus 19%. Cytology results were never positive when the forceps biopsy was negative. The cytological sample was negative and forceps sample positive in 2 cases of cholangiocarcinoma, 16 cases of pancreatic carcinoma, and 1 case of benign disease. Diagnostic accuracy was predicted by low bilirubin (p < 0.001), aspartate transaminase (p < 0.05), and white cell count (p {<=} 0.05). Conclusions: This technique is safe and effective and is recommended for histological diagnosis during PTBD in patients with inoperable malignant biliary strictures. Diagnostic yield is greater when bilirubin levels are low and there is no sepsis; histological diagnosis by way of forceps biopsy renders cytological sampling unnecessary.

  6. Key Events Timeline

    Broader source: Energy.gov [DOE]

    This document lists key events beginning with the April 20 fire on the Deepwater Horizon through July 28th. Updated July 28, 2010.

  7. Economic Analysis of Hydrogen Energy Station Concepts: Are "H 2E-Stations" a Key Link to a Hydrogen Fuel Cell Vehicle Infrastructure?

    E-Print Network [OSTI]

    Lipman, Timothy E.; Edwards, Jennifer L.; Kammen, Daniel M.

    2002-01-01

    ECONOMIC ANALYSIS OF HYDROGEN ENERGY STATION CONCEPTS: ARE 'Economic Analysis of Hydrogen Energy Station Concepts: Are “the concept of the “hydrogen energy station”(H 2 E-Station).

  8. Network Analysis of Epidermal Growth Factor Signaling using Integrated Genomic, Proteomic and Phosphorylation Data

    SciTech Connect (OSTI)

    Waters, Katrina M.; Liu, Tao; Quesenberry, Ryan D.; Willse, Alan R.; Bandyopadhyay, Somnath; Kathmann, Loel E.; Weber, Thomas J.; Smith, Richard D.; Wiley, H. S.; Thrall, Brian D.

    2012-03-29

    To understand how integration of multiple data types can help decipher cellular responses at the systems level, we analyzed the mitogenic response of human mammary epithelial cells to epidermal growth factor (EGF) using whole genome microarrays, mass spectrometry-based proteomics and large-scale western blots with over 1000 antibodies. A time course analysis revealed significant differences in the expression of 3172 genes and 596 proteins, including protein phosphorylation changes measured by western blot. Integration of these disparate data types showed that each contributed qualitatively different components to the observed cell response to EGF and that varying degrees of concordance in gene expression and protein abundance measurements could be linked to specific biological processes. Networks inferred from individual data types were relatively limited, whereas networks derived from the integrated data recapitulated the known major cellular responses to EGF and exhibited more highly connected signaling nodes than networks derived from any individual dataset. While cell cycle regulatory pathways were altered as anticipated, we found the most robust response to mitogenic concentrations of EGF was induction of matrix metalloprotease cascades, highlighting the importance of the EGFR system as a regulator of the extracellular environment. These results demonstrate the value of integrating multiple levels of biological information to more accurately reconstruct networks of cellular response.

  9. Analysis of the factors and the roles of HRD in organizational learning styles as identified by key informants at selected corporations in the Republic of Korea 

    E-Print Network [OSTI]

    Jeong, Jinchul

    2005-08-29

    The core competency of the most effective organizations will be their capacity to learn in an increasingly complex and unpredictable business environment and HRD should expand its role to become a partner in the transformation of the entire...

  10. VSEAMS: A pipeline for variant set enrichment analysis using summary GWAS data identifies IKZF3, BATF and ESRRA as key transcription factors in type 1 diabetes

    E-Print Network [OSTI]

    Burren, Oliver S.; Guo, Hui; Wallace, Chris

    2014-08-27

    in ImmunoBase (Table 1), three of which are implicated as candidate causal genes in one or more diseases: TRAF3IP2 in psoriasis, ulcerative colitis and Crohn’s disease (Jostins et al., 2012; Tsoi et al., 2012), ZNF438 in multiple sclerosis (IMSGC et al... ., 2011) and RUNX3 in ankylosing spondylitis and psoriasis (IGASC et al., 2013; Tsoi et al., 2012). The 22 remaining genes have no established association to autoimmune disease, their membership of functionally defined gene sets, which show over- all...

  11. Optical key system

    DOE Patents [OSTI]

    Hagans, Karla G. (Livermore, CA); Clough, Robert E. (Danville, CA)

    2000-01-01

    An optical key system comprises a battery-operated optical key and an isolated lock that derives both its operating power and unlock signals from the correct optical key. A light emitting diode or laser diode is included within the optical key and is connected to transmit a bit-serial password. The key user physically enters either the code-to-transmit directly, or an index to a pseudorandom number code, in the key. Such person identification numbers can be retained permanently, or ephemeral. When a send button is pressed, the key transmits a beam of light modulated with the password information. The modulated beam of light is received by a corresponding optical lock with a photovoltaic cell that produces enough power from the beam of light to operate a password-screen digital logic. In one application, an acceptable password allows a two watt power laser diode to pump ignition and timing information over a fiberoptic cable into a sealed engine compartment. The receipt of a good password allows the fuel pump, spark, and starter systems to each operate. Therefore, bypassing the lock mechanism as is now routine with automobile thieves is pointless because the engine is so thoroughly disabled.

  12. Deep Learning with Hierarchical Convolutional Factor Analysis 1Bo Chen, 2Gungor Polatkan, 3Guillermo Sapiro, 2David Blei,

    E-Print Network [OSTI]

    Carin, Lawrence

    Deep Learning with Hierarchical Convolutional Factor Analysis 1Bo Chen, 2Gungor Polatkan, 3, Minneapolis, MN, USA Abstract - Unsupervised multi-layered ("deep") models are considered for general data-layered or "deep" models for representation of general data, with a particular focus on imagery and audio signals

  13. Bayesian Inference of the Number of Factors in Gene-Expression Analysis: Application to Human Virus Challenge Studies

    E-Print Network [OSTI]

    Carin, Lawrence

    Bayesian Inference of the Number of Factors in Gene-Expression Analysis: Application to Human Virus. Ginsburg2 , Alfred Hero III3 , Joseph Lucas2 , David Dunson4 and Lawrence Carin1§ 1 Electrical and Computer University 3 Electrical & Computer Engineering Department, University of Michigan 4 Statistics Department

  14. Human Factors Analysis of Power System Visualizations Thomas J. Overbye Douglas A. Wiegmann Aaron M. Rich Yan Sun

    E-Print Network [OSTI]

    Human Factors Analysis of Power System Visualizations Thomas J. Overbye Douglas A. Wiegmann Aaron M testing the usability of different power system visualizations. In particular, the ability of participants to assess and correct power system voltage problems was tested. Participants were divided into three groups

  15. Design and Analysis of TQS01, a 90 mm Nb3Sn Model Quadrupole for LHC Luminosity Upgrade Based on a Key and Bladder Assembly

    E-Print Network [OSTI]

    Caspi, S.

    2008-01-01

    and Analysis of TQS01, a 90 mm Nb 3 Sn Model Quadrupole forStructure for an LHC 90 mm Nb 3 Sn quadrupole magnet”, IEEEal. , “Development of a 90-mm Nb3Sn Technological Quadrupole

  16. Linear regression analysis of emissions factors when firing fossil fuels and biofuels in a commercial water-tube boiler

    SciTech Connect (OSTI)

    Sharon Falcone Miller; Bruce G. Miller

    2007-12-15

    This paper compares the emissions factors for a suite of liquid biofuels (three animal fats, waste restaurant grease, pressed soybean oil, and a biodiesel produced from soybean oil) and four fossil fuels (i.e., natural gas, No. 2 fuel oil, No. 6 fuel oil, and pulverized coal) in Penn State's commercial water-tube boiler to assess their viability as fuels for green heat applications. The data were broken into two subsets, i.e., fossil fuels and biofuels. The regression model for the liquid biofuels (as a subset) did not perform well for all of the gases. In addition, the coefficient in the models showed the EPA method underestimating CO and NOx emissions. No relation could be studied for SO{sub 2} for the liquid biofuels as they contain no sulfur; however, the model showed a good relationship between the two methods for SO{sub 2} in the fossil fuels. AP-42 emissions factors for the fossil fuels were also compared to the mass balance emissions factors and EPA CFR Title 40 emissions factors. Overall, the AP-42 emissions factors for the fossil fuels did not compare well with the mass balance emissions factors or the EPA CFR Title 40 emissions factors. Regression analysis of the AP-42, EPA, and mass balance emissions factors for the fossil fuels showed a significant relationship only for CO{sub 2} and SO{sub 2}. However, the regression models underestimate the SO{sub 2} emissions by 33%. These tests illustrate the importance in performing material balances around boilers to obtain the most accurate emissions levels, especially when dealing with biofuels. The EPA emissions factors were very good at predicting the mass balance emissions factors for the fossil fuels and to a lesser degree the biofuels. While the AP-42 emissions factors and EPA CFR Title 40 emissions factors are easier to perform, especially in large, full-scale systems, this study illustrated the shortcomings of estimation techniques. 23 refs., 3 figs., 8 tabs.

  17. Cryptographic Key Management System

    SciTech Connect (OSTI)

    No, author

    2014-02-21

    This report summarizes the outcome of U.S. Department of Energy (DOE) contract DE-OE0000543, requesting the design of a Cryptographic Key Management System (CKMS) for the secure management of cryptographic keys for the energy sector infrastructure. Prime contractor Sypris Electronics, in collaboration with Oak Ridge National Laboratories (ORNL), Electric Power Research Institute (EPRI), Valicore Technologies, and Purdue University's Center for Education and Research in Information Assurance and Security (CERIAS) and Smart Meter Integration Laboratory (SMIL), has designed, developed and evaluated the CKMS solution. We provide an overview of the project in Section 3, review the core contributions of all contractors in Section 4, and discuss bene#12;ts to the DOE in Section 5. In Section 6 we describe the technical construction of the CKMS solution, and review its key contributions in Section 6.9. Section 7 describes the evaluation and demonstration of the CKMS solution in different environments. We summarize the key project objectives in Section 8, list publications resulting from the project in Section 9, and conclude with a discussion on commercialization in Section 10 and future work in Section 11.

  18. Key Reference Agilent Technologies

    E-Print Network [OSTI]

    Anlage, Steven

    is provided "as is", and is subject to being changed, without notice, in future editions. Further with the User and should any of the contract terms conflict with these terms, the contract terms shall control enables you to define the number of points in a step sweep. When you press this key, the current value

  19. Key Research Results Achievement

    E-Print Network [OSTI]

    ) evaluated several common figures of merit used to compare the electrical and optical performance of TCsKey Research Results Achievement NREL research significantly contributed to inadequate existing not yet at performance levels of TCOs, demonstrate a much better combination of transmission

  20. Key Research Results Achievement

    E-Print Network [OSTI]

    % energy savings in new buildings and major renovations. Researchers at the National Renewable Energy%energysavingsovercode.NREL developedthesimulationtoolsandledthe committeethatproducedtheguides. Key Result TheAdvancedEnergy to use signifi- cantly less energy--reducing operating costs and greenhouse gas emissions. This new K-12

  1. Symptom Dimensions in OCD: Item-Level Factor Analysis and Heritability Estimates

    E-Print Network [OSTI]

    Katerberg, Hilga

    To reduce the phenotypic heterogeneity of obsessive-compulsive disorder (OCD) for genetic, clinical and translational studies, numerous factor analyses of the Yale-Brown Obsessive Compulsive Scale checklist (YBOCS-CL) have ...

  2. Analysis of variation at transcription factor binding sites in Drosophila and humans

    E-Print Network [OSTI]

    Spivakov, Mikhail

    Background: Advances in sequencing technology have boosted population genomics and made it possible to map the positions of transcription factor binding sites (TFBSs) with high precision. Here we investigate TFBS variability ...

  3. Dynamic Simulation and Analysis of Factors Impacting the Energy Consumption of Residential Buildings 

    E-Print Network [OSTI]

    Lian, Y.; Hao, Y.

    2006-01-01

    Buildings have a close relationship with climate. There are a lot of important factors that influence building energy consumption such as building shape coefficient, insulation work of building envelope, covered area, and the area ratio of window...

  4. Energy Price Indices and Discount Factors for Life-Cycle Cost Analysis- 2010

    Broader source: Energy.gov [DOE]

    Report describes the 2010 edition of energy price indices and discount factors for performing life-cycle cost analyses of energy and water conservation and renewable energy projects in federal facilities.

  5. Experimental and computational analysis of epidermal growth factor receptor pathway phosphorylation dynamics

    E-Print Network [OSTI]

    Kleiman, Laura B

    2010-01-01

    The epidermal growth factor receptor (EGFR, also known as ErbB 1) is a prototypical receptor tyrosine kinase (RTK) that activates multi-kinase phosphorylation cascades to regulate diverse cellular processes, including ...

  6. The relationship of social desirability responding and the Big Five: an investigation using confirmatory factor analysis 

    E-Print Network [OSTI]

    Carlisle, Todd Dana

    2000-01-01

    The relationship between social desirability responding (SDR) and the Big Five factors of personality was both summarized with a review of past and current studies and directly investigated using a series of confirmatory ...

  7. Simultaneous factor analysis of organic particle and gas1 mass spectra: AMS and PTR-MS measurements at an2

    E-Print Network [OSTI]

    Meskhidze, Nicholas

    S1 Simultaneous factor analysis of organic particle and gas1 mass spectra: AMS and PTR: Traffic F2PTR: LRT + Local Source F3PTR: LRT + Painting F4PTR: LRT + Local Oxidation F5PTR: Oxygenates+Local Source) F3PTR (LRT+Painting) F4PTR: Local Oxidation F5PTR: Oxygenates fPeak = -1.0 fPeak = 0 fPeak = 1

  8. Data analysis and radionuclide scaling factor for the B-Cell waste stream

    SciTech Connect (OSTI)

    HILL, R.L.

    2000-04-25

    This report documents a statistical data analysis of radiological data obtained to characterize the 324 Facility B-Cell decontamination and decommissioning waste stream.

  9. OPE for all Helicity Amplitudes II. Form Factors and Data analysis

    E-Print Network [OSTI]

    Benjamin Basso; Joao Caetano; Lucia Cordova; Amit Sever; Pedro Vieira

    2015-08-12

    We present the general flux tube integrand for MHV and non-MHV amplitudes, in planar N = 4 SYM theory, up to a group theoretical rational factor. We find that the MHV and non-MHV cases only differ by simple form factors which we derive. This information allows us to run the operator product expansion program for all sorts of non-MHV amplitudes and to test the recently proposed map with the so called charged pentagons transitions. Perfect agreement is found, on a large sample of non-MHV amplitudes, with the perturbative data available in the literature.

  10. OPE for all Helicity Amplitudes II. Form Factors and Data analysis

    E-Print Network [OSTI]

    Basso, Benjamin; Cordova, Lucia; Sever, Amit; Vieira, Pedro

    2015-01-01

    We present the general flux tube integrand for MHV and non-MHV amplitudes, in planar N = 4 SYM theory, up to a group theoretical rational factor. We find that the MHV and non-MHV cases only differ by simple form factors which we derive. This information allows us to run the operator product expansion program for all sorts of non-MHV amplitudes and to test the recently proposed map with the so called charged pentagons transitions. Perfect agreement is found, on a large sample of non-MHV amplitudes, with the perturbative data available in the literature.

  11. Seasonal analysis of abiotic factors impacting phytoplankton assemblages in Offatts Bayou, Galveston, Texas 

    E-Print Network [OSTI]

    Roehrborn, Linda Rae

    2009-05-15

    stations in Lake Madeline. While the results of this study support the importance of temperature, dissolved oxygen and pH as the critical controlling factors (p < 0.05) of phytoplankton biomass and diversity, it is clear that phytoplankton dynamics...

  12. Key Management in Historical Context

    E-Print Network [OSTI]

    ;Rolling Keys Why change keys? --- cryptoperiod (intrinsic to cryptosystem) --- management issuesKey Management in Historical Context Whitfield Diffie Internet Corporation for Assigned Names to become the security or insecurity of the message. #12;Key management systems both reflect and shape

  13. Analysing ZigBee Key Establishment Protocols

    E-Print Network [OSTI]

    Yüksel, Ender

    2012-01-01

    In this report, we present our approach for protocol analysis together with a real example where we find an important flow in a contemporary wireless sensor network security protocol. We start by modelling protocols using a specific process algebraic formalism called LySa process calculus. We then apply an analysis based on a special program analysis technique called control flow analysis. We apply this technique to the ZigBee-2007 End-to-End Application Key Establishment Protocol and with the help of the analysis discover an unknown flaw. Finally we suggest a fix for the protocol, and verify that the fix works by using the same technique.

  14. Institutional, Retrospective Analysis of 777 Patients With Brain Metastases: Treatment Outcomes and Diagnosis-Specific Prognostic Factors

    SciTech Connect (OSTI)

    Antoni, Delphine; Clavier, Jean-Baptiste; Pop, Marius; Schumacher, Catherine; Lefebvre, François; Noël, Georges

    2013-07-15

    Purpose: To retrospectively evaluate the prognostic factors and survival of a series of 777 patients with brain metastases (BM) from a single institution. Methods and Materials: Patients were treated with surgery followed by whole-brain radiation therapy (WBRT) or with WBRT alone in 16.3% and 83.7% of the cases, respectively. The patients were RPA (recursive partitioning analysis) class I, II, and III in 11.2%, 69.6%, and 18.4% of the cases, respectively; RPA class II-a, II-b, and II-c in 8.3%, 24.8%, and 66.9% of the cases, respectively; and with GPA (graded prognostic assessment) scores of 0-1.0, 1.5-2.0, 2.5-3.0, and 3.5-4.0 in 35%, 27.5%, 18.2%, and 8.6% of the cases, respectively. Results: The median overall survival (OS) times according to RPA class I, II, and III were 20.1, 5.1, and 1.3 months, respectively (P<.0001); according to RPA class II-a, II-b, II-c: 9.1, 8.9, and 4.0 months, respectively (P<.0001); and according to GPA score 0-1.0, 1.5-2.0, 2.5-3.0, and 3.5-4.0: 2.5, 4.4, 9.0, and 19.1 months, respectively (P<.0001). By multivariate analysis, the favorable independent prognostic factors for survival were as follows: for gastrointestinal tumor, a high Karnofsky performance status (KPS) (P=.0003) and an absence of extracranial metastases (ECM) (P=.003); for kidney cancer, few BM (P=.002); for melanoma, few BM (P=.01), an absence of ECM (P=.002), and few ECM (P=.0002); for lung cancer, age (P=.007), a high KPS (P<.0001), an absence of ECM (P<.0001), few ECM and BM (P<.0001 and P=.0006, respectively), and control of the primary tumor (P=.004); and for breast cancer, age (P=.001), a high KPS (P=.007), control of the primary tumor (P=.05), and few ECM and BM (P=.01 and P=.0002, respectively). The triple-negative subtype was a significant unfavorable factor (P=.007). Conclusion: Prognostic factors varied by pathology. Our analysis confirms the strength of prognostic factors used to determine the GPA score, including the genetic subtype for breast cancer.

  15. Sifting attacks in finite-size quantum key distribution

    E-Print Network [OSTI]

    Corsin Pfister; Patrick J. Coles; Stephanie Wehner; Norbert Lütkenhaus

    2015-09-02

    A central assumption in quantum key distribution (QKD) is that Eve has no knowledge about which rounds will be used for parameter estimation or key distillation. Here we show that this assumption is violated for iterative sifting, a commonly used sifting procedure that has been em- ployed in both theoretical and experimental finite-size QKD. We show that iterative sifting leads to two problems: (1) some rounds are more likely to be key rounds than others, (2) the public communication of past measurement choices changes this bias round by round. We analyze these two previously unnoticed problems, present eavesdropping strategies that exploit them, and find that the two problems are independent. We propose corrections to the protocol and prove that the resulting protocol, which we call the fixed round number sifting protocol, is secure and can thus replace iterative sifting in future QKD protocols. It outperforms other recently suggested protocols, increasing the efficiency by a factor of almost two. More generally, we present two formal criteria for a sifting protocol which ensure that they are secure. Our criteria may guide the design of future protocols and inspire a more rigorous QKD analysis, which has neglected sifting-related attacks so far.

  16. Human factors review for nuclear power plant severe accident sequence analysis

    SciTech Connect (OSTI)

    Krois, P.A.; Haas, P.M.

    1985-01-01

    The paper discusses work conducted to: (1) support the severe accident sequence analysis of a nuclear power plant transient based on an assessment of operator actions, and (2) develop a descriptive model of operator severe accident management. Operator actions during the transient are assessed using qualitative and quantitative methods. A function-oriented accident management model provides a structure for developing technical operator guidance on mitigating core damage preventing radiological release.

  17. Combined factor analysis of the WISC-III and CMS: does the resulting factor structure discriminate among children with and without clinical disorders? 

    E-Print Network [OSTI]

    Siekierski, Becky Mayes

    2006-10-30

    -III/CMS standardization sample................................................................................................ 35 3 Demographic data of research sample from MAPS study................ 36 4 WISC-III index and IQ score composition... otherwise indicated, consisted of the following: the one-factor model is regarded as essentially the composition of the Full Scale IQ; the two-factor 11 model is based on the verbal and performance dichotomy; the three-factor model consists...

  18. Psychology with Management BSc (Hons) Key details

    E-Print Network [OSTI]

    Painter, Kevin

    Psychology with Management BSc (Hons) Key details Duration: Full-time: 4 years Delivery type: Day% Psychology with 25% Business and Management modules. Psychology modules cover a range of core approaches to psychology as well as research design and analysis and applied specialist topics. The curriculum is based

  19. Assessment of the impact of the scanner-related factors on brain morphometry analysis with Brainvisa

    E-Print Network [OSTI]

    Shokouhi, Mahsa; Barnes, Anna; Suckling, John; Moorhead, Thomas WJ; Brennan, David; Job, Dominic; Lymer, Katherine; Dazzan, Paola; Reis Marques, Tiago; MacKay, Clare; McKie, Shane; Williams, Steven CR; Lawrie, Stephen M; Deakin, Bill; Williams, Steve R; Condon, Barrie

    2011-12-21

    -RAGE) sequence [30]. Briefly, our whole dataset consisted of two groups: the first group included thirteen subjects scanned twice at three centres with 1.5 T scan- ners (presented here as A, B, and C) and the second group consisted of eleven subjects scanned... mask of brain was created using the information derived from histogram analysis and by applying mor- phological operations which removed skull and non- brain tissues (Figure 1b). The two hemispheres and the cerebellum were then separated (Figure 1c...

  20. Bayesian Sparse Correlated Factor Analysis In this paper, we propose a new sparse correlated factor model under a Bayesian framework that

    E-Print Network [OSTI]

    Ruan, Jianhua

    are . The loading matrix is sparse and since the prior knowledge of non-zero elements are assumed available, the sparse pattern of the loading matrix is significantly constrained, resulting unambiguous factor order. A Gibbs sampler is proposed to uncover the unknown non-negative factors and the loading matrix from data

  1. Multi-factor authentication

    DOE Patents [OSTI]

    Hamlet, Jason R; Pierson, Lyndon G

    2014-10-21

    Detection and deterrence of spoofing of user authentication may be achieved by including a cryptographic fingerprint unit within a hardware device for authenticating a user of the hardware device. The cryptographic fingerprint unit includes an internal physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a PUF value. Combining logic is coupled to receive the PUF value, combines the PUF value with one or more other authentication factors to generate a multi-factor authentication value. A key generator is coupled to generate a private key and a public key based on the multi-factor authentication value while a decryptor is coupled to receive an authentication challenge posed to the hardware device and encrypted with the public key and coupled to output a response to the authentication challenge decrypted with the private key.

  2. Statistica Sinica ??(200?), 000-000 1 A MULTIVARIATE GAUSSIAN PROCESS FACTOR MODEL

    E-Print Network [OSTI]

    Kass, Rob

    kinematic dataset. Key words and phrases: Multivariate Gaussian Process, Dynamical Factor Analysis it contains over 20 degrees of freedom, mechanical constraints and, plausibly, complex and non-linear inter principal components analysis (PCA), can go far in this direction but do not conform to the repeated

  3. Policy on Keys and Keycards Policy on Keys and Keycards

    E-Print Network [OSTI]

    Sridhar, Srinivas

    department is responsible for the total cost of lock changes and new keys/cards to secure areas compromised has been compromised, and avoid potentially significant costs due to theft, vandalism, or excessive be given access to keys/cards that permit entry to buildings and locked spaces on the University campuses

  4. Demand key factor in worldwide crude prices and drilling

    SciTech Connect (OSTI)

    Beck, R.J.

    1995-01-30

    The global demand surge that rescued world crude oil prices in 1994 will continue through 1995 and at least sustain, if not increase, worldwide drilling activity. Although average world crude oil prices at the end of 1994 were somewhat higher than a year earlier, the average price for all of last year was down from that of 1993. Production capacity remained sufficient to meet the growing need for crude, and the potential for return of Iraqi exports, embargoed by the United Nations since August 1990, lingered over the market. For several years the average world export crude oil price fluctuated seasonally within the range of $16--20/bbl. This band appears to have dropped to $13--17/bbl. The paper discusses economic growth rates; worldwide demand; worldwide supply; worldwide supply outlook; prices; and international drilling activity.

  5. Key factors for determining groundwater impacts due to leakage...

    Office of Scientific and Technical Information (OSTI)

    injection of CO2 for 50 years at a rate of 5 million tons per year into a depleted oilgas reservoir with high permeability and, one or more wells provided leakage pathways...

  6. Occupancy by key transcription factors is a more accurate predictor...

    Office of Scientific and Technical Information (OSTI)

    United States Language: English Subject: 59 BASIC BIOLOGICAL SCIENCES functional genomics; gene regulation; TAL1; GATA1; histone modifications; enhancer assay Word Cloud More...

  7. Occupancy by key transcription factors is a more accurate predictor...

    Office of Scientific and Technical Information (OSTI)

    Univ., University Park, PA (United States) 59 BASIC BIOLOGICAL SCIENCES functional genomics; gene regulation; TAL1; GATA1; histone modifications; enhancer assay functional...

  8. Key factors for determining groundwater impacts due to leakage from

    Office of Scientific and Technical Information (OSTI)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfate Reducing(Journalspectroscopy of aerosols in(JournalTechnicalConnect KPiX ___(Journalgeologic

  9. Key factors for determining groundwater impacts due to leakage from

    Office of Scientific and Technical Information (OSTI)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfate Reducing(Journalspectroscopy of aerosols in(JournalTechnicalConnect KPiX

  10. An Analysis of the Effects of Sociodemographic Factors on Daily Per Capita Residential Water Use in Texas Cities 

    E-Print Network [OSTI]

    Murdock, Steve H.; Albrecht, Don E.; Hamm, Rita R.; Bachman, Kenneth; Parpia, Banoo

    1988-01-01

    consideration of numerous factors including hydrologic and physiographic factors, engineering feasibility and economic feasibility. At the same time, it is increasingly evident that water needs are closely tied to population growth and to the social, economic...

  11. Worldwide Trends in Energy Use and Efficiency: Key Insights from...

    Open Energy Info (EERE)

    Trends in Energy Use and Efficiency: Key Insights from International Energy Agency (IEA) Indicator Analysis in Support of the Group of Eight (G8) Plan of Action Jump to:...

  12. NAME GRAD'NG KEY .

    E-Print Network [OSTI]

    MA 165 EXAM 3 Fall 2002 Page 1/4. NAME GRAD'NG KEY . Page 1 / 18. STUDENT ID Page 2 / 32. Page 3 /18. RECITATION INSTRUCTOR. Page 4 / 32.

  13. Diversity & Flexibility Key to Sustainability | Department of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Diversity & Flexibility Key to Sustainability Diversity & Flexibility Key to Sustainability Plenary V: Biofuels and Sustainability: Acknowledging Challenges and Confronting...

  14. Key China Energy Statistics 2012

    SciTech Connect (OSTI)

    Levine, Mark; Fridley, David; Lu, Hongyou; Fino-Chen, Cecilia

    2012-05-01

    The China Energy Group at Lawrence Berkeley National Laboratory (LBNL) was established in 1988. Over the years the Group has gained recognition as an authoritative source of China energy statistics through the publication of its China Energy Databook (CED). The Group has published seven editions to date of the CED (http://china.lbl.gov/research/chinaenergy-databook). This handbook summarizes key statistics from the CED and is expressly modeled on the International Energy Agency’s “Key World Energy Statistics” series of publications. The handbook contains timely, clearly-presented data on the supply, transformation, and consumption of all major energy sources.

  15. Key China Energy Statistics 2011

    SciTech Connect (OSTI)

    Levine, Mark; Fridley, David; Lu, Hongyou; Fino-Chen, Cecilia

    2012-01-15

    The China Energy Group at Lawrence Berkeley National Laboratory (LBNL) was established in 1988. Over the years the Group has gained recognition as an authoritative source of China energy statistics through the publication of its China Energy Databook (CED). In 2008 the Group published the Seventh Edition of the CED (http://china.lbl.gov/research/chinaenergy-databook). This handbook summarizes key statistics from the CED and is expressly modeled on the International Energy Agency’s “Key World Energy Statistics” series of publications. The handbook contains timely, clearly-presented data on the supply, transformation, and consumption of all major energy sources.

  16. Key Issues | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterested Parties - WAPA Public CommentInverted253.16582104) Kenmore:Key2: ProjectKey

  17. Key Steps | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJesse Bergkamp Graduate student Subtask 4Photo4> TheKevin MorrisKeyKey Steps

  18. Architecture BA (Hons) Key details

    E-Print Network [OSTI]

    Painter, Kevin

    Architecture BA (Hons) Key details Duration: 4 years (honours degree) Delivery type: Day Intake in the subject of Architecture, including a portfolio of Design, Technical and Theoretical courses covering all aspects of Architectural Theory and Practice. The course has been designed with reference to the RIBA

  19. INFORMATION: THE KEY TO SUSTAINABILITY

    E-Print Network [OSTI]

    Bateman, Ian J.

    of construction and demolition wastes and the introduction of demolition plans. Examples of information sources in the UK, Europe and the US are provided. Key words: waste management, construction, demolition, secondary sector so are concerned with re-use and recycling construction and demolition waste (C & D). However many

  20. Integrated investigation of dementia risk factors : insights from geography, record linkage, and individual participant meta-analysis 

    E-Print Network [OSTI]

    Russ, Thomas Charles

    2013-11-29

    that such variation might point towards potentially modifiable risk or protective factors for dementia. I have attempted to overcome the methodological challenges alluded to above by only examining within-study comparisons. A metaanalysis of rural-urban comparisons...

  1. Abstract Factor analysis has been pursued as a means to decompose dynamic cardiac PET images into different tissue types

    E-Print Network [OSTI]

    Adler, Andy

    using simulated data and on a canine model with different 82 Rb infusion profiles. Biasing of factors scans with varying 82 Rb (150 MBq) infusion durations (15, 30, 60, 120, 240, 240, 120, 60, 30, 15

  2. Few-key Text Entry Revisited: Mnemonic Gestures on Four Keys

    E-Print Network [OSTI]

    Wobbrock, Jacob O.

    of Roman letters for high learnability. We compare this new 4-key method to predominant 3-key and 5-key present a new 4-key method that relies on mnemonic gestures reminiscent of Roman letters. Our method-key methods rely on two keys to move a selector left and right and a third key to select a letter. Although

  3. Identify key design elements of desired function

    E-Print Network [OSTI]

    Nawroth, Janna C.

    DESIGN Identify key design elements of desired function Identify functionally equivalent implementation of key design elements (e.g. structure, physiology, kinematics etc.) Quantify functional and standardize fabrication for repeatability . Test phase: Quantify implementation of key design elements

  4. Key Activities | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterested Parties - WAPA Public CommentInverted253.16582104) Kenmore:Key

  5. Brain Receptor Structures Key to Future Therapeutics

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Brain Receptor Structures Key to Future Therapeutics Brain Receptor Structures Key to Future Therapeutics Print Wednesday, 28 January 2015 00:00 With an aging population in...

  6. Key Opportunities and Challenges for Program Sustainability ...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Key Opportunities and Challenges for Program Sustainability Key Opportunities and Challenges for Program Sustainability Better Buildings Neighborhood Program, Peer Exchange Call:...

  7. November 2012 Key Performance Indicator (KPI): Carbon Management

    E-Print Network [OSTI]

    Evans, Paul

    November 2012 Key Performance Indicator (KPI): Carbon Management NTU report our carbon footprint provided. The carbon emissions are calculated using Carbon Trust conversion factors, as used in NTU's EMS.64 2011/2012 18,130 4.20 The recorded changes in emissions are a result of carbon management projects

  8. Keys for growth in Japan's mature mobile market

    E-Print Network [OSTI]

    Oto, Hiroyuki

    2005-01-01

    The objective of this thesis is to identify key factors that will produce further growth for NTT DoCoMo in Japan's mature mobile market. Since the early 1990s, the mobile phone market in Japan has grown rapidly, and ...

  9. Analysis and calibration of social factors in a consumer acceptance and adoption model for diffusion of diesel vehicle in Europe

    E-Print Network [OSTI]

    Zhang, Qi, S.M. Massachusetts Institute of Technology

    2008-01-01

    While large scale diffusion of alternative fuel vehicles (AFVs) is widely anticipated, the mechanisms that determine their success or failure are ill understood. Analysis of an AFV transition model developed at MIT has ...

  10. Real-Time Reliable Prediction of Linear-Elastic Mode-I Stress Intensity Factors for Failure Analysis

    E-Print Network [OSTI]

    Huynh, Dinh Bao Phuong

    Modern engineering analysis requires accurate, reliable and efficient evaluation of outputs of interest. These outputs are functions of "input" parameter that serve to describe a particular configuration of the system, ...

  11. Human Factors Process Failure Mode and Effects Analysis (HF PFMEA) Application in the Evaluation of Management Risks

    E-Print Network [OSTI]

    Soguilon, Nenita M.

    2009-12-18

    Human errors in engineering processes do not usually get analyzed and evaluated in terms of their risks, much less management errors. Not much effort is expended on management errors and risks analysis, probably because not many have come to realize...

  12. Crystallization and preliminary X-ray analysis of molecular chaperone-like diol dehydratase-reactivating factor in ADP-bound and nucleotide-free forms

    SciTech Connect (OSTI)

    Mori, Koichi; Hieda, Naoki; Yamanishi, Mamoru; Shibata, Naoki; Toraya, Tetsuo

    2005-06-01

    The molecular chaperone-like reactivating factor for adenosylcobalamin (coenzyme B{sub 12}) dependent diol dehydratase was crystallized in ADP-bound and nucleotide-free forms. Preliminary X-ray analysis indicated that crystals are orthorhombic and diffract to 2.0 Å. Adenosylcobalamin (coenzyme B{sub 12}) dependent diol dehydratase (EC 4.2.1.28) catalyzes the conversion of 1,2-diols and glycerol to the corresponding aldehydes. It undergoes mechanism-based inactivation by glycerol. The diol dehydratase-reactivating factor (DDR) reactivates the inactivated holoenzymes in the presence of adenosylcobalamin, ATP and Mg{sup 2+} by mediating the release of a damaged cofactor. This molecular chaperone-like factor was overexpressed in Escherichia coli, purified and crystallized in the ADP-bound and nucleotide-free forms by the sandwich-drop vapour-diffusion method. The crystals of the ADP-bound form belong to the orthorhombic system, with space group P2{sub 1}2{sub 1}2{sub 1} and unit-cell parameters a = 83.26, b = 84.60, c = 280.09 Å, and diffract to 2.0 Å. In the absence of nucleotide, DDR crystals were orthorhombic, with space group P2{sub 1}2{sub 1}2{sub 1} and unit-cell parameters a = 81.92, b = 85.37, c = 296.99 Å and diffract to 3.0 Å. Crystals of both forms were suitable for structural analysis.

  13. Human factors engineering report for the cold vacuum drying facility

    SciTech Connect (OSTI)

    IMKER, F.W.

    1999-06-30

    The purpose of this report is to present the results and findings of the final Human Factors Engineering (HFE) technical analysis and evaluation of the Cold Vacuum Drying Facility (CVDF). Ergonomics issues are also addressed in this report, as appropriate. This report follows up and completes the preliminary work accomplished and reported by the Preliminary HFE Analysis report (SNF-2825, Spent Nuclear Fuel Project Cold Vacuum Drying Facility Human Factors Engineering Analysis: Results and Findings). This analysis avoids redundancy of effort except for ensuring that previously recommended HFE design changes have not affected other parts of the system. Changes in one part of the system may affect other parts of the system where those changes were not applied. The final HFE analysis and evaluation of the CVDF human-machine interactions (HMI) was expanded to include: the physical work environment, human-computer interface (HCI) including workstation and software, operator tasks, tools, maintainability, communications, staffing, training, and the overall ability of humans to accomplish their responsibilities, as appropriate. Key focal areas for this report are the process bay operations, process water conditioning (PWC) skid, tank room, and Central Control Room operations. These key areas contain the system safety-class components and are the foundation for the human factors design basis of the CVDF.

  14. Key Activities | Department of Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACTThousand Cubic Feet) SoldDepartment ofKenThousandtheKevlar andKey

  15. Key Terms | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative Fuelsof EnergyApril 2014 | International NuclearKaren AtkinsonAbout the FuelKey

  16. MULTIVARIATE PUBLIC KEY CRYPTOSYSTEMS FROM DIOPHANTINE EQUATIONS

    E-Print Network [OSTI]

    Gao, Shuhong

    MULTIVARIATE PUBLIC KEY CRYPTOSYSTEMS FROM DIOPHANTINE EQUATIONS SHUHONG GAO AND RAYMOND HEINDL for multivariate public key cryptosystems, which combines ideas from both triangular and oil-vinegar schemes. We the framework. 1. Introduction 1.1. Multivariate Public Key Cryptography. Public key cryptography plays

  17. Quantum Key Distribution with Qubit Pairs

    E-Print Network [OSTI]

    Mohd Asad Siddiqui; Tabish Qureshi

    2014-07-17

    We propose a new Quantum Key Distribution method in which Alice sends pairs of qubits to Bob, each in one of four possible states. Bob uses one qubit to generate a secure key and the other to generate an auxiliary key. For each pair he randomly decides which qubit to use for which key. The auxiliary key has to be added to Bob's secure key in order to match Alice's secure key. This scheme provides an additional layer of security over the standard BB84 protocol.

  18. Phylogenetic and comparative gene expression analysis of barley (Hordeum vulgare)WRKY transcription factor family reveals putatively retained functions betweenmonocots and dicots

    SciTech Connect (OSTI)

    Mangelsen, Elke; Kilian, Joachim; Berendzen, Kenneth W.; Kolukisaoglu, Uner; Harter, Klaus; Jansson, Christer; Wanke, Dierk

    2008-02-01

    WRKY proteins belong to the WRKY-GCM1 superfamily of zinc finger transcription factors that have been subject to a large plant-specific diversification. For the cereal crop barley (Hordeum vulgare), three different WRKY proteins have been characterized so far, as regulators in sucrose signaling, in pathogen defense, and in response to cold and drought, respectively. However, their phylogenetic relationship remained unresolved. In this study, we used the available sequence information to identify a minimum number of 45 barley WRKY transcription factor (HvWRKY) genes. According to their structural features the HvWRKY factors were classified into the previously defined polyphyletic WRKY subgroups 1 to 3. Furthermore, we could assign putative orthologs of the HvWRKY proteins in Arabidopsis and rice. While in most cases clades of orthologous proteins were formed within each group or subgroup, other clades were composed of paralogous proteins for the grasses and Arabidopsis only, which is indicative of specific gene radiation events. To gain insight into their putative functions, we examined expression profiles of WRKY genes from publicly available microarray data resources and found group specific expression patterns. While putative orthologs of the HvWRKY transcription factors have been inferred from phylogenetic sequence analysis, we performed a comparative expression analysis of WRKY genes in Arabidopsis and barley. Indeed, highly correlative expression profiles were found between some of the putative orthologs. HvWRKY genes have not only undergone radiation in monocot or dicot species, but exhibit evolutionary traits specific to grasses. HvWRKY proteins exhibited not only sequence similarities between orthologs with Arabidopsis, but also relatedness in their expression patterns. This correlative expression is indicative for a putative conserved function of related WRKY proteins in mono- and dicot species.

  19. Experimental quantum key distribution with proven security against realistic attacks

    E-Print Network [OSTI]

    Salvail, Louis

    , center of the Danish National Research Foundation, Dept. of Computer Science,University of Aarhus,8000, Denmark Abstract We report on a realization of a fully automated 20 km quantum key distribution system­ cated security analysis against realistic attacks is used to optimize the system parameters in order

  20. Hash-based Multivariate Public Key Cryptosystems

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Hash-based Multivariate Public Key Cryptosystems WANG Hou-Zhen and ZHANG Huan-Guo The Key for the traditional multivariate public key cryp- tosystems. For example, the signature scheme SFLASH was broken. at ASIACRYPTO'09. Most multivariate schemes known so far are insecure, except maybe the sigature schemes UOV

  1. Final analysis of proton form factor ratio data at Q2 = 4.0, 4.8, and 5.6 GeV2

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Puckett, A. J. R.; Brash, E. J.; Gayou, O.; Jones, M. K.; Pentchev, L.; Perdrisat, C. F.; Punjabi, V.; Aniol, K. A.; Averett, T.; Benmokhtar, F.; et al

    2012-04-11

    Recently published measurements of the proton electromagnetic form factor ratio R = ?p GEp/GMp at momentum transfers Q2 up to 8.5 GeV2 in Jefferson Lab Hall C deviate from the linear trend of previous measurements in Jefferson Lab Hall A, favoring a slower rate of decrease of R with Q2. While statistically compatible in the region of overlap with Hall A, the Hall C data hint at a systematic difference between the two experiments. This possibility was investigated in a reanalysis of the Hall A data. We find that the original analysis underestimated the background in the selection of elasticmore »events. The application of an additional cut to further suppress the background increases the results for R, improving the consistency between Halls A and C.« less

  2. Brain Receptor Structures Key to Future Therapeutics

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Brain Receptor Structures Key to Future Therapeutics Print With an aging population in America, it is more important than ever to discover ways to treat or prevent diseases...

  3. Monroe County Extension Services Key West Office

    E-Print Network [OSTI]

    Hill, Jeffrey E.

    potable water is pumped to the Keys from the mainland through a 130-mile long transmission line irrigation and fertilizer, and are more

  4. Time-to-Event Analysis of Fine Particle Air Pollution and Preterm Birth: Results from North Carolina, 2001-2005

    E-Print Network [OSTI]

    Reich, Brian J.

    1 Time-to-Event Analysis of Fine Particle Air Pollution and Preterm Birth: Results from North.chang@duke.edu #12;3 Abstract Exposures to air pollution during pregnancy have been suggested as risk factors good air quality. Key words: air pollution, particulate matter, preterm birth, survival analysis Word

  5. Unifying classical and quantum key distillation

    E-Print Network [OSTI]

    Matthias Christandl; Artur Ekert; Michal Horodecki; Pawel Horodecki; Jonathan Oppenheim; Renato Renner

    2007-02-28

    Assume that two distant parties, Alice and Bob, as well as an adversary, Eve, have access to (quantum) systems prepared jointly according to a tripartite state. In addition, Alice and Bob can use local operations and authenticated public classical communication. Their goal is to establish a key which is unknown to Eve. We initiate the study of this scenario as a unification of two standard scenarios: (i) key distillation (agreement) from classical correlations and (ii) key distillation from pure tripartite quantum states. Firstly, we obtain generalisations of fundamental results related to scenarios (i) and (ii), including upper bounds on the key rate. Moreover, based on an embedding of classical distributions into quantum states, we are able to find new connections between protocols and quantities in the standard scenarios (i) and (ii). Secondly, we study specific properties of key distillation protocols. In particular, we show that every protocol that makes use of pre-shared key can be transformed into an equally efficient protocol which needs no pre-shared key. This result is of practical significance as it applies to quantum key distribution (QKD) protocols, but it also implies that the key rate cannot be locked with information on Eve's side. Finally, we exhibit an arbitrarily large separation between the key rate in the standard setting where Eve is equipped with quantum memory and the key rate in a setting where Eve is only given classical memory. This shows that assumptions on the nature of Eve's memory are important in order to determine the correct security threshold in QKD.

  6. Hydrogen Fuel Cell Performance in the Key Early Markets of Material Handling Equipment and Backup Power (Presentation)

    SciTech Connect (OSTI)

    Kurtz, J.; Sprik, S.; Ramsden, T.; Saur, G.; Ainscough, C.; Post, M.; Peters, M.

    2013-10-01

    This presentation summarizes the results of NREL's analysis of hydrogen fuel cell performance in the key early markets of material handling equipment (MHE) and backup power.

  7. On multivariate signatureonly public key cryptosystems

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    On multivariate signature­only public key cryptosystems Nicolas T. Courtois 1,2 courtois we argument that the problem has many natural solutions within the framework of the multivariate cryptography. First of all it seems that virtually any non­injective multivariate public key is inherently

  8. Deniable Internet Key Exchange Andrew C. Yao

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Deniable Internet Key Exchange Andrew C. Yao Frances F. Yao Yunlei Zhao§ Bin Zhu¶ Abstract In this work, we develop a family of protocols for deniable Internet Key-Exchange (IKE) with the following of privacy protection (especially for E-commerce over Internet), this work is naturally of practical interest

  9. Captured key electrical safety lockout system

    DOE Patents [OSTI]

    Darimont, Daniel E. (Aurora, IL)

    1995-01-01

    A safety lockout apparatus for an electrical circuit includes an electrical switch, a key, a lock and a blocking mechanism. The electrical switch is movable between an ON position at which the electrical circuit is energized and an OFF position at which the electrical circuit is deactivated. The lock is adapted to receive the key and is rotatable among a plurality of positions by the key. The key is only insertable and removable when the lock is at a preselected position. The lock is maintained in the preselected position when the key is removed from the lock. The blocking mechanism physically maintains the switch in its OFF position when the key is removed from the lock. The blocking mechanism preferably includes a member driven by the lock between a first position at which the electrical switch is movable between its ON and OFF positions and a second position at which the member physically maintains the electrical switch in its OFF position. Advantageously, the driven member's second position corresponds to the preselected position at which the key can be removed from and inserted into the lock.

  10. Captured key electrical safety lockout system

    SciTech Connect (OSTI)

    Darimont, D.E.

    1995-10-31

    A safety lockout apparatus for an electrical circuit includes an electrical switch, a key, a lock and a blocking mechanism. The electrical switch is movable between an ON position at which the electrical circuit is energized and an OFF position at which the electrical circuit is deactivated. The lock is adapted to receive the key and is rotatable among a plurality of positions by the key. The key is only insertable and removable when the lock is at a preselected position. The lock is maintained in the preselected position when the key is removed from the lock. The blocking mechanism physically maintains the switch in its OFF position when the key is removed from the lock. The blocking mechanism preferably includes a member driven by the lock between a first position at which the electrical switch is movable between its ON and OFF positions and a second position at which the member physically maintains the electrical switch in its OFF position. Advantageously, the driven member`s second position corresponds to the preselected position at which the key can be removed from and inserted into the lock. 7 figs.

  11. Key Renewable Energy Opportunities for Oklahoma Tribes

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterested Parties - WAPA Public CommentInverted253.16582104) Kenmore:Key2: ProjectKeyKEY

  12. BACK TO BASICS: YOUR KEYS TO SAFE

    E-Print Network [OSTI]

    Kirschner, Denise

    BACK TO BASICS: YOUR KEYS TO SAFE DRIVING FINE-TUNE THE FUNDAMENTALS DRIVE SAFELY WORK WEEK: FRIDAY an occasional refresher. In fact, most company fleet safety programs emphasize basic skills and defensive

  13. Civil Engineering BEng (Hons) Key details

    E-Print Network [OSTI]

    Painter, Kevin

    Civil Engineering BEng (Hons) Key details Duration: Full-time: 4 years (BEng Hons) Delivery type engineering disciplines of Structures, Geotechnics, Water Engineering and Transportation Engineering civil or structural engineers. After graduation, students are equipped to work for consultants

  14. Extracting secret keys from integrated circuits

    E-Print Network [OSTI]

    Lim, Daihyun, 1976-

    2004-01-01

    Modern cryptographic protocols are based on the premise that only authorized participants can obtain secret keys and access to information systems. However, various kinds of tampering methods have been devised to extract ...

  15. Advanced Analysis Software Key to New, Energy-Efficient Technologies -

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 OutreachProductswsicloudwsicloudden DocumentationAccommodationsRegister / Vol.ConferenceAdolphusProgram Office

  16. Security Issues Associated With Error Correction And Privacy Amplification In Quantum Key Distribution

    E-Print Network [OSTI]

    Horace Yuen

    2014-11-10

    Privacy amplification is a necessary step in all quantum key distribution protocols, and error correction is needed in each except when signals of many photons are used in the key communication in quantum noise approach. No security analysis of error correcting code information leak to the attacker has ever been provided, while an ad hoc formula is currently employed to account for such leak in the key generation rate. It is also commonly believed that privacy amplification allows the users to at least establish a short key of arbitrarily close to perfect security. In this paper we show how the lack of rigorous error correction analysis makes the otherwise valid privacy amplification results invalid, and that there exists a limit on how close to perfect a generated key can be obtained from privacy amplification. In addition, there is a necessary tradeoff between key rate and security, and the best theoretical values from current theories would not generate enough near-uniform key bits to cover the message authentication key cost in disturbance-information tradeoff protocols of the BB84 variety.

  17. Sandia Energy - The Brain: Key To a Better Computer

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-Throughput AnalysisSinkholeCapabilities General overview of theBrain: Key To a

  18. BACK TO BASICS: YOUR KEYS TO SAFE

    E-Print Network [OSTI]

    Kirschner, Denise

    BACK TO BASICS: YOUR KEYS TO SAFE DRIVING BUCKLE UP! Seat belts should never have time off DRIVE the back seat to the front seat.4 ·The back is the best place for pets. According to AAA, similar. Never place the shoulder portion under your arm or behind your back! ·Drivers should sit with at least

  19. Mechanical Engineering BEng / BEng (Hons) Key details

    E-Print Network [OSTI]

    Painter, Kevin

    Mechanical engineers play key roles in all industrial sectors, from aerospace and oil and gas, through food for Mechanical Engineering graduates in many sectors, including power production, oil and petrochemicals, manufacturing, power plant, medical engineering and many others l Whatever your final career path, developing

  20. Fashion Marketing & Retailing BA (Hons) Key details

    E-Print Network [OSTI]

    Painter, Kevin

    Fashion Marketing & Retailing BA (Hons) Key details Duration: Full-time: 3 years (BA) / 4 years (BA Hons) Delivery type: Day Intake date: September Fees: 54000 AED per year Overview Our Fashion Marketing and Retailing programme confidently prepares students for a career within the marketing and retailing industry

  1. Key Management Challenges in Smart Grid

    SciTech Connect (OSTI)

    Sheldon, Frederick T; Duren, Mike

    2012-01-01

    Agenda Awarded in February 2011 Team of industry and research organizations Project Objectives Address difficult issues Complexity Diversity of systems Scale Longevity of solution Participate in standards efforts and working groups Develop innovative key management solutions Modeling and simulation ORNL Cyber Security Econometric Enterprise System Demonstrate effectiveness of solution Demonstrate scalability

  2. Organisational Change -Key Steps LocalCollege/

    E-Print Network [OSTI]

    Botea, Adi

    Resources Division START Version 1.0 X:\\Employment Strategies\\Workplace Change & Innovation\\Change Management Frameworks\\Change Management - Key Steps 021111.vsd FINISH NOTES: * For information on formal vs informal change refer to the managing change clause in the ANU Enterprise Agreement and the managing change policy

  3. Chemical Engineering BEng (Hons) Key details

    E-Print Network [OSTI]

    Painter, Kevin

    Chemical Engineering BEng (Hons) Key details Duration: Full-time: 3 years (BEng) / 4 years (BEng Hons) Delivery type: Day Intake date: September Fees: 58000 AED per year Overview Chemical engineering successful and thriving types of business in the world. Chemical engineers play a vital role in achieving

  4. Management strategies for endangered Florida Key deer 

    E-Print Network [OSTI]

    Peterson, Markus Nils

    2004-09-30

    species. These data were used to address my study objectives. I found the most commonly cited FSR (2.67:1, male:female) for Florida Key deer to be inaccurate. A male biased FSR of 1.45:1 was more probable. Modified drop and drive nets were appropriate...

  5. Roadmap for selected key measurements of LHCb

    E-Print Network [OSTI]

    The LHCb Collaboration; B. Adeva; M. Adinolfi; A. Affolder; Z. Ajaltouni; J. Albrecht; F. Alessio; M. Alexander; P. Alvarez Cartelle; A. A. Alves Jr; S. Amato; Y. Amhis; J. Amoraal; J. Anderson; O. Aquines Gutierrez; L. Arrabito; M. Artuso; E. Aslanides; G. Auriemma; S. Bachmann; Y. Bagaturia; D. S. Bailey; V. Balagura; W. Baldini; MdC. Barandela Pazos; R. J. Barlow; S. Barsuk; A. Bates; C. Bauer; Th. Bauer; A. Bay; I. Bediaga; K. Belous; I. Belyaev; M. Benayoun; G. Bencivenni; R. Bernet; M. -O. Bettler; A. Bizzeti; T. Blake; F. Blanc; C. Blanks; J. Blouw; S. Blusk; A. Bobrov; V. Bocci; A. Bondar; N. Bondar; W. Bonivento; S. Borghi; A. Borgia; E. Bos; T. J. V. Bowcock; C. Bozzi; J. Bressieux; S. Brisbane; M. Britsch; N. H. Brook; H. Brown; A. Büchler-Germann; J. Buytaert; J. -P. Cachemiche; S. Cadeddu; J. M. Caicedo Carvajal; O. Callot; M. Calvi; M. Calvo Gomez; A. Camboni; W. Cameron; P. Campana; A. Carbone; G. Carboni; A. Cardini; L. Carson; K. Carvalho Akiba; G. Casse; M. Cattaneo; M. Charles; Ph. Charpentier; A. Chlopik; P. Ciambrone; X. Cid Vidal; P. J. Clark; P. E. L. Clarke; M. Clemencic; H. V. Cliff; J. Closier; C. Coca; V. Coco; J. Cogan; P. Collins; F. Constantin; G. Conti; A. Contu; G. Corti; G. A. Cowan; B. D'Almagne; C. D'Ambrosio; D. G. d'Enterria; W. Da Silva; P. David; I. De Bonis; S. De Capua; M. De Cian; F. De Lorenzi; J. M. De Miranda; L. De Paula; P. De Simone; H. De Vries; D. Decamp; H. Degaudenzi; M. Deissenroth; L. Del Buono; C. Deplano; O. Deschamps; F. Dettori; J. Dickens; H. Dijkstra; M. Dima; S. Donleavy; A. C. dos Reis; A. Dovbnya; T. Du Pree; P. -Y. Duval; L. Dwyer; R. Dzhelyadin; C. Eames; S. Easo; U. Egede; V. Egorychev; F. Eisele; S. Eisenhardt; L. Eklund; D. Esperante Pereira; L. Estève; S. Eydelman; E. Fanchini; C. Färber; G. Fardell; C. Farinelli; S. Farry; V. Fave; V. Fernandez Albor; M. Ferro-Luzzi; S. Filippov; C. Fitzpatrick; F. Fontanelli; R. Forty; M. Frank; C. Frei; M. Frosini; J. L. Fungueirino Pazos; S. Furcas; A. Gallas Torreira; D. Galli; M. Gandelman; Y. Gao; J-C. Garnier; L. Garrido; C. Gaspar; N. Gauvin; M. Gersabeck; T. Gershon; Ph. Ghez; V. Gibson; Yu. Gilitsky; V. V. Gligorov; C. Göbel; D. Golubkov; A. Golutvin; A. Gomes; M. Grabalosa Gándara; R. Graciani Diaz; L. A. Granado Cardoso; E. Graugés; G. Graziani; A. Grecu; G. Guerrer; E. Gushchin; Yu. Guz; Z. Guzik; T. Gys; F. Hachon; G. Haefeli; S. C. Haines; T. Hampson; S. Hansmann-Menzemer; R. Harji; N. Harnew; P. F. Harrison; J. He; K. Hennessy; P. Henrard; J. A. Hernando Morata; A. Hicheur; E. Hicks; W. Hofmann; K. Holubyev; P. Hopchev; W. Hulsbergen; P. Hunt; T. Huse; R. S. Huston; D. Hutchcroft; V. Iakovenko; C. Iglesias Escudero; J. Imong; R. Jacobsson; M. Jahjah Hussein; E. Jans; F. Jansen; P. Jaton; B. Jean-Marie; M. John; C. R. Jones; B. Jost; F. Kapusta; T. M. Karbach; J. Keaveney; U. Kerzel; T. Ketel; A. Keune; S. Khalil; B. Khanji; Y. M. Kim; M. Knecht; J. Knopf; S. Koblitz; A. Konoplyannikov; P. Koppenburg; I. Korolko; A. Kozlinskiy; M. Krasowski; L. Kravchuk; P. Krokovny; K. Kruzelecki; M. Kucharczyk; I. Kudryashov; T. Kvaratskheliya; D. Lacarrere; A. Lai; R. W. Lambert; G. Lanfranchi; C. Langenbruch; T. Latham; R. Le Gac; R. Lefevre; A. Leflat; J. Lefrançois; O. Leroy; K. Lessnoff; L. Li; Y. Y. Li; J. Libby; M. Lieng; R. Lindner; S. Lindsey; C. Linn; B. Liu; G. Liu; J. H. Lopes; E. Lopez Asamar; J. Luisier; F. Machefert; I. Machikhiliyan; F. Maciuc; O. Maev; J. Magnin; A. Maier; R. M. D. Mamunur; G. Manca; G. Mancinelli; N. Mangiafave; U. Marconi; F. Marin; J. Marks; G. Martellotti; A. Martens; L. Martin; D. Martinez Santos; Z. Mathe; C. Matteuzzi; V. Matveev; A. Mazurov; G. McGregor; B. Mcharek; C. Mclean; R. McNulty; M. Merk; J. Merkel; M. Merkin; R. Messi; F. C. D. Metlica; J. Michalowski; S. Miglioranzi; M. -N. Minard; S. Monteil; D. Moran; J. V. Morris; R. Mountain; I. Mous; F. Muheim; R. Muresan; F. Murtas; B. Muryn; M. Musy; J. Mylroie-Smith; P. Naik; T. Nakada; R. Nandakumar; J. Nardulli; Z. Natkaniec; M. Nedos; M. Needham; N. Neufeld; L. Nicolas; S. Nies; V. Niess; N. Nikitin; A. Noor; A. Oblakowska-Mucha; V. Obraztsov; S. Oggero; O. Okhrimenko; R. Oldeman; M. Orlandea; A. Ostankov; J. Palacios; M. Palutan; J. Panman; A. Papadelis; A. Papanestis; M. Pappagallo; C. Parkes; G. Passaleva; G. D. Patel; M. Patel; S. K. Paterson; G. N. Patrick; E. Pauna; C. Pauna; C. Pavel; A. Pazos Alvarez; A. Pellegrino; G. Penso; M. Pepe Altarelli; S. Perazzini; D. L. Perego; A. Pérez-Calero Yzquierdo; E. Perez Trigo; P. Perret; G. Pessina; A. Petrella; A. Petrolini; B. Pietrzyk; D. Pinci; S. Playfer; M. Plo Casasus; G. Polok; A. Poluektov; E. Polycarpo; D. Popov; B. Popovici; S. Poss; C. Potterat; A. Powell; S. Pozzi; V. Pugatch; A. Puig Navarro; W. Qian; J. H. Rademacker; B. Rakotomiaramanana; I. Raniuk; G. Raven; S. Redford; W. Reece

    2010-11-23

    Six of the key physics measurements that will be made by the LHCb experiment, concerning CP asymmetries and rare B decays, are discussed in detail. The "road map" towards the precision measurements is presented, including the use of control channels and other techniques to understand the performance of the detector with the first data from the LHC.

  6. Business Management BA / MA (Hons) Key details

    E-Print Network [OSTI]

    Painter, Kevin

    Business Management BA / MA (Hons) Key details Duration: Full-time: 3 years (BA) / 4 years (MSc Management degree programme follows a number of guiding principles that mirror the values of managers of leading organisations and reflect current business management thinking. In the first two years of all

  7. Vermont's Changing Forests Key Findings on the

    E-Print Network [OSTI]

    Keeton, William S.

    1 Vermont's Changing Forests Key Findings on the Health of Forested Ecosystems from the Vermont Members Anne Archie, USDA Forest Service Douglas Lantagne, University of Vermont Ed O'Leary, Vermont, USDA Farm Service Agency Charles Scott, USDA Forest Service Steven Sinclair, Vermont Agency of Natural

  8. Automotive Engineering BEng (Hons) Key details

    E-Print Network [OSTI]

    Painter, Kevin

    Automotive Engineering BEng (Hons) Key details Duration: Full-time: 3 years (BEng) / 4 years (BEng programme, but allows students in the later years to specialise in subjects relating to automotive technology. Automotive engineering continues to be a major employer of professional engineers, owing

  9. CAREER RESOURCES Canadian Key Business Directory

    E-Print Network [OSTI]

    Thompson, Michael

    CAREER RESOURCES BOOKS Canadian Key Business Directory - Includes the largest companies in Canada companies - Search by name, geography, SIC code and more! - Online version available through library: http://www.jobsetc.gc.ca/eng/ - Training, career and worker information - Career Exploration resources

  10. NCLC November 1999 Cem Kaner Page 1 UCITA: Key Consumer IssuesUCITA: Key Consumer Issues

    E-Print Network [OSTI]

    NCLC November 1999 Cem Kaner Page 1 UCITA: Key Consumer IssuesUCITA: Key Consumer Issues Cem Kaner, J.D., Ph.D., ASQ-CQE November 1999 Contact Information: kaner@kaner.com www.kaner.com (testing November 1999 Cem Kaner Page 2 UCITA? Huh?UCITA? Huh? · Uniform Computer Information Transactions Act

  11. An Empirical Analysis of Factors That Influence the First Year to Second Year Retention of Students at One Large, Hispanic Serving Institution (HSI) 

    E-Print Network [OSTI]

    Wilkerson, Steven Lamar

    2009-05-15

    The purpose of this study was to identify how input and environmental factors impact first-to-second year retention of undergraduate students at a large Hispanic Serving Institution (HSI). An additional purpose of the study was to determine...

  12. Final analysis of proton form factor ratio data at Q[superscript 2]=4.0, 4.8, and 5.6 GeV[superscript 2

    E-Print Network [OSTI]

    Bertozzi, William

    Precise measurements of the proton electromagnetic form factor ratio R=?[subscript p]G[subscript E][superscript p]/G[subscript M][superscript p] using the polarization transfer method at Jefferson Lab have revolutionized ...

  13. Comparing individuals with learning disability and those with borderline IQ: a confirmatory factor analysis of the Wechsler Adult Intelligence Scale (3rd edition). 

    E-Print Network [OSTI]

    MacLean, Hannah Ng On-Nar

    2011-06-30

    Background: Support for the four factor construct validity of the third edition of the Wechsler Adult Intelligence Scale (WAIS-III) has been found in clinical and non clinical populations but some studies question whether ...

  14. Chemical and Petroleum Engineering Key and Lab Space Agreement

    E-Print Network [OSTI]

    Chemical and Petroleum Engineering Key and Lab Space Agreement Key Holder Information Last Name and Petroleum Engineering remain the property of the Department. I agree to pay a deposit for the keys

  15. Identification of Key Barriers in Workforce Development

    SciTech Connect (OSTI)

    2008-03-31

    This report documents the identification of key barriers in the development of an adequate national security workforce as part of the National Security Preparedness Project, being performed under a Department of Energy/National Nuclear Security Administration grant. Many barriers exist that prevent the development of an adequate number of propertly trained national security personnel. Some barriers can be eliminated in a short-term manner, whereas others will involve a long-term strategy that takes into account public policy.

  16. Key Physical Mechanisms in Nanostructured Solar Cells

    SciTech Connect (OSTI)

    Dr Stephan Bremner

    2010-07-21

    The objective of the project was to study both theoretically and experimentally the excitation, recombination and transport properties required for nanostructured solar cells to deliver energy conversion efficiencies well in excess of conventional limits. These objectives were met by concentrating on three key areas, namely, investigation of physical mechanisms present in nanostructured solar cells, characterization of loss mechanisms in nanostructured solar cells and determining the properties required of nanostructured solar cells in order to achieve high efficiency and the design implications.

  17. Rapid Compression Machine ? A Key Experimental Device to Effectively...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Compression Machine A Key Experimental Device to Effectively Collaborate with Basic Energy Sciences Rapid Compression Machine A Key Experimental Device to Effectively...

  18. Cooling Towers: Understanding Key Components of Cooling Towers...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Cooling Towers: Understanding Key Components of Cooling Towers and How to Improve Water Efficiency Cooling Towers: Understanding Key Components of Cooling Towers and How to Improve...

  19. Single, Key Gene Discovery Could Streamline Production of Biofuels...

    Energy Savers [EERE]

    Single, Key Gene Discovery Could Streamline Production of Biofuels Single, Key Gene Discovery Could Streamline Production of Biofuels August 11, 2011 - 3:51pm Addthis WASHINGTON,...

  20. Building America Expert Meeting: Key Innovations for Adding Energy...

    Energy Savers [EERE]

    Expert Meeting: Key Innovations for Adding Energy Efficiency to Maintenance Projects Building America Expert Meeting: Key Innovations for Adding Energy Efficiency to Maintenance...

  1. Thailand-Key Results and Policy Recommendations for Future Bioenergy...

    Open Energy Info (EERE)

    Thailand-Key Results and Policy Recommendations for Future Bioenergy Development Jump to: navigation, search Name Thailand-Key Results and Policy Recommendations for Future...

  2. Technology Key to Harnessing Natural Gas Potential | Department...

    Office of Environmental Management (EM)

    Technology Key to Harnessing Natural Gas Potential Technology Key to Harnessing Natural Gas Potential July 18, 2012 - 3:52pm Addthis Deputy Secretary Daniel Poneman tours Proinlosa...

  3. Key Energy-Saving Projects for Smaller Facilities | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Key Energy-Saving Projects for Smaller Facilities Key Energy-Saving Projects for Smaller Facilities This presentation discusses how smaller industrial facilities can save energy...

  4. Effective electromechanical moduli of ferroelectric ceramics with fiber Key Laboratory of Advanced Materials & Rheological Properties of Ministry of Education,

    E-Print Network [OSTI]

    Li, Jiangyu

    Effective electromechanical moduli of ferroelectric ceramics with fiber textures Y. C. Zhou Key and electromechanical coupling factors of ferroelectric ceramics BaTiO3 and Pb Mg1/3Nb2/3 O3­PbTiO3 PMN-PT with various higher electromechanical coupling factor k31 than that of 001 -oriented single crystals. © 2005 American

  5. Factors Associated With Newly Graduated Nurses' Intent to Leave Current Position in U.S. Acute Care Hospitals: A Descriptive Research Study Using Secondary Data Analysis

    E-Print Network [OSTI]

    Meyer, Mary N.

    2014-08-31

    in new nurses. Two unit-based factors, unit-type and the nurse-nurse relationship were associated with new nurse ITLcp. New nurses working on adult medical surgical units had comparatively higher ITLcp than their peers in neonatal, pediatrics, or critical...

  6. Transfer Factors for Contaminant Uptake by Fruit and Nut Trees

    SciTech Connect (OSTI)

    Napier, Bruce A.; Fellows, Robert J.; Minc, Leah D.

    2013-11-20

    Transfer of radionuclides from soils into plants is one of the key mechanisms for long-term contamination of the human food chain. Nearly all computer models that address soil-to-plant uptake of radionuclides use empirically-derived transfer factors to address this process. Essentially all available soil-to-plant transfer factors are based on measurements in annual crops. Because very few measurements are available for tree fruits, samples were taken of alfalfa and oats and the stems, leaves, and fruits and nuts of almond, apple, apricot, carob, fig, grape, nectarine, pecan, pistachio (natural and grafted), and pomegranate, along with local surface soil. The samples were dried, ground, weighed, and analyzed for trace constituents through a combination of induction-coupled plasma mass spectrometry and instrumental neutron activation analysis for a wide range of naturally-occurring elements. Analysis results are presented and converted to soil-to-plant transfer factors. These are compared to commonly used and internationally recommended values. Those determined for annual crops are very similar to commonly-used values; those determined for tree fruits show interesting differences. Most macro- and micronutrients are slightly reduced in fruits; non-essential elements are reduced further. These findings may be used in existing computer models and may allow development of tree-fruit-specific transfer models.

  7. Apportionment of ambient primary and secondary fine particulate matter at the Pittsburgh National Energy Laboratory particulate matter characterization site using positive matrix factorization and a potential source contributions function analysis

    SciTech Connect (OSTI)

    Donald V. Martello; Natalie J. Pekney; Richard R. Anderson (and others) [U.S. Department of Energy, Pittsburgh, PA (United States). National Energy Technology Laboratory

    2008-03-15

    Fine particulate matter (PM2.5) concentrations associated with 202 24-hr samples collected at the National Energy Technology Laboratory particulate matter characterization site in south Pittsburgh from October 1999 through September 2001 were used to apportion PM2.5 into primary and secondary contributions using Positive Matrix Factorization (PMF2). Input included the concentrations of PM2.5 mass determined with a Federal Reference Method (FRM) sampler, semi-volatile PM2.5 organic material, elemental carbon (EC), and trace element components of PM2.5. A total of 11 factors were identified. The results of potential source contributions function analysis using PMF2 factors and HYSPLIT-calculated back-trajectories were used to identify those factors associated with specific meteorological transport conditions. The 11 factors were identified as being associated with emissions from various specific regions and facilities including crustal material, gasoline combustion, diesel combustion, and three nearby sources high in trace metals. Three sources associated with transport from coal-fired power plants to the southeast, a combination of point sources to the northwest, and a steel mill and associated sources to the west were identified. In addition, two secondary-material-dominated sources were identified, one was associated with secondary products of local emissions and one was dominated by secondary ammonium sulfate transported to the NETL site from the west and southwest. Of these 11 factors, the four largest contributors to PM2.5 were the secondary transported material, local secondary material, diesel combustion emissions, and gasoline combustion emissions. 26 refs., 10 figs., 1 tab.

  8. Another key Y-12 General Foreman remembered

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 OutreachProductswsicloudwsiclouddenDVA N C E D B L O O D S TAPropaneandAn319Another key Y-12 General Foreman

  9. Keyes, California: Energy Resources | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History View NewTexas: Energy ResourcesOrder atHills,NewKeithDelaware:DLRKettering,KeyTex Energy LLCKeyes,

  10. NERSC.COE.key.actions-4.pptx

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration wouldMass map shines light on77 PAGEMissionStressMoveMuncriefB ONERSCNERSC8 CoE Key Actions

  11. Composite keys? | OpenEI Community

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTIONRobertsdale, Alabama (Utility Company)| Open EnergyColoradoBiomassPlusComposite keys? Home >

  12. Fermilab | Science | Particle Physics | Key Discoveries

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDid you not find whatGasEnergyfeature photo featureParticleDark matterKey

  13. Key Agency Targets Summary _FY 2012_.doc

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACTThousand Cubic Feet) SoldDepartment ofKenThousandtheKevlar andKey5 B

  14. Key Actions for Optimizing for KNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJesse Bergkamp Graduate student Subtask 4Photo4> TheKevin Morris Title:AnaKey

  15. Bioenergy Key Publications | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative FuelsofProgram:Y-12Power, IncBio Centers Announcement at theproduceƈ GOAL:Key

  16. Fair Encryption of RSA Keys Guillaume Poupard and Jacques Stern

    E-Print Network [OSTI]

    Stern, Jacques

    based on verifiable encryption of secret keys using double decker exponentiation which makes the proofs

  17. Session-Key Generation using Human Passwords Only Oded Goldreich

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Session-Key Generation using Human Passwords Only Oded Goldreich Department of Computer Science present session-key generation protocols in a model where the legitimate parties share only a human assumptions. Keywords: Session-key generation (authenticated key-exchange), mutual authentication proto- cols

  18. SessionKey Generation using Human Passwords Only # Oded Goldreich +

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Session­Key Generation using Human Passwords Only # Oded Goldreich + Department of Computer Science present session­key generation protocols in a model where the legitimate parties share only a human setup assumptions. Keywords: Session­key generation (authenticated key­exchange), mutual authentication

  19. The impacts of urbanization on endangered florida key deer 

    E-Print Network [OSTI]

    Harveson, Patricia Moody

    2006-04-12

    of peninsular Florida. Key deer range is restricted to the Lower Florida Keys with approximately 60% residing on Big Pine Key and 15% residing on No Name Key which have undergone rapid human population growth and development over the past 30 years. Urban...

  20. ACKNOWLEDGEMENTS ..................................................................................4 DEFINITIONS OF KEY TERMS .........................................................................6

    E-Print Network [OSTI]

    Escher, Christine

    ) means the chemical compound containing one atom of carbon and two atoms of oxygen. (2) "Carbon dioxide) "Global Warming Potential factor" (GWP) means the radiative forcing impact of one mass-based unit. For instance, methane (CH4) has a GWP of 23, meaning that every gram of methane will trap 23 times as much

  1. Unconditional Security of Time-energy Entanglement Quantum Key Distribution using Dual-basis Interferometry

    E-Print Network [OSTI]

    Zheshen Zhang; Jacob Mower; Dirk Englund; Franco N. C. Wong; Jeffrey H. Shapiro

    2014-01-23

    High-dimensional quantum key distribution (HDQKD) offers the possibility of high secure-key rate with high photon-information efficiency. We consider HDQKD based on the time-energy entanglement produced by spontaneous parametric downconversion, and show that it is secure against collective attacks. Its security rests upon visibility data -- obtained from Franson and conjugate-Franson interferometers -- that probe photon-pair frequency correlations and arrival-time correlations. From these measurements an upper bound can be established on the eavesdropper's Holevo information by translating the Gaussian-state security analysis for continuous-variable quantum key distribution so that it applies to our protocol. We show that visibility data from just the Franson interferometer provides a weaker, but nonetheless useful, secure-key rate lower bound. To handle multiple-pair emissions, we incorporate the decoy-state approach into our protocol. Our results show that over 200\\,km transmission distance in optical fiber, time-energy entanglement HDQKD could permit a 700 bit/sec secure-key rate, and a photon information efficiency of 2 secure-key bits per photon coincidence in the key-generation phase using receivers with 15% system efficiency.

  2. Cours-XIII/Clavin2015.key

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Paul Clavin 2 P.Clavin XIII Lecture 13 : 13-1. Acoustic waves and entropy-vorticity wave Stability analysis of shock waves 13-2. Analyses Linearized Euler equations Linearized...

  3. Social media impact factor: the top ten dermatology journals on facebook and twitter

    E-Print Network [OSTI]

    Karimkhani, Chante; Gamble, Ryan; Dellavalle, Robert P

    2014-01-01

    the enormous worldwide impact of social media, journals and4 April 2014 Commentary Social media impact factor: the topmay want to take social media impact into account. Key

  4. Hacking on decoy-state quantum key distribution system with partial phase randomization

    E-Print Network [OSTI]

    Shi-Hai Sun; Mu-Sheng Jiang; Xiang-Chun Ma; Chun-Yan Li; Lin-Mei Liang

    2014-07-15

    Quantum key distribution (QKD) provides means for unconditional secure key transmission between two distant parties. However, in practical implementations, it suffers from quantum hacking due to device imperfections. Here we propose a hybrid measurement attack, with only linear optics, homodyne detection, and single photon detection, to the widely used vacuum+weak decoy state QKD system when the phase of source is partially randomized. Our analysis shows that, in some parameter regimes, the proposed attack would result in an entanglement breaking channel but still be able to trick the legitimate users to believe they have transmitted secure keys. That is, the eavesdropper is able to steal all the key information without discovered by the users. Thus, our proposal reveals that partial phase randomization is not sufficient to guarantee the security of phase-encoding QKD systems with weak coherent states.

  5. Probabilistic risk analysis of building contamination Introduction

    E-Print Network [OSTI]

    Bolster, Diogo

    Probabilistic risk analysis of building contamination Introduction Accurate and verifiable, San Diego, La Jolla, CA, USA Key words: Ventilation contaminant; Risk analysis; Probabilistic

  6. Passive decoy state quantum key distribution with practical light sources

    E-Print Network [OSTI]

    Marcos Curty; Xiongfeng Ma; Bing Qi; Tobias Moroder

    2009-11-14

    Decoy states have been proven to be a very useful method for significantly enhancing the performance of quantum key distribution systems with practical light sources. While active modulation of the intensity of the laser pulses is an effective way of preparing decoy states in principle, in practice passive preparation might be desirable in some scenarios. Typical passive schemes involve parametric down-conversion. More recently, it has been shown that phase randomized weak coherent pulses (WCP) can also be used for the same purpose [M. Curty {\\it et al.}, Opt. Lett. {\\bf 34}, 3238 (2009).] This proposal requires only linear optics together with a simple threshold photon detector, which shows the practical feasibility of the method. Most importantly, the resulting secret key rate is comparable to the one delivered by an active decoy state setup with an infinite number of decoy settings. In this paper we extend these results, now showing specifically the analysis for other practical scenarios with different light sources and photo-detectors. In particular, we consider sources emitting thermal states, phase randomized WCP, and strong coherent light in combination with several types of photo-detectors, like, for instance, threshold photon detectors, photon number resolving detectors, and classical photo-detectors. Our analysis includes as well the effect that detection inefficiencies and noise in the form of dark counts shown by current threshold detectors might have on the final secret ket rate. Moreover, we provide estimations on the effects that statistical fluctuations due to a finite data size can have in practical implementations.

  7. Energy Price Indices and Discount Factors for Life Cycle Cost...

    Office of Environmental Management (EM)

    Life Cycle Cost Analysis, 2013 Energy Price Indices and Discount Factors for Life Cycle Cost Analysis, 2013 Handbook describes the annual supplements to the NIST Handbook 135 and...

  8. Type I error and power of the mean and covariance structure confirmatory factor analysis for differential item functioning detection: Methodological issues and resolutions

    E-Print Network [OSTI]

    Lee, Jaehoon

    2009-01-01

    or not a given level of measurement equivalence holds, different scaling methods can lead to different conclusions when a researcher locates DIF in a scale. This dissertation evaluates the MACS analysis for DIF detection by means of a Monte Carlo simulation...

  9. Application of spatial and non-spatial data analysis in determination of the factors that impact municipal solid waste generation rates in Turkey

    SciTech Connect (OSTI)

    Keser, Saniye; Duzgun, Sebnem; Aksoy, Aysegul

    2012-03-15

    Highlights: Black-Right-Pointing-Pointer Spatial autocorrelation exists in municipal solid waste generation rates for different provinces in Turkey. Black-Right-Pointing-Pointer Traditional non-spatial regression models may not provide sufficient information for better solid waste management. Black-Right-Pointing-Pointer Unemployment rate is a global variable that significantly impacts the waste generation rates in Turkey. Black-Right-Pointing-Pointer Significances of global parameters may diminish at local scale for some provinces. Black-Right-Pointing-Pointer GWR model can be used to create clusters of cities for solid waste management. - Abstract: In studies focusing on the factors that impact solid waste generation habits and rates, the potential spatial dependency in solid waste generation data is not considered in relating the waste generation rates to its determinants. In this study, spatial dependency is taken into account in determination of the significant socio-economic and climatic factors that may be of importance for the municipal solid waste (MSW) generation rates in different provinces of Turkey. Simultaneous spatial autoregression (SAR) and geographically weighted regression (GWR) models are used for the spatial data analyses. Similar to ordinary least squares regression (OLSR), regression coefficients are global in SAR model. In other words, the effect of a given independent variable on a dependent variable is valid for the whole country. Unlike OLSR or SAR, GWR reveals the local impact of a given factor (or independent variable) on the waste generation rates of different provinces. Results show that provinces within closer neighborhoods have similar MSW generation rates. On the other hand, this spatial autocorrelation is not very high for the exploratory variables considered in the study. OLSR and SAR models have similar regression coefficients. GWR is useful to indicate the local determinants of MSW generation rates. GWR model can be utilized to plan waste management activities at local scale including waste minimization, collection, treatment, and disposal. At global scale, the MSW generation rates in Turkey are significantly related to unemployment rate and asphalt-paved roads ratio. Yet, significances of these variables may diminish at local scale for some provinces. At local scale, different factors may be important in affecting MSW generation rates.

  10. HUMAN FACTORS AND LINGUISTIC CONSIDERATIONS: KEYS TO HIGH-SPEED CHINESE CHARACTER INPUT

    E-Print Network [OSTI]

    , namely, a commercial Chinese typist with junior middle school education who would regularly be typing. Introduction For Chinese character input to computers, a Cornell research team has approached the problem from on Wang Yun-yu's four-corner numbering system has best demonstrat- ed, in the opinion of the Cornell team

  11. FE-Funded Study Released on Key Factors Affecting China Shale...

    Energy Savers [EERE]

    government gives priority to the development of China's shale gas sector to help fight air pollution and reduce reliance on natural gas imports; and The U.S. government supports...

  12. Behaviors and housing inertia are key factors in determining the consequences of a shock in

    E-Print Network [OSTI]

    Boyer, Edmond

    reductions in oil consumption. Today, there- fore, heated debates are going on about the necessity of much of actions: policies aiming at reducing oil consumption can be either immediate or de- layed, in the wait and urban structure. It is found that changes in households consumption and housing choices reduce

  13. Key factors governing uncertainty in the response to sunshade geoengineering from a comparison

    E-Print Network [OSTI]

    Robock, Alan

    impacts of global warming. In this study we compare the sunshade solar geoengineering response of variation within the GeoMIP ensemble. 1. Introduction Solar geoengineering has been proposed as a potential the harmful impacts of global warming. Research suggests that only field tests of solar geoengineering

  14. FE-Funded Study Released on Key Factors Affecting China Shale Gas

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:FinancingPetroleum12, 2015Executive Order14, 2011 CX-006821: CategoricalJulyCapturing

  15. Factors influencing German private equity investment in US real estate

    E-Print Network [OSTI]

    Paelmo, Kay L. (Kay Lee), 1977-

    2003-01-01

    This thesis identifies and ranks in order of importance the key factors influencing high net-worth German investors' decisions about US real estate private equity investments. Through research and in-depth interviews with ...

  16. Apportionment of ambient primary and secondary fine particulate matter at the Pittsburgh National Energy Laboratory particulate matter characterization site using positive matrix factorization and a potential source contributions function analysis

    SciTech Connect (OSTI)

    Martello, D.V.; Pekney, N.J.; Anderson, R.R.; Davidson, C.I. (Carnegie Mellon U., Pittsburgh, PA); Hopke, P.K. (Clarkson University, Potsdam, NY); Kim, E. (Clarkson University, Potsdam, NY); Christensen, W.F. (Brigham Young Univ., Provo, UT); Mangelson, N.F. (Brigham Young Univ., Provo, UT); Eatough, D.J. (Brigham Young Univ., Provo, UT)

    2008-03-01

    Fine particulate matter (PM2.5) concentrations associated with 202 24-hr samples collected at the National Energy Technology Laboratory (NETL) particulate matter (PM) characterization site in south Pittsburgh from October 1999 through September 2001 were used to apportion PM2.5 into primary and secondary contributions using Positive Matrix Factorization (PMF2). Input included the concentrations of PM2.5 mass determined with a Federal Reference Method (FRM) sampler, semi-volatile PM2.5 organic material, elemental carbon (EC), and trace element components of PM2.5. A total of 11 factors were identified. The results of potential source contributions function (PSCF) analysis using PMF2 factors and HYSPLIT-calculated back-trajectories were used to identify those factors associated with specific meteorological transport conditions. The 11 factors were identified as being associated with emissions from various specific regions and facilities including crustal material, gasoline combustion, diesel combustion, and three nearby sources high in trace metals. Three sources associated with transport from coal-fired power plants to the southeast, a combination of point sources to the northwest, and a steel mill and associated sources to the west were identified. In addition, two secondary-material-dominated sources were identified, one was associated with secondary products of local emissions and one was dominated by secondary ammonium sulfate transported to the NETL site from the west and southwest. Of these 11 factors, the four largest contributors to PM2.5 were the secondary transported material (dominated by ammonium sulfate) (47%), local secondary material (19%), diesel combustion emissions (10%), and gasoline combustion emissions (8%). The other seven factors accounted for the remaining 16% of the PM2.5 mass. The findings are consistent with the major source of PM2.5 in the Pittsburgh area being dominated by ammonium sulfate from distant transport and so decoupled from local activity emitting organic pollutants in the metropolitan area. In contrast, the major local secondary sources are dominated by organic material.

  17. Apportionment of ambient primary and secondary fine particulate matter at the Pittsburgh National Energy Laboratory particulate matter characterization site using positive matrix factorization and a potential source contributions function analysis

    SciTech Connect (OSTI)

    Martello, DV [Martello, Donald V.; Pekney, NJ [Pekney, Natalie J.; Anderson, RR [Anderson, Richard; R,; Davidson, CI [Davidson, Cliff I.; Hopke, PK [Hopke, Philip K.; Kim, E [Kim, Eugene; Christensen, WF; (Christensen, William F.); Mangelson, NF [Mangelson, Nolan F.; Eatough, DJ [Eatough, Delbert J.

    2008-03-01

    Fine particulate matter (PM2.5) concentrations associated with 202 24-hr amples collected at the National Energy Technology Laboratory (NETL) particulate matter (PM) characterization site in south Pittsburgh from October 1999 through September 2001 were used to apportion PM2.5 into primary and secondary contributions using Positive Matrix Factorization (PMF2). Input included the concentrations of PM2.5 mass determined with a Federal Reference Method (FRM) sampler, semi-volatile PM2.5, organic material, elemental carbon (EC), and trace element components of PM2.5. A total of 11 factors were identified. The results of potential source contributions function (PSCF) analysis using PMF2 factors and HYSPLIT-calculated back-trajectories were used to identify those factors associated with specific meteorological transport conditions. The 11 factors were identified as being associated with emissions from various specific regions and facilities including crustal material, gasoline combustion, diesel combustion, and three nearby sources high in trace metals. Three sources associated with transport from coal-fired power plants to the southeast, a combination of point sources to the northwest, and a steel mill and associated sources to the west were identified. In addition, two secondary-material-dominated sources were identified, one was associated with secondary products of local emissions and one was dominated by secondary ammonium sulfate transported to the NETL site from the west and southwest. Of these 11 factors, the four largest contributors to PM2.5, were the secondary transported material (dominated by ammonium sulfate) (47%), local secondary material (19%), diesel combustion emissions (10%), and gasoline combustion emissions (8%). The other seven factors accounted for the remaining 16% of the PM2.5 mass. The findings are consistent with the major source of PM2.5 in the Pittsburgh area being dominated by ammonium sulfate from distant transport and so decoupled from local activity emitting organic pollutants in the metropolitan area. In contrast, the major local secondary sources are dominated by organic material.

  18. Apportionment of Ambient Primary and Secondary Fine Particulate Matter at the Pittsburgh National Energy Laboratory Particulate Matter Characterization Site Using Positive Matrix Factorization and a Potential Source Contributions Function Analysis

    SciTech Connect (OSTI)

    Martello, Donald [National Energy Technology Lab. (NETL), Pittsburgh, PA, (United States); Pekney, Natalie [National Energy Technology Lab. (NETL), Pittsburgh, PA, (United States); Anderson, Richard [National Energy Technology Lab. (NETL), Pittsburgh, PA, (United States); Davidson, Cliff [Department of Civil and Environmental Engineering, Carnegie Mellon University, Pittsburgh, PA; Hopke, Philip [Clarkson Univ., Potsdam, NY (United States). Center for Air Resources Engineering and Science, and Dept. of Chemical Engineering; Kim, Eugene [Clarkson Univ., Potsdam, NY (United States). Center for Air Resources Engineering and Science, and Dept. of Chemical Engineering; Christensen, William [Brigham Young Univ., Provo, UT (United States). Dept. of Statistics; Mangelson, Nolan [Brigham Young Univ., Provo, UT (United States). Dept. of Chemistry and Biochemistry; Eatough, Delbert [Brigham Young Univ., Provo, UT (United States). Dept. of Chemistry and Biochemistry

    2008-03-01

    Fine particulate matter (PM2.5) concentrations associated with 202 24-hr samples collected at the National Energy Technology Laboratory (NETL) particulate matter (PM) characterization site in south Pittsburgh from October 1999 through September 2001 were used to apportion PM2.5 into primary and secondary contributions using Positive Matrix Factorization (PMF2). Input included the concentrations of PM2.5 mass determined with a Federal Reference Method (FRM) sampler, semi-volatile PM2.5, organic material, elemental carbon (EC), and trace element components of PM2.5. A total of 11 factors were identified. The results of potential source contributions function (PSCF) analysis using PMF2 factors and HYSPLIT-calculated back-trajectories were used to identify those factors associated with specific meteorological transport conditions. The 11 factors were identified as being associated with emissions from various specific regions and facilities including crustal material, gasoline combustion, diesel combustion, and three nearby sources high in trace metals. Three sources associated with transport from coal-fired power plants to the southeast, a combination of point sources to the northwest, and a steel mill and associated sources to the west were identified. In addition, two secondary-material-dominated sources were identified, one was associated with secondary products of local emissions and one was dominated by secondary ammonium sulfate transported to the NETL site from the west and southwest. Of these 11 factors, the four largest contributors to PM2.5, were the secondary transported material (dominated by ammonium sulfate) (47%), local secondary material (19%), diesel combustion emissions (10%), and gasoline combustion emissions (8%). The other seven factors accounted for the remaining 16% of the PM2.5 mass. The findings are consistent with the major source of PM2.5 in the Pittsburgh area being dominated by ammonium sulfate from distant transport and so decoupled from local activity emitting organic pollutants in the metropolitan area. In contrast, the major local secondary sources are dominated by organic material.

  19. Technique for information retrieval using enhanced latent semantic analysis generating rank approximation matrix by factorizing the weighted morpheme-by-document matrix

    SciTech Connect (OSTI)

    Chew, Peter A; Bader, Brett W

    2012-10-16

    A technique for information retrieval includes parsing a corpus to identify a number of wordform instances within each document of the corpus. A weighted morpheme-by-document matrix is generated based at least in part on the number of wordform instances within each document of the corpus and based at least in part on a weighting function. The weighted morpheme-by-document matrix separately enumerates instances of stems and affixes. Additionally or alternatively, a term-by-term alignment matrix may be generated based at least in part on the number of wordform instances within each document of the corpus. At least one lower rank approximation matrix is generated by factorizing the weighted morpheme-by-document matrix and/or the term-by-term alignment matrix.

  20. Factors Influencing Succession: Lessons from Large, Infrequent

    E-Print Network [OSTI]

    Turner, Monica G.

    intense disturbances of large and small extent. Key words: disturbance frequency; disturbance intensityFactors Influencing Succession: Lessons from Large, Infrequent Natural Disturbances Monica G ABSTRACT Disturbance events vary in intensity, size, and fre- quency, but few opportunities exist to study

  1. Electricity and Development: Global Trends and Key Challenges

    E-Print Network [OSTI]

    ;3. Prospects for Electricity Development Electricity Access Projected Electrification Rates by Region globalElectricity and Development: Global Trends and Key Challenges Romeo Pacudan, PhD Risoe National · Prospects for electricity development · Investment requirements · Key challenges · Final remarks #12

  2. Energy Storage: The Key to a Reliable, Clean Electricity Supply...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Storage: The Key to a Reliable, Clean Electricity Supply Energy Storage: The Key to a Reliable, Clean Electricity Supply February 22, 2012 - 4:52pm Addthis Improved energy...

  3. Exploring the context : a small hotel in Key West

    E-Print Network [OSTI]

    VanBeuzekom, Edrick

    1984-01-01

    This thesis develops a personal method and approach for designing in a delicate context such as the Key West Historic District. This thesis is composed of two parts. The first part presents observations of Key West, focusing ...

  4. SOW and Key Performance Parameters (KPP) Handbook Final Version...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    SOW and Key Performance Parameters (KPP) Handbook Final Version 9-30-2014 SOW and Key Performance Parameters (KPP) Handbook Final Version 9-30-2014 This handbook provides suggested...

  5. Could Solar Energy Storage be Key for Residential Solar? | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Could Solar Energy Storage be Key for Residential Solar? Could Solar Energy Storage be Key for Residential Solar? October 26, 2010 - 4:52pm Addthis This is the silent power storage...

  6. Relationship between key events in Earth history

    E-Print Network [OSTI]

    Gillman, Michael

    2015-01-01

    A model of cyclical (sinusoidal) motion of the solar system, intercepting event lines distributed at fixed intervals, explains the pattern of timings of mass extinctions, earlier glaciations, largest impact craters and the largest known extrusions of magma in the history of the Earth. The model reveals links between several sets of key events, including the end-Cretaceous and end-Ordovician extinctions with the Marinoan glaciation, and the end-Permian with the end-Serpukhovian extinctions. The model is supported by significant clusters of events and a significant reduction of impact crater size with position (sine value). The pattern of event lines is sustained to the earliest-dated impact craters (2023 and 1849 Ma) and to the origin of the solar system, close to 4567.4 Ma. The implication is that, for the entirety of its existence, the solar system has passed in a consistent manner through a predictably structured galaxy. Dark matter is a possible contender for the structure determining the event lines.

  7. Residential Energy Efficiency Financing: Key Elements of Program Design

    Broader source: Energy.gov [DOE]

    Presents key programmatic elements and context of financing initiatives, including contractor support, rebates, quality assurance, and more.

  8. Master Thesis Group Key Agreement for Ad Hoc Networks

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Master Thesis Group Key Agreement for Ad Hoc Networks Lijun Liao Date: 06 July 2005 Supervisor: M their financial support. #12;Abstract Over the last 30 years the study of group key agreement has stimulated much present a Tree-based group key agreement Framework for Ad-hoc Networks (TFAN). TFAN is especially suitable

  9. Distributed Key Generation in the Wild Aniket Kate1

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Distributed Key Generation in the Wild Aniket Kate1 Yizhou Huang2 Ian Goldberg2 1 Max Planck of Waterloo, Canada aniket@mpi-sws.org, {y226huan, iang}@uwaterloo.ca Abstract Distributed key generation (DKG communication model. computational setting. distributed key generation. uniform randomness. implementation 1

  10. A Linearization Attack on the Bluetooth Key Stream Generator

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    A Linearization Attack on the Bluetooth Key Stream Generator Frederik Armknecht ? University on the key stream generator underlying the E0 yet. 1 Introduction The encryption system E 0 , which key stream generator (KSG) is used. In this paper, we propose an attack on the underlying KSG. We

  11. Leakage-Resilient Cryptography with Key Derived from Sensitive Data

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Leakage-Resilient Cryptography with Key Derived from Sensitive Data Konrad Durnoga , Tomasz Kazana subject to adversarial leakage. We propose a method to derive keys for such protocols on-the-fly from the actual keys are derived from. That is, an adversary can hardly gain any knowledge about the private data

  12. Structural and functional analysis of the interaction between the nucleoporin Nup98 and the mRNA export factor Rae1

    SciTech Connect (OSTI)

    Ren, Yi; Seo, Hyuk-Soo; Blobel, Günter; Hoelz, André (Rockefeller)

    2010-07-23

    The export of mRNAs is a multistep process, involving the packaging of mRNAs into messenger ribonucleoprotein particles (mRNPs), their transport through nuclear pore complexes, and mRNP remodeling events prior to translation. Ribonucleic acid export 1 (Rae1) and Nup98 are evolutionarily conserved mRNA export factors that are targeted by the vesicular stomatitis virus matrix protein to inhibit host cell nuclear export. Here, we present the crystal structure of human Rae1 in complex with the Gle2-binding sequence (GLEBS) of Nup98 at 1.65 {angstrom} resolution. Rae1 forms a seven-bladed {beta}-propeller with several extensive surface loops. The Nup98 GLEBS motif forms an {approx} 50-{angstrom}-long hairpin that binds with its C-terminal arm to an essentially invariant hydrophobic surface that extends over the entire top face of the Rae1 {beta}-propeller. The C-terminal arm of the GLEBS hairpin is necessary and sufficient for Rae1 binding, and we identify a tandem glutamate element in this arm as critical for complex formation. The Rae1 {center_dot} Nup98{sup GLEBS} surface features an additional conserved patch with a positive electrostatic potential, and we demonstrate that the complex possesses single-stranded RNA-binding capability. Together, these data suggest that the Rae1 {center_dot} Nup98 complex directly binds to the mRNP at several stages of the mRNA export pathway.

  13. Crystal structure, mutational analysis and RNA-dependent ATPase activity of the yeast DEAD-box pre-mRNA splicing factor Prp28

    SciTech Connect (OSTI)

    Jacewicz, Agata; Schwer, Beate; Smith, Paul; Shuman, Stewart

    2014-10-10

    Yeast Prp28 is a DEAD-box pre-mRNA splicing factor implicated in displacing U1 snRNP from the 5' splice site. Here we report that the 588-aa Prp28 protein consists of a trypsin-sensitive 126-aa N-terminal segment (of which aa 1–89 are dispensable for Prp28 function in vivo) fused to a trypsin-resistant C-terminal catalytic domain. Purified recombinant Prp28 and Prp28-(127–588) have an intrinsic RNA-dependent ATPase activity, albeit with a low turnover number. The crystal structure of Prp28-(127–588) comprises two RecA-like domains splayed widely apart. AMPPNP•Mg2+ is engaged by the proximal domain, with proper and specific contacts from Phe194 and Gln201 (Q motif) to the adenine nucleobase. The triphosphate moiety of AMPPNP•Mg2+ is not poised for catalysis in the open domain conformation. Guided by the Prp28•AMPPNP structure, and that of the Drosophila Vasa•AMPPNP•Mg2+•RNA complex, we targeted 20 positions in Prp28 for alanine scanning. ATP-site components Asp341 and Glu342 (motif II) and Arg527 and Arg530 (motif VI) and RNA-site constituent Arg476 (motif Va) are essential for Prp28 activity in vivo. Synthetic lethality of double-alanine mutations highlighted functionally redundant contacts in the ATP-binding (Phe194-Gln201, Gln201-Asp502) and RNA-binding (Arg264-Arg320) sites. As a result, overexpression of defective ATP-site mutants, but not defective RNA-site mutants, elicited severe dominant-negative growth defects.

  14. Crystal structure, mutational analysis and RNA-dependent ATPase activity of the yeast DEAD-box pre-mRNA splicing factor Prp28

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Jacewicz, Agata; Schwer, Beate; Smith, Paul; Shuman, Stewart

    2014-10-10

    Yeast Prp28 is a DEAD-box pre-mRNA splicing factor implicated in displacing U1 snRNP from the 5' splice site. Here we report that the 588-aa Prp28 protein consists of a trypsin-sensitive 126-aa N-terminal segment (of which aa 1–89 are dispensable for Prp28 function in vivo) fused to a trypsin-resistant C-terminal catalytic domain. Purified recombinant Prp28 and Prp28-(127–588) have an intrinsic RNA-dependent ATPase activity, albeit with a low turnover number. The crystal structure of Prp28-(127–588) comprises two RecA-like domains splayed widely apart. AMPPNP•Mg2+ is engaged by the proximal domain, with proper and specific contacts from Phe194 and Gln201 (Q motif) to themore »adenine nucleobase. The triphosphate moiety of AMPPNP•Mg2+ is not poised for catalysis in the open domain conformation. Guided by the Prp28•AMPPNP structure, and that of the Drosophila Vasa•AMPPNP•Mg2+•RNA complex, we targeted 20 positions in Prp28 for alanine scanning. ATP-site components Asp341 and Glu342 (motif II) and Arg527 and Arg530 (motif VI) and RNA-site constituent Arg476 (motif Va) are essential for Prp28 activity in vivo. Synthetic lethality of double-alanine mutations highlighted functionally redundant contacts in the ATP-binding (Phe194-Gln201, Gln201-Asp502) and RNA-binding (Arg264-Arg320) sites. As a result, overexpression of defective ATP-site mutants, but not defective RNA-site mutants, elicited severe dominant-negative growth defects.« less

  15. Multi-Photon Quantum Key Distribution Based on Double-Lock Encryption

    E-Print Network [OSTI]

    Kam Wai Clifford Chan; Mayssaa El Rifai; Pramode K. Verma; Subhash Kak; Yuhua Chen

    2015-03-19

    This paper presents a multi-stage, multi-photon quantum key distribution protocol based on the double-lock cryptography. It exploits the asymmetry in the detection strategies between the legitimate users and the eavesdropper. The security analysis of the protocol is presented with coherent states under the intercept-resend attack, the photon number splitting attack, and the man-in-the-middle attack. It is found that the mean photon number can be much larger than one. This complements the recent interest in multi-photon quantum communication protocols that require a pre-shared key between the legitimate users.

  16. An Integrated Suite of Tools to support Human Factors Engineering

    SciTech Connect (OSTI)

    Jacques V Hugo

    2001-08-01

    Human Factors Engineering (HFE) work for the nuclear industry imposes special demands on the practitioner in terms of the scope, complexity and safety requirements for humans in nuclear installations. Unfortunately HFE lags behind other engineering disciplines in the development and use of modern, powerful tools for the full range of analysis and design processes. HFE does not appear to be an attractive market for software and hardware developers and as a result, HFE practitioners usually have to rely on inefficient general-purpose tools like standard office software, or they have to use expensive special-purpose tools that offer only part of the solution they require and which also do not easily integrate with other tools. There have been attempts to develop generic software tools to support the HFE analyst and also to achieve some order and consistency in format and presentation. However, in spite of many years of development, very few tools have emerged that have achieved these goals. This would suggest the need for special tools, but existing commercial products have been found inadequate and to date not a single tool has been developed that adequately supports the special requirements of HFE work for the nuclear industry. This paper describes an integrated suite of generic as well as purpose-built tools that facilitate information solicitation, issues tracking, work domain analysis, functional requirements analysis, function allocation, operational sequence analysis, task analysis and development of HSI design requirements. In combination, this suite of tools supports the analytical as well as the representational aspects of key HFE activities primarily for new NPPs, including capturing information from subject matter experts and various source documents directly into the appropriate tool and then linking, analyzing and extending that information further to represent detailed functional and task information, and ultimately HSI design requirements. The paper also describes a tool developed especially for functional requirements analysis, function allocation, and task analysis.

  17. Initial Risk Analysis and Decision Making Framework

    SciTech Connect (OSTI)

    Engel, David W.

    2012-02-01

    Commercialization of new carbon capture simulation initiative (CCSI) technology will include two key elements of risk management, namely, technical risk (will process and plant performance be effective, safe, and reliable) and enterprise risk (can project losses and costs be controlled within the constraints of market demand to maintain profitability and investor confidence). Both of these elements of risk are incorporated into the risk analysis subtask of Task 7. Thus far, this subtask has developed a prototype demonstration tool that quantifies risk based on the expected profitability of expenditures when retrofitting carbon capture technology on a stylized 650 MW pulverized coal electric power generator. The prototype is based on the selection of specific technical and financial factors believed to be important determinants of the expected profitability of carbon capture, subject to uncertainty. The uncertainty surrounding the technical performance and financial variables selected thus far is propagated in a model that calculates the expected profitability of investments in carbon capture and measures risk in terms of variability in expected net returns from these investments. Given the preliminary nature of the results of this prototype, additional work is required to expand the scope of the model to include additional risk factors, additional information on extant and proposed risk factors, the results of a qualitative risk factor elicitation process, and feedback from utilities and other interested parties involved in the carbon capture project. Additional information on proposed distributions of these risk factors will be integrated into a commercial implementation framework for the purpose of a comparative technology investment analysis.

  18. Provably-Secure Authenticated Group Diffie-Hellman KeyExchange

    SciTech Connect (OSTI)

    Bresson, Emmanuel; Chevassut, Olivier; Pointcheval, David

    2007-01-01

    Authenticated key exchange protocols allow two participantsA and B, communicating over a public network and each holding anauthentication means, to exchange a shared secret value. Methods designedto deal with this cryptographic problem ensure A (resp. B) that no otherparticipants aside from B (resp. A) can learn any information about theagreed value, and often also ensure A and B that their respective partnerhas actually computed this value. A natural extension to thiscryptographic method is to consider a pool of participants exchanging ashared secret value and to provide a formal treatment for it. Startingfrom the famous 2-party Diffie-Hellman (DH) key exchange protocol, andfrom its authenticated variants, security experts have extended it to themulti-party setting for over a decade and completed a formal analysis inthe framework of modern cryptography in the past few years. The presentpaper synthesizes this body of work on the provably-secure authenticatedgroup DH key exchange.

  19. Human Factors @ UB Fall 2010 Human Factors

    E-Print Network [OSTI]

    Krovi, Venkat

    . Outsourcing aviation maintenance: Hu- man factors implications, specifically for communications. C. Drury, K. Guy, C. Wenner. International Journal of Aviation Psychology, 2010, 20, 124 ­ 143. #12;2 Human Factors

  20. Updated distribution and reintroduction of the Lower Keys marsh rabbit 

    E-Print Network [OSTI]

    Faulhaber, Craig Alan

    2005-02-17

    , for their advice and interest in the project. Kim Rohrs of the Monroe County Department of Planning and Environmental Resources provided valuable spatial and tabular data on land ownership and land-use planning in the Keys. My interns, Josh Harris, Kyle........................ 29 3.1 The number of individual Lower Keys marsh rabbits captured in 13 occupied populations on 4 keys from October 2001?August 2002. Data are arranged according to sex and age class...

  1. Practical Attacks on Decoy State Quantum Key Distribution Systems with Detector Efficiency Mismatch

    E-Print Network [OSTI]

    Fei Yangyang; Gao Ming; Wang Weilong; Li Chaobo; Ma Zhi

    2015-07-23

    To the active basis choice decoy state quantum key distribution systems with detector efficiency mismatch, we present a modified attack strategy, which is based on faked states attack, with quantum nondemolition measurement ability to restress the threat of detector efficiency mismatch. Considering that perfect quantum nondemolition measurement ability dose not exist in real life, we also propose a practical attack strategy using photon number resolving detectors. Theoretical analysis and numerical simulation results show that, without changing the channel, our attack strategies are serious threats to decoy state quantum key distribution systems. The eavesdropper may get some information ab out the secret key without causing any alarms. Besides, the lower bound of detector efficiency mismatch to run our modified faked states attack successfully with perfect quantum nondemolition measurement ability is also given out, which provides the producers of quantum key distribution systems with a reference and can be treated as the approximate secure bound of detector efficiency mismatch in decoy state quantum key distribution systems.

  2. Water dynamics clue to key residues in protein folding

    SciTech Connect (OSTI)

    Gao, Meng [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Zhu, Huaiqiu, E-mail: hqzhu@pku.edu.cn [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Yao, Xin-Qiu [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China) [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Department of Biophysics, Kyoto University, Sakyo Kyoto 606-8502 (Japan); She, Zhen-Su, E-mail: she@pku.edu.cn [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)

    2010-01-29

    A computational method independent of experimental protein structure information is proposed to recognize key residues in protein folding, from the study of hydration water dynamics. Based on all-atom molecular dynamics simulation, two key residues are recognized with distinct water dynamical behavior in a folding process of the Trp-cage protein. The identified key residues are shown to play an essential role in both 3D structure and hydrophobic-induced collapse. With observations on hydration water dynamics around key residues, a dynamical pathway of folding can be interpreted.

  3. Key Practical Issues in Strengthening Safety Culture, INSAG-15

    Broader source: Energy.gov [DOE]

    Key Pratical Issues in Strengthening Safety Culture, INSAG-15. A report by the International Nuclear Safety Advisory Gorup, International Atomic Energy Agency, Vienna, 2002.

  4. Deputy Secretary Sherwood-Randall Meets Key Government Officials...

    Broader source: Energy.gov (indexed) [DOE]

    Pritzker and Deputy Secretary Sherwood-Randall had the opportunity to engage with key Chinese government officials while in Beijing. Both met with Premier Li Keqiang and Vice...

  5. Climate Action Planning: A Review of Best Practices, Key Elements...

    Open Energy Info (EERE)

    Climate Action Planning: A Review of Best Practices, Key Elements, and Common Climate Strategies for Signatories to the American College & University Presidents' Climate Commitment...

  6. California Energy Incentive Programs An Annual Update on Key...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Issues and Financial Opportunities for Federal Sites in California California Energy Incentive Programs An Annual Update on Key Energy Issues and Financial Opportunities...

  7. Intercropped silviculture systems, a key to achieving soil fungal...

    Office of Scientific and Technical Information (OSTI)

    Intercropped silviculture systems, a key to achieving soil fungal community management in eucalyptus plantations Citation Details In-Document Search Title: Intercropped...

  8. Strategic Energy Management.  Keys to Behavioral and Operational Change.

    E-Print Network [OSTI]

    Kroll, Ryan M; Willems, Phil; Rubado, Dan; Belkhayat, Kathleen

    2015-01-01

    Strategic Energy Management Keys to Behavioral andof Oregon’s Strategic Energy Management (SEM) initiative.Introduction Strategic energy management (SEM) is defined

  9. MasterKey Cryptosystems AT&T Bell Labs

    E-Print Network [OSTI]

    Blaze, Matthew

    then be converted to a stream­ cipher via one of the usual block­chaining methods). We use the public­key encryption

  10. Pantex Plant Achieves Key Safety Milestone Ahead of Schedule...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Achieves Key Safety Milestone Ahead of Schedule | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

  11. An Efficient Pseudo-Random Generator with Applications to Public-Key Encryption and Constant-Round Multiparty

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    high expan- sion rate generators based on assumptions related to factoring [GR00,HSS93], we note). In return, we get a simpler generator where no hashing is necessary to extract the output (in contrastAn Efficient Pseudo-Random Generator with Applications to Public-Key Encryption and Constant

  12. Neth, H., Khemlani, S. S., Oppermann, B., & Gray, W. D. (2006). Juggling multiple tasks: A rational analysis of multitasking inn a synthetic task environment, Proceedings of the 50th annual meeting of the Human Factors and Ergonomics Society. San Francisc

    E-Print Network [OSTI]

    Gray, Wayne

    2006-01-01

    of the Human Factors and Ergonomics Society. San Francisco, CA: HFES. JUGGLING MULTIPLE TASKS: A RATIONAL

  13. The Transcription Factor Encyclopedia

    E-Print Network [OSTI]

    2012-01-01

    Transcription Factor Encyclopedia. Genome Biology 2012 13:Factor Encyclopedia. Gen- ome Biology 2012, 13:000. where ‘Biology 2012, 13:R24 http://genomebiology.com/2012/13/3/R24 SOFTWARE Open Access The Transcription Factor Encyclopedia

  14. AES Flow Interception : Key Snooping Method on Virtual Machine.

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    AES Flow Interception : Key Snooping Method on Virtual Machine. - Exception Handling Attack for AES for snooping AES en- cryption key on Virtual Machine Monitor (VMM), and we present coun- termeasures against. In general, the virtualization technology composes two software parts: one is vir- tual machine (VM

  15. Entity Authentication and Authenticated Key Exchange with Tree Parity Machines

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    synchronization of two in­ teracting identically structured Tree Parity Machines (TPMs) has been proposed underEntity Authentication and Authenticated Key Exchange with Tree Parity Machines Markus Volkmer key exchange in the framework of Tree Parity Machines (TPMs). The interaction of TPMs has been

  16. Energy Security: A Key Requirement forSustainable Development

    E-Print Network [OSTI]

    1 Energy Security: A Key Requirement forSustainable Development Perspective and Action Plan Robert Card Under Secretary US Department of Energy August 30, 2002 Session One: Maintaining Energy Security WSSD Side Event Energy for Sustainable Development IEA/UNEP/Eskom #12;2 Energy Security is a Key

  17. A Distributed Public Key Caching Scheme in Large Wireless Networks

    E-Print Network [OSTI]

    Deng, Jing

    -constrained, in terms of computational power, battery energy, and on-board memory space. For example, the prototypeA Distributed Public Key Caching Scheme in Large Wireless Networks Yuan Kong Jing Deng Stephen R in wireless networks, the public keys of the nodes need to be widely available and signed by a Certificate

  18. Improved Key Generation For Gentry's Fully Homomorphic Encryption Scheme

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Improved Key Generation For Gentry's Fully Homomorphic Encryption Scheme P. Scholl and N.P. Smart scheme was the slow key generation process. Gentry and Halevi provided a fast technique for 2-power cyclo. In particular they focused on the field generated by the polynomial F(X) = X2n + 1, but they noted

  19. Zero-one laws for connectivity in random key graphs

    E-Print Network [OSTI]

    Yagan, Osman

    with the random key predistribution scheme of Eschenauer and Gligor for wireless sensor networks. For this class which are more realistic for applications to wireless sensor networks. Keywords: Wireless sensor- dom key predistribution for wireless sensor networks (WSNs) [6], [7], [9]. For the sake

  20. Baton: Key Agility for Android without a Centralized Certificate Infrastructure

    E-Print Network [OSTI]

    Van Oorschot, Paul

    Baton: Key Agility for Android without a Centralized Certificate Infrastructure David Barrera,dmccarney}@ccsl.carleton.ca {clark,paulv}@scs.carleton.ca ABSTRACT Android's trust-on-first-use application signing model asso transfer signing au- thority to a new signing key. Our proposal, Baton, modifies Android's app installation

  1. k-Connectivity in Random Key Graphs with Unreliable Links

    E-Print Network [OSTI]

    Yagan, Osman

    of Eschenauer and Gligor for securing wireless sensor network (WSN) communications. Random key graphs have real-world networks; e.g., with secure WSN application in mind, link unreliability can be attributed for securing WSN communications is the random predistribution of cryptographic keys to sensor nodes

  2. Wireless sensor networks under the random pairwise key predistribution scheme

    E-Print Network [OSTI]

    Yagan, Osman

    Wireless sensor networks under the random pairwise key predistribution scheme: Can resiliency, College Park, MD 20742. Email: armand@isr.umd.edu Abstract--We investigate the resiliency of wireless the classical key predistribution scheme of Eschenauer and Gligor. Keywords: Wireless sensor networks, Security

  3. Efficient quantum key distribution scheme with pre-announcing the basis

    E-Print Network [OSTI]

    Jingliang Gao; Changhua Zhu; Heling Xiao

    2014-10-21

    We devise a new quantum key distribution scheme that is more efficient than the BB84 protocol. By pre-announcing basis, Alice and Bob are more likely to use the same basis to prepare and measure the qubits, thus achieves a higher efficiency. The error analysis is revised and its security against any eavesdropping is proven briefly. Furthermore we show that, compared with the LCA scheme, our modification can be applied in more quantum channels.

  4. Apparatus, system, and method for synchronizing a timer key

    DOE Patents [OSTI]

    Condit, Reston A; Daniels, Michael A; Clemens, Gregory P; Tomberlin, Eric S; Johnson, Joel A

    2014-04-22

    A timer key relating to monitoring a countdown time of a countdown routine of an electronic device is disclosed. The timer key comprises a processor configured to respond to a countdown time associated with operation of the electronic device, a display operably coupled with the processor, and a housing configured to house at least the processor. The housing has an associated structure configured to engage with the electronic device to share the countdown time between the electronic device and the timer key. The processor is configured to begin a countdown routine based at least in part on the countdown time, wherein the countdown routine is at least substantially synchronized with a countdown routine of the electronic device when the timer key is removed from the electronic device. A system and method for synchronizing countdown routines of a timer key and an electronic device are also disclosed.

  5. Practical issues in quantum-key-distribution postprocessing

    SciTech Connect (OSTI)

    Fung, C.-H. Fred; Chau, H. F. [Department of Physics and Center of Theoretical and Computational Physics, University of Hong Kong, Pokfulam Road (Hong Kong); Ma Xiongfeng [Institute for Quantum Computing and Department of Physics and Astronomy, University of Waterloo, 200 University Ave W., Waterloo, Ontario, Canada N2L 3G1 (Canada)

    2010-01-15

    Quantum key distribution (QKD) is a secure key generation method between two distant parties by wisely exploiting properties of quantum mechanics. In QKD, experimental measurement outcomes on quantum states are transformed by the two parties to a secret key. This transformation is composed of many logical steps (as guided by security proofs), which together will ultimately determine the length of the final secret key and its security. We detail the procedure for performing such classical postprocessing taking into account practical concerns (including the finite-size effect and authentication and encryption for classical communications). This procedure is directly applicable to realistic QKD experiments and thus serves as a recipe that specifies what postprocessing operations are needed and what the security level is for certain lengths of the keys. Our result is applicable to the BB84 protocol with a single or entangled photon source.

  6. Regulation of vascular endothelial growth factor receptor-2 in pancreatic and breast cancer cells by Sp proteins 

    E-Print Network [OSTI]

    Higgins, Kelly Jean

    2007-09-17

    Vascular endothelial growth factor receptor-2 (VEGFR2) is a key angiogenic factor, and angiogenesis is an important physiological process associated with neovascularization, growth, and metastasis of many different tumors. ...

  7. Bayesian Group Factor Analysis Seppo Virtanen1

    E-Print Network [OSTI]

    Kaski, Samuel

    and Ghahramani, 2011; Paisley and Carin, 2009; Rai and Daum´e III, 2009) which favor solutions with only a few

  8. Repairing Tom Swift's electric factor analysis machine

    E-Print Network [OSTI]

    Preacher, Kristopher J.; MacCallum, R. C.

    2003-01-01

    the variation and covariation in a set of mea- sured variables. Because of their many useful applications, EFA methods have en- joyed widespread use in psychological research literature over the last several decades. In the process of conducting EFA, several....g., Beidel, Turner, & Morris, 1995; Bell-Dolan & Allan, 1998; Brown, Schulberg, & Madonia, 1995; Collinsworth, Strom, & Strom, 1996; Copeland, Brandon, & Quinn, 1995; Dunn, Ryan, & Paolo, 1994; Dyce, 1996; Enns & Reddon, 1998; Flowers & Algozzine, 2000; Gass...

  9. Human Factors Analysis of Predator B Crash

    E-Print Network [OSTI]

    Carrigan, Geoff

    2008-06-10

    The 2006 crash of a Predator B in Arizona has prompted a great amount of scrutiny into Unmanned Arial System (UAS) operations. The direct cause of the Predator crash can be tied to an initial failure of the displays and a ...

  10. Nonnegative Matrix Factorization for Spectral Data Analysis

    E-Print Network [OSTI]

    Plemmons, Robert J.

    mining, space object identification and classification. 1 Introduction We are concerned with methods, Winston-Salem, NC 27109. His research was supported in part by the Air Force Office of Scientific Research under grant FA49620-03-1-0215, and by the Army Research Office under grant DAAD19-00-1-0540. Email

  11. Industrial Power Factor Analysis Guidebook. (Technical Report...

    Office of Scientific and Technical Information (OSTI)

    of reactive power in an electrical system. Reactive power represents wasted energy--electricity that does no useful work because the electrical current is out of phase with...

  12. Energy Price Indices and Discount Factors for Life-Cycle Cost...

    Office of Environmental Management (EM)

    0 Energy Price Indices and Discount Factors for Life-Cycle Cost Analysis - 2010 Report describes the 2010 edition of energy price indices and discount factors for performing...

  13. Key Facts about Argonne National Laboratory | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACTThousand Cubic Feet) SoldDepartment ofKenThousandtheKevlarKeyKeyKey

  14. Friction Factor Measurement, Analysis, and Modeling for Flat-Plates with 12.15 mm Diameter Hole-Pattern, Tested with Air at Different Clearances, Inlet Pressures, and Pressure Ratios 

    E-Print Network [OSTI]

    Deva Asirvatham, Thanesh

    2011-02-22

    Friction factor data are important for better prediction of leakage and rotordynamic coefficients of gas annular seals. A flat-plate test rig is used to determine friction factor of hole-pattern/honeycomb flat-plate surfaces ...

  15. Security bounds for efficient decoy-state quantum key distribution

    E-Print Network [OSTI]

    Marco Lucamarini; James F. Dynes; Bernd Fröhlich; Zhiliang Yuan; Andrew J. Shields

    2015-03-25

    Information-theoretical security of quantum key distribution (QKD) has been convincingly proven in recent years and remarkable experiments have shown the potential of QKD for real world applications. Due to its unique capability of combining high key rate and security in a realistic finite-size scenario, the efficient version of the BB84 QKD protocol endowed with decoy states has been subject of intensive research. Its recent experimental implementation finally demonstrated a secure key rate beyond 1 Mbps over a 50 km optical fiber. However the achieved rate holds under the restrictive assumption that the eavesdropper performs collective attacks. Here, we review the protocol and generalize its security. We exploit a map by Ahrens to rigorously upper bound the Hypergeometric distribution resulting from a general eavesdropping. Despite the extended applicability of the new protocol, its key rate is only marginally smaller than its predecessor in all cases of practical interest.

  16. OIMB GK12 CURRICULUM Name: _____KEY__________ Fun Crab Facts!

    E-Print Network [OSTI]

    OIMB GK12 CURRICULUM Name: _____KEY__________ Fun Crab Facts! Eyestalk mouth antenna cheliped CURRICULUM Name: _____________________ Fun Crab Facts! Eyestalk Mouth Antenna Cheliped Carapace Walking metamorphosis motorcycle exoskeleton omnivores butterfly pea #12;OIMB GK12 CURRICULUM Masked crab Fiddler crab

  17. EnergySmart Schools National Financing Roundtable - Key Outcomes

    SciTech Connect (OSTI)

    2009-04-01

    This document presents key outcomes from the EnergySmart Schools National Financing Roundtable as a follow-up to the release of its Guide to FInancing EnergySmart Schools

  18. LANL breaks ground on key sediment control project

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    project LANL breaks ground on key sediment control project Called "grade-control" structures, the approximately 2 million features are up to eight feet high and made of rocks...

  19. Turbulence may be key to "fast magnetic reconnection" mystery

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    A paper published in the journal Nature asserts to have found the key to a long-standing mystery in plasma physics and astrophysics, and it's all about turbulence....

  20. Refine the Concept of Public Key Encryption with Delegated Search

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    with the public key of Bob, but unfortunately, her computer is infected by some virus which embeds a malware contents. However, in this way, Bob's computer will be under the risk of infection by the malware

  1. Mind Your Manners: Socially Appropriate Wireless Key Establishment for Groups

    E-Print Network [OSTI]

    Xu, Wenyuan

    Mind Your Manners: Socially Appropriate Wireless Key Establishment for Groups Cynthia Kuo Ahren students may want to (quietly) opt out of their friends' illicit file trading activities, but academics

  2. Practical Non-Interactive Key Distribution Based on Pairings

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    , the Private Key Generator (PKG), who possesses additional privileged information in the form of a master in a non- interactive system is that the synchronous communication between Alice and Bob is replaced

  3. Efficiency in Quantum Key Distribution Protocols using entangled Gaussian states

    E-Print Network [OSTI]

    Carles Rodó

    2010-05-14

    Efficiency is a key issue in any real implementation of a cryptographic protocol since the physical resources are not unlimited. We will first show that Quantum Key Distribution is possible with an "Entanglement based" scheme with NPPT symmetric Gaussian states in spite of the fact that these systems cannot be distilled with Gaussian operations (they are all bound entangled). In this work we analyze the secrecy properties of Gaussian states under Gaussian operations. Although such operations are useless for quantum distillation, we prove that it is possible to distill efficiently a secret key secure against finite coherent attacks from sufficiently entangled Gaussian states with non-positive partial transposition. Moreover, all such states allow for efficient key distillation, when the eavesdropper is assumed to perform individual attacks before in an efficient way.

  4. Reflective cracking of shear keys in multi-beam bridges 

    E-Print Network [OSTI]

    Sharpe, Graeme Peter

    2009-06-02

    strength to resist cracking from vehicular loads, but uneven temperature changes and shrinkage strains cause high tensile stresses in the shear key regions and lead to reflective cracking. The analyses showed the highest stresses were often times near...

  5. Darcy Q. Hou State Key Laboratory of Hydraulic

    E-Print Network [OSTI]

    Tijsseling, A.S.

    Darcy Q. Hou State Key Laboratory of Hydraulic Engineering Simulation and Safety, and School to severe dam- ages. Over 50 incidents have been attributed to this mechanism and an accident was reported

  6. Cold Boot Key Recovery by Solving Polynomial Systems with Noise

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    the observed set of round subkeys in memory (computed via the cipher's key schedule operation), which were, for transparent en- cryption and decryption of data. One could apply the method from [9] to obtain the computer

  7. Potential Application Of Radionuclide Scaling Factors To High Level Waste Characterization

    SciTech Connect (OSTI)

    Reboul, S. H.

    2013-09-30

    Production sources, radiological properties, relative solubilities in waste, and laboratory analysis techniques for the forty-five radionuclides identified in Hanford?s Waste Treatment and Immobilization Plant (WTP) Feed Acceptance Data Quality Objectives (DQO) document are addressed in this report. Based on Savannah River Site (SRS) experience and waste characteristics, thirteen of the radionuclides are judged to be candidates for potential scaling in High Level Waste (HLW) based on the concentrations of other radionuclides as determined through laboratory measurements. The thirteen radionuclides conducive to potential scaling are: Ni-59, Zr-93, Nb-93m, Cd-113m, Sn-121m, Sn-126, Cs-135, Sm-151, Ra-226, Ra-228, Ac-227, Pa-231, and Th-229. The ability to scale radionuclides is useful from two primary perspectives: 1) it provides a means of checking the radionuclide concentrations that have been determined by laboratory analysis; and 2) it provides a means of estimating radionuclide concentrations in the absence of a laboratory analysis technique or when a complex laboratory analysis technique fails. Along with the rationale for identifying and applying the potential scaling factors, this report also provides examples of using the scaling factors to estimate concentrations of radionuclides in current SRS waste and into the future. Also included in the report are examples of independent laboratory analysis techniques that can be used to check results of key radionuclide analyses. Effective utilization of radionuclide scaling factors requires understanding of the applicable production sources and the chemistry of the waste. As such, the potential scaling approaches identified in this report should be assessed from the perspective of the Hanford waste before reaching a decision regarding WTP applicability.

  8. Quantum Public-Key Encryption with Information Theoretic Security

    E-Print Network [OSTI]

    Jiangyou Pan; Li Yang

    2012-02-20

    We propose a definition for the information theoretic security of a quantum public-key encryption scheme, and present bit-oriented and two-bit-oriented encryption schemes satisfying our security definition via the introduction of a new public-key algorithm structure. We extend the scheme to a multi-bitoriented one, and conjecture that it is also information theoretically secure, depending directly on the structure of our new algorithm.

  9. We describe the Science Data Quality Assessment (SDQA) system for LSST. SDQA will be an analysis system that examines and reports on the quality of LSST data and derived products from a scientific perspective. The key driver of SDQA planning and practices

    E-Print Network [OSTI]

    Mannings, Vince

    .g., weather data, calibration data and system health and safety data Characterization of image artifacts e and future Data Challenges. SDQA in context in the LSST System Base DM System Mountain DM System PipelineWe describe the Science Data Quality Assessment (SDQA) system for LSST. SDQA will be an analysis

  10. Grid Parity for Residential Photovoltaics in the United States: Key Drivers and Sensitivities; Preprint

    SciTech Connect (OSTI)

    Ong, S.; Denholm, P.; Clark, N.

    2012-08-01

    In this report, we analyze PV break-even costs for U.S. residential customers. We evaluate some key drivers of grid parity both regionally and over time. We also examine the impact of moving from flat to time-of-use (TOU) rates, and we evaluate individual components of the break-even cost, including effect of rate structure and various incentives. Finally, we examine how PV markets might evolve on a regional basis considering the sensitivity of the break-even cost to four major drivers: technical performance, financing parameters, electricity prices and rates, and policies. We find that electricity price rather than technical parameters are in general the key drivers of the break-even cost of PV. Additionally, this analysis provides insight about the potential viability of PV markets.

  11. Key Parameters for Operator Diagnosis of BWR Plant Condition during a Severe Accident

    SciTech Connect (OSTI)

    Clayton, Dwight A.; Poore, III, Willis P.

    2015-01-01

    The objective of this research is to examine the key information needed from nuclear power plant instrumentation to guide severe accident management and mitigation for boiling water reactor (BWR) designs (specifically, a BWR/4-Mark I), estimate environmental conditions that the instrumentation will experience during a severe accident, and identify potential gaps in existing instrumentation that may require further research and development. This report notes the key parameters that instrumentation needs to measure to help operators respond to severe accidents. A follow-up report will assess severe accident environmental conditions as estimated by severe accident simulation model analysis for a specific US BWR/4-Mark I plant for those instrumentation systems considered most important for accident management purposes.

  12. Transportation Energy Futures: Key Opportunities and Tools for Decision Makers (Brochure)

    SciTech Connect (OSTI)

    Not Available

    2012-12-01

    The Transportation Energy Futures (TEF) project examines underexplored greenhouse gas-abatement and oil-savings opportunities by consolidating transportation energy knowledge, conducting advanced analysis, and exploring additional opportunities for sound strategic action. Led by NREL, in collaboration with Argonne National Laboratory, the project's primary goal is to provide analysis to accompany DOE-EERE's long-term transportation energy planning by addressing high-priority questions, informing domestic decisions about transportation energy strategies, priorities, and investments. Research and analysis were conducted with an eye toward short-term actions that support long-term energy goals The project looks beyond technology to examine each key question in the context of the marketplace, consumer behavior, industry capabilities, and infrastructure. This updated fact sheet includes a new section on initial project findings.

  13. Untappable key distribution system: a one-time-pad booster

    E-Print Network [OSTI]

    Geraldo A. Barbosa; Jeroen van de Graaf

    2015-07-08

    One-time-pad (OTP) encryption simply cannot be cracked, even by a quantum computer. The need of sharing in a secure way supplies of symmetric random keys turned the method almost obsolete as a standing-alone method for fast and large volume telecommunication. Basically, this secure sharing of keys and their renewal, once exhausted, had to be done through couriers, in a slow and costly process. This paper presents a solution for this problem providing a fast and unlimited renewal of secure keys: An untappable key distribution system is presented and detailed. This fast key distribution system utilizes two layers of confidentially protection: 1) Physical noise intrinsic to the optical channel that turn the coded signals into stealth signals and 2) Privacy amplification using a bit pool of refreshed entropy run after run, to eliminate any residual information. The resulting level of security is rigorously calculated and demonstrates that the level of information an eavesdropper could obtain is completely negligible. The random bit sequences, fast and securely distributed, can be used to encrypt text, data or voice.

  14. Statistical Hot Channel Analysis for the NBSR

    SciTech Connect (OSTI)

    Cuadra A.; Baek J.

    2014-05-27

    A statistical analysis of thermal limits has been carried out for the research reactor (NBSR) at the National Institute of Standards and Technology (NIST). The objective of this analysis was to update the uncertainties of the hot channel factors with respect to previous analysis for both high-enriched uranium (HEU) and low-enriched uranium (LEU) fuels. Although uncertainties in key parameters which enter into the analysis are not yet known for the LEU core, the current analysis uses reasonable approximations instead of conservative estimates based on HEU values. Cumulative distribution functions (CDFs) were obtained for critical heat flux ratio (CHFR), and onset of flow instability ratio (OFIR). As was done previously, the Sudo-Kaminaga correlation was used for CHF and the Saha-Zuber correlation was used for OFI. Results were obtained for probability levels of 90%, 95%, and 99.9%. As an example of the analysis, the results for both the existing reactor with HEU fuel and the LEU core show that CHFR would have to be above 1.39 to assure with 95% probability that there is no CHF. For the OFIR, the results show that the ratio should be above 1.40 to assure with a 95% probability that OFI is not reached.

  15. Accident analysis and hazard analysis for human and organizational factors

    E-Print Network [OSTI]

    Stringfellow, Margaret Virgina

    2011-01-01

    Pressures and incentives to operate complex socio-technical aerospace systems in a high-risk state are ever present. Without consideration of the role humans and organizations play in system safety during the development ...

  16. Characterization of Two Sigma Factors in Plant Pathogenesis by Pseudomonas syringae pv. syringae B728a 

    E-Print Network [OSTI]

    Basu Thakur, Poulami

    2012-07-11

    function (ECF) sigma (?) factors serve as important regulatory factors in responding to various environmental signals. Bioinformatic analysis of the B728a genome has revealed 10 ECF sigma factors, five of which have high levels of sequence similarity...

  17. Energy Price Indices and Discount Factors for Life-Cycle Cost...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Price Indices and Discount Factors for Life-Cycle Cost Analysis - 2015 Energy Price Indices and Discount Factors for Life-Cycle Cost Analysis - 2015 Handbook describes the annual...

  18. Energy Price Indices and Discount Factors for Life-Cycle Cost...

    Office of Environmental Management (EM)

    2 Energy Price Indices and Discount Factors for Life-Cycle Cost Analysis - 2012 Report provides tables of present-value factors for use in the life-cycle cost analysis of capital...

  19. Continuous Variable Quantum Key Distribution with a Noisy Laser

    E-Print Network [OSTI]

    Christian S. Jacobsen; Tobias Gehring; Ulrik L. Andersen

    2015-07-06

    Existing experimental implementations of continuous-variable quantum key distribution require shot-noise limited operation, achieved with shot-noise limited lasers. However, loosening this requirement on the laser source would allow for cheaper, potentially integrated systems. Here, we implement a theoretically proposed prepare-and-measure continuous-variable protocol and experimentally demonstrate the robustness of it against preparation noise stemming for instance from technical laser noise. Provided that direct reconciliation techniques are used in the post-processing we show that for small distances large amounts of preparation noise can be tolerated in contrast to reverse reconciliation where the key rate quickly drops to zero. Our experiment thereby demonstrates that quantum key distribution with non-shot-noise limited laser diodes might be feasible.

  20. Efficiency in Quantum Key Distribution Protocols with Entangled Gaussian States

    E-Print Network [OSTI]

    C. Rodó; O. Romero-Isart; K. Eckert; A. Sanpera

    2007-03-21

    Quantum key distribution (QKD) refers to specific quantum strategies which permit the secure distribution of a secret key between two parties that wish to communicate secretly. Quantum cryptography has proven unconditionally secure in ideal scenarios and has been successfully implemented using quantum states with finite (discrete) as well as infinite (continuous) degrees of freedom. Here, we analyze the efficiency of QKD protocols that use as a resource entangled gaussian states and gaussian operations only. In this framework, it has already been shown that QKD is possible (M. Navascu\\'es et al. Phys. Rev. Lett. 94, 010502 (2005)) but the issue of its efficiency has not been considered. We propose a figure of merit (the efficiency $E$) to quantify the number of classical correlated bits that can be used to distill a key from a sample of $N$ entangled states. We relate the efficiency of the protocol to the entanglement and purity of the states shared between the parties.

  1. Secret Key Generation via a Modified Quantum Secret Sharing Protocol

    SciTech Connect (OSTI)

    Smith IV, Amos M; Evans, Philip G; Lawrie, Benjamin J; Legre, Matthieu; Lougovski, Pavel; Ray, William R; Williams, Brian P; Qi, Bing; Grice, Warren P

    2015-01-01

    We present and experimentally show a novel protocol for distributing secret information between two and only two parties in a N-party single-qubit Quantum Secret Sharing (QSS) system. We demonstrate this new algorithm with N = 3 active parties over 6km of telecom. ber. Our experimental device is based on the Clavis2 Quantum Key Distribution (QKD) system built by ID Quantique but is generalizable to any implementation. We show that any two out of the N parties can build secret keys based on partial information from each other and with collaboration from the remaining N > 2 parties. This algorithm allows for the creation of two-party secret keys were standard QSS does not and signicantly reduces the number of resources needed to implement QKD on a highly connected network such as the electrical grid.

  2. A Key to Common Caterpillar Pests of Vegetables 

    E-Print Network [OSTI]

    Sparks Jr., Alton N.; Liu, Tong-Xian

    2001-08-10

    of the head capsule. The proximity of the juncture of the adfrontal and epicranial sutures to the vertical triangle is used in separating armyworms and cutworms. Using the key The key will help you identify the most destructive and most com- mon caterpillar...; sp=spiracle Figure 3. Common arrangement of crochets on prolegs. A?complete circle B?semicircle C?two rows D?single row Figure 4. Head capsule of a caterpillar. vt=vertical triangle; epi=epicranial suture; adf=adfrontal suture 3 1 Body has numerous...

  3. Robust Shot Noise Measurement for Continuous Variable Quantum Key Distribution

    E-Print Network [OSTI]

    Sébastien Kunz-Jacques; Paul Jouguet

    2015-01-17

    We study a practical method to measure the shot noise in real time in Continuous Variable Quantum Key Distribution (CVQKD) systems. The amount of secret key that can be extracted from the raw statistics depends strongly on this quantity since it affects in particular the computation of the excess noise (i.e. noise in excess of the shot noise) added by an eavesdropper on the quantum channel. Some powerful quantum hacking attacks relying on faking the estimated value of the shot noise to hide an intercept and resend strategy were proposed. Here, we provide experimental evidence that our method can defeat the saturation attack and the wavelength attack.

  4. Feasibility of underwater free space quantum key distribution

    E-Print Network [OSTI]

    Peng Shi; Shi-Cheng Zhao; Wen-Dong Li; Yong-Jian Gu

    2014-04-04

    We investigate the optical absorption and scattering properties of underwater media pertinent to our underwater free space quantum key distribution (QKD) channel model. With the vector radiative transfer theory and Monte Carlo method, we obtain the attenuation of photons, the fidelity of the scattered photons, the quantum bit error rate and the sifted key generation rate of underwater quantum communication. It can be observed from our simulations that the most secure single photon underwater free space QKD is feasible in the clearest ocean water.

  5. Key Dates | U.S. DOE Office of Science (SC)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACTThousand Cubic Feet) SoldDepartment ofKenThousandtheKevlarKeyKey

  6. Exploring Spatial Variations in the Relationship between National Park Visitation and Associated Factors in Texas Counties 

    E-Print Network [OSTI]

    Lee, Kyung Hee

    2013-11-07

    Recreation demand such as national park visitation is influenced by various social, demographic, and economic factors. These key variables are important indicators in predicting future trends and provide beneficial information about potential park...

  7. ISO standardization of scaling factor method for low and intermediate level radioactive wastes generated at nuclear power plants

    SciTech Connect (OSTI)

    Kashiwagi, Makoto; Masui, Hideki; Denda, Yasutaka; James, David; Lantes, Bertrand; Mueller, Wolfgang; Garamszeghy, Mike; Leganes, Jose Luis; Maxeiner, Harald; Van Velzen, Leo

    2007-07-01

    Low- and intermediate-level radioactive wastes (L-ILW ) generated at nuclear power plants are disposed of in various countries. In the disposal of such wastes, it is required that the radioactivity concentrations of waste packages should be declared with respect to difficult-to-measure nuclides (DTM nuclides), such as C-14, Ni-63 and a-emitting nuclides, which are often limited to maximum values in disposal licenses, safety cases and/or regulations for maximum radioactive concentrations. To fulfill this requirement, the Scaling Factor method (SF method) has been applied in various countries as a principal method for determining the concentrations of DTM nuclides. In the SF method, the concentrations of DTM nuclides are determined by multiplying the concentrations of certain key nuclides by SF values (the determined ratios of radioactive concentration between DTM nuclides and those key nuclides). The SF values used as conversion factors are determined from the correlation between DTM nuclides and key nuclides such as Co-60. The concentrations of key nuclides are determined by {gamma} ray measurements which can be made comparatively easily from outside the waste package. The SF values are calculated based on the data obtained from the radiochemical analysis of waste samples. The use of SFs, which are empirically based on analytical data, has become established as a widely recognized 'de facto standard'. A number of countries have independently collected nuclide data by analysis over many years and each has developed its own SF method, but all the SF methods that have been adopted are similar. The project team for standardization had been organized for establishing this SF method as a 'de jure standard' in the international standardization system of the International Organization for Standardization (ISO). The project team for standardization has advanced the standardization through technical studies, based upon each country's study results and analysis data. The conclusions reached by the project team was published as ISO International Standard 21238:2007 'The Scaling Factor method to determine the radioactivity of low- and intermediate-level radioactive waste packages generated at nuclear power plants'. This paper gives an introduction to the international standardization process for the SF method and the contents of the recently published International Standard. (authors)

  8. On Factorization of Molecular Wavefunctions

    E-Print Network [OSTI]

    Thierry Jecko; Brian T. Sutcliffe; R. Guy Woolley

    2015-07-18

    Recently there has been a renewed interest in the chemical physics literature of factorization of the position representation eigenfunctions \\{$\\Phi$\\} of the molecular Schr\\"odinger equation as originally proposed by Hunter in the 1970s. The idea is to represent $\\Phi$ in the form $\\varphi\\chi$ where $\\chi$ is \\textit{purely} a function of the nuclear coordinates, while $\\varphi$ must depend on both electron and nuclear position variables in the problem. This is a generalization of the approximate factorization originally proposed by Born and Oppenheimer, the hope being that an `exact' representation of $\\Phi$ can be achieved in this form with $\\varphi$ and $\\chi$ interpretable as `electronic' and `nuclear' wavefunctions respectively. We offer a mathematical analysis of these proposals that identifies ambiguities stemming mainly from the singularities in the Coulomb potential energy.

  9. On Factorization of Molecular Wavefunctions

    E-Print Network [OSTI]

    Thierry Jecko; Brian T. Sutcliffe; R. Guy Woolley

    2015-09-05

    Recently there has been a renewed interest in the chemical physics literature of factorization of the position representation eigenfunctions \\{$\\Phi$\\} of the molecular Schr\\"odinger equation as originally proposed by Hunter in the 1970s. The idea is to represent $\\Phi$ in the form $\\varphi\\chi$ where $\\chi$ is \\textit{purely} a function of the nuclear coordinates, while $\\varphi$ must depend on both electron and nuclear position variables in the problem. This is a generalization of the approximate factorization originally proposed by Born and Oppenheimer, the hope being that an `exact' representation of $\\Phi$ can be achieved in this form with $\\varphi$ and $\\chi$ interpretable as `electronic' and `nuclear' wavefunctions respectively. We offer a mathematical analysis of these proposals that identifies ambiguities stemming mainly from the singularities in the Coulomb potential energy.

  10. On Factorization of Molecular Wavefunctions

    E-Print Network [OSTI]

    Thierry Jecko; Brian T. Sutcliffe; R. Guy Woolley

    2015-10-13

    Recently there has been a renewed interest in the chemical physics literature of factorization of the position representation eigenfunctions \\{$\\Phi$\\} of the molecular Schr\\"odinger equation as originally proposed by Hunter in the 1970s. The idea is to represent $\\Phi$ in the form $\\varphi\\chi$ where $\\chi$ is \\textit{purely} a function of the nuclear coordinates, while $\\varphi$ must depend on both electron and nuclear position variables in the problem. This is a generalization of the approximate factorization originally proposed by Born and Oppenheimer, the hope being that an `exact' representation of $\\Phi$ can be achieved in this form with $\\varphi$ and $\\chi$ interpretable as `electronic' and `nuclear' wavefunctions respectively. We offer a mathematical analysis of these proposals that identifies ambiguities stemming mainly from the singularities in the Coulomb potential energy.

  11. Prediction and Informative Risk Factor Selection of Bone Diseases

    E-Print Network [OSTI]

    Buffalo, State University of New York

    --Electronic health records (EHRs); risk factor analysis; integrated feature extraction; risk factor selection1 Prediction and Informative Risk Factor Selection of Bone Diseases Hui Li, Xiaoyi Li, Murali and the overwhelming amount of electronic health records (EHRs) shared by healthcare institutions and practitioners, we

  12. Bright Integrated Photon-Pair Source for Practical Passive Decoy-State Quantum Key Distribution

    E-Print Network [OSTI]

    Stephan Krapick; Michael Stefszky; Michal Jachura; Benjamin Brecht; Malte Avenhaus; Christine Silberhorn

    2014-01-28

    We report on a bright, nondegenerate type-I parametric down-conversion source, which is well suited for passive decoy-state quantum key distribution. We show the photon-number-resolved analysis over a broad range of pump powers and we prove heralded higher-order $n$-photon states up to $n=4$. The inferred photon click statistics exhibit excellent agreements to the theoretical predictions. From our measurement results we conclude that our source meets the requirements to avert photon-number-splitting attacks.

  13. Dictionaries Using Variable-Length Keys and Data, with Applications *

    E-Print Network [OSTI]

    Blelloch, Guy E.

    (Isil- logn, 1) + Itil) and Isil is the length of bit string si. We assume a word length w > log m. We present string Isil > 1, Itil > 1 for all bit-strings si and ti. Fox' fixed-length keys the dictionary problem

  14. Automation-considered Logic of Authentication and Key Distribution

    E-Print Network [OSTI]

    Kwon, Taekyoung

    methods are focused on the automation-based model checking that relies on building a finite modelAutomation-considered Logic of Authentication and Key Distribution Taekyoung Kwon1 and Seongan Lim2 Abstract. This paper presents an automation-considered logic of au- thentication for reasoning about

  15. Offshore Wind Power Experiences, Potential and Key Issues for

    E-Print Network [OSTI]

    offshore wind farms are installed in British, Swedish and Danish waters, and present-day costs in 2015, 2030 and 2050 14 3.1 Offshore wind farms under construction and in planning stage 14 3Offshore Wind Power Experiences, Potential and Key Issues for Deployment Jørgen Lemming, Poul Erik

  16. Architecture of the Secoqc Quantum Key Distribution network

    E-Print Network [OSTI]

    Mehrdad Dianati; Romain Alleaume

    2006-10-25

    The European projet Secoqc (Secure Communication based on Quantum Cryptography) aims at developing a global network for unconditionally secure key distribution. This paper specifies the requirements and presents the principles guiding the design of this network, and relevant to its architecture and protocols.

  17. The Key Coal Producers ONLINE SUPPORTING MATERIALS to

    E-Print Network [OSTI]

    Patzek, Tadeusz W.

    The Key Coal Producers ONLINE SUPPORTING MATERIALS to A Global Coal Production Forecast with Multi's most important coal-producing area is North-Central China. The provinces of Inner Mongolia, Ningxia, Shaanxi and Shanxi together accounted for 83 percent of China's proven coal reserves in 2000, and Shanxi

  18. Preparing Turkey Safely Turkey provides protein along with other key

    E-Print Network [OSTI]

    Preparing Turkey Safely Nutrition Turkey provides protein along with other key nutrients. A serving is 3 ounces cooked poultry (about the size of a deck of cards). One serving of roasted, skinless turkey protein; iron--8% daily value Right Size Turkey Use this chart as a helpful guide: Whole bird ­ 1 pound

  19. PEM FUEL CELL TECHNOLOGY Key Research Needs and Approaches

    E-Print Network [OSTI]

    Developer University #12;8 FUEL CELL RESEARCH NEEDS MEA optimization should focus on new materials Pt (full1 PEM FUEL CELL TECHNOLOGY Key Research Needs and Approaches Tom Jarvi UTC Power South Windsor, CT 06074 23 January 2008 #12;2 UTC POWER MARKET FOCUS Transportation Fuel Cells On-Site Power Solutions #12

  20. GIS and Spectral Soil Laboratory Key faculty member: Sabine Grunwald

    E-Print Network [OSTI]

    Ma, Lena

    GIS and Spectral Soil Laboratory Key faculty member: Sabine Grunwald Contact: Soil and Water information systems (GIS), geostatistical and statistical methods, space-time landscape modeling, remote laboratory. Available software include: MS Office Suite; MS SQL database; ArcGIS Suite (ESRI) including

  1. Experimental quantum key distribution without monitoring signal disturbance

    E-Print Network [OSTI]

    Hiroki Takesue; Toshihiko Sasaki; Kiyoshi Tamaki; Masato Koashi

    2015-05-29

    Since the invention of Bennett-Brassard 1984 (BB84) protocol, many quantum key distribution (QKD) protocols have been proposed and some protocols are operated even in field environments. One of the striking features of QKD is that QKD protocols are provably secure unlike cryptography based on computational complexity assumptions. It has been believed that, to guarantee the security of QKD, Alice and Bob have to monitor the statistics of the measurement outcomes which are used to determine the amount of the privacy amplification to generate a key. Recently a new type of QKD protocol, called round robin differential phase shift (RRDPS) protocol, was proposed, and remarkably this protocol can generate a key without monitoring any statistics of the measurement outcomes. Here we report an experimental realization of the RRDPS protocol. We used a setup in which Bob randomly chooses one from four interferometers with different pulse delays so that he could implement phase difference measurements for all possible combinations with five-pulse time-bin states. Using the setup, we successfully distributed keys over 30 km of fiber, making this the first QKD experiment that does not rely on signal disturbance monitoring.

  2. The Seven Keys to Success in Energy Management and Conservation 

    E-Print Network [OSTI]

    Darby, D. F.

    1984-01-01

    This paper is a summary of the seven key elements of the Deere & Company Energy Management and Conservation Program. These elements have been found to be essential for the ultimate success of any company-wide energy management program. The process...

  3. FAST GENERATORS FOR THE DIFFIEHELLMAN KEY AGREEMENT PROTOCOL

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    FAST GENERATORS FOR THE DIFFIE­HELLMAN KEY AGREEMENT PROTOCOL AND MALICIOUS STANDARDS BOAZ TSABAN­order cyclic group. Some generators allow faster exponentiation. We show that to a large extent, using the fast that if there is some case in which fast generators are less secure, then this could be used by a malicious authority

  4. FAST GENERATORS FOR THE DIFFIE-HELLMAN KEY AGREEMENT PROTOCOL

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    FAST GENERATORS FOR THE DIFFIE-HELLMAN KEY AGREEMENT PROTOCOL AND MALICIOUS STANDARDS BOAZ TSABAN, using the fast generators is as secure as using a randomly chosen generator. On the other hand, we show that if there is some case in which fast generators are less secure, then this could be used by a malicious authority

  5. Appendix 30 Fire Effects on Key Ecological Processes in Forested

    E-Print Network [OSTI]

    Appendix 30 Fire Effects on Key Ecological Processes in Forested Ecosystems The following paragraphs on fire effects on forest succession are from Stickney (1982) Forest Succession ...the severity of the pre-disturbance forest herb species also demonstrated the ability to survive fire, particularly those

  6. Outline Overview Design Principles Key Points Design Principles

    E-Print Network [OSTI]

    Almulhem, Ahmad

    Engineering Department, KFUPM Spring 2008 Ahmad Almulhem - Network Security Engineering - 2008 1 / 12 #12-Safe Defaults Economy of Mechanism Complete Mediation Open Design Separation of Privilege Least Common Mechanism Psychological Acceptability 3 Key Points Ahmad Almulhem - Network Security Engineering - 2008 2 / 12 #12;Outline

  7. Annual Report 2004 1 Key events during 2004

    E-Print Network [OSTI]

    Svenningsson, Josef

    Johansson studying the separation of carbon dioxide in a reactor system for two-stage combustion. #12;1 Key for innovation systems and entrepreneurship A year of anniversaries ­ the University, the Foundation, Chalmers are among those hardest struck,but many holidaying Swedes,especially in Thailand,fall victim to the tsunami

  8. MOLECULAR ENTOMOLOGY Molecular Identification Key for Pest Species of Scirtothrips

    E-Print Network [OSTI]

    Hoddle, Mark S.

    primers and determining the size of the products by using standard agarose gel electrophoresis, followed, Neohydatothrips, molecular identiÞcation key, exotic pests, nondestruc- tive DNA extraction The genus Scirtothrips, several species of Scirtothrips have (or have the potential to) spread from their natural habitats

  9. Introduction Adhesion complexes play key roles in many events, including

    E-Print Network [OSTI]

    Hardin, Jeff

    Introduction Adhesion complexes play key roles in many events, including cell migration cell adhesion are remarkably similar in Caenorhabditis elegans, Drosophila and humans (Hynes and Zhao to reveal much about the basic, conserved molecular mechanisms that mediate and regulate cell adhesion

  10. Page 1 of 4 Creating and Submitting a Key Request

    E-Print Network [OSTI]

    Howitt, Ivan

    of employees. Enter search criteria in the search fields available and select the down red arrow to filter the terms. #12;Page 3 of 4 13. On the Key Request Form - Room List windowpane, select Add New. 14 use the Select Drawing button after entering the building and floor to display the floor plan

  11. news and views A key issue for hydrogen storage materi-

    E-Print Network [OSTI]

    Palumbi, Stephen

    news and views A key issue for hydrogen storage materi- als is that the hydrogenation and dehydro be possible to discover stable hydrogen hydrates with higher storage Hydrogen Posture Plan www.eere.energy.gov/hydrogenandfuelcells/pdfs/ hydrogen_posture_plan.pdf 7. Kuhs, W

  12. Key Directions and a Roadmap for Electrical Design for Manufacturability

    E-Print Network [OSTI]

    Kahng, Andrew B.

    Key Directions and a Roadmap for Electrical Design for Manufacturability (Invited Talk) Andrew B by design and design-for- manufacturability (DFM) techniques. This talk addresses trends and a roadmap assumptions come true? The second part will give a roadmap for electrical DFM technologies, motivated

  13. Key Title Marine Ecology www.wiley.com

    E-Print Network [OSTI]

    Wall, Diana

    Key Title Marine Ecology www.wiley.com Antarctic Ecosystems: An Extreme Environment in a Changing their genomes. Chapters address both Antarctic terrestrial and marine ecosystems, and the scientific and evolution Part II: Marine habitats and regions Chapter 4. The impact of regional climate change

  14. Key Facts About Hurricane Readiness Preparing for a Hurricane

    E-Print Network [OSTI]

    HURRICANES Key Facts About Hurricane Readiness Preparing for a Hurricane If you are under a hurricane watch or warning, here are some basic steps to take to prepare for the storm: · Learn about your. · Identify potential home hazards and know how to secure or protect them before the hurricane strikes

  15. Notes on the CRTDH Group Key Agreement Protocol Spyros Magliveras and Wandi Wei

    E-Print Network [OSTI]

    Magliveras, Spyros

    , the distributed schemes help in the uniform distribution of the work-load for key management and eliminate: xkzou@cs.iupui.edu Abstract Group key management (GKM) is one of the primary is- sues for secure group Key Management (GKM), Contributory Group Key Agreement, Chinese Remainder Theorem, Diffie-Hellman Key

  16. Distribution and abundance of endangered Florida Key deer on outer islands 

    E-Print Network [OSTI]

    Watts, Dominque Elijah

    2007-04-25

    -based survey data. All outer islands exhibited estimated abundances considerably below carrying capacities, with larger populations occurring closer to Big Pine Key. Results indicated that other islands and complexes such as Ramrod Key, Water Key...

  17. Strategic Energy Management.  Keys to Behavioral and Operational Change.

    E-Print Network [OSTI]

    Kroll, Ryan M; Willems, Phil; Rubado, Dan; Belkhayat, Kathleen

    2015-01-01

    Verification Protocol (IPMVP) as Option C: Whole BuildingAnalysis. However, IPMVP notes that for Option C “billing

  18. Distribution Statistics and Random Matrix Formalism of Multicarrier Continuous-Variable Quantum Key Distribution

    E-Print Network [OSTI]

    Laszlo Gyongyosi

    2014-10-30

    We propose a combined mathematical framework of order statistics and random matrix theory for multicarrier continuous-variable (CV) quantum key distribution (QKD). In a multicarrier CVQKD scheme, the information is granulated into Gaussian subcarrier CVs, and the physical Gaussian link is divided into Gaussian sub-channels. The sub-channels are dedicated to the conveying of the subcarrier CVs. The distribution statistics analysis covers the study of the distribution of the sub-channel transmittance coefficients in the presence of a Gaussian noise and the utilization of the moment generation function (MGF) in the error analysis. We reveal the mathematical formalism of sub-channel selection and formulation of the transmittance coefficients, and show a reduced complexity progressive sub-channel scanning method. We define a random matrix formalism for multicarrier CVQKD to evaluate the statistical properties of the information flowing process. Using random matrix theory, we express the achievable secret key rates and study the efficiency of the AMQD-MQA (adaptive multicarrier quadrature division-multiuser quadrature allocation) multiple-access multicarrier CVQKD. The proposed combined framework is particularly convenient for the characterization of the physical processes of experimental multicarrier CVQKD.

  19. Simple rate-adaptive LDPC coding for quantum key distribution

    E-Print Network [OSTI]

    Mo Li; Chun-Mei Zhang; Zhen-Qiang Yin; Wei Chen; Chuan Wang; Zheng-Fu Han

    2015-05-24

    Although quantum key distribution (QKD) comes from the development of quantum theory, the implementation of a practical QKD system does involve a lot of classical process, such as key reconciliation and privacy amplification, which is called post-processing. Post-processing has been a crucial element to high speed QKD systems, even the bottleneck of it because of its relatively high time consumption. Low density parity check (LDPC) is now becoming a promising approach of overcoming the bottleneck due to its good performance in processing throughput. In this article we propose and simulate an easily implemented but efficiently rate-adaptive LDPC coding approach of reconciliation, different from the previously proposed puncturing- and shortening-based approach. We also give a measure for choosing the optimal LDPC parameter for our rate-adaptive approach according to error rates.

  20. Quantum Hacking on Quantum Key Distribution using Homodyne Detection

    E-Print Network [OSTI]

    Jing-Zheng Huang; Sébastien Kunz-Jacques; Paul Jouguet; Christian Weedbrook; Zhen-Qiang Yin; Shuang Wang; Wei Chen; Guang-Can Guo; Zheng-Fu Han

    2014-02-27

    Imperfect devices in commercial quantum key distribution systems open security loopholes that an eavesdropper may exploit. An example of one such imperfection is the wavelength dependent coupling ratio of the fiber beam splitter. Utilizing this loophole, the eavesdropper can vary the transmittances of the fiber beam splitter at the receiver's side by inserting lights with wavelengths different from what is normally used. Here, we propose a wavelength attack on a practical continuous-variable quantum key distribution system using homodyne detection. By inserting light pulses at different wavelengths, this attack allows the eavesdropper to bias the shot noise estimation even if it is done in real time. Based on experimental data, we discuss the feasibility of this attack and suggest a prevention scheme by improving the previously proposed countermeasures.

  1. No-signaling Quantum Key Distribution: Solution by Linear Programming

    E-Print Network [OSTI]

    Won-Young Hwang; Joonwoo Bae; Nathan Killoran

    2013-01-15

    We outline a straightforward approach for obtaining a secret key rate using only no-signaling constraints and linear programming. Assuming an individual attack, we consider all possible joint probabilities. Initially, we study only the case where Eve has binary outcomes, and we impose constraints due to the no-signaling principle and given measurement outcomes. Within the remaining space of joint probabilities, by using linear programming, we get bound on the probability of Eve correctly guessing Bob's bit. We then make use of an inequality that relates this guessing probability to the mutual information between Bob and a more general Eve, who is not binary-restricted. Putting our computed bound together with the Csisz\\'ar-K\\"orner formula, we obtain a positive key generation rate. The optimal value of this rate agrees with known results, but was calculated in a more straightforward way, offering the potential of generalization to different scenarios.

  2. Secure password-based authenticated key exchange for web services

    SciTech Connect (OSTI)

    Liang, Fang; Meder, Samuel; Chevassut, Olivier; Siebenlist, Frank

    2004-11-22

    This paper discusses an implementation of an authenticated key-exchange method rendered on message primitives defined in the WS-Trust and WS-SecureConversation specifications. This IEEE-specified cryptographic method (AuthA) is proven-secure for password-based authentication and key exchange, while the WS-Trust and WS-Secure Conversation are emerging Web Services Security specifications that extend the WS-Security specification. A prototype of the presented protocol is integrated in the WSRF-compliant Globus Toolkit V4. Further hardening of the implementation is expected to result in a version that will be shipped with future Globus Toolkit releases. This could help to address the current unavailability of decent shared-secret-based authentication options in the Web Services and Grid world. Future work will be to integrate One-Time-Password (OTP) features in the authentication protocol.

  3. Low Timing Jitter Detector for Gigahertz Quantum Key Distribution

    E-Print Network [OSTI]

    R. J. Collins; R. H. Hadfield; V. Fernandez; S. W. Nam; G. S. Buller

    2007-02-23

    A superconducting single-photon detector based on a niobium nitride nanowire is demonstrated in an optical-fibre-based quantum key distribution test bed operating at a clock rate of 3.3 GHz and a transmission wavelength of 850 nm. The low jitter of the detector leads to significant reduction in the estimated quantum bit error rate and a resultant improvement in the secrecy efficiency compared to previous estimates made by use of silicon single-photon avalanche detectors.

  4. 1. Aim of the Code of Practice 2. Key points

    E-Print Network [OSTI]

    Roelleke, Thomas

    family leave provisions 1August 2011 #12;1 Aim of the Code of Practice The aim is to: 1 promote good1. Aim of the Code of Practice 2. Key points 3. Maternity leave and pay 4. Ante-natal leave 5. Compassionate leave for family and other reasons 1 1 3 4 5 7 8 9 10 HR Code of Practice 14. Maternity and other

  5. Key Renewable Energy Opportunities for Oklahoma Tribes | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCED MANUFACTURING OFFICE INDUSTRIALU.S. DepartmentJeanKey Meeting Takeaways from 2014 Meeting

  6. Key Activities in Energy Efficiency | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterested Parties - WAPA Public CommentInverted253.16582104) Kenmore: ENERGYKevinKey

  7. Key Concepts in Project Development and Financing in Alaska

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterested Parties - WAPA Public CommentInverted253.16582104) Kenmore:Key2: Project

  8. Vehicle Technologies Office: Key Activities in Vehicles | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative FuelsofProgram: Report1538-1950 TimelineUtility-ScaleTechnology|Energy Key

  9. A correct security evaluation of quantum key distribution

    E-Print Network [OSTI]

    Osamu Hirota

    2014-09-21

    There is no doubt that quantum key distribution is an excellent result as a science. However, this paper presents a view on quantum key distribution (QKD) wherein QKD may have a difficulty to provide a sufficient security and good communication performance in real world networks. In fact, a one-time pad forwarded by QKD model with $\\bar{\\epsilon}=10^{-6}$ may be easily decrypted by key estimation. Despite that researchers know several criticisms on the theoretical incompleteness on the security evaluation, Portmann and Rennner, and others still avert from the discussion on criticism, and experimental groups tend to make exaggerated claims about their own work by making it seems that QKD is applicable to commercial communication systems. All such claims are based on a misunderstanding of the meaning of criteria of information theoretic security in cryptography. A severe situation has arisen as a result, one that will impair a healthy development of quantum information science (QIS). Thus, the author hopes that this paper will help to stimulate discussions on developing a more detailed theory.

  10. Cost per-User as Key Factor in Project Prioritization: A Case Study of the San Francisco Bay Area

    E-Print Network [OSTI]

    Nuworsoo, Cornelius; Parks, Kamala; Deakin, Elizabeth

    2006-01-01

    However. few agencies conduct a full CBA; rulbcr. they havemethodologies that use CBA concepts but focus on projectrelatively few agencies use CBA to prioritize projects,

  11. A genome-wide regulatory network identifies key transcription factors for memory CD8[superscript +] T-cell development

    E-Print Network [OSTI]

    Hu, Guangan

    Memory CD8[superscript +] T-cell development is defined by the expression of a specific set of memory signature genes. Despite recent progress, many components of the transcriptional control of memory CD8[superscript +] ...

  12. SUBTASK 1.7 EVALUATION OF KEY FACTORS AFFECTING SUCCESSFUL OIL PRODUCTION IN THE BAKKEN FORMATION, NORTH DAKOTA PHASE II

    SciTech Connect (OSTI)

    Darren D. Schmidt; Steven A. Smith; James A. Sorensen; Damion J. Knudsen; John A. Harju; Edward N. Steadman

    2011-10-31

    Production from the Bakken and Three Forks Formations continues to trend upward as forecasts predict significant production of oil from unconventional resources nationwide. As the U.S. Geological Survey reevaluates the 3.65 billion bbl technically recoverable estimate of 2008, technological advancements continue to unlock greater unconventional oil resources, and new discoveries continue within North Dakota. It is expected that the play will continue to expand to the southwest, newly develop in the northeastern and northwestern corners of the basin in North Dakota, and fully develop in between. Although not all wells are economical, the economic success rate has been near 75% with more than 90% of wells finding oil. Currently, only about 15% of the play has been drilled, and recovery rates are less than 5%, providing a significant future of wells to be drilled and untouched hydrocarbons to be pursued through improved stimulation practices or enhanced oil recovery. This study provides the technical characterizations that are necessary to improve knowledge, provide characterization, validate generalizations, and provide insight relative to hydrocarbon recovery in the Bakken and Three Forks Formations. Oil-saturated rock charged from the Bakken shales and prospective Three Forks can be produced given appropriate stimulation treatments. Highly concentrated fracture stimulations with ceramic- and sand-based proppants appear to be providing the best success for areas outside the Parshall and Sanish Fields. Targeting of specific lithologies can influence production from both natural and induced fracture conductivity. Porosity and permeability are low, but various lithofacies units within the formation are highly saturated and, when targeted with appropriate technology, release highly economical quantities of hydrocarbons.

  13. Key success factors in transforming traditional family business for success and long-term survival in changing markets

    E-Print Network [OSTI]

    Srisomburananont, Thitipong, 1976-

    2004-01-01

    Most of family-owned enterprises start their operations in the traditional businesses such as manufacturing, trading, or providing services. Some of them are very successful and become major global players in the industries, ...

  14. Practical Training in Microalgae Utilization with Key Industry Engineering Group Key Industry Engineering Group s.r.o. has developed a biotechnology for the production of an animal

    E-Print Network [OSTI]

    Practical Training in Microalgae Utilization with Key Industry Engineering Group Key Industry on a suspension of Planktochlorella microalgae. The product consists of a suspension of algae in the growing

  15. The MX Factor

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    MX Factor Test films played a strategic-planning role in the debates of the late 1970s and early 1980s about where and how to deploy the MX intercontinental ballistic missile...

  16. Power Factor Improvement 

    E-Print Network [OSTI]

    Viljoen, T. A.

    1979-01-01

    and disadvantages of various locations in the electrical network are described including the cost of installation and network capacity improvement. Sizing of capacitors is also covered. Finally, some case studies involving power factor improvement are presented...

  17. Reducing Power Factor Cost

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Before PF 100142 0.70 or 70% After PF 100105 0.95 or 95% PB References: B.C. Hydro. Power Factor. The GEM Series. October 1989. Commonwealth Sprague Capacitor, Inc....

  18. Uncertainty Analysis for Photovoltaic Degradation Rates (Poster)

    SciTech Connect (OSTI)

    Jordan, D.; Kurtz, S.; Hansen, C.

    2014-04-01

    Dependable and predictable energy production is the key to the long-term success of the PV industry. PV systems show over the lifetime of their exposure a gradual decline that depends on many different factors such as module technology, module type, mounting configuration, climate etc. When degradation rates are determined from continuous data the statistical uncertainty is easily calculated from the regression coefficients. However, total uncertainty that includes measurement uncertainty and instrumentation drift is far more difficult to determine. A Monte Carlo simulation approach was chosen to investigate a comprehensive uncertainty analysis. The most important effect for degradation rates is to avoid instrumentation that changes over time in the field. For instance, a drifting irradiance sensor, which can be achieved through regular calibration, can lead to a substantially erroneous degradation rates. However, the accuracy of the irradiance sensor has negligible impact on degradation rate uncertainty emphasizing that precision (relative accuracy) is more important than absolute accuracy.

  19. Electromagetic proton form factors

    E-Print Network [OSTI]

    M Y Hussein

    2006-10-31

    The electromagnetic form factors are crucial to our understanding of the proton internal structure, and thus provide a strong constraint of the distributions of the charge and magnetization current within the proton. We adopted the quark-parton model for calculating and understanding the charge structure of the proton interms of the electromagnetic form factors. A remarkable agreement with the available experimental evidence is found.

  20. Optimizing Power Factor Correction 

    E-Print Network [OSTI]

    Phillips, R. K.; Burmeister, L. C.

    1986-01-01

    FACTOR CORRECTION Robert K. Phillips and Louis C. Burmeister, Mechanical Engineering, University of Kansas, Lawrence, KS The optimal investment for power factor correcting capacitors for Kansas Power and Light Company large power contract customers... consumer of electricity were made for demands of 200, 400, 800, 1,600, 3,200, and 6,400 k\\~ and monthly energy consumption periods of 100, 150, 200, 300, 400, and 500 hours for several capacitor purchase and installation costs. The results...

  1. FGF growth factor analogs

    DOE Patents [OSTI]

    Zamora, Paul O. (Gaithersburg, MD); Pena, Louis A. (Poquott, NY); Lin, Xinhua (Plainview, NY); Takahashi, Kazuyuki (Germantown, MD)

    2012-07-24

    The present invention provides a fibroblast growth factor heparin-binding analog of the formula: ##STR00001## where R.sub.1, R.sub.2, R.sub.3, R.sub.4, R.sub.5, X, Y and Z are as defined, pharmaceutical compositions, coating compositions and medical devices including the fibroblast growth factor heparin-binding analog of the foregoing formula, and methods and uses thereof.

  2. NREL: Awards and Honors - Real-Time Biomass Analysis

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and saves trees from being prematurely harvested. The key to RTBA is the use of multivariate analysis to calibrate the near-infrared spectrometry to the specific parameters...

  3. 2014 CATEE: Collaboration is the Key- Public/Private Partnerships 

    E-Print Network [OSTI]

    Lin, L.

    2014-01-01

    stream_source_info ESL-KT-14-11-24.pdf.txt stream_content_type text/plain stream_size 9508 Content-Encoding UTF-8 stream_name ESL-KT-14-11-24.pdf.txt Content-Type text/plain; charset=UTF-8 2014 CATEE Collaboration... is the Key - Public/Private Partnerships November 19, 2014 Lisa Lin, Sustainability Manager, City of Houston ESL-KT-14-11-24 CATEE 2014: Clean Air Through Efficiency Conference, Dallas, Texas Nov. 18-20 City of Houston Energy Efficiency Programs 2000...

  4. Upconversion based receivers for quantum hacking resistant quantum key distribution

    E-Print Network [OSTI]

    Nitin Jain; Gregory S. Kanter

    2015-09-21

    We propose a novel upconversion (sum frequency generation) based quantum-optical setup that can be employed as a receiver (Bob) in practical quantum key distribution systems. The pump governing the upconversion process is produced and utilized inside the physical receiver, making its access or control unrealistic for an external adversary (Eve). This pump facilitates several properties which permit Bob to define and control the modes that can participate in the quantum measurement. Furthermore, by manipulating and monitoring the characteristics of the pump pulses, Bob can detect a wide range of quantum hacking attacks launched by Eve.

  5. KeyTex Energy LLC | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History View NewTexas: Energy ResourcesOrder atHills,NewKeithDelaware:DLRKettering,KeyTex Energy LLC Jump

  6. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach HomeA Better Anode Design to Improve Lithium-Ion Batteries Print Lithium-ionA FirstA Key Enzyme to the

  7. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach HomeA Better Anode Design to Improve Lithium-Ion Batteries Print Lithium-ionA FirstA Key Enzyme to theA

  8. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach HomeA Better Anode Design to Improve Lithium-Ion Batteries Print Lithium-ionA FirstA Key Enzyme to theAA

  9. Florida Keys El Coop Assn, Inc | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LISTStar2-0057-EA Jump to:ofEnia SpAFlex Fuels Energy Jump to:Flora HomeKeys El Coop

  10. SimTable key tool for preparing, responding to wildfire

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust,Field-effect Photovoltaics -7541 UnlimitedShift EndShutdownSolar PhotovoltaicSimTable key

  11. Catalysis Center for Energy Innovation KEY ACCOMPLISHMENTS AND CORE CAPABILITIES

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory of raregovAboutRecoveryplanning Career Planning for theFebruary 26, 2014andKEY

  12. GE Key Partner in Innovation Institutes | GE Global Research

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HABFESOpportunities Nuclear Physics (NP)aboutRio de Janeiro,theIs Key

  13. Key Dates | U.S. DOE Office of Science (SC)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACTThousand Cubic Feet) SoldDepartment ofKenThousandtheKevlar andKey5

  14. Key Dates | U.S. DOE Office of Science (SC)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACTThousand Cubic Feet) SoldDepartment ofKenThousandtheKevlarKey Dates

  15. Key Dates | U.S. DOE Office of Science (SC)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACTThousand Cubic Feet) SoldDepartment ofKenThousandtheKevlarKey

  16. Iron is the Key to Preserving Dinosaur Soft Tissue

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation CurrentHenryInhibitingInteractivePGAS andUniversity IonIron is the Key to

  17. Key Publications - Natural Gas Regulation | Department of Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJesse Bergkamp Graduate student Subtask 4Photo4> TheKevin MorrisKey

  18. Robotics Key to Subsea Exploration | GE Global Research

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II) byMultidayAlumni > The Energy Materials CenterRobotics Key to Subsea

  19. Minimum Energy Per Bit for Secret Key Acquisition Over Multipath Wireless Channels

    E-Print Network [OSTI]

    Sayeed, Akbar M.

    Minimum Energy Per Bit for Secret Key Acquisition Over Multipath Wireless Channels Tzu-Han Chou the secret key capacity. We analyze the low-SNR regime to quantify the minimum energy per secret key bit of conventional channel capacity, there is a non-zero SNR that achieves the minimum energy per key bit. A time

  20. A look at the PGP ecosystem through the key server data

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    to be challenging. GnuPG does not provide library access to low level functions that would allow parsing the data-based encryption systems use a network of key servers to share public keys. These key server operate on an add only basis, thus the data gives us access to PGP public keys from over 20 years of PGP usage. Analyzing

  1. The Origins of the SPAR-H Method's Performance Shaping Factor Multipliers

    SciTech Connect (OSTI)

    Ronald L. Boring; Harold S. Blackman

    2007-08-01

    The Standardized Plant Analysis Risk-Human Reliability Analysis (SPAR-H) method has proved to be a reliable, easy-to-use method for human reliability analysis. Calculation of human error probability (HEP) rates is especially straightforward, starting with pre-defined nominal error rates for cognitive vs. action oriented tasks, and incorporating performance shaping factor (PSF) multipliers upon those nominal error rates. SPAR-H uses eight PSFs with multipliers typically corresponding to nominal, degraded, and severely degraded human performance for individual PSFs. Additionally, some PSFs feature multipliers to reflect enhanced performance. Although SPAR-H enjoys widespread use among industry and regulators, current source documents on SPAR-H such as NUREG/CR-6883 do not provide a clear account of the origin of these multipliers. The present paper redresses this shortcoming and documents the historic development of the SPAR-H PSF multipliers, from the initial use of nominal error rates, to the selection of the eight PSFs, to the mapping of multipliers to available data sources such as a Technique for Human Error Rate Prediction (THERP). Where error rates were not readily derived from THERP and other sources, expert judgment was used to extrapolate appropriate values. In documenting key background information on the multipliers, this paper provides a much needed cross-reference for human reliability practitioners and researchers of SPAR-H to validate analyses and research findings.

  2. Implementing Performance-Based Sustainability Requirements for the Low Carbon Fuel Standard – Key Design Elements and Policy Considerations

    E-Print Network [OSTI]

    Yeh, Sonia; Sumner, Daniel A.; Kaffka, Stephen R.; Ogden, J; Jenkins, Bryan M.

    2009-01-01

    Standard – Key Design Elements and Policy ConsiderationsStandard ? Key Design Elements and Policy Considerations:Standard ? Key Design Elements and Policy Considerations:

  3. Anthrax Lethal Factor

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 OutreachProductswsicloudwsiclouddenDVA N C E D B L O O D S TAPropaneandAn319Another keyAnthony L.Thiang Yian

  4. Break-Even Cost for Residential Solar Water Heating in the United States: Key Drivers and Sensitivities

    SciTech Connect (OSTI)

    Cassard, H.; Denholm, P.; Ong, S.

    2011-02-01

    This paper examines the break-even cost for residential rooftop solar water heating (SWH) technology, defined as the point where the cost of the energy saved with a SWH system equals the cost of a conventional heating fuel purchased from the grid (either electricity or natural gas). We examine the break-even cost for the largest 1,000 electric and natural gas utilities serving residential customers in the United States as of 2008. Currently, the break-even cost of SWH in the United States varies by more than a factor of five for both electricity and natural gas, despite a much smaller variation in the amount of energy saved by the systems (a factor of approximately one and a half). The break-even price for natural gas is lower than that for electricity due to a lower fuel cost. We also consider the relationship between SWH price and solar fraction and examine the key drivers behind break-even costs. Overall, the key drivers of the break-even cost of SWH are a combination of fuel price, local incentives, and technical factors including the solar resource location, system size, and hot water draw.

  5. Benchmark Report on Key Outage Attributes: An Analysis of Outage Improvement Opportunities and Priorities

    SciTech Connect (OSTI)

    Germain, Shawn St.; Farris, Ronald

    2014-09-01

    Advanced Outage Control Center (AOCC), is a multi-year pilot project targeted at Nuclear Power Plant (NPP) outage improvement. The purpose of this pilot project is to improve management of NPP outages through the development of an AOCC that is specifically designed to maximize the usefulness of communication and collaboration technologies for outage coordination and problem resolution activities. This report documents the results of a benchmarking effort to evaluate the transferability of technologies demonstrated at Idaho National Laboratory and the primary pilot project partner, Palo Verde Nuclear Generating Station. The initial assumption for this pilot project was that NPPs generally do not take advantage of advanced technology to support outage management activities. Several researchers involved in this pilot project have commercial NPP experience and believed that very little technology has been applied towards outage communication and collaboration. To verify that the technology options researched and demonstrated through this pilot project would in fact have broad application for the US commercial nuclear fleet, and to look for additional outage management best practices, LWRS program researchers visited several additional nuclear facilities.

  6. Exploring vulnerability and interdependency of UK infrastructure using key-linkages analysis

    E-Print Network [OSTI]

    Kelly, Scott; Tyler, Peter; Crawford-Brown, Douglas

    2015-07-27

    ) Waste (£5.8 bn) Water (£29.5 bn) Grand Total (£467 bn) Public Public/Private Private 3 Figure 1: Future source of funding for different infrastructure categories in the UK 60 Source: UK National infrastructure pipeline (2013) 61... Scientist 2012). With increasing risks from extreme weather events caused by the 65 onset of climate change and a concentration of populations now living in vulnerable 66 coastal cities, river deltas and along earth quake fault-lines, the risks of damage...

  7. Identifying Key Pathways in Multiple Cancers with Multi-omics Pathway Analysis

    E-Print Network [OSTI]

    Ng, Sam

    2015-01-01

    angiogenesis, and oncogenesis, Figure 5B. Comparison of theis an early driver of oncogenesis. Thus it is consistentbidirectional receptors in oncogenesis. Orthogonality with

  8. LETTER Global analysis of plasticity in turgor loss point, a key drought tolerance trait

    E-Print Network [OSTI]

    Sack, Lawren

    , ptlp measured in one season can reliably characterise most spe- cies' constitutive drought tolerances, wilting and hydraulic dysfunction (Brodribb et al. 2003; Choat et al. 2007; Bartlett et al. 2012b) have ecosystems, especially relative to ecosystem water supply. The turgor loss point (ptlp; unit: MPa

  9. Identifying Key Pathways in Multiple Cancers with Multi-omics Pathway Analysis

    E-Print Network [OSTI]

    Ng, Sam

    2015-01-01

    Goiffon R.J. , Goldstein T.C. , Ng S. , et al. (2012) Whole-Benz S.C. , Goldstein T.C. , Ng S. , et al. (2011) SubtypeA.D. , Tamborero D. , Ng S. , et al. (2014) Multiplatform

  10. A Key Review On Exergetic Analysis And Assessment Of Renewable Energy

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION JEnvironmental Jump to:EAand Dalton JumpProgram | OpenEnergyEvaluation | Open EnergyEnergyResources

  11. A passive transmitter for quantum key distribution with coherent light

    E-Print Network [OSTI]

    Marcos Curty; Marc Jofre; Valerio Pruneri; Morgan W. Mitchell

    2011-08-03

    Signal state preparation in quantum key distribution schemes can be realized using either an active or a passive source. Passive sources might be valuable in some scenarios; for instance, in those experimental setups operating at high transmission rates, since no externally driven element is required. Typical passive transmitters involve parametric down-conversion. More recently, it has been shown that phase-randomized coherent pulses also allow passive generation of decoy states and Bennett-Brassard 1984 (BB84) polarization signals, though the combination of both setups in a single passive source is cumbersome. In this paper, we present a complete passive transmitter that prepares decoy-state BB84 signals using coherent light. Our method employs sum-frequency generation together with linear optical components and classical photodetectors. In the asymptotic limit of an infinite long experiment, the resulting secret key rate (per pulse) is comparable to the one delivered by an active decoy-state BB84 setup with an infinite number of decoy settings.

  12. The role of naturally occurring waterholes in determining the distribution of Florida Key Deer 

    E-Print Network [OSTI]

    Kim, Ji Yeon

    2009-05-15

    (Big Pine Key Inn Station, 1953) Data on Big Pine Key and the Volume of Daily Fresh Water Shortage on Big Pine Key (From the Result of 1-Year Base Line Simulation)................................................................................ 26...). I used two precipitation data sets to parameterize dv1, one consisting of daily precipitation (inches) from January 1 to December 31, 1953 from the Big Pine Key Inn weather station and one from January 1 to December 31, 2001 from the Key West...

  13. Geothermal Plant Capacity Factors

    SciTech Connect (OSTI)

    Greg Mines; Jay Nathwani; Christopher Richard; Hillary Hanson; Rachel Wood

    2015-01-01

    The capacity factors recently provided by the Energy Information Administration (EIA) indicated this plant performance metric had declined for geothermal power plants since 2008. Though capacity factor is a term commonly used by geothermal stakeholders to express the ability of a plant to produce power, it is a term frequently misunderstood and in some instances incorrectly used. In this paper we discuss how this capacity factor is defined and utilized by the EIA, including discussion on the information that the EIA requests from operations in their 923 and 860 forms that are submitted both monthly and annually by geothermal operators. A discussion is also provided regarding the entities utilizing the information in the EIA reports, and how those entities can misinterpret the data being supplied by the operators. The intent of the paper is to inform the facility operators as the importance of the accuracy of the data that they provide, and the implications of not providing the correct information.

  14. Demonstration of emulator-based Bayesian calibration of safety analysis codes: Theory and formulation

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Yurko, Joseph P.; Buongiorno, Jacopo; Youngblood, Robert

    2015-05-28

    System codes for simulation of safety performance of nuclear plants may contain parameters whose values are not known very accurately. New information from tests or operating experience is incorporated into safety codes by a process known as calibration, which reduces uncertainty in the output of the code and thereby improves its support for decision-making. The work reported here implements several improvements on classic calibration techniques afforded by modern analysis techniques. The key innovation has come from development of code surrogate model (or code emulator) construction and prediction algorithms. Use of a fast emulator makes the calibration processes used here withmore »Markov Chain Monte Carlo (MCMC) sampling feasible. This study uses Gaussian Process (GP) based emulators, which have been used previously to emulate computer codes in the nuclear field. The present work describes the formulation of an emulator that incorporates GPs into a factor analysis-type or pattern recognition-type model. This “function factorization” Gaussian Process (FFGP) model allows overcoming limitations present in standard GP emulators, thereby improving both accuracy and speed of the emulator-based calibration process. Calibration of a friction-factor example using a Method of Manufactured Solution is performed to illustrate key properties of the FFGP based process.« less

  15. The effect of sociocultural factors on the quality of relations of the United States with Hispaniola: analysis of the American military occupation of Haiti and the Dominican Republic (1915-1934) 

    E-Print Network [OSTI]

    Alvarez, Fausto B.

    1988-01-01

    with Hispaniola reveals a strong emphasis on economic and strategic interests (see, for example, Langley, 1983' Wiarda and Kryzanek, 1982; Langley, 1982; Lowenthal, 1972, 1969; Knight, 1970). Therefore, the sociological significance of this study... with the role of social and cultural factors involved in the application of this policy. Melvin Knight, an American historian who had first-hand acquaintance with and who wrote about the military occupation of Hispaniola, described this "dilemma" as follows...

  16. Breakeven Cost for Residential Photovoltaics in the United States: Key Drivers and Sensitivities (Report Summary) (Presentation)

    SciTech Connect (OSTI)

    Denholm, P.; Margolis, R. M.; Ong, S.; Roberts, B.

    2009-12-01

    "Break-even cost" for photovoltaic (PV) technology is defined as the point where the cost of PV-generated electricity equals the cost of electricity purchased from the grid. Break-even cost is expressed in $/W of an installed system. Achieving break-even cost is a function of many variables. Consequently, break-even costs vary by location and time for a country, such as the United States, with a diverse set of resources, electricity prices, and other variables. In this presentation, we introduce an analysis of PV break-even costs for residential customers in the United States, including an evaluation of some of the key drivers of PV breakeven both regionally and over time. This presentation includes our methodology and presents results for both near-term residential breakeven costs(2009) and future market sensitivities of break-even costs (2015). See also the the report "Break-Even Cost for Residential Photovoltaics in the United States: Key Drivers and Sensitivities". Presentation for NREL/TP-6A2-45991.

  17. Passive faraday mirror attack in practical two-way quantum key distribution system

    E-Print Network [OSTI]

    Shi-Hai Sun; Mu-Sheng Jiang; Lin-Mei Liang

    2012-03-04

    The faraday mirror (FM) plays a very important role in maintaining the stability of two way plug-and-play quantum key distribution (QKD) system. However, the practical FM is imperfect, which will not only introduce additional quantum bit error rate (QBER) but also leave a loophole for Eve to spy the secret key. In this paper, we propose a passive faraday mirror attack in two way QKD system based on the imperfection of FM. Our analysis shows that, if the FM is imperfect, the dimension of Hilbert space spanned by the four states sent by Alice is three instead of two. Thus Eve can distinguish these states with a set of POVM operators belonging to three dimension space, which will reduce the QBER induced by her attack. Furthermore, a relationship between the degree of the imperfection of FM and the transmittance of the practical QKD system is obtained. The results show that, the probability that Eve loads her attack successfully depends on the degree of the imperfection of FM rapidly, but the QBER induced by Eve's attack changes with the degree of the imperfection of FM slightly.

  18. Break-Even Cost for Residential Photovoltaics in the United States: Key Drivers and Sensitivities

    SciTech Connect (OSTI)

    Denholm, P.; Margolis, R. M.; Ong, S.; Roberts, B.

    2009-12-01

    Grid parity--or break-even cost--for photovoltaic (PV) technology is defined as the point where the cost of PV-generated electricity equals the cost of electricity purchased from the grid. Break-even cost is expressed in $/W of an installed system. Achieving break-even cost is a function of many variables. Consequently, break-even costs vary by location and time for a country, such as the United States, with a diverse set of resources, electricity prices, and other variables. In this report, we analyze PV break-even costs for U.S. residential customers. We evaluate some key drivers of grid parity both regionally and over time. We also examine the impact of moving from flat to time-of-use (TOU) rates, and we evaluate individual components of the break-even cost, including effect of rate structure and various incentives. Finally, we examine how PV markets might evolve on a regional basis considering the sensitivity of the break-even cost to four major drivers: technical performance, financing parameters, electricity prices and rates, and policies. We find that local incentives rather than ?technical? parameters are in general the key drivers of the break-even cost of PV. Additionally, this analysis provides insight about the potential viability of PV markets.

  19. Principal Canopy Factors of Sweet Corn and Relationships to Competitive Ability with Wild-Proso Millet (Panicum miliaceum)

    E-Print Network [OSTI]

    Sims, Gerald K.

    -season ``canopy closure'' factor (e.g., leaf area index and intercepted photosynthetically active radiation at six', `Quickie', `Rocker', `SCH7006RR', `Spirit', `Spring Treat', and `Sugar Buns'. Key words: Competition, crop

  20. 17?-Estradiol and Progesterone Regulate Expression of ?-Amyloid Clearance Factors in Primary Neuron Cultures and Female Rat Brain

    E-Print Network [OSTI]

    Jayaraman, Anusha; Carroll, Jenna C.; Morgan, Todd E.; Lin, Sharon W.; Zhao, Liqin; Arimoto, Jason M.; Murphy, M. Paul; Beckett, Tina L.; Finch, Caleb E.; Brinton, Roberta Diaz; Pike, Christian J.

    2012-01-01

    The accumulation of ?-amyloid protein (A?) is a key risk factor in the development of Alzheimer's disease. The ovarian sex steroid hormones 17?-estradiol (E2) and progesterone (P4) have been shown to regulate A? accumulation, although the underlying...

  1. Fast Factoring of Integers

    E-Print Network [OSTI]

    Gordon Chalmers

    2005-09-20

    An algorithm is given to factor an integer with $N$ digits in $\\ln^m N$ steps, with $m$ approximately 4 or 5. Textbook quadratic sieve methods are exponentially slower. An improvement with the aid of an a particular function would provide a further exponential speedup.

  2. Practical security bounds against the Trojan-horse attack in quantum key distribution

    E-Print Network [OSTI]

    Marco Lucamarini; Iris Choi; Martin B. Ward; James F. Dynes; Zhiliang Yuan; Andrew J. Shields

    2015-06-05

    In the quantum version of a Trojan-horse attack, photons are injected into the optical modules of a quantum key distribution system in an attempt to read information direct from the encoding devices. To stop the Trojan photons, the use of passive optical components has been suggested. However, to date, there is no quantitative bound that specifies such components in relation to the security of the system. Here, we turn the Trojan-horse attack into an information leakage problem. This allows us quantify the system security and relate it to the specification of the optical elements. The analysis is supported by the experimental characterization of reflectivity and transmission of the optical components most relevant to security.

  3. Practical security bounds against the Trojan-horse attack in quantum key distribution

    E-Print Network [OSTI]

    Marco Lucamarini; Iris Choi; Martin B. Ward; James F. Dynes; Zhiliang Yuan; Andrew J. Shields

    2015-08-03

    In the quantum version of a Trojan-horse attack, photons are injected into the optical modules of a quantum key distribution system in an attempt to read information direct from the encoding devices. To stop the Trojan photons, the use of passive optical components has been suggested. However, to date, there is no quantitative bound that specifies such components in relation to the security of the system. Here, we turn the Trojan-horse attack into an information leakage problem. This allows us quantify the system security and relate it to the specification of the optical elements. The analysis is supported by the experimental characterization, within the operation regime, of reflectivity and transmission of the optical components most relevant to security.

  4. Matrix Factorization and Matrix Concentration

    E-Print Network [OSTI]

    Mackey, Lester

    2012-01-01

    PCA 3 Mixed Membership Matrix Factorization 3.15.2 Matrix concentration3.3 Mixed Membership Matrix Factorization . . . 3.4

  5. EVALUATING NATIONAL ENVIRONMENTAL SUSTAINABILITY: PERFORMANCE MEASURES AND INFLUENTIAL FACTORS FOR

    E-Print Network [OSTI]

    components factor analysis to help build subindices measuring waste and pollution, sustainable energy, sustainable food, nature conservation, and sustainable cities (Due to its current importance, the greenhouse development, industrial structure, energy prices, environmental governance, pollution abatement and control

  6. Security of Power Packet Dispatching Using Differential Chaos Shift Keying

    E-Print Network [OSTI]

    Yanzi Zhou; Ryo Takahashi; Takashi Hikihara

    2015-02-19

    This paper investigates and confirms one advantageous function of a power packet dispatching system, which has been proposed by authors' group with being apart from the conventional power distribution system. Here is focused on the function to establish the security of power packet dispatching for prohibiting not only information but also power of power packet from being stolen by attackers. For the purpose of protecting power packets, we introduce a simple encryption of power packets before sending them. Encryption scheme based on chaotic signal is one possibility for this purpose. This paper adopts the Differential Chaos Shift Keying (DCSK) scheme for the encryption, those are partial power packet encryption and whole power packet encryption.

  7. Modern hydrocracking is the key to upgrading processes

    SciTech Connect (OSTI)

    Corbett, R.A.

    1989-06-26

    Hydrocracking technology is the key to Canada's heavy oil and bitumen upgrading facilities that have recently started or are due to start up during the next few years. The upgrader at Consumers' Cooperative Refineries Ltd. in Regina Sask.; the capacity addition program (CAP) at Syncrude Canada Ltd.'s Fort McMurray, Alta., plant; Husky Oil Operations Ltd.'s Bi-Provincial upgrader to be built near Lloydminster, Sask.; and the OSLO project to be built near Fort McMurray, all rely on this modern technology for primary upgrading. All of the projects are designed to upgrade heavy oil and bitumen extracted from oil sands to a high-quality synthetic crude oil (SCO) that is a blend of high-quality naphtha and gas oil.

  8. Quantum public-key algorithms to encrypt and authenticate quantum messages with information-theoretic security

    E-Print Network [OSTI]

    Min Liang; Li Yang

    2012-05-10

    Public-key cryptosystems for quantum messages are considered from two aspects: public-key encryption and public-key authentication. Firstly, we propose a general construction of quantum public-key encryption scheme, and then construct an information-theoretic secure instance. Then, we propose a quantum public-key authentication scheme, which can protect the integrity of quantum messages. This scheme can both encrypt and authenticate quantum messages. It is information-theoretic secure with regard to encryption, and the success probability of tampering decreases exponentially with the security parameter with regard to authentication. Compared with classical public-key cryptosystems, one private-key in our schemes corresponds to an exponential number of public-keys, and every quantum public-key used by the sender is an unknown quantum state to the sender.

  9. Quantum public-key algorithms to encrypt and authenticate quantum messages with information-theoretic security

    E-Print Network [OSTI]

    Liang, Min

    2012-01-01

    Public-key cryptosystems for quantum messages are considered from two aspects: public-key encryption and public-key authentication. Firstly, we propose a general construction of quantum public-key encryption scheme, and then construct an information-theoretic secure instance. Then, we propose a quantum public-key authentication scheme, which can protect the integrity of quantum messages. This scheme can both encrypt and authenticate quantum messages. It is information-theoretic secure with regard to encryption, and the success probability of tampering decreases exponentially with the security parameter with regard to authentication. Compared with classical public-key cryptosystems, one private-key in our schemes corresponds to an exponential number of public-keys, and every quantum public-key used by the sender is an unknown quantum state to the sender.

  10. Nucleon and $?$ elastic and transition form factors

    E-Print Network [OSTI]

    Jorge Segovia; Ian C. Cloet; Craig D. Roberts; Sebastian M. Schmidt

    2014-09-03

    We compute nucleon and Delta elastic and transition form factors, and compare predictions made using a framework built upon a Faddeev equation kernel and interaction vertices that possess QCD-like momentum dependence with results obtained using a vector-vector contact-interaction. The comparison emphasises that experiment is sensitive to the momentum dependence of the running couplings and masses in the strong interaction sector of the Standard Model and highlights that the key to describing hadron properties is a veracious expression of dynamical chiral symmetry breaking in the bound-state problem. Amongst the results we describe, the following are of particular interest: $G_E^p(Q^2)/G_M^p(Q^2)$ possesses a zero at $Q^2=9.5GeV^2$; any change in the interaction which shifts a zero in the proton ratio to larger $Q^2$ relocates a zero in $G_E^n(Q^2)/G_M^n(Q^2)$ to smaller $Q^2$; and there is likely a value of momentum transfer above which $G_E^n>G_E^p$. Regarding the $\\Delta(1232)$-baryon, we find that, inter alia: the electric monopole form factor exhibits a zero; the electric quadrupole form factor is negative, large in magnitude, and sensitive to the nature and strength of correlations in the $\\Delta(1232)$ Faddeev amplitude; and the magnetic octupole form factor is negative so long as rest-frame P- and D-wave correlations are included. In connection with the N-to-Delta transition, the momentum-dependence of the magnetic transition form factor, $G_M^\\ast$, matches that of $G_M^n$ once the momentum transfer is high enough to pierce the meson-cloud; and the electric quadrupole ratio is a keen measure of diquark and orbital angular momentum correlations.

  11. FACTORS AFFECTING EXVESSEL PRICES OF SKIPJACK TUNA IN HAWAII

    E-Print Network [OSTI]

    FACTORS AFFECTING EXVESSEL PRICES OF SKIPJACK TUNA IN HAWAII Yung C . Shang The skipj ack -tuna to overfishing. On the other hand, the cost-revenue analysis indicates that, given the past input and tuna prices objective of this paper is to exam- ine the factors affecting the prices of skipj ack tuna. Skipjack

  12. Time-like pion electromagnetic form factors in $k_{T}$ factorization with the Next-to-leading-order twist-3 contribution

    E-Print Network [OSTI]

    Shan Cheng; Zhen-Jun Xiao

    2015-05-12

    We calculate the time-like pion electromagnetic form factor in the $k_T$ factorization formalism with the inclusion of the next-to-leading-order(NLO) corrections to the leading-twist and sub-leading-twist contributions. It's found that the total NLO correction can enhance (reduce) the magnitude (strong phase) of the leading order form factor by $20\\% - 30\\%$ ( $ 5$ GeV$^2$, and the NLO twist-3 correction play the key role to narrow the gap between the pQCD predictions and the measured values for the time-like pion electromagnetic form factor.

  13. Deuteron Form Factor

    SciTech Connect (OSTI)

    Farrar, G.R.; Huleihel, K.; Zhang, H. (Department of Physics and Astronomy, Rutgers University, Piscataway, New Jersey 08855 (United States))

    1995-01-30

    We obtain the perturbative QCD (PQCD) prediction for the leading twist deuteron form factor, treated as a pair of nucleons in nonrelativistic bound state. It is [lt]10[sup [minus]3] times experiment at [ital Q][sup 2]=4 GeV[sup 2], suggesting that PQCD is not relevant to the deuteron form factor at present values of [ital Q][sup 2], or that non-nucleon (e.g., hidden color'') degrees of freedom must be included for a correct description of the deuteron. The tree-level amplitude [similar to][ital eg][sup 10] and is the sum of several 10[sup 6] Feynman diagrams, making it an interesting case study in the behavior of perturbation theory.

  14. Framework for Identifying Key Environmental Concerns in Marine Renewable Energy Projects- Appendices

    SciTech Connect (OSTI)

    Sharon Kramer; Mirko Previsic; Peter Nelson; Sheri Woo

    2010-06-17

    Marine wave and tidal energy technology could interact with marine resources in ways that are not well understood. As wave and tidal energy conversion projects are planned, tested, and deployed, a wide range of stakeholders will be engaged; these include developers, state and federal regulatory agencies, environmental groups, tribal governments, recreational and commercial fishermen, and local communities. Identifying stakeholders’ environmental concerns in the early stages of the industry’s development will help developers address and minimize potential environmental effects. Identifying important concerns will also assist with streamlining siting and associated permitting processes, which are considered key hurdles by the industry in the U.S. today. In September 2008, RE Vision consulting, LLC was selected by the Department of Energy (DoE) to conduct a scenario-based evaluation of emerging hydrokinetic technologies. The purpose of this evaluation is to identify and characterize environmental impacts that are likely to occur, demonstrate a process for analyzing these impacts, identify the “key” environmental concerns for each scenario, identify areas of uncertainty, and describe studies that could address that uncertainty. This process is intended to provide an objective and transparent tool to assist in decision-making for siting and selection of technology for wave and tidal energy development. RE Vision worked with H. T. Harvey & Associates, to develop a framework for identifying key environmental concerns with marine renewable technology. This report describes the results of this study. This framework was applied to varying wave and tidal power conversion technologies, scales, and locations. The following wave and tidal energy scenarios were considered: ? 4 wave energy generation technologies ? 3 tidal energy generation technologies ? 3 sites: Humboldt coast, California (wave); Makapu’u Point, Oahu, Hawaii (wave); and the Tacoma Narrows, Washington (tidal) ? 3 project sizes: pilot, small commercial, and large commercial The possible combinations total 24 wave technology scenarios and 9 tidal technology scenarios. We evaluated 3 of the 33 scenarios in detail: 1. A small commercial OPT Power Buoy project off the Humboldt County, California coast 2. A small commercial Pelamis Wave Power P-2 project off Makapu’u Point, Oahu, Hawaii 3. A pilot MCT SeaGen tidal project, sited in the Tacoma Narrows, Washington This framework document used information available from permitting documents that were written to support actual wave or tidal energy projects, but the results obtained here should not be confused with those of the permitting documents1. The main difference between this framework document and permitting documents of currently proposed pilot projects is that this framework identifies key environmental concerns and describes the next steps in addressing those concerns; permitting documents must identify effects, find or declare thresholds of significance, evaluate the effects against the thresholds, and find mitigation measures that will minimize or avoid the effects so they can be considered less-than-significant. Two methodologies, 1) an environmental effects analysis and 2) Raptools, were developed and tested to identify potential environmental effects associated with wave or tidal energy conversion projects. For the environmental effects analysis, we developed a framework based on standard risk assessment techniques. The framework was applied to the three scenarios listed above. The environmental effects analysis addressed questions such as: ? What is the temporal and spatial exposure of a species at a site? ? What are the specific potential project effects on that species? ? What measures could minimize, mitigate, or eliminate negative effects? ? Are there potential effects of the project, or species’ response to the effect, that are highly uncertain and warrant additional study? The second methodology, Raptools, is a collaborative approach useful for evaluating multiple characteristi

  15. Journal Information Journal Impact Factor

    E-Print Network [OSTI]

    Krejcí, Pavel

    Journal Information Journal Impact Factor 5-Year Journal Impact Factor Journal Self Cites Journal Immediacy Index Journal Cited Half-Life 2014 JCR Science Edition Journal: CZECHOSLOVAK MATHEMATICAL JOURNAL Mark Journal Title ISSN Total Cites Impact Factor 5-Year Impact Factor Immediacy Index Citable Items

  16. Journal Information Journal Impact Factor

    E-Print Network [OSTI]

    Krejcí, Pavel

    Journal Information Journal Impact Factor 5-Year Journal Impact Factor Journal Self Cites Journal Immediacy Index Journal Cited Half-Life 2012 JCR Science Edition Journal: CZECHOSLOVAK MATHEMATICAL JOURNAL Mark Journal Title ISSN Total Cites Impact Factor 5-Year Impact Factor Immediacy Index Citable Items

  17. High-Rate Quantum Key Distribution with Superconducting Nanowire Single Photon Detectors

    E-Print Network [OSTI]

    Spellmeyer, Neal W.

    We demonstrate the potential for 1.85 Mbit/s secure key rates over 101 km of fiber, >100 times faster than previously demonstrated, using the differential phase shift quantum key distribution protocol and superconducting ...

  18. Blast furnace key to earth's birth P11 Balancing the body clock P14

    E-Print Network [OSTI]

    Liley, David

    Newage Blast furnace key to earth's birth P11 Balancing the body clock P14 Research readies to the stars Julian criBB 11 blast furnace holds key to earth's birth Julian criBB 12 agency audit raises

  19. Lowest Engine-Out Emissions as the Key to the Future of the Heavy...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Lowest Engine-Out Emissions as the Key to the Future of the Heavy-Duty Diesel Engine: New Development Rersults Lowest Engine-Out Emissions as the Key to the Future of the...

  20. The Energy Cost of Cryptographic Key Establishment in Wireless Sensor Networks #

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    The Energy Cost of Cryptographic Key Establishment in Wireless Sensor Networks # Johann Großsch, Security. Keywords Wireless networking, security protocols, cryptography, key establishment, energy Inffeldgasse 16a, A--8010 Graz, Austria ABSTRACT Wireless sensor nodes generally face serious limitations

  1. A World Wide Web key to the grass genera of Texas 

    E-Print Network [OSTI]

    Dawson, John Edward

    2001-01-01

    An illustrated dichotomous key to the grass genera of Texas is presented in hypertext markup language (HTML) format. The key combines scanned images of inflorescences, digitized images of dissected spikelets, text descriptions ...

  2. ASTROPHYSICS Thesaurus of key words used in the annual subject indexes

    E-Print Network [OSTI]

    Xu, Ren-Xin

    ASTRONOMY AND ASTROPHYSICS Thesaurus of key words used in the annual subject indexes (valid from processing 03.20.2 Techniques: interferometric 03.20.3 Techniques: miscellaneous #12;2 Thesaurus of key words

  3. Large trees-key climate influencers-die first in drought

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Large trees-key climate influencers-die first in drought Large trees-key climate influencers-die first in drought A team of researchers studied forests worldwide, ranging from...

  4. Unconditional Security of Time-Energy Entanglement Quantum Key Distribution Using Dual-Basis Interferometry

    E-Print Network [OSTI]

    Zhang, Zheshen

    High-dimensional quantum key distribution (HDQKD) offers the possibility of high secure-key rate with high photon-information efficiency. We consider HDQKD based on the time-energy entanglement produced by spontaneous ...

  5. Measurement of the ??*?? and ??*??' transition form factors

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    del Amo Sanchez, P.; Lees, J. P.; Poireau, V.; Prencipe, E.; Tisserand, V.; Garra Tico, J.; Grauges, E.; Martinelli, M.; Milanes, D. A.; Palano, A.; et al

    2011-09-06

    We study the reactions e?e??e?e??(') in the single-tag mode and measure the ??*??(') transition form factors in the momentum-transfer range from 4 to 40 GeV². The analysis is based on 469 fb?¹ of integrated luminosity collected at PEP-II with the BABAR detector at e?e? center-of-mass energies near 10.6 GeV.

  6. Measurement of the ??*?? and ??*??' transition form factors

    SciTech Connect (OSTI)

    del Amo Sanchez, P.; Lees, J. P.; Poireau, V.; Prencipe, E.; Tisserand, V.; Garra Tico, J.; Grauges, E.; Martinelli, M.; Milanes, D. A.; Palano, A.; Pappagallo, M.; Eigen, G.; Stugu, B.; Sun, L.; Brown, D. N.; Kerth, L. T.; Kolomensky, Yu.?G.; Lynch, G.; Osipenkov, I. L.; Koch, H.; Schroeder, T.; Asgeirsson, D. J.; Hearty, C.; Mattison, T. S.; McKenna, J. A.; Khan, A.; Blinov, V. E.; Botov, A. A.; Buzykaev, A. R.; Druzhinin, V. P.; Golubev, V. B.; Kravchenko, E. A.; Onuchin, A. P.; Serednyakov, S. I.; Skovpen, Yu.?I.; Solodov, E. P.; Todyshev, K.?Yu.; Yushkov, A. N.; Bondioli, M.; Curry, S.; Kirkby, D.; Lankford, A. J.; Mandelkern, M.; Martin, E. C.; Stoker, D. P.; Atmacan, H.; Gary, J. W.; Liu, F.; Long, O.; Vitug, G. M.; Campagnari, C.; Hong, T. M.; Kovalskyi, D.; Richman, J. D.; West, C. A.; Eisner, A. M.; Heusch, C. A.; Kroseberg, J.; Lockman, W. S.; Martinez, A. J.; Schalk, T.; Schumm, B. A.; Seiden, A.; Winstrom, L. O.; Cheng, C. H.; Doll, D. A.; Echenard, B.; Hitlin, D. G.; Ongmongkolkul, P.; Porter, F. C.; Rakitin, A. Y.; Andreassen, R.; Dubrovin, M. S.; Meadows, B. T.; Sokoloff, M. D.; Bloom, P. C.; Ford, W. T.; Gaz, A.; Nagel, M.; Nauenberg, U.; Smith, J. G.; Wagner, S. R.; Ayad, R.; Toki, W. H.; Jasper, H.; Petzold, A.; Spaan, B.; Kobel, M. J.; Schubert, K. R.; Schwierz, R.; Bernard, D.; Verderi, M.; Clark, P. J.; Playfer, S.; Watson, J. E.; Andreotti, M.; Bettoni, D.; Bozzi, C.; Calabrese, R.; Cecchi, A.; Cibinetto, G.; Fioravanti, E.; Franchini, P.; Garzia, I.; Luppi, E.; Munerato, M.; Negrini, M.; Petrella, A.; Piemontese, L.; Baldini-Ferroli, R.; Calcaterra, A.; de Sangro, R.; Finocchiaro, G.; Nicolaci, M.; Pacetti, S.; Patteri, P.; Peruzzi, I. M.; Piccolo, M.; Rama, M.; Zallo, A.; Contri, R.; Guido, E.; Lo Vetere, M.; Monge, M. R.; Passaggio, S.; Patrignani, C.; Robutti, E.; Bhuyan, B.; Prasad, V.; Lee, C. L.; Morii, M.; Edwards, A. J.; Adametz, A.; Marks, J.; Uwer, U.; Bernlochner, F. U.; Ebert, M.; Lacker, H. M.; Lueck, T.; Volk, A.; Dauncey, P. D.; Tibbetts, M.; Behera, P. K.; Mallik, U.; Chen, C.; Cochran, J.; Crawley, H. B.; Meyer, W. T.; Prell, S.; Rosenberg, E. I.; Rubin, A. E.; Gritsan, A. V.; Guo, Z. J.; Arnaud, N.; Davier, M.; Derkach, D.; Firmino da Costa, J.; Grosdidier, G.; Le Diberder, F.; Lutz, A. M.; Malaescu, B.; Perez, A.; Roudeau, P.; Schune, M. H.; Serrano, J.; Sordini, V.; Stocchi, A.; Wang, L.; Wormser, G.; Lange, D. J.; Wright, D. M.; Bingham, I.; Chavez, C. A.; Coleman, J. P.; Fry, J. R.; Gabathuler, E.; Hutchcroft, D. E.; Payne, D. J.; Touramanis, C.; Bevan, A. J.; Di Lodovico, F.; Sacco, R.; Sigamani, M.; Cowan, G.; Paramesvaran, S.; Wren, A. C.; Brown, D. N.; Davis, C. L.; Denig, A. G.; Fritsch, M.; Gradl, W.; Hafner, A.; Alwyn, K. E.; Bailey, D.; Barlow, R. J.; Jackson, G.; Lafferty, G. D.; Anderson, J.; Cenci, R.; Jawahery, A.; Roberts, D. A.; Simi, G.; Tuggle, J. M.; Dallapiccola, C.; Salvati, E.; Cowan, R.; Dujmic, D.; Sciolla, G.; Zhao, M.; Lindemann, D.; Patel, P. M.; Robertson, S. H.; Schram, M.; Biassoni, P.; Lazzaro, A.; Lombardo, V.; Palombo, F.; Stracka, S.; Cremaldi, L.; Godang, R.; Kroeger, R.; Sonnek, P.; Summers, D. J.; Nguyen, X.; Simard, M.; Taras, P.; De Nardo, G.; Monorchio, D.; Onorato, G.; Sciacca, C.; Raven, G.; Snoek, H. L.; Jessop, C. P.; Knoepfel, K. J.; LoSecco, J. M.; Wang, W. F.; Corwin, L. A.; Honscheid, K.; Kass, R.; Blount, N. L.; Brau, J.; Frey, R.; Igonkina, O.; Kolb, J. A.; Rahmat, R.; Sinev, N. B.; Strom, D.; Strube, J.; Torrence, E.; Castelli, G.; Feltresi, E.; Gagliardi, N.; Margoni, M.; Morandin, M.; Posocco, M.; Rotondo, M.; Simonetto, F.; Stroili, R.; Ben-Haim, E.; Bomben, M.; Bonneaud, G. R.; Briand, H.; Calderini, G.; Chauveau, J.; Hamon, O.; Leruste, Ph.; Marchiori, G.; Ocariz, J.; Prendki, J.; Sitt, S.; Biasini, M.; Manoni, E.; Rossi, A.; Angelini, C.; Batignani, G.; Bettarini, S.; Carpinelli, M.; Casarosa, G.; Cervelli, A.; Forti, F.; Giorgi, M. A.; Lusiani, A.; Neri, N.; Paoloni, E.; Rizzo, G.; Walsh, J. J.; Lopes Pegna, D.; Lu, C.; Olsen, J.; Smith, A. J. S.; Telnov, A. V.; Anulli, F.; Baracchini, E.; Cavoto, G.; Faccini, R.; Ferrarotto, F.; Ferroni, F.; Gaspero, M.; Li Gioi, L.; Mazzoni, M. A.; Piredda, G.; Renga, F.; Buenger, C.; Hartmann, T.; Leddig, T.; Schröder, H.; Waldi, R.; Adye, T.; Olaiya, E. O.; Wilson, F. F.; Emery, S.; Hamel de Monchenault, G.; Vasseur, G.; Yèche, Ch.; Allen, M. T.; Aston, D.; Bard, D. J.; Bartoldus, R.; Benitez, J. F.; Cartaro, C.; Convery, M. R.; Dorfan, J.; Dubois-Felsmann, G. P.; Dunwoodie, W.; Field, R. C.; Franco Sevilla, M.; Fulsom, B. G.; Gabareen, A. M.; Graham, M. T.; Grenier, P.; Hast, C.; Innes, W. R.; Kelsey, M. H.; Kim, H.; Kim, P.; Kocian, M. L.; Leith, D. W. G. S.; Lewis, P.; Li, S.; Lindquist, B.; Luitz, S.; Luth, V.; Lynch, H. L.

    2011-09-06

    We study the reactions e?e??e?e??(') in the single-tag mode and measure the ??*??(') transition form factors in the momentum-transfer range from 4 to 40 GeV². The analysis is based on 469 fb?¹ of integrated luminosity collected at PEP-II with the BABAR detector at e?e? center-of-mass energies near 10.6 GeV.

  7. Weighing the Costs and Benefits of Renewables Portfolio Standards: A Comparative Analysis of State-Level Policy Impact Projections

    E-Print Network [OSTI]

    Chen, Cliff; Wiser, Ryan; Bolinger, Mark

    2007-01-01

    factors: wind power capital costs and natural gas prices.key assumptions – wind capital cost and the duration of PTC47 7.3.2 Wind Capital Cost

  8. Key issues of ultraviolet radiation of OH at high altitudes

    SciTech Connect (OSTI)

    Zhang, Yuhuai; Wan, Tian; Jiang, Jianzheng; Fan, Jing

    2014-12-09

    Ultraviolet (UV) emissions radiated by hydroxyl (OH) is one of the fundamental elements in the prediction of radiation signature of high-altitude and high-speed vehicle. In this work, the OH A{sup 2}?{sup +}?X{sup 2}? ultraviolet emission band behind the bow shock is computed under the experimental condition of the second bow-shock ultraviolet flight (BSUV-2). Four related key issues are discussed, namely, the source of hydrogen element in the high-altitude atmosphere, the formation mechanism of OH species, efficient computational algorithm of trace species in rarefied flows, and accurate calculation of OH emission spectra. Firstly, by analyzing the typical atmospheric model, the vertical distributions of the number densities of different species containing hydrogen element are given. According to the different dominating species containing hydrogen element, the atmosphere is divided into three zones, and the formation mechanism of OH species is analyzed in the different zones. The direct simulation Monte Carlo (DSMC) method and the Navier-Stokes equations are employed to compute the number densities of the different OH electronically and vibrationally excited states. Different to the previous work, the trace species separation (TSS) algorithm is applied twice in order to accurately calculate the densities of OH species and its excited states. Using a non-equilibrium radiation model, the OH ultraviolet emission spectra and intensity at different altitudes are computed, and good agreement is obtained with the flight measured data.

  9. Key Geomechanics Issues at the Waste Isolation Pilot Plant Geomechanics

    SciTech Connect (OSTI)

    HANSEN,FRANCIS D.

    1999-09-01

    Mechanical and hydrological properties of rock salt provide excellent bases for geological isolation of hazardous materials. Regulatory compliance determinations for the Waste Isolation Pilot Plant (WIPP) stand as testament to the widely held conclusion that salt provides excellent isolation properties. The WIPP saga began in the 1950s when the U.S. National Academy of Sciences (NAS) recommended a salt vault as a promising solution to the national problem of nuclear waste disposal. For over 20 years, the Scientific basis for the NAS recommendation has been fortified by Sandia National Laboratories through a series of large scale field tests and laboratory investigations of salt properties. These scientific investigations helped develop a comprehensive understanding of salt's 4 reformational behavior over an applicable range of stresses and temperatures. Sophisticated constitutive modeling, validated through underground testing, provides the computational ability to model long-term behavior of repository configurations. In concert with advancement of the mechanical models, fluid flow measurements showed not only that the evaporite lithology was essentially impermeable but that the WIPP setting was hydrologically inactive. Favorable mechanical properties ensure isolation of materials placed in a salt geological setting. Key areas of the geomechanics investigations leading to the certification of WIPP are in situ experiments, laboratory tests, and shaft seal design.

  10. Do myoepithelial cells hold the key for breast tumorprogression?

    SciTech Connect (OSTI)

    Polyak, Kornelia; Hu, Min

    2005-11-18

    Mammary myoepithelial cells have been the foster child of breast cancer biology and have been largely ignored since they were considered to be less important for tumorigenesis than luminal epithelial cells from which most of breast carcinomas are thought to arise. In recent years as our knowledge in stem cell biology and the cellular microenvironment has been increasing myoepithelial cells are slowly starting to gain more attention. Emerging data raise the hypothesis if myoepithelial cells play a key role in breast tumor progression by regulating the in situ to invasive carcinoma transition and if myoepithelial cells are part of the mammary stem cell niche. Paracrine interactions between myoepithelial and luminal epithelial cells are known to be important for cell cycle arrest, establishing epithelial cell polarity, and inhibiting migration and invasion. Based on these functions normal mammary myoepithelial cells have been called ''natural tumor suppressors''. However, during tumor progression myoepithelial cells seem to loose these properties and eventually they themselves diminish as tumors become invasive. Better understanding of myoepithelial cell function and their role in tumor progression may lead to their exploitation for cancer therapeutic and preventative measures.

  11. Finite Element Analysis in Vertebrate Biomechanics

    E-Print Network [OSTI]

    Finite Element Analysis in Vertebrate Biomechanics CALLUM F. ROSS* Department of Organismal Biology presents a series of papers that apply the method of finite element analysis (FEA) to questions ontogenetic or phylogenetic transformations. © 2005 Wiley-Liss, Inc. Key words: finite-element analysis

  12. A Thesis for the Degree of Master An Efficient Tree-based Group Key

    E-Print Network [OSTI]

    Kim, Kwangjo

    A Thesis for the Degree of Master An Efficient Tree-based Group Key Agreement using Bilinear Map-based Group Key Agreement using Bilinear Map #12;An Efficient Tree-based Group Key Agreement using Bilinear in partial fulfillment of the require- ments for the degree of Master of Science in the School of Engineering

  13. A Thesis for the Degree of Master A New Group Key Agreement

    E-Print Network [OSTI]

    Kim, Kwangjo

    A Thesis for the Degree of Master A New Group Key Agreement Scheme based on Ternary Tree Sang-won Lee School of Engineering Information and Communications University 2003 #12;A New Group Key Agreement Scheme based on Ternary Tree #12;A New Group Key Agreement Scheme based on Ternary Tree Advisor

  14. Master's Thesis A Study on Location-Based Authenticated Key Agreement

    E-Print Network [OSTI]

    Kim, Kwangjo

    Master's Thesis A Study on Location-Based Authenticated Key Agreement Scheme in Wireless Sensor Institute of Science and Technology 2010 #12;A Study on Location-Based Authenticated Key Agreement Scheme in Wireless Sensor and Actor Networks #12;A Study on Location-Based Authenticated Key Agreement Scheme

  15. Scalable Storage Scheme from Forward Key Rotation Chunbo Ma1,2

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Scalable Storage Scheme from Forward Key Rotation Chunbo Ma1,2 , Jun Ao3 , and Jianhua Li1 1 School@263.net Abstract. Kallahalla et al. presented a RSA-based Forward Key Rotation mechanism in secure storage present a Forward Key Rotation storage scheme based on discrete logarithm and discuss its security

  16. State Key Laboratory of Disaster Reduction in Civil Engineering, Tongji University

    E-Print Network [OSTI]

    State Key Laboratory of Disaster Reduction in Civil Engineering, Tongji University Experimental for energy dissipation mechanism. State Key Laboratory of Disaster Reduction in Civil Engineering #12;· Scope on Horizontal connection. State Key Laboratory of Disaster Reduction in Civil Engineering, Tongji University

  17. Scalable Compilers for Group Key Establishment : Two/Three Party to Group

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Scalable Compilers for Group Key Establishment : Two/Three Party to Group S. Sree Vivek1, , S presents the first scalable, efficient and generic compilers to construct group key exchange (GKE) protocols from two/three party key exchange (2-KE/3-KE) protocols. We propose three different compilers

  18. Scalable Compilers for Group Key Establishment : Two/Three Party to Group

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Scalable Compilers for Group Key Establishment : Two/Three Party to Group S. Sree Vivek 1,# , S presents the first scalable, e#cient and generic compilers to construct group key exchange (GKE) protocols from two/three party key exchange (2­KE/3­KE) protocols. We propose three di#erent compilers where

  19. The GH Public-key Cryptosystem Guang Gong, Lein Harn , and Huapeng Wu

    E-Print Network [OSTI]

    Gong, Guang

    The GH Public-key Cryptosystem Guang Gong, Lein Harn #3; , and Huapeng Wu #3;#3; Department-order characteristic sequences which was proposed by Gong and Harn in 1999. Key words. Public-key cryptosystem, digital signature, third-order linear feedback shift register sequences over #12;nite #12;elds. 1 Introduction Gong

  20. Table of Contents A Multivariate Signature Scheme with an almost cyclic public key . . . . . . . . . . . . . . . . . . . . . 2

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Table of Contents A Multivariate Signature Scheme with an almost cyclic public key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 #12;A Multivariate Signature Scheme with an almost cyclic public key Albrecht Petzoldt1,buchmann}@cdc.informatik.tu-darmstadt.de Abstract. Multivariate public key cryptography is one of the main approaches to guarantee the security

  1. TOT, a Fast Multivariate Public Key Cryptosystem with Basic Secure Trapdoor

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    TOT, a Fast Multivariate Public Key Cryptosystem with Basic Secure Trapdoor Wuqiang Shen-way trapdoor function, and then propose a new multivariate public key cryptosystem called TOT, which can though C was broken, its high speed has been affirmed). Keywords: TOT; multivariate public key

  2. Table of Contents A Multivariate Signature Scheme with an almost cyclic public key . . . . . . . . . . . . . . . . . . . . . 2

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Table of Contents A Multivariate Signature Scheme with an almost cyclic public key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 #12; A Multivariate Signature Scheme with an almost cyclic public key Albrecht Petzoldt 1,buchmann}@cdc.informatik.tu­darmstadt.de Abstract. Multivariate public key cryptography is one of the main approaches to guarantee the security

  3. A Key Technology Evaluation Case Study: Applying a New Middleware Architecture on the

    E-Print Network [OSTI]

    Zdun, Uwe

    A Key Technology Evaluation Case Study: Applying a New Middleware Architecture on the Enterprise in (all) the new key technology areas, it was hard for the management to estimate which new technologies, fgoedickejuzdung@informatik.uni-essen.de Abstract Decisions for key technologies, like middleware, for large scale

  4. A Key Establishment IP-Core for Ubiquitous Computing Markus Volkmer and Sebastian Wallner

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    A Key Establishment IP-Core for Ubiquitous Computing Markus Volkmer and Sebastian Wallner Hamburg in the ubiquitous and pervasive comput- ing setting is secure key exchange. The restrictions moti- vate-core in ¢¡¤£¦¥¨§ -CMOS technology are evaluated. 1. Introduction In ubiquitous and pervasive computing scenarios, key

  5. Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships Mohammad, ymu}@uow.edu.au Abstract. In this paper, we revisit security notions for dedicated-key hash functions notions for dedicated-key hash functions. The provision of this set of enhanced properties has been

  6. Financial Management: The Key to Farm-Firm Business Management 

    E-Print Network [OSTI]

    Pena, Jose G.; Klinefelter, Danny A.

    2008-10-17

    want to succeed need to de- velop a farm/ranch business plan that outlines, in detail, how they plan to generate a profit and manage business risks. They should start by outlining specific business/personal goals and objectives and preparing... should be kept from the time the plan is implemented. Financial statements and cash flow projections with ?what if? analysis should be prepared and adjusted as often as necessary to analyze risks and keep the plan on track. Successful business...

  7. Key establishment à la Merkle in a quantum world

    E-Print Network [OSTI]

    Gilles Brassard; Peter Hoyer; Kassem Kalach; Marc Kaplan; Sophie Laplante; Louis Salvail

    2015-02-13

    In 1974, Ralph Merkle proposed the first unclassified scheme for secure communications over insecure channels. When legitimate communicating parties are willing to spend an amount of computational effort proportional to some parameter N, an eavesdropper cannot break into their communication without spending a time proportional to N^2, which is quadratically more than the legitimate effort. Two of us showed in 2008 that Merkle's schemes are completely insecure against a quantum adversary, but that their security can be partially restored if the legitimate parties are also allowed to use quantum computation: the eavesdropper needed to spend a time proportional to N^{3/2} to break our earlier quantum scheme. Furthermore, all previous classical schemes could be broken completely by the onslaught of a quantum eavesdropper and we conjectured that this is unavoidable. We give now two novel key establishment schemes in the spirit of Merkle's. The first one can be broken by a quantum adversary who makes an effort proportional to N^{5/3}, which is the optimal attack against this scheme. Our second scheme is purely classical, yet it cannot be broken by a quantum eavesdropper who is only willing to expend an effort proportional to that of the legitimate parties. We then introduce two families of more elaborate protocols. The first family consists in quantum protocols whose security is arbitrarily close to quadratic in the query complexity model. The second is a family of classical protocols whose security against a quantum adversary is arbitrarily close to N^{3/2} in the same model.

  8. Los Alamos Explosives Performance Key to Stockpile Stewardship

    SciTech Connect (OSTI)

    Dattelbaum, Dana

    2014-11-03

    As the U.S. Nuclear Deterrent ages, one essential factor in making sure that the weapons will continue to perform as designed is understanding the fundamental properties of the high explosives that are part of a nuclear weapons system. As nuclear weapons go through life extension programs, some changes may be advantageous, particularly through the addition of what are known as "insensitive" high explosives that are much less likely to accidentally detonate than the already very safe "conventional" high explosives that are used in most weapons. At Los Alamos National Laboratory explosives research includes a wide variety of both large- and small-scale experiments that include small contained detonations, gas and powder gun firings, larger outdoor detonations, large-scale hydrodynamic tests, and at the Nevada Nuclear Security Site, underground sub-critical experiments.

  9. Los Alamos Explosives Performance Key to Stockpile Stewardship

    ScienceCinema (OSTI)

    Dattelbaum, Dana

    2015-01-05

    As the U.S. Nuclear Deterrent ages, one essential factor in making sure that the weapons will continue to perform as designed is understanding the fundamental properties of the high explosives that are part of a nuclear weapons system. As nuclear weapons go through life extension programs, some changes may be advantageous, particularly through the addition of what are known as "insensitive" high explosives that are much less likely to accidentally detonate than the already very safe "conventional" high explosives that are used in most weapons. At Los Alamos National Laboratory explosives research includes a wide variety of both large- and small-scale experiments that include small contained detonations, gas and powder gun firings, larger outdoor detonations, large-scale hydrodynamic tests, and at the Nevada Nuclear Security Site, underground sub-critical experiments.

  10. Centralized Cryptographic Key Management and Critical Risk Assessment - CRADA Final Report For CRADA Number NFE-11-03562

    SciTech Connect (OSTI)

    Abercrombie, R. K.; Peters, Scott

    2014-05-28

    The Department of Energy Office of Electricity Delivery and Energy Reliability (DOE-OE) Cyber Security for Energy Delivery Systems (CSEDS) industry led program (DE-FOA-0000359) entitled "Innovation for Increasing Cyber Security for Energy Delivery Systems (12CSEDS)," awarded a contract to Sypris Electronics LLC to develop a Cryptographic Key Management System for the smart grid (Scalable Key Management Solutions for Critical Infrastructure Protection). Oak Ridge National Laboratory (ORNL) and Sypris Electronics, LLC as a result of that award entered into a CRADA (NFE-11-03562) between ORNL and Sypris Electronics, LLC. ORNL provided its Cyber Security Econometrics System (CSES) as a tool to be modified and used as a metric to address risks and vulnerabilities in the management of cryptographic keys within the Advanced Metering Infrastructure (AMI) domain of the electric sector. ORNL concentrated our analysis on the AMI domain of which the National Electric Sector Cyber security Organization Resource (NESCOR) Working Group 1 (WG1) has documented 29 failure scenarios. The computational infrastructure of this metric involves system stakeholders, security requirements, system components and security threats. To compute this metric, we estimated the stakes that each stakeholder associates with each security requirement, as well as stochastic matrices that represent the probability of a threat to cause a component failure and the probability of a component failure to cause a security requirement violation. We applied this model to estimate the security of the AMI, by leveraging the recently established National Institute of Standards and Technology Interagency Report (NISTIR) 7628 guidelines for smart grid security and the International Electrotechnical Commission (IEC) 63351, Part 9 to identify the life cycle for cryptographic key management, resulting in a vector that assigned to each stakeholder an estimate of their average loss in terms of dollars per day of system operation. To further address probabilities of threats, information security analysis can be performed using game theory implemented in dynamic Agent Based Game Theoretic (ABGT) simulations. Such simulations can be verified with the results from game theory analysis and further used to explore larger scale, real world scenarios involving multiple attackers, defenders, and information assets. The strategy for the game was developed by analyzing five electric sector representative failure scenarios contained in the AMI functional domain from NESCOR WG1. From these five selected scenarios, we characterized them into three specific threat categories affecting confidentiality, integrity and availability (CIA). The analysis using our ABGT simulation demonstrated how to model the AMI functional domain using a set of rationalized game theoretic rules decomposed from the failure scenarios in terms of how those scenarios might impact the AMI network with respect to CIA.

  11. A Behavioural Analysis of Online Privacy and Security

    E-Print Network [OSTI]

    Baddeley, Michelle

    for the future; these mistakes will also distort learning processes. Emotions and visceral factors will play a key role - not only a ecting people's actions but also distorting the interactions between information, learning and choices. This will have wide...

  12. Tiled QR factorization algorithms

    E-Print Network [OSTI]

    Bouwmeester, Henricus; Langou, Julien; Robert, Yves

    2011-01-01

    This work revisits existing algorithms for the QR factorization of rectangular matrices composed of p-by-q tiles, where p >= q. Within this framework, we study the critical paths and performance of algorithms such as Sameh and Kuck, Modi and Clarke, Greedy, and those found within PLASMA. Although neither Modi and Clarke nor Greedy is optimal, both are shown to be asymptotically optimal for all matrices of size p = q^2 f(q), where f is any function such that \\lim_{+\\infty} f= 0. This novel and important complexity result applies to all matrices where p and q are proportional, p = \\lambda q, with \\lambda >= 1, thereby encompassing many important situations in practice (least squares). We provide an extensive set of experiments that show the superiority of the new algorithms for tall matrices.

  13. Management decisions for cogeneration : a survey analysis

    E-Print Network [OSTI]

    Radcliffe, Robert R.

    1982-01-01

    This study explores the underlying factors in the decision by private, private non-profit, and public sector facility owners to invest in cogeneration technology. It employs alpha factor analysis techniques to develop ...

  14. System theoretic approach for determining causal factors of quality loss in complex system design

    E-Print Network [OSTI]

    Goerges, Stephanie L

    2013-01-01

    Identifying the factors that could lead to the loss of quality is difficult for large, complex systems. Traditional design methods such as Failure Modes and Effects Analysis (FMEA), Fault Tree Analysis (FTA), and Robust ...

  15. System Theoretic Approach for Determining Causal Factors of Quality Loss in Complex System Design

    E-Print Network [OSTI]

    . Traditional design methods such as Failure Modes and Effects Analysis (FMEA), Fault Tree Analysis (FTA to identify more causal factors for quality losses than FMEA or FTA, including component interactions

  16. A robust quantum receiver for phase shift keyed signals

    E-Print Network [OSTI]

    Christian R. Müller; Christoph Marquardt

    2014-12-19

    The impossibility of perfectly discriminating non orthogonal quantum states imposes far-reaching consequences both on quantum and classical communication schemes. We propose and numerically analyze an optimized quantum receiver for the discrimination of phase encoded signals. Our scheme outperforms the standard quantum limit and approaches the Helstrom bound for any signal power. The discrimination is performed via an optimized, feedback-mediated displacement prior to a photon counting detector. We provide a detailed analysis of the influence of excess noise and technical imperfections on the average error probability. The results demonstrate the receiver's robustness and show that it can outperform any classical receiver over a wide range of realistic parameters.

  17. The same key to different doors - temperature puzzles

    E-Print Network [OSTI]

    Ludwik Turko

    2014-12-27

    The notion of temperature in many body elementary particle processes is in a common use for decades. Thermal models have become simple and universal effective tools to describe particle production -- not only in high energy heavy ion collisions but also in high energy elementary particle collisions. We perform a critical analysis of the temperature concepts in such processes. Although the temperature concept is a very useful tool, nevertheless it should be used with the care, taking into account that usually it is just model dependent fitted parameter.

  18. Sandia Energy - CRF Researchers Measure Reaction Rates of Second Key

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-Throughput Analysis ofSample SULI ProgramPhysicalNaughton

  19. Sandia Energy - Direct Measurement of Key Molecule Will Increase Accuracy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-Throughput Analysis ofSample SULIColin Humphreys HomeWednesday,EngineeringDianaof

  20. Sandia Energy - Resolving a Key to How Stars Transmit Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-Throughput AnalysisSinkhole Officials Turn toRandall T. CyganCreation of

  1. Sandia Energy - Small Electric Voltage Alters Conductivity in Key

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-Throughput AnalysisSinkhole OfficialsWorkSensors & OpticalMaterials

  2. Electrical and Production Load Factors 

    E-Print Network [OSTI]

    Sen, T.; Heffington, W. M.

    2009-01-01

    factors and operating hours of small and medium-sized industrial plants are analyzed to classify shift-work patterns and develop energy conservation diagnostic tools. This paper discusses two types of electric load factors for each shift... The purpose of this paper is to analyze operating hours of small and medium-sized manufacturing plants in the United States and develop ranges of load factors for use as diagnostic tools for effective energy management. Load factor is defined...

  3. Economic Conditions and Factors Affecting New Nuclear Power Deployment

    SciTech Connect (OSTI)

    Harrison, Thomas J.

    2014-10-01

    This report documents work performed in support of the US Department of Energy Office of Nuclear Energy’s Advanced Small Modular Reactor (AdvSMR) program. The report presents information and results from economic analyses to describe current electricity market conditions and those key factors that may impact the deployment of AdvSMRs or any other new nuclear power plants. Thus, this report serves as a reference document for DOE as it moves forward with its plans to develop advanced reactors, including AdvSMRs. For the purpose of this analysis, information on electricity markets and nuclear power plant operating costs will be combined to examine the current state of the nuclear industry and the process required to successfully move forward with new nuclear power in general and AdvSMRs in particular. The current electricity market is generally unfavorable to new nuclear construction, especially in deregulated markets with heavy competition from natural gas and subsidized renewables. The successful and profitable operation of a nuclear power plant (or any power plant) requires the rate at which the electricity is sold to be sufficiently greater than the cost to operate. The wholesale rates in most US markets have settled into values that provide profits for most operating nuclear power plants but are too low to support the added cost of capital recovery for new nuclear construction. There is a strong geographic dependence on the wholesale rate, with some markets currently able to support new nuclear construction. However, there is also a strong geographic dependence on pronuclear public opinion; the areas where power prices are high tend to have unfavorable views on the construction of new nuclear power plants. The use of government-backed incentives, such as subsidies, can help provide a margin to help justify construction projects that otherwise may not seem viable. Similarly, low interest rates for the project will also add a positive margin to the economic analysis. In both cases, the profitable price point is decreased, making more markets open to profitable entry. Overall, the economic attractiveness of a nuclear power construction project is not only a function of its own costs, but a function of the market into which it is deployed. Many of the market characteristics are out of the control of the potential nuclear power plant operators. The decision-making process for the power industry in general is complicated by the short-term market volatility in both the wholesale electricity market and the commodity (natural gas) market. Decisions based on market conditions today may be rendered null and void in six months. With a multiple-year lead time, nuclear power plants are acutely vulnerable to market corrections.

  4. Lifestyle Factors in U.S. Residential Electricity Consumption

    SciTech Connect (OSTI)

    Sanquist, Thomas F.; Orr, Heather M.; Shui, Bin; Bittner, Alvah C.

    2012-03-30

    A multivariate statistical approach to lifestyle analysis of residential electricity consumption is described and illustrated. Factor analysis of selected variables from the 2005 U.S. Residential Energy Consumption Survey (RECS) identified five lifestyle factors reflecting social and behavioral choices associated with air conditioning, laundry usage, personal computer usage, climate zone of residence, and TV use. These factors were also estimated for 2001 RECS data. Multiple regression analysis using the lifestyle factors yields solutions accounting for approximately 40% of the variance in electricity consumption for both years. By adding the associated household and market characteristics of income, local electricity price and access to natural gas, variance accounted for is increased to approximately 54%. Income contributed only {approx}1% unique variance to the 2005 and 2001 models, indicating that lifestyle factors reflecting social and behavioral choices better account for consumption differences than income. This was not surprising given the 4-fold range of energy use at differing income levels. Geographic segmentation of factor scores is illustrated, and shows distinct clusters of consumption and lifestyle factors, particularly in suburban locations. The implications for tailored policy and planning interventions are discussed in relation to lifestyle issues.

  5. Key Laser Technologies for X-Ray FELs

    SciTech Connect (OSTI)

    Kaertner, Franz

    2013-08-31

    In the final project period, we demonstrated sub femtosecond timing distribution over a 1.2 km polarization-maintaining (PM) fiber-optic link using balanced optical cross-correlators (BOCs) for link stabilization. By eliminating polarization mode dispersion, link operation for 16 days maintained 0.6 fs RMS timing drift and during a 3-day interval only 0.13 fs drift, which corresponds to a stability level of 10-21. To improve the overall system efficiency and robustness, we developed fiber-coupled, hybrid-integrated BOCs using waveguides in periodically-poled KTiOPO4 (PPKTP). The measured second-harmonic conversion efficiency in the waveguides is a factor of 50 higher than that of bulk-optic crystals. Characterization of 1st-generation devices shows performance comparable to free-space BOCs, with the potential for significant improvement in future devices. For optical-to-RF conversion, we developed two balanced optical-microwave phase detectors (BOM-PD) based on the Sagnac and Mach-Zehnder interferometers. RF extraction using BOM-PDs in phase-locked loops yielded sub-10-fs residual timing jitter for locking bandwidths on the order of several hundred kHz. Finally, we characterized the timing jitter of ultralow-noise Ti:Sapphire oscillators, demonstrating an unprecedented 13 as of jitter integrated over the entire Nyquist band. Our measurements agreed well with theory, confirming our models for quantum-limited laser noise. Measurements of commercially available solid-state lasers at 1550 nm showed that there are laser sources already available with sufficiently low noise to achieve sub-femtosecond performance as master oscillators within a timing distribution system.

  6. Secure multi-party communication with quantum key distribution managed by trusted authority

    DOE Patents [OSTI]

    Nordholt, Jane Elizabeth; Hughes, Richard John; Peterson, Charles Glen

    2013-07-09

    Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD are extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.

  7. Unveiling Microbial Carbon Cycling Processes in Key U.S. Soils...

    Office of Scientific and Technical Information (OSTI)

    Technical Report: Unveiling Microbial Carbon Cycling Processes in Key U.S. Soils using "Omics" Citation Details In-Document Search Title: Unveiling Microbial Carbon Cycling...

  8. Introduction Soil compaction is the key physical feature that can prevent sustainable woodland

    E-Print Network [OSTI]

    Introduction Soil compaction is the key physical feature that can prevent sustainable woodland risk of physical instability and windthrow due to underdeveloped root systems. This Best Practice

  9. Key Benefits in Using Ethanol-Diesel Blends | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Benefits in Using Ethanol-Diesel Blends Key Benefits in Using Ethanol-Diesel Blends Poster presentation at the 2007 Diesel Engine-Efficiency & Emissions Research Conference (DEER...

  10. Thermal energy storage : a key technology for the food cold chain Denis Leducq(a), P. Schalbart(a), F. Trinquet(a), G. Alvarez(a), B. Verlinden(b),P.

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    ID: 123 Thermal energy storage : a key technology for the food cold chain Denis Leducq(a), P and intermittent renewable energy sources, energy storage, and more specifically thermal energy storage is one of thermal energy storage devices, is also an important factor of food quality and security enhancement

  11. Factor Demand Linkages, Technology Shocks and the Business Cycle

    E-Print Network [OSTI]

    Holly, Sean; Petrella, I

    . In this paper we consider the implications of factor demand linkages for the econometric analysis of the e¤ect of technology shocks on hours. A contemporaneous technology shock to all sectors in manufacturing then implies a positive aggregate response in both... output and hours. The positive aggregate response is directly related to the role of factor demand linkages in the transmission of shocks. When sectoral interactions are ignored we ?nd a negative correlation as with much of the literature. This 4 suggests...

  12. Electromagnetic deuteron form factors in point form relativistic quantum mechanics

    E-Print Network [OSTI]

    N. A. Khokhlov

    2015-03-10

    A study of electromagnetic structure of the deuteron in the framework of relativistic quantum mechanics is presented. The deuteron form factors dependencies on the transferred 4-momentum Q are calculated. We compare results obtained with different realistic deuteron wave functions stemming from Nijmegen-I, Nijmegen-II, JISP16, CD-Bonn, Paris and Moscow (with forbidden states) potentials. A nucleon form factor parametrization consistent with modern experimental analysis was used as an input data.

  13. harmonic analysis

    E-Print Network [OSTI]

    $author.value

    Faculty. Faculty listing for "harmonic analysis". Search People: ... Research Interests: complex analysis, harmonic analysis, and partial differential equations

  14. Asit Nema\\Foundation Green-Ensys 1 RISK FACTORS ASSOCIATED WITH SOLID WASTE TREATMENT

    E-Print Network [OSTI]

    Columbia University

    to closure of the facilities within a rather short period after commissioning. Key Words MSW treatment, waste to energy/wealth, entropy, risk factors, landfill. INTRODUCTION A case study of 11 municipal solid waste landfill facility. Among the composting plants three were running at varying levels of capacity utilisation

  15. TMD theory, factorization and evolution

    E-Print Network [OSTI]

    John Collins

    2013-07-10

    The concepts and methods of factorization using transverse-momentum-dependent (TMD) parton densities and/or fragmentation functions are summarized.

  16. Filling factors and Braid group

    E-Print Network [OSTI]

    Wellington Cruz

    1998-02-25

    We extract the Braid group structure of a recently derived hierarchy scheme for the filling factors proposed by us which related the Hausdorff dimension, $h$, to statistics, $\

  17. Cross-impacts analysis development and energy policy analysis applications

    SciTech Connect (OSTI)

    Roop, J.M.; Scheer, R.M.; Stacey, G.S.

    1986-12-01

    Purpose of this report is to describe the cross-impact analysis process and microcomputer software developed for the Office of Policy, Planning, and Analysis (PPA) of DOE. First introduced in 1968, cross-impact analysis is a technique that produces scenarios of future conditions and possibilities. Cross-impact analysis has several unique attributes that make it a tool worth examining, especially in the current climate when the outlook for the economy and several of the key energy markets is uncertain. Cross-impact analysis complements the econometric, engineering, systems dynamics, or trend approaches already in use at DOE. Cross-impact analysis produces self-consistent scenarios in the broadest sense and can include interaction between the economy, technology, society and the environment. Energy policy analyses that couple broad scenarios of the future with detailed forecasting can produce more powerful results than scenario analysis or forecasts can produce alone.

  18. All information-theoretically secure key establishing protocols are quantum protocols

    E-Print Network [OSTI]

    Mario Stipcevic

    2005-03-26

    A theorem is proved which states that no classical key generating protocol could ever be provably secure. Consequently, candidates for provably secure protocols must rely on some quantum effect. Theorem relies on the fact that BB84 Quantum key distribution protocol has been proven secure.

  19. A new generic protocol for authentication and key agreement in lightweight systems

    E-Print Network [OSTI]

    Markowitch, Olivier

    A new generic protocol for authentication and key agreement in lightweight systems Na¨im Qachri1 frederic.lafitte@rma.ac.be Abstract. In this paper, we propose a new generic authenticated key agreement protocol where the master secret is automatically renewed based on a sequence of hash values, thus

  20. Forward-secure Key Evolution in Wireless Sensor Networks Marek Klonowski1

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    (and tamper-resistance), limited computing power and memory space, inability to perform public challenges for communication security: no public-key cryptography can be used, only symmetric algorithms is that there is no communication overhead due to evolution of keys ­ this is important, since energy consumption for communication

  1. Band structures Optical absorption Summary Key concepts in Density Functional Theory (II)

    E-Print Network [OSTI]

    Botti, Silvana

    Band structures Optical absorption Summary Key concepts in Density Functional Theory (II) Kohn-Sham scheme, band structure and optical spectra Silvana Botti European Theoretical Spectroscopy Facility (ETSF, Belfast Key concepts in Density Functional Theory (II) Silvana Botti #12;Band structures Optical

  2. MOLECULAR PHYSICS, 2002, VOL. 100, NO. 11, 16591675 Key properties of monohalogen substituted phenols: interpretation

    E-Print Network [OSTI]

    Nguyen, Minh Tho

    MOLECULAR PHYSICS, 2002, VOL. 100, NO. 11, 1659±1675 Key properties of monohalogen substituted August 2001; accepted 31 December 2001) This paper is an attempt to bridge the key properties by Runge from coal tar [1] in 1834 and named pheÂnol by Gerhardt in 1843 [2] (see also Laurent [3

  3. FFT-Based Key Recovery for the Integral Attack Yosuke Todo

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    FFT-Based Key Recovery for the Integral Attack Yosuke Todo NTT Secure Platform Laboratories Abstract. The integral attack is one of the most powerful attack against block ciphers. In this paper, we propose two new techniques for the integral attack, the FFT technique and the key concealment technique

  4. Bit Transmission Probability Maximizing the Key Rate of the BB84 Protocol

    E-Print Network [OSTI]

    Sonny Lumbantoruan; Ryutaroh Matsumoto; Tomohiko Uyematsu

    2010-03-11

    In all papers on the BB84 protocol, the transmission probability of each bit value is usually set to be equal. In this paper, we show that by assigning different transmission probability to each transmitted qubit within a single polarization basis, we can generally improve the key generation rate of the BB84 protocol and achieve a higher key rate.

  5. Better Technologies Key to Addressing Climate Change Energy Department official explains U.S. initiatives

    E-Print Network [OSTI]

    is a multilateral effort to develop the next generation of economical and safe nuclear reactors, and the ITERBetter Technologies Key to Addressing Climate Change Energy Department official explains U.S. initiatives 17 December 2004 More energy-efficient technologies will be key to reducing greenhouse gas

  6. Generating RSA Keys on a Handheld Using an Untrusted Server Nagendra Modadugu Dan Boneh Michael Kim

    E-Print Network [OSTI]

    Boneh, Dan

    Æciently generate RSA keys on a low power handheld device with the help of an untrusted server. Most of the key power handheld device is somewhat problematic. For example, generating a 1024 bit RSA signature life time is a concern. Consider a user who is given a new cellphone application while traveling

  7. Scalable, Server-Passive, User-Anonymous Timed Release Public Key Encryption from Bilinear Pairing

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Scalable, Server-Passive, User-Anonymous Timed Release Public Key Encryption from Bilinear Pairing- able, server-passive and user-anonymous timed release public-key encryption scheme which allows precise in our scheme is completely passive -- no interaction between it and the sender or receiver is needed

  8. Secure Key Management in the Cloud Ivan Damgrd1, Thomas P. Jakobsen1,,

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Secure Key Management in the Cloud Ivan Damgård1, Thomas P. Jakobsen1,, Jesper Buus Nielsen1 of assistance from outside the cloud when doing the transition. We study the levels of security one can on their practical performance. Keywords: Information security, cloud computing, cloud cryptography, secure key man

  9. Generic Compilers for Authenticated Key Exchange Tibor Jager Florian Kohlar Sven Schage Jorg Schwenk

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Generic Compilers for Authenticated Key Exchange Tibor Jager Florian Kohlar Sven Sch¨age J efficient attacks on the na¨ive combination of these protocols. In this paper, we propose new compilers challenge(s) exchanged during authentication. Keywords: authenticated key agreement, protocol compiler, TLS

  10. Dartmouth Computer Science Technical Report TR2008-628 Key Management for Secure Power SCADA

    E-Print Network [OSTI]

    Dartmouth Computer Science Technical Report TR2008-628 Key Management for Secure Power SCADA Manya the views of the sponsors #12;1 Key Management for Secure Power SCADA By: Manya Sleeper Advisor: Sean Smith power SCADA systems that seeks to take advantage of the full security capacity of a given network

  11. Key Frame Selection Algorithms for Automatic Generation of Panoramic Images from

    E-Print Network [OSTI]

    Shahabi, Cyrus

    acquire and fuse various sensor data (e.g., geospatial metadata) together with video to create sensor, and possibly even on-demand. Our experimental results demonstrate that by using geospatial metadata qual- ity. Key words:Geo-tagged videos, crowdsourcing, key frame selection, geospa- tial metadata

  12. On the Communication Complexity of Secret Key Generation in the Multiterminal Source Model

    E-Print Network [OSTI]

    Kashyap, Navin

    On the Communication Complexity of Secret Key Generation in the Multiterminal Source Model Manuj Mukherjee Navin Kashyap Abstract--Communication complexity refers to the minimum rate of public communication required for generating a maximal- rate secret key (SK) in the multiterminal source model of Csisz

  13. Energy Efficiency of Symmetric Key Cryptographic Algorithms in Wireless Sensor Networks

    E-Print Network [OSTI]

    Heys, Howard

    Energy Efficiency of Symmetric Key Cryptographic Algorithms in Wireless Sensor Networks Xueying-- In this paper, we examine the energy efficiency of symmetric key cryptographic algorithms applied in wireless energy efficiency with a level of security suitable for wireless sensor networks. Keywords - wireless

  14. DEFINITION, PERFORMANCE GOALS AND KEY FINDINGS Photo Source: UBC Public Affairs

    E-Print Network [OSTI]

    passionate for sustainability. Performance Goals & Key Indicators for the University The following are ourDEFINITION, PERFORMANCE GOALS AND KEY FINDINGS Photo Source: UBC Public Affairs GEOGRAPHY 446 and implementing social sustainability at the University of British Columbia University of British Columbia

  15. On The IndistinguishabilityBased Security Model of Key Agreement Protocols-Simple Cases 1

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    On The Indistinguishability­Based Security Model of Key Agreement Protocols-Simple Cases 1 Zhaohui University White Hart Lane, London N17 8HR, United Kingdom {m.z.cheng of authenticated key agreement protocols in simple cases have been evolving for more than ten years. In this paper

  16. On The Indistinguishability-Based Security Model of Key Agreement Protocols-Simple Cases1

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    On The Indistinguishability-Based Security Model of Key Agreement Protocols-Simple Cases1 Zhaohui University White Hart Lane, London N17 8HR, United Kingdom {m.z.cheng of authenticated key agreement protocols in simple cases have been evolving for more than ten years. In this paper

  17. Attacks On An ISO/IEC 117702 Key Establishment Protocol Zhaohui Cheng # and Richard Comley

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Attacks On An ISO/IEC 11770­2 Key Establishment Protocol Zhaohui Cheng # and Richard Comley September 23, 2004 School of Computing Science Middlesex University White Hart Lane, London N17 8HR, UK. {m) on a key establishment protocol (mechanism 12) standardised in ISO/IEC 11770­2 are described and two

  18. Attacks On An ISO/IEC 11770-2 Key Establishment Protocol Zhaohui Cheng

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Attacks On An ISO/IEC 11770-2 Key Establishment Protocol Zhaohui Cheng and Richard Comley September 23, 2004 School of Computing Science Middlesex University White Hart Lane, London N17 8HR, UK. {m) on a key establishment protocol (mechanism 12) standardised in ISO/IEC 11770-2 are described and two

  19. Evaluation of the effects of a highway improvement project on Key deer 

    E-Print Network [OSTI]

    Braden, Anthony Wayne

    2006-10-30

    Deer-vehicle collisions (DVCs) along a 5.6-km segment of United States Highway 1 (US 1) on Big Pine Key (BPK), Florida responsible for approximately 26% of endangered Florida Key deer (Odocoileus virginianus clavium) annual mortalities. The Florida...

  20. Ntru-like Public Key Cryptosystems beyond Dedekind Domain Up to Alternative Algebra

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Ntr¯u-like Public Key Cryptosystems beyond Dedekind Domain Up to Alternative Algebra Ehsan Malekian) as well as non-associative Octonions (a power-associative and alternative algebra of dimension eight over: Public Key Cryptography, Ntr¯u, Alternative algebra, lattice based cryptogra- phy, non