National Library of Energy BETA

Sample records for d1 key results

  1. Key Research Results Achievement

    E-Print Network [OSTI]

    ) evaluated several common figures of merit used to compare the electrical and optical performance of TCsKey Research Results Achievement NREL research significantly contributed to inadequate existing not yet at performance levels of TCOs, demonstrate a much better combination of transmission

  2. Key Research Results Achievement

    E-Print Network [OSTI]

    % energy savings in new buildings and major renovations. Researchers at the National Renewable Energy%energysavingsovercode.NREL developedthesimulationtoolsandledthe committeethatproducedtheguides. Key Result TheAdvancedEnergy to use signifi- cantly less energy--reducing operating costs and greenhouse gas emissions. This new K-12

  3. Wind Vision: Analysis Highlights and Key Results

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Highlights and Key Results Eric Lantz (NREL) Ryan Wiser (LBNL) July 15, 2015 2 | Wind and Water Power Technologies Office eere.energy.gov Presentation Overview Wind...

  4. Thailand-Key Results and Policy Recommendations for Future Bioenergy...

    Open Energy Info (EERE)

    Thailand-Key Results and Policy Recommendations for Future Bioenergy Development Jump to: navigation, search Name Thailand-Key Results and Policy Recommendations for Future...

  5. The United States Industrial Electric Motor Systems Market Opportunities Assessment: Key Results 

    E-Print Network [OSTI]

    Rosenberg, M.

    1999-01-01

    presents key findings from the Market Assessment in regard to patterns of motor energy use, saturation of energy efficiency measures such as efficient motors and adjustable speed drives, and motor system purchase and maintenance practices....

  6. Performance Metrics and Empirical Results of a PUF Cryptographic Key Generation ASIC

    E-Print Network [OSTI]

    Yu, Meng-Day (Mandel)

    We describe a PUF design with integrated error correction that is robust to various layout implementations and achieves excellent and consistent results in each of the following four areas: Randomness, Uniqueness, Bias and ...

  7. Transmission resonances, quasi-normal modes and quasi-normal frequencies: Key analytic results

    E-Print Network [OSTI]

    Boonserm, Petarpa

    2010-01-01

    Exact solutions for transmission amplitudes and transmission probabilities, the existence of transmission resonances, and the closely related study of exact quasi-normal modes [QNMs] and quasi-normal frequencies [QNFs], has had a long and convoluted history - replete with many rediscoveries of previously known results. In this article we shall collect and survey a number of analytic results, and develop several new results, in a form amenable to comparison with the extant literature. In particular we shall discuss the delta-function potential, double-delta-function potential, and asymmetric double-delta-function potential; the step barrier, symmetric rectangular potential barrier, and asymmetric rectangular potential barrier; and then discuss the Eckart potential and its simplifications - the tanh potential and sech^2 potential. The history of the Eckart potential is particularly complicated: Apart from the special case of the Morse potential, other special cases and equivalent reformulations of Eckart's resu...

  8. Key results of battery performance and life tests at Argonne National Laboratory

    SciTech Connect (OSTI)

    DeLuca, W.H.; Gillie, K.R.; Kulaga, J.E.; Smaga, J.A.; Tummillo, A.F.; Webster, C.E.

    1991-01-01

    Advanced battery technology evaluations are performed under simulated electric vehicle operating conditions at Argonne National Laboratory's Diagnostic Laboratory (ADL). The ADL provide a common basis for both performance characterization and life evaluation with unbiased application of tests and analyses. This paper summarizes the performance characterizations and life evaluations conducted in 1991 on twelve single cells and eight 3- to 360-cell modules that encompass six battery technologies (Na/S, Li/MS, Ni/MH, Zn/Br, Ni/Fe, and Pb-Acid). These evaluations were performed for the Department of Energy, Office of Transportation Technologies, Electric and Hybrid Propulsion Division. The results measure progress in battery R D programs, compare battery technologies, and provide basic data for modeling and continuing R D to battery users, developers, and program managers.

  9. Key results of battery performance and life tests at Argonne National Laboratory

    SciTech Connect (OSTI)

    DeLuca, W.H.; Gillie, K.R.; Kulaga, J.E.; Smaga, J.A.; Tummillo, A.F.; Webster, C.E.

    1991-12-31

    Advanced battery technology evaluations are performed under simulated electric vehicle operating conditions at Argonne National Laboratory`s & Diagnostic Laboratory (ADL). The ADL provide a common basis for both performance characterization and life evaluation with unbiased application of tests and analyses. This paper summarizes the performance characterizations and life evaluations conducted in 1991 on twelve single cells and eight 3- to 360-cell modules that encompass six battery technologies (Na/S, Li/MS, Ni/MH, Zn/Br, Ni/Fe, and Pb-Acid). These evaluations were performed for the Department of Energy, Office of Transportation Technologies, Electric and Hybrid Propulsion Division. The results measure progress in battery R & D programs, compare battery technologies, and provide basic data for modeling and continuing R & D to battery users, developers, and program managers.

  10. Job Search Steps Ready Reference D-1

    E-Print Network [OSTI]

    Job Search Steps Ready Reference D-1 College of Engineering, Architecture & Technology Career Services Oklahoma State University College of Engineering, Architecture & Technology Career Services Office

  11. Quantification of key long-term risks at CO? sequestration sites: Latest results from US DOE's National Risk Assessment Partnership (NRAP) Project

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Pawar, Rajesh; Bromhal, Grant; Carroll, Susan; Chu, Shaoping; Dilmore, Robert; Gastelum, Jason; Oldenburg, Curt; Stauffer, Philip; Zhang, Yingqi; Guthrie, George

    2014-12-31

    Risk assessment for geologic CO? storage including quantification of risks is an area of active investigation. The National Risk Assessment Partnership (NRAP) is a US-Department of Energy (US-DOE) effort focused on developing a defensible, science-based methodology and platform for quantifying risk profiles at geologic CO? sequestration sites. NRAP has been developing a methodology that centers round development of an integrated assessment model (IAM) using system modeling approach to quantify risks and risk profiles. The IAM has been used to calculate risk profiles with a few key potential impacts due to potential CO? and brine leakage. The simulation results are alsomore »used to determine long-term storage security relationships and compare the long-term storage effectiveness to IPCC storage permanence goal. Additionally, we also demonstrate application of IAM for uncertainty quantification in order to determine parameters to which the uncertainty in model results is most sensitive.« less

  12. Quantification of key long-term risks at CO? sequestration sites: Latest results from US DOE's National Risk Assessment Partnership (NRAP) Project

    SciTech Connect (OSTI)

    Pawar, Rajesh; Bromhal, Grant; Carroll, Susan; Chu, Shaoping; Dilmore, Robert; Gastelum, Jason; Oldenburg, Curt; Stauffer, Philip; Zhang, Yingqi; Guthrie, George

    2014-12-31

    Risk assessment for geologic CO? storage including quantification of risks is an area of active investigation. The National Risk Assessment Partnership (NRAP) is a US-Department of Energy (US-DOE) effort focused on developing a defensible, science-based methodology and platform for quantifying risk profiles at geologic CO? sequestration sites. NRAP has been developing a methodology that centers round development of an integrated assessment model (IAM) using system modeling approach to quantify risks and risk profiles. The IAM has been used to calculate risk profiles with a few key potential impacts due to potential CO? and brine leakage. The simulation results are also used to determine long-term storage security relationships and compare the long-term storage effectiveness to IPCC storage permanence goal. Additionally, we also demonstrate application of IAM for uncertainty quantification in order to determine parameters to which the uncertainty in model results is most sensitive.

  13. KEY PERSONNEL

    National Nuclear Security Administration (NNSA)

    KEY PERSONNEL 7062015 TITLE NAME President Christopher C. Gentile Vice President, Engineering Robin Stubenhofer Vice President, Integrated Supply Chain Rick Lavelock Director,...

  14. IEEE P1363.3 D1 IBKAS January 29, 2008 Copyright 2008 IEEE. All rights reserved.

    E-Print Network [OSTI]

    Wang, Yongge

    IEEE P1363.3 D1 IBKAS January 29, 2008 1 Copyright © 2008 IEEE. All rights reserved. This is an unapproved IEEE Standards Draft, subject to change. IEEE P1363.3 Standard Specifications for Public Key............................................................................................................. 9 #12;IEEE P1363.3 D1 IBKAS January 29, 2008 2 Copyright © 2008 IEEE. All rights reserved

  15. $Z^+(4430)$ as a $D_1'{D}^* $ ($D_1{D}^* $) molecular state

    E-Print Network [OSTI]

    Xiang Liu; Yan-Rui Liu; Wei-Zhen Deng; Shi-Lin Zhu

    2008-08-01

    We reexamine whether $Z^+(4430)$ could be a $D_1'-{D}^*$ or $D_1-{D}^*$ molecular state after considering both the pion and $\\sigma$ meson exchange potentials and introducing the form factor to take into account the structure effect of the interaction vertex. Our numerical analysis with Matlab package MATSLISE indicates the contribution from the sigma meson exchange is small for the $D_1'-{D}^*$ system and significant for the $D_1-{D}^*$ system. The S-wave $D_1-\\bar{D}^*$ molecular state with only $J^{P}=0^-$ and $D_1'-{D}^*$ molecular states with $J^P=0^-,1^-,2^-$ may exist with reasonable parameters. One should investigate whether the broad width of $D_1'$ disfavors the possible formation of molecular states in the future. The bottom analog $Z_B$ of $Z^+(4430)$ has a larger binding energy, which may be searched at Tevatron and LHC. Experimental measurement of the quantum number of $Z^+(4430)$ may help uncover its underlying structure.

  16. Suberoylanilide hydroxamic acid (SAHA) inhibits EGF-induced cell transformation via reduction of cyclin D1 mRNA stability

    SciTech Connect (OSTI)

    Zhang, Jingjie [State Key Laboratory of Natural and Biomimetic Drugs, Department of Pharmacology, School of Basic Medical Sciences, Peking University, 38 Xueyuan Rd, Haidian District, Beijing 100191 (China) [State Key Laboratory of Natural and Biomimetic Drugs, Department of Pharmacology, School of Basic Medical Sciences, Peking University, 38 Xueyuan Rd, Haidian District, Beijing 100191 (China); Nelson Institute of Environmental Medicine, New York University School of Medicine, 57 Old Forge Rd, Tuxedo, NY 10987 (United States); Ouyang, Weiming; Li, Jingxia; Zhang, Dongyun; Yu, Yonghui; Wang, York [Nelson Institute of Environmental Medicine, New York University School of Medicine, 57 Old Forge Rd, Tuxedo, NY 10987 (United States)] [Nelson Institute of Environmental Medicine, New York University School of Medicine, 57 Old Forge Rd, Tuxedo, NY 10987 (United States); Li, Xuejun, E-mail: xjli@bjmu.edu.cn [State Key Laboratory of Natural and Biomimetic Drugs, Department of Pharmacology, School of Basic Medical Sciences, Peking University, 38 Xueyuan Rd, Haidian District, Beijing 100191 (China)] [State Key Laboratory of Natural and Biomimetic Drugs, Department of Pharmacology, School of Basic Medical Sciences, Peking University, 38 Xueyuan Rd, Haidian District, Beijing 100191 (China); Huang, Chuanshu, E-mail: chuanshu.huang@nyumc.org [Nelson Institute of Environmental Medicine, New York University School of Medicine, 57 Old Forge Rd, Tuxedo, NY 10987 (United States)] [Nelson Institute of Environmental Medicine, New York University School of Medicine, 57 Old Forge Rd, Tuxedo, NY 10987 (United States)

    2012-09-01

    Suberoylanilide hydroxamic acid (SAHA) inhibiting cancer cell growth has been associated with its downregulation of cyclin D1 protein expression at transcription level or translation level. Here, we have demonstrated that SAHA inhibited EGF-induced Cl41 cell transformation via the decrease of cyclin D1 mRNA stability and induction of G0/G1 growth arrest. We found that SAHA treatment resulted in the dramatic inhibition of EGF-induced cell transformation, cyclin D1 protein expression and induction of G0/G1 growth arrest. Further studies showed that SAHA downregulation of cyclin D1 was only observed with endogenous cyclin D1, but not with reconstitutionally expressed cyclin D1 in the same cells, excluding the possibility of SAHA regulating cyclin D1 at level of protein degradation. Moreover, SAHA inhibited EGF-induced cyclin d1 mRNA level, whereas it did not show any inhibitory effect on cyclin D1 promoter-driven luciferase reporter activity under the same experimental conditions, suggesting that SAHA may decrease cyclin D1 mRNA stability. This notion was supported by the results that treatment of cells with SAHA decreased the half-life of cyclin D1 mRNA from 6.95 h to 2.57 h. Consistent with downregulation of cyclin D1 mRNA stability, SAHA treatment also attenuated HuR expression, which has been well-characterized as a positive regulator of cyclin D1 mRNA stability. Thus, our study identifies a novel mechanism responsible for SAHA inhibiting cell transformation via decreasing cyclin D1 mRNA stability and induction of G0/G1 growth arrest in Cl41 cells. -- Highlights: ? SAHA inhibits cell transformation in Cl41 cells. ? SAHA suppresses Cyclin D1 protein expression. ? SAHA decreases cyclin D1 mRNA stability.

  17. Nucleic acid sequences encoding D1 and D1/D2 domains of human coxsackievirus and adenovirus receptor (CAR)

    DOE Patents [OSTI]

    Freimuth, Paul I.

    2010-04-06

    The invention provides recombinant human CAR (coxsackievirus and adenovirus receptor) polypeptides which bind adenovirus. Specifically, polypeptides corresponding to adenovirus binding domain D1 and the entire extracellular domain of human CAR protein comprising D1 and D2 are provided. In another aspect, the invention provides nucleic acid sequences encoding these domains and expression vectors for producing the domains and bacterial cells containing such vectors. The invention also includes an isolated fusion protein comprised of the D1 polypeptide fused to a polypeptide which facilitates folding of D1 when expressed in bacteria. The functional D1 domain finds application in a therapeutic method for treating a patient infected with a CAR D1-binding virus, and also in a method for identifying an antiviral compound which interferes with viral attachment. The invention also provides a method for specifically targeting a cell for infection by a virus which binds to D1.

  18. U.S. Geothermal Announces More Test Results From the Neal Hot Springs Production Well and a Key Addition to Senior Staff

    Broader source: Energy.gov [DOE]

    U.S. Geothermal Inc. ("U.S. Geothermal"), a renewable energy company focused on the production of electricity from geothermal energy, announced today results from a second, higher rate flow test of the first full size production well (NHS-1) at the Neal Hot Springs Project.

  19. Cryptographic Key Management System

    SciTech Connect (OSTI)

    No, author

    2014-02-21

    This report summarizes the outcome of U.S. Department of Energy (DOE) contract DE-OE0000543, requesting the design of a Cryptographic Key Management System (CKMS) for the secure management of cryptographic keys for the energy sector infrastructure. Prime contractor Sypris Electronics, in collaboration with Oak Ridge National Laboratories (ORNL), Electric Power Research Institute (EPRI), Valicore Technologies, and Purdue University's Center for Education and Research in Information Assurance and Security (CERIAS) and Smart Meter Integration Laboratory (SMIL), has designed, developed and evaluated the CKMS solution. We provide an overview of the project in Section 3, review the core contributions of all contractors in Section 4, and discuss bene#12;ts to the DOE in Section 5. In Section 6 we describe the technical construction of the CKMS solution, and review its key contributions in Section 6.9. Section 7 describes the evaluation and demonstration of the CKMS solution in different environments. We summarize the key project objectives in Section 8, list publications resulting from the project in Section 9, and conclude with a discussion on commercialization in Section 10 and future work in Section 11.

  20. COCONUT Deliverable D1 Algorithms for Solving Nonlinear Constrained

    E-Print Network [OSTI]

    Neumaier, Arnold

    COCONUT Deliverable D1 Algorithms for Solving Nonlinear Constrained and Optimization Problems: The State of The Art June 8, 2001 The Coconut Project Christian Bliek ILOG Peter Spellucci TU Darmstadt Lu

  1. IBMS BoneKEy | The 4th Joint Meeting of ECTS and IBMS 1 Citation: IBMS BoneKEy 13, Article number: 682 (2015) | doi:10.1038/bonekey.2015.50

    E-Print Network [OSTI]

    Cai, Long

    2015-01-01

    IBMS BoneKEy | The 4th Joint Meeting of ECTS and IBMS 1 Citation: IBMS BoneKEy 13, Article number of ECTS and IBMS Rotterdam, The Netherlands 25­28 April 2015 D1.1 Abstract not available D1.2 This House

  2. Predictive Monitoring for Improved Management of Glucose Levels Jaques Reifman, Ph.D.,1

    E-Print Network [OSTI]

    systems. Methods: We investigated the capabilities of data-driven autoregressive (AR) models to (1 5-day period. Results: With CGM data serving as the gold standard, AR model-based predictions478 Predictive Monitoring for Improved Management of Glucose Levels Jaques Reifman, Ph.D.,1

  3. Public Key Cryptography and Key Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-02-15

    The use and management of certificate-based public key cryptography for the Department of Energy (DOE) requires the establishment of a public key infrastructure (PKI). This chapter defines the policy related to roles, requirements, and responsibilities for establishing and maintaining a DOE PKI and the documentation necessary to ensure that all certificates are managed in a manner that maintains the overall trust required to support a viable PKI. Canceled by DOE N 251.112.

  4. Linda Hill, Ph.D.1 Olha Buchel, MLS.1

    E-Print Network [OSTI]

    Janée, Greg

    . The agendas for digital library and classification research in relating to KOS are also proposed. [Keywords DIGITIZING RETRIEVING SEARCHING VISUALIZING KNOWLEDGE ORGANIZATION SYSTEMS AUTHORITY FILES CLASSIFICATION ( ) [] [] Integration of Knowledge Organization Systems into Digital Library Architectures Linda Hill, Ph.D.1 Olha

  5. Key Milestones/Outlook

    Broader source: Energy.gov [DOE]

    Key Milestones/Outlook per the Department of Energy 2015 Congressional Budget Request, Environmental Management, March 2014

  6. Emission from the D1D5 CFT

    E-Print Network [OSTI]

    Steven G. Avery; Borun D. Chowdhury; Samir D. Mathur

    2009-11-06

    It is believed that the D1D5 brane system is described by an 'orbifold CFT' at a special point in moduli space. We first develop a general formulation relating amplitudes in a d-dimensional CFT to absorption/emission of quanta from flat infinity. We then construct the D1D5 vertex operators for minimally coupled scalars in supergravity, and use these to compute the CFT amplitude for emission from a state carrying a single excitation. Using spectral flow we relate this process to one where we have emission from a highly excited initial state. In each case the radiation rate is found to agree with the radiation found in the gravity dual.

  7. Emission from the D1D5 CFT: Higher Twists

    E-Print Network [OSTI]

    Steven G. Avery; Borun D. Chowdhury

    2009-07-10

    We study a certain class of nonextremal D1D5 geometries and their ergoregion emission. Using a detailed CFT computation and the formalism developed in arXiv:0906.2015 [hep-th], we compute the full spectrum and rate of emission from the geometries and find exact agreement with the gravity answer. Previously, only part of the spectrum had been reproduced using a CFT description. We close with a discussion of the context and significance of the calculation.

  8. Geometry of the N=4, d=1 nonlinear supermultiplet

    SciTech Connect (OSTI)

    Bellucci, S.; Krivonos, S.

    2006-12-15

    We construct the general action for N=4, d=1 nonlinear supermultiplet including the most general interaction terms which depend on the arbitrary function h obeying the Laplace equation on S{sup 3}. We find the bosonic field B which depends on the components of nonlinear supermultiplet and transforms as a full time derivative under N=4 supersymmetry. The most general interaction is generated just by a Fayet-Iliopoulos term built from this auxiliary component. Being transformed through a full time derivative under N=4, d=1 supersymmetry, this auxiliary component B may be dualized into a fourth scalar field giving rise to a four-dimensional N=4, d=1 sigma-model. We analyzed the geometry in the bosonic sector and find that it is not a hyper-Kaehler one. With a particular choice of the target space metric g the geometry in the bosonic sector coincides with the one which appears in heterotic (4, 0) sigma-model in d=2.

  9. Key Events Timeline

    Broader source: Energy.gov [DOE]

    This document lists key events beginning with the April 20 fire on the Deepwater Horizon through July 28th. Updated July 28, 2010.

  10. Sphere-plate Casimir interaction in (D + 1)-dimensional spacetime

    SciTech Connect (OSTI)

    Teo, L. P., E-mail: LeePeng.Teo@nottingham.edu.my [Department of Applied Mathematics, Faculty of Engineering, University of Nottingham Malaysia Campus, Jalan Broga, 43500 Semenyih, Selangor Darul Ehsan (Malaysia)

    2014-04-15

    In this paper, we derive the formula for the Casimir interaction energy between a sphere and a plate in (D + 1)-dimensional Minkowski spacetime. It is assumed that the scalar field satisfies the Dirichlet or Neumann boundary conditions on the sphere and the plate. As in the D = 3 case, the formula is of TGTG type. One of our main contributions is deriving the translation matrices which express the change of bases between plane waves and spherical waves for general D. Using orthogonality of Gegenbauer polynomials, it turns out that the final TGTG formula for the Casimir interaction energy can be simplified to one that is similar to the D = 3 case. To illustrate the application of the formula, both large separation and small separation asymptotic behaviors of the Casimir interaction energy are computed. The large separation leading term is proportional to L{sup ?D+1} if the sphere is imposed with Dirichlet boundary condition, and to L{sup ?D?1} if the sphere is imposed with Neumann boundary condition, where L is distance from the center of the sphere to the plane. For the small separation asymptotic behavior, it is shown that the leading term is equal to the one obtained using proximity force approximation. The next-to-leading order term is also computed using perturbation method. It is shown that when the space dimension D is larger than 5, the next-to-leading order has sign opposite to the leading order term. Moreover, the ratio of the next-to-leading order term to the leading order term is linear in D, indicating a larger correction at higher dimensions.

  11. Appendix D.1 Hanford Sitewide SSHAC Level 3 PSHA Project

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 OutreachProductswsicloudwsiclouddenDVA N C E D B L O O D SFederal Facility Agreement and Consent04 STANDARDC.D.1

  12. D1 Mohan Bio Oils Ltd | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LISTStar EnergyLawler,CoalConcordiaConsumerLEDS TierCristalinoCuivreCybersroD1 Mohan

  13. D1 Oils CEEP JV | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LISTStar EnergyLawler,CoalConcordiaConsumerLEDS TierCristalinoCuivreCybersroD1

  14. D1 Oils China Ltd | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LISTStar EnergyLawler,CoalConcordiaConsumerLEDS TierCristalinoCuivreCybersroD1Ltd Jump

  15. D1 Williamson Magor Bio Fuel | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LISTStar EnergyLawler,CoalConcordiaConsumerLEDS TierCristalinoCuivreCybersroD1Ltd

  16. D1 Fuel Crops Ltd | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX ECoopButtePower VenturesInformation9) Wind Farm JumpAlum|Cyclone PowerD1 Fuel Crops

  17. Optical key system

    DOE Patents [OSTI]

    Hagans, Karla G. (Livermore, CA); Clough, Robert E. (Danville, CA)

    2000-01-01

    An optical key system comprises a battery-operated optical key and an isolated lock that derives both its operating power and unlock signals from the correct optical key. A light emitting diode or laser diode is included within the optical key and is connected to transmit a bit-serial password. The key user physically enters either the code-to-transmit directly, or an index to a pseudorandom number code, in the key. Such person identification numbers can be retained permanently, or ephemeral. When a send button is pressed, the key transmits a beam of light modulated with the password information. The modulated beam of light is received by a corresponding optical lock with a photovoltaic cell that produces enough power from the beam of light to operate a password-screen digital logic. In one application, an acceptable password allows a two watt power laser diode to pump ignition and timing information over a fiberoptic cable into a sealed engine compartment. The receipt of a good password allows the fuel pump, spark, and starter systems to each operate. Therefore, bypassing the lock mechanism as is now routine with automobile thieves is pointless because the engine is so thoroughly disabled.

  18. Key Reference Agilent Technologies

    E-Print Network [OSTI]

    Anlage, Steven

    is provided "as is", and is subject to being changed, without notice, in future editions. Further with the User and should any of the contract terms conflict with these terms, the contract terms shall control enables you to define the number of points in a step sweep. When you press this key, the current value

  19. Unifying classical and quantum key distillation

    E-Print Network [OSTI]

    Matthias Christandl; Artur Ekert; Michal Horodecki; Pawel Horodecki; Jonathan Oppenheim; Renato Renner

    2007-02-28

    Assume that two distant parties, Alice and Bob, as well as an adversary, Eve, have access to (quantum) systems prepared jointly according to a tripartite state. In addition, Alice and Bob can use local operations and authenticated public classical communication. Their goal is to establish a key which is unknown to Eve. We initiate the study of this scenario as a unification of two standard scenarios: (i) key distillation (agreement) from classical correlations and (ii) key distillation from pure tripartite quantum states. Firstly, we obtain generalisations of fundamental results related to scenarios (i) and (ii), including upper bounds on the key rate. Moreover, based on an embedding of classical distributions into quantum states, we are able to find new connections between protocols and quantities in the standard scenarios (i) and (ii). Secondly, we study specific properties of key distillation protocols. In particular, we show that every protocol that makes use of pre-shared key can be transformed into an equally efficient protocol which needs no pre-shared key. This result is of practical significance as it applies to quantum key distribution (QKD) protocols, but it also implies that the key rate cannot be locked with information on Eve's side. Finally, we exhibit an arbitrarily large separation between the key rate in the standard setting where Eve is equipped with quantum memory and the key rate in a setting where Eve is only given classical memory. This shows that assumptions on the nature of Eve's memory are important in order to determine the correct security threshold in QKD.

  20. Key Management in Historical Context

    E-Print Network [OSTI]

    ;Rolling Keys Why change keys? --- cryptoperiod (intrinsic to cryptosystem) --- management issuesKey Management in Historical Context Whitfield Diffie Internet Corporation for Assigned Names to become the security or insecurity of the message. #12;Key management systems both reflect and shape

  1. Holographic description of non-supersymmetric orbifolded D1-D5-P solutions

    E-Print Network [OSTI]

    Chakrabarty, Bidisha; Virmani, Amitabh

    2015-01-01

    Non-supersymmetric black hole microstates are of great interest in the context of the black hole information paradox. We identify the holographic description of the general class of non-supersymmetric orbifolded D1-D5-P supergravity solutions found by Jejjala, Madden, Ross and Titchener. This class includes both completely smooth solutions and solutions with conical defects, and in the near-decoupling limit these solutions describe degrees of freedom in the cap region. The CFT description involves a general class of states obtained by fractional spectral flow in both left-moving and right-moving sectors, generalizing previous work which studied special cases in this class. We compute the massless scalar emission spectrum and emission rates in both gravity and CFT and find perfect agreement, thereby providing strong evidence for our proposed identification. We also investigate the physics of ergoregion emission as pair creation for these orbifolded solutions. Our results represent the largest class of non-supe...

  2. Endoglin inhibits ERK-induced c-Myc and cyclin D1 expression to impede endothelial cell proliferation

    SciTech Connect (OSTI)

    Pan, Christopher C.; Bloodworth, Jeffrey C. [Division of Pharmacology, Columbus, OH 43210 (United States)] [Division of Pharmacology, Columbus, OH 43210 (United States); Mythreye, Karthikeyan [Duke University, Department of Medicine, Durham, NC 27708 (United States)] [Duke University, Department of Medicine, Durham, NC 27708 (United States); Lee, Nam Y., E-mail: lee.5064@osu.edu [Division of Pharmacology, Columbus, OH 43210 (United States); Davis Heart and Lung Research Institute, Columbus, OH 43210 (United States)

    2012-08-03

    Highlights: Black-Right-Pointing-Pointer Endoglin inhibits ERK activation in endothelial cells. Black-Right-Pointing-Pointer Endoglin is a regulator of c-Myc and cyclin D1 expression. Black-Right-Pointing-Pointer {beta}-arrestin2 interaction with endoglin is required for ERK/c-Myc repression. Black-Right-Pointing-Pointer Endoglin impedes cellular proliferation by targeting ERK-induced mitogenic signaling. -- Abstract: Endoglin is an endothelial-specific transforming growth factor beta (TGF-{beta}) co-receptor essential for angiogenesis and vascular remodeling. Endoglin regulates a wide range of cellular processes, including cell adhesion, migration, and proliferation, through TGF-{beta} signaling to canonical Smad and Smad-independent pathways. Despite its overall pro-angiogenic role in the vasculature, the underlying mechanism of endoglin action is poorly characterized. We previously identified {beta}-arrestin2 as a binding partner that causes endoglin internalization from the plasma membrane and inhibits ERK signaling towards endothelial migration. In the present study, we examined the mechanistic role of endoglin and {beta}-arrestin2 in endothelial cell proliferation. We show that endoglin impedes cell growth through sustained inhibition of ERK-induced c-Myc and cyclin D1 expression in a TGF-{beta}-independent manner. The down-regulation of c-Myc and cyclin D1, along with growth-inhibition, are reversed when the endoglin/{beta}-arrestin2 interaction is disrupted. Given that TGF-{beta}-induced Smad signaling potently represses c-Myc in most cell types, our findings here show a novel mechanism by which endoglin augments growth-inhibition by targeting ERK and key downstream mitogenic substrates.

  3. EIS-0274: Disposal of S3G and D1G Prototype Reactor Plants

    Broader source: Energy.gov [DOE]

    This EIS analyzes the options and alternatives for the handling of the S3G and D1G Prototype reactor plants. Alternatives include their of prompt dismantlement, a deferred dismantlement alternative, and a no action alternative of keeping the defueled S3G and D1G Prototype reactor plants in protective storage indefinitely.

  4. (01)UC06/PhD/1 Audiology1 To introduce a new subject, Audiology,

    E-Print Network [OSTI]

    Hickman, Mark

    (01)UC06/PhD/1 ­ Audiology1 To introduce a new subject, Audiology, to the Doctor of Philosophy Degree Reference identifier: (01)UC06/PhD/1 ­ Audiology (UC 2006 Calendar, p 479) Section A 1. Purpose processes of hearing is vital to the profession. There is a critical shortage and continuing attrition of PhD

  5. Transportation Energy Futures Study: The Key Results and Conclusions...

    Open Energy Info (EERE)

    activities related to renewable energy and energy efficiency technologies. Austin Brown, Ph.D., is a senior analyst in the Washington, D.C. office of the National Renewable...

  6. Thailand-Key Results and Policy Recommendations for Future Bioenergy

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX ECoop Inc JumpHeter BatterySolarfinMarketMemberITerraPowerDeveloping

  7. Transportation Energy Futures Study: The Key Results and Conclusions

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX ECoop IncIowa (Utility Company) Jump to: navigation, searchTransCanadaWebinar | OpenEI

  8. Policy on Keys and Keycards Policy on Keys and Keycards

    E-Print Network [OSTI]

    Sridhar, Srinivas

    department is responsible for the total cost of lock changes and new keys/cards to secure areas compromised has been compromised, and avoid potentially significant costs due to theft, vandalism, or excessive be given access to keys/cards that permit entry to buildings and locked spaces on the University campuses

  9. The D1-173 amino acid is a structural determinant of the critical interaction between D1-Tyr161 (TyrZ) and D1-His190 in Photosystem II

    E-Print Network [OSTI]

    TyrZ Proline The main cofactors of Photosystem II (PSII) are borne by the D1 and D2 subunits are located upstream of the -helix bearing TyrZ and between the two -helices bearing TyrZ and its hydrogen substitution in PsbA2-PSII versus PsbA3-PSII is shown to be the main structural determinant of the previously

  10. Lasers in Surgery and Medicine 38:427434 (2006) Preliminary Results of Interstitial Motexafin

    E-Print Network [OSTI]

    Yodh, Arjun G.

    2006-01-01

    Lutetium-Mediated PDT for Prostate Cancer K.L. Du, MD, PhD,1 R. Mick, MS,2 T.M. Busch, PhD,1 T.C. Zhu, Ph, using motexafin lutetium-mediated PDT for recurrent prostate adenocarcinoma. Dosimetry of light fluence Wiley-Liss, Inc. Key words: photodynamic therapy; prostate cancer; adenocarcinoma; motexafin lutetium

  11. Distribution and abundance of endangered Florida Key deer on outer islands 

    E-Print Network [OSTI]

    Watts, Dominque Elijah

    2007-04-25

    -based survey data. All outer islands exhibited estimated abundances considerably below carrying capacities, with larger populations occurring closer to Big Pine Key. Results indicated that other islands and complexes such as Ramrod Key, Water Key...

  12. Holographic description of non-supersymmetric orbifolded D1-D5-P solutions

    E-Print Network [OSTI]

    Bidisha Chakrabarty; David Turton; Amitabh Virmani

    2015-08-05

    Non-supersymmetric black hole microstates are of great interest in the context of the black hole information paradox. We identify the holographic description of the general class of non-supersymmetric orbifolded D1-D5-P supergravity solutions found by Jejjala, Madden, Ross and Titchener. This class includes both completely smooth solutions and solutions with conical defects, and in the near-decoupling limit these solutions describe degrees of freedom in the cap region. The CFT description involves a general class of states obtained by fractional spectral flow in both left-moving and right-moving sectors, generalizing previous work which studied special cases in this class. We compute the massless scalar emission spectrum and emission rates in both gravity and CFT and find perfect agreement, thereby providing strong evidence for our proposed identification. We also investigate the physics of ergoregion emission as pair creation for these orbifolded solutions. Our results represent the largest class of non-supersymmetric black hole microstate geometries with identified CFT duals presently known.

  13. D-1

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Ancillary Facilities. 03312017 M-016-173 Lead Regulatory Agency: EPA Select K Basin sludge treatment and packaging technology and propose new interim sludge treatment and...

  14. D-1

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    transport of subsurface contamination to groundwater. Based on the corrective measures study (M-45-58) interim surface barriers andor other infiltration controls may be...

  15. Market-Based Incentives for Green Building Alternatives K.R. Grosskopf, Ph.D.1

    E-Print Network [OSTI]

    Hill, Jeffrey E.

    be addressed. Key Words Best management practices (BMPs), demand-side management, externalities, rebates

  16. NAME GRAD'NG KEY .

    E-Print Network [OSTI]

    MA 165 EXAM 3 Fall 2002 Page 1/4. NAME GRAD'NG KEY . Page 1 / 18. STUDENT ID Page 2 / 32. Page 3 /18. RECITATION INSTRUCTOR. Page 4 / 32.

  17. Differentiation-inducing factor-1 induces cyclin D1 degradation through the phosphorylation of Thr{sup 286} in squamous cell carcinoma

    SciTech Connect (OSTI)

    Mori, Jun [Department of Clinical Pharmacology, Graduate School of Medical Sciences, Kyushu University, Fukuoka 812-8582 (Japan); Department of Oral and Maxillofacial Surgery, Graduate School of Dental Science, Kyushu University, Fukuoka 812-8582 (Japan); Takahashi-Yanaga, Fumi [Department of Clinical Pharmacology, Graduate School of Medical Sciences, Kyushu University, Fukuoka 812-8582 (Japan)]. E-mail: yanaga@clipharm.med.kyushu-u.ac.jp; Miwa, Yoshikazu [Department of Clinical Pharmacology, Graduate School of Medical Sciences, Kyushu University, Fukuoka 812-8582 (Japan); Watanabe, Yutaka [Department of Applied Chemistry, Faculty of Engineering, Ehime University, Matsuyama 790-8577 (Japan); Hirata, Masato [Department of Molecular and Cellular Biochemistry, Graduate School of Dental Science, Kyushu University, Fukuoka 812-8582 (Japan); Morimoto, Sachio [Department of Clinical Pharmacology, Graduate School of Medical Sciences, Kyushu University, Fukuoka 812-8582 (Japan); Shirasuna, Kanemitsu [Department of Oral and Maxillofacial Surgery, Graduate School of Dental Science, Kyushu University, Fukuoka 812-8582 (Japan); Sasaguri, Toshiyuki [Department of Clinical Pharmacology, Graduate School of Medical Sciences, Kyushu University, Fukuoka 812-8582 (Japan)

    2005-11-01

    Differentiation-inducing factors (DIFs) are morphogens which induce cell differentiation in Dictyostelium. We reported that DIF-1 and DIF-3 inhibit proliferation and induce differentiation in mammalian cells. In this study, we investigated the effect of DIF-1 on oral squamous cell carcinoma cell lines NA and SAS, well differentiated and poorly differentiated cell lines, respectively. Although DIF-1 did not induce the expression of cell differentiation makers in these cell lines, it inhibited the proliferation of NA and SAS in a dose-dependent manner by restricting the cell cycle in the G{sub 0}/G{sub 1} phase. DIF-1 induced cyclin D1 degradation, but this effect was prevented by treatment with lithium chloride and SB216763, the inhibitors of glycogen synthase kinase-3{beta} (GSK-3{beta}). Depletion of endogenous GSK-3{beta} by RNA interference also attenuated the effect of DIF-1 on cyclin D1 degradation. Therefore, we investigated the effect of DIF-1 on GSK-3{beta} and found that DIF-1 dephosphorylated GSK-3{beta} on Ser{sup 9} and induced the nuclear translocation of GSK-3{beta}, suggesting that DIF-1 activated GSK-3{beta}. Then, we examined the effect of DIF-1 on cyclin D1 mutants (Thr286Ala, Thr288Ala, and Thr286/288Ala). We revealed that Thr286Ala and Thr286/288Ala mutants were highly resistant to DIF-1-induced degradation compared with wild-type cyclin D1, indicating that the phosphorylation of Thr{sup 286} was critical for cyclin D1 degradation induced by DIF-1. These results suggest that DIF-1 induces degradation of cyclin D1 through the GSK-3{beta}-mediated phosphorylation of Thr{sup 286}.

  18. Diversity & Flexibility Key to Sustainability | Department of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Diversity & Flexibility Key to Sustainability Diversity & Flexibility Key to Sustainability Plenary V: Biofuels and Sustainability: Acknowledging Challenges and Confronting...

  19. Modave Lectures on Fuzzballs and Emission from the D1-D5 System

    E-Print Network [OSTI]

    Chowdhury, Borun D

    2010-01-01

    These lecture notes present an introduction to the fuzzball proposal and emission from the D1-D5 system which is geared to an audience of graduate students and others with little background in the subject. The presentation begins with a discussion of the Penrose process and Hawking radiation. The fuzzball proposal is then introduced, and the two- and three-charge systems are reviewed. In the three-charge case details are not discussed. A detailed discussion of emission calculations for D1-D5-P black holes and for certain non-extremal fuzzballs from both the gravity and CFT perspectives is included. We explicitly demonstrate how seemingly different emission processes in gravity, namely, Hawking radiation and superradiance from D1-D5-P black holes, and ergoregion emission from certain non-extremal fuzzballs, are only different manifestations of the same phenomenon in the CFT.

  20. Key China Energy Statistics 2012

    SciTech Connect (OSTI)

    Levine, Mark; Fridley, David; Lu, Hongyou; Fino-Chen, Cecilia

    2012-05-01

    The China Energy Group at Lawrence Berkeley National Laboratory (LBNL) was established in 1988. Over the years the Group has gained recognition as an authoritative source of China energy statistics through the publication of its China Energy Databook (CED). The Group has published seven editions to date of the CED (http://china.lbl.gov/research/chinaenergy-databook). This handbook summarizes key statistics from the CED and is expressly modeled on the International Energy Agency’s “Key World Energy Statistics” series of publications. The handbook contains timely, clearly-presented data on the supply, transformation, and consumption of all major energy sources.

  1. Key China Energy Statistics 2011

    SciTech Connect (OSTI)

    Levine, Mark; Fridley, David; Lu, Hongyou; Fino-Chen, Cecilia

    2012-01-15

    The China Energy Group at Lawrence Berkeley National Laboratory (LBNL) was established in 1988. Over the years the Group has gained recognition as an authoritative source of China energy statistics through the publication of its China Energy Databook (CED). In 2008 the Group published the Seventh Edition of the CED (http://china.lbl.gov/research/chinaenergy-databook). This handbook summarizes key statistics from the CED and is expressly modeled on the International Energy Agency’s “Key World Energy Statistics” series of publications. The handbook contains timely, clearly-presented data on the supply, transformation, and consumption of all major energy sources.

  2. Key Issues | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterested Parties - WAPA Public CommentInverted253.16582104) Kenmore:Key2: ProjectKey

  3. Key Steps | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJesse Bergkamp Graduate student Subtask 4Photo4> TheKevin MorrisKeyKey Steps

  4. Culvert Design for Flood Routing considering Sediment Transport W.J. Rahmeyer PhD.1

    E-Print Network [OSTI]

    Rahmeyer, William J.

    Culvert Design for Flood Routing considering Sediment Transport W.J. Rahmeyer PhD.1 and W Education Utah State University Brigham City, UT 84302 UNITED STATES OF AMERICA Abstract: Current flood systems where flood flows deliver sediments to and through culvert inlets. Keywords: Culvert bed

  5. February 16, 2008 Connecting renewal age processes and M/D/1

    E-Print Network [OSTI]

    a connection between each of these models through the first hitting time of the renewal age process. FurtherFebruary 16, 2008 Connecting renewal age processes and M/D/1 processor sharing queues through stick breaking J.S.H. van Leeuwaarden1 A.H. L¨opker2 A.J.E.M. Janssen3 Abstract: The renewal age process

  6. Characterization and Localization of D1 Dopamine Receptors in the Sexually Dimorphic Vocal

    E-Print Network [OSTI]

    Casto, Joseph M.

    Characterization and Localization of D1 Dopamine Receptors in the Sexually Dimorphic Vocal Control circuit implicated in the learning and production of song. This circuit includes a sexually dimorphic brain nuclei has been implicated in the learning and production of bird- song(Nottebohm et al., 1976

  7. Whole-Body Biodistribution and Estimation of Radiation-Absorbed Doses of the Dopamine D1

    E-Print Network [OSTI]

    Shen, Jun

    Whole-Body Biodistribution and Estimation of Radiation-Absorbed Doses of the Dopamine D1 Receptor and Behaviour, Monash University, Clayton, Victoria, Australia The present study estimated radiation of interest were drawn on compressed planar images of source organs that could be iden- tified. Radiation dose

  8. Engineered Heart Tissue Model of Diabetic Myocardium Hannah Song, Ph.D.,1

    E-Print Network [OSTI]

    Zandstra, Peter W.

    Engineered Heart Tissue Model of Diabetic Myocardium Hannah Song, Ph.D.,1 Peter W. Zandstra, Ph of cardiomyocytes (CMs) is a leading cause of heart failure. Previously, we reported an in vitro test-bed for screening cell integration between injected test cells and host CM using the engineered heart tissue

  9. HLA RTI Performance in High Speed LAN Environments Richard Fujimoto, PhD 1

    E-Print Network [OSTI]

    HLA RTI Performance in High Speed LAN Environments Richard Fujimoto, PhD 1 College Of Computing. Specifically, the UK­RTI and a second, simplified RTI implementation were realized on a cluster of Sun. The performance of these implementations was compared with the UK­RTI and version 1.3 of the DMSO RTI using UDP

  10. HLA RTI Performance in High Speed LAN Environments Richard Fujimoto, PhD1

    E-Print Network [OSTI]

    HLA RTI Performance in High Speed LAN Environments Richard Fujimoto, PhD1 College Of Computing. Specifically, the UK-RTI and a second, simplified RTI implementation were realized on a cluster of Sun. The performance of these implementations was compared with the UK-RTI and version 1.3 of the DMSO RTI using UDP

  11. Director of Dissertation Committees (Ph.D.) 1. Mai Hamdalla, University of Connecticut (June 2014)

    E-Print Network [OSTI]

    Rajasekaran, Sanguthevar

    Director of Dissertation Committees (Ph.D.) 1. Mai Hamdalla, University of Connecticut (June 2014) 2. Tian Mi, University of Connecticut (June 2013) 3. Samir A. Mohamed Elsayed, University of Connecticut (June 2013) 4. Rania Kilany, University of Connecticut (June 2013) 5. Hieu Dinh, University

  12. Integrability of D1-brane on Group Manifold with Mixed Three Form Flux

    E-Print Network [OSTI]

    Kluson, J

    2015-01-01

    We consider D1-brane as a natural probe of the group manifold with mixed three form fluxes. We determine Lax connection for given theory. Then we switch to the canonical analysis and calculate the Poisson brackets between spatial components of Lax connections and we argue for integrability of given theory.

  13. Geometry of contours and Peierls estimates in d=1 Ising models with long range interactions

    E-Print Network [OSTI]

    to an ideal gas. Unfortunately, there is a price to pay: to have a phase transition in d = 1, we need) and a repulsive force is needed to prevent a collapse of matter. The natural choice (as proposed originally by Kac­Sinai theory seems the natural way to answer these questions, as it provides powerful tools for investigating

  14. Architecture BA (Hons) Key details

    E-Print Network [OSTI]

    Painter, Kevin

    Architecture BA (Hons) Key details Duration: 4 years (honours degree) Delivery type: Day Intake in the subject of Architecture, including a portfolio of Design, Technical and Theoretical courses covering all aspects of Architectural Theory and Practice. The course has been designed with reference to the RIBA

  15. INFORMATION: THE KEY TO SUSTAINABILITY

    E-Print Network [OSTI]

    Bateman, Ian J.

    of construction and demolition wastes and the introduction of demolition plans. Examples of information sources in the UK, Europe and the US are provided. Key words: waste management, construction, demolition, secondary sector so are concerned with re-use and recycling construction and demolition waste (C & D). However many

  16. Analysis of the rotational structure in the high-resolution infrared spectra of trans-hexatriene-2-d1 and -3-d1

    SciTech Connect (OSTI)

    Craig, Norman C.; Chen, Yihui; van Besien, Herman; Blake, Thomas A.

    2014-09-01

    The 2-d1 and 3-d1 isotopologues of trans-hexatriene have been synthesized, and their high-resolution (0.0015 cm-1) IR spectra have been recorded. For each of the isotopologues the rotational structure in four C-type bands for out-of-plane vibrational modes has been analyzed, and the ground state combination differences (GSCDs) have been pooled. Ground state rotational constants have been fitted to the GSCDs. For the 2-d species, A0, B0, and C0 values of 0.7837254(5), 0.0442806(3), and 0.0419299(2) cm-1 were fitted to 2450 GSCDs. For the 3-d species, A0, B0, and C0 values of 0.7952226(8), 0.0446149(7), and 0.0422661(4) cm-1 were fitted to 2234 GSCDs. For the eleven out-of-plane modes of the two isotopologues, predictions of anharmonic wavenumbers and harmonic intensities have been computed and compared with experiment where possible.

  17. Few-key Text Entry Revisited: Mnemonic Gestures on Four Keys

    E-Print Network [OSTI]

    Wobbrock, Jacob O.

    of Roman letters for high learnability. We compare this new 4-key method to predominant 3-key and 5-key present a new 4-key method that relies on mnemonic gestures reminiscent of Roman letters. Our method-key methods rely on two keys to move a selector left and right and a third key to select a letter. Although

  18. Identify key design elements of desired function

    E-Print Network [OSTI]

    Nawroth, Janna C.

    DESIGN Identify key design elements of desired function Identify functionally equivalent implementation of key design elements (e.g. structure, physiology, kinematics etc.) Quantify functional and standardize fabrication for repeatability . Test phase: Quantify implementation of key design elements

  19. Key Activities | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterested Parties - WAPA Public CommentInverted253.16582104) Kenmore:Key

  20. Brain Receptor Structures Key to Future Therapeutics

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Brain Receptor Structures Key to Future Therapeutics Brain Receptor Structures Key to Future Therapeutics Print Wednesday, 28 January 2015 00:00 With an aging population in...

  1. Key Opportunities and Challenges for Program Sustainability ...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Key Opportunities and Challenges for Program Sustainability Key Opportunities and Challenges for Program Sustainability Better Buildings Neighborhood Program, Peer Exchange Call:...

  2. Transport coefficients of D1-D5-P system and the membrane paradigm

    E-Print Network [OSTI]

    Yuya Sasai

    2012-01-12

    I discuss a correspondence between string theory and the black hole membrane paradigm in the context of the D1-D5-P system. By using the Kubo formula, I calculate transport coefficients of the effective string model induced by two kinds of minimal scalars. Then, I show that these transport coefficients exactly agree with the corresponding membrane transport coefficients of a five-dimensional near-extremal black hole with three charges.

  3. Key Activities | Department of Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACTThousand Cubic Feet) SoldDepartment ofKenThousandtheKevlar andKey

  4. Key Terms | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative Fuelsof EnergyApril 2014 | International NuclearKaren AtkinsonAbout the FuelKey

  5. MULTIVARIATE PUBLIC KEY CRYPTOSYSTEMS FROM DIOPHANTINE EQUATIONS

    E-Print Network [OSTI]

    Gao, Shuhong

    MULTIVARIATE PUBLIC KEY CRYPTOSYSTEMS FROM DIOPHANTINE EQUATIONS SHUHONG GAO AND RAYMOND HEINDL for multivariate public key cryptosystems, which combines ideas from both triangular and oil-vinegar schemes. We the framework. 1. Introduction 1.1. Multivariate Public Key Cryptography. Public key cryptography plays

  6. Quantum Key Distribution with Qubit Pairs

    E-Print Network [OSTI]

    Mohd Asad Siddiqui; Tabish Qureshi

    2014-07-17

    We propose a new Quantum Key Distribution method in which Alice sends pairs of qubits to Bob, each in one of four possible states. Bob uses one qubit to generate a secure key and the other to generate an auxiliary key. For each pair he randomly decides which qubit to use for which key. The auxiliary key has to be added to Bob's secure key in order to match Alice's secure key. This scheme provides an additional layer of security over the standard BB84 protocol.

  7. Transcription Factor IID Recruitment and Sp1 Activation DUAL FUNCTION OF TAF1 IN CYCLIN D1 TRANSCRIPTION*

    E-Print Network [OSTI]

    Wang, Edith

    kinases, an event necessary to drive cells through the proliferation cycle (1). Cyclin protein levels-7280 Cyclin D1 is an oncogene that regulates progression through the G1 phase of the cell cycle. A temperature to arrest in late G1 by decreasing transcription of cell cycle regula- tors, including cyclin D1. Here we

  8. The role of naturally occurring waterholes in determining the distribution of Florida Key Deer 

    E-Print Network [OSTI]

    Kim, Ji Yeon

    2009-05-15

    (Big Pine Key Inn Station, 1953) Data on Big Pine Key and the Volume of Daily Fresh Water Shortage on Big Pine Key (From the Result of 1-Year Base Line Simulation)................................................................................ 26...). I used two precipitation data sets to parameterize dv1, one consisting of daily precipitation (inches) from January 1 to December 31, 1953 from the Big Pine Key Inn weather station and one from January 1 to December 31, 2001 from the Key West...

  9. Spectroscopy of the D1-transition of cesium by dressed-state resonance fluorescence from a single (In,Ga)As/GaAs quantum dot

    E-Print Network [OSTI]

    Ulrich, S M; Oster, M; Jetter, M; Urvoy, A; Löw, R; Michler, P

    2014-01-01

    We use a laser-driven single (In,Ga)As quantum dot (QD) in the dressed state regime of resonance fluorescence ($T = 4$ K) to observe the four $D_1$-transition lines of alkali atomic cesium ($Cs$) vapor at room temperature. We tune the frequency of the dressing continuous-wave laser in the vicinity of the bare QD resonance $\\sim 335.116$ THz ($\\sim 894.592$ nm) at constant excitation power and thereby controllably tune the center and side channel frequencies of the probe light, i.e. the Mollow triplet. Resonances between individual QD Mollow triplet lines and the atomic hyperfine-split transitions are clearly identified in the $Cs$ absorption spectrum. Our results show that narrow-band (In,Ga)As QD resonance fluorescence (RF) is suitable to optically address individual transitions of the $D_1$ quadruplet without applying magnetic field or electric field tuning.

  10. Practical issues in quantum-key-distribution postprocessing

    SciTech Connect (OSTI)

    Fung, C.-H. Fred; Chau, H. F. [Department of Physics and Center of Theoretical and Computational Physics, University of Hong Kong, Pokfulam Road (Hong Kong); Ma Xiongfeng [Institute for Quantum Computing and Department of Physics and Astronomy, University of Waterloo, 200 University Ave W., Waterloo, Ontario, Canada N2L 3G1 (Canada)

    2010-01-15

    Quantum key distribution (QKD) is a secure key generation method between two distant parties by wisely exploiting properties of quantum mechanics. In QKD, experimental measurement outcomes on quantum states are transformed by the two parties to a secret key. This transformation is composed of many logical steps (as guided by security proofs), which together will ultimately determine the length of the final secret key and its security. We detail the procedure for performing such classical postprocessing taking into account practical concerns (including the finite-size effect and authentication and encryption for classical communications). This procedure is directly applicable to realistic QKD experiments and thus serves as a recipe that specifies what postprocessing operations are needed and what the security level is for certain lengths of the keys. Our result is applicable to the BB84 protocol with a single or entangled photon source.

  11. Faraday Filtering on the Cs-D$_1$-Line for Quantum Hybrid Systems

    E-Print Network [OSTI]

    Widmann, Matthias; Lee, Sang-Yun; Michler, Peter; Wrachtrup, Jörg; Gerhardt, Ilja

    2015-01-01

    Narrow-band filtering of light is widely used in optical spectroscopy. Atomic filters, which rely on the Faraday effect, allow for GHz-wide transmission spectra, which are intrinsically matched to an atomic transition. We present an experimental realization and a theoretical study of a Faraday anomalous dispersion optical filter (FADOF) based on cesium and its D$_1$-line-transition ($6^2S_{1/2}\\rightarrow6^2P_{1/2}$) around 894nm. We also present the prospects and visions for combining this filter with the single photon emission of a single quantum dot (QD), which matches with the atomic transition.

  12. Second order effect of twist deformation in the D1D5 CFT

    E-Print Network [OSTI]

    Carson, Zaq; Mathur, Samir D

    2015-01-01

    Thermalization in the D1D5 CFT should occur via interactions caused by the twist operator, which deforms the theory off its free orbifold point. Earlier studies investigating this deformation at first order did not show any definite evidence of thermalization. In this paper we study the deformation to second order, where we do expect to see the effects that should give thermalization. We compute the effect of two twist operators on an initial vacuum state, which generates a squeezed state analogous to the case for a single twist. We obtain expressions for the Bogoliubov coefficients in this 2-twist case.

  13. Hash-based Multivariate Public Key Cryptosystems

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Hash-based Multivariate Public Key Cryptosystems WANG Hou-Zhen and ZHANG Huan-Guo The Key for the traditional multivariate public key cryp- tosystems. For example, the signature scheme SFLASH was broken. at ASIACRYPTO'09. Most multivariate schemes known so far are insecure, except maybe the sigature schemes UOV

  14. Cours-VI/Clavin2015.key

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    d 1 Le d 2 d 2 w xd L U L U Ladia 1 cool D T R 2 Formulation (volumetric heat loss in a planar flame) L cool D T R U L 2 L D T U 2 L tube radius R (Joulin...

  15. CG1-D1.7-v5.0-UVA007-ReportFinalApplicationDemonstration

    E-Print Network [OSTI]

    Zudilova-Seinstra, Elena

    Development Partner(s): UvA, Univ. Linz, CSIC, ICM, II SAS, INS, U.S.C., CYFRONET, UAB Lead Partner: Uv Hoekstra UvA 6/12/2004 Verified by Robert Pajk CYFRONET 1/02/2005 Approved by Alfons Hoekstra UvA 1/02/2005 Gonzalez, Juliusz Gajewski5.0 01-02-2005 Verified by the Quality Engineer Robert Pajak #12;WP1 D1.7 CG1-D1

  16. Security bounds for efficient decoy-state quantum key distribution

    E-Print Network [OSTI]

    Marco Lucamarini; James F. Dynes; Bernd Fröhlich; Zhiliang Yuan; Andrew J. Shields

    2015-03-25

    Information-theoretical security of quantum key distribution (QKD) has been convincingly proven in recent years and remarkable experiments have shown the potential of QKD for real world applications. Due to its unique capability of combining high key rate and security in a realistic finite-size scenario, the efficient version of the BB84 QKD protocol endowed with decoy states has been subject of intensive research. Its recent experimental implementation finally demonstrated a secure key rate beyond 1 Mbps over a 50 km optical fiber. However the achieved rate holds under the restrictive assumption that the eavesdropper performs collective attacks. Here, we review the protocol and generalize its security. We exploit a map by Ahrens to rigorously upper bound the Hypergeometric distribution resulting from a general eavesdropping. Despite the extended applicability of the new protocol, its key rate is only marginally smaller than its predecessor in all cases of practical interest.

  17. Complete Genome Sequence of a thermotolerant sporogenic lactic acid bacterium, Bacillus coagulans strain 36D1

    SciTech Connect (OSTI)

    Rhee, Mun Su [University of Florida, Gainesville; Moritz, Brelan E. [University of Florida, Gainesville; Xie, Gary [Los Alamos National Laboratory (LANL); Glavina Del Rio, Tijana [U.S. Department of Energy, Joint Genome Institute; Dalin, Eileen [U.S. Department of Energy, Joint Genome Institute; Tice, Hope [U.S. Department of Energy, Joint Genome Institute; Bruce, David [Los Alamos National Laboratory (LANL); Goodwin, Lynne A. [Los Alamos National Laboratory (LANL); Chertkov, Olga [Los Alamos National Laboratory (LANL); Brettin, Thomas S [ORNL; Han, Cliff [Los Alamos National Laboratory (LANL); Detter, J. Chris [U.S. Department of Energy, Joint Genome Institute; Pitluck, Sam [U.S. Department of Energy, Joint Genome Institute; Land, Miriam L [ORNL; Patel, Milind [University of Florida, Gainesville; Ou, Mark [University of Florida, Gainesville; Harbrucker, Roberta [University of Florida, Gainesville; Ingram, Lonnie O. [University of Florida; Shanmugam, Keelnathan T. [University of Florida

    2011-01-01

    Bacillus coagulans is a ubiquitous soil bacterium that grows at 50-55 C and pH 5.0 and fer- ments various sugars that constitute plant biomass to L (+)-lactic acid. The ability of this spo- rogenic lactic acid bacterium to grow at 50-55 C and pH 5.0 makes this organism an attrac- tive microbial biocatalyst for production of optically pure lactic acid at industrial scale not only from glucose derived from cellulose but also from xylose, a major constituent of hemi- cellulose. This bacterium is also considered as a potential probiotic. Complete genome se- quence of a representative strain, B. coagulans strain 36D1, is presented and discussed.

  18. Induction of cyclin D1 by submicromolar concentrations of arsenite in human epidermal keratinocytes

    SciTech Connect (OSTI)

    Hwang, B.-J. [Department of Chemistry, City College of the City University of New York, Convent Avenue and 138th Street, New York, NY 10031 (United States); Utti, Charles [Department of Chemistry, City College of the City University of New York, Convent Avenue and 138th Street, New York, NY 10031 (United States); Steinberg, Mark [Department of Chemistry, City College of the City University of New York, Convent Avenue and 138th Street, New York, NY 10031 (United States)]. E-mail: marste@sci.ccny.cuny.edu

    2006-12-01

    Arsenic is a prevalent environmental carcinogen but arsenic is not directly mutagenic and the mechanism by which arsenite brings about oncogenic transformation is poorly understood. To gain insight into the oncogenic properties of arsenic, we studied the expression of cyclin D1 in cultured human epidermal keratinocytes treated with submicromolar concentrations of sodium arsenite. Arsenite at concentrations between 200 and 800 nM over a 3-day period brought about an increase in cell growth rate. Uptake of the vital stain, neutral red, arsenite at 200 and 400 nM concentrations brought about a parallel increase in cell viability over the same treatment period. Analysis of cell cycle parameters by flow cytometry showed that the growth stimulation was accompanied by a concomitant shift from the G1 into the S/G2 cell cycle compartment in the arsenite-treated cells. Real-time PCR analysis of cyclin D1 transcription showed that there was an induction of more than three-fold in cells exposed to 400 nM arsenite for 3 days. Quantitation of cyclin D levels in Western blots showed that arsenite treatment caused a time-dependent induction of cyclin D proteins representing an induction of about 2.0-fold after a 7 day treatment period. Electrophoretic mobility shift assays (EMSA) showed that arsenite also stimulated binding of the transcription factors, AP1 and CREBP to their respective binding motifs within 3 days. This supports a mechanism of oncogenesis based on persistent upregulation of D type cyclins leading to a concomitant loss of G1/S checkpoint control.

  19. A 2D/1D coupling neutron transport method based on the matrix MOC and NEM methods

    SciTech Connect (OSTI)

    Zhang, H.; Zheng, Y.; Wu, H.; Cao, L.

    2013-07-01

    A new 2D/1D coupling method based on the matrix MOC method (MMOC) and nodal expansion method (NEM) is proposed for solving the three-dimensional heterogeneous neutron transport problem. The MMOC method, used for radial two-dimensional calculation, constructs a response matrix between source and flux with only one sweep and then solves the linear system by using the restarted GMRES algorithm instead of the traditional trajectory sweeping process during within-group iteration for angular flux update. Long characteristics are generated by using the customization of commercial software AutoCAD. A one-dimensional diffusion calculation is carried out in the axial direction by employing the NEM method. The 2D and ID solutions are coupled through the transverse leakage items. The 3D CMFD method is used to ensure the global neutron balance and adjust the different convergence properties of the radial and axial solvers. A computational code is developed based on these theories. Two benchmarks are calculated to verify the coupling method and the code. It is observed that the corresponding numerical results agree well with references, which indicates that the new method is capable of solving the 3D heterogeneous neutron transport problem directly. (authors)

  20. F-resolved magneto-optical resonances in the D1 excitation of cesium: Experiment and theory M. Auzinsh,* R. Ferber, F. Gahbauer, A. Jarmola, and L. Kalvans

    E-Print Network [OSTI]

    Auzinsh, Marcis

    F-resolved magneto-optical resonances in the D1 excitation of cesium: Experiment and theory M experimentally and theoretically for D1 excitation of atomic cesium. This system offers the advantage cases. We believe that the transitions of the cesium D1 line offer precisely such an opportunity. We

  1. Brain Receptor Structures Key to Future Therapeutics

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Brain Receptor Structures Key to Future Therapeutics Print With an aging population in America, it is more important than ever to discover ways to treat or prevent diseases...

  2. Monroe County Extension Services Key West Office

    E-Print Network [OSTI]

    Hill, Jeffrey E.

    potable water is pumped to the Keys from the mainland through a 130-mile long transmission line irrigation and fertilizer, and are more

  3. On multivariate signatureonly public key cryptosystems

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    On multivariate signature­only public key cryptosystems Nicolas T. Courtois 1,2 courtois we argument that the problem has many natural solutions within the framework of the multivariate cryptography. First of all it seems that virtually any non­injective multivariate public key is inherently

  4. Deniable Internet Key Exchange Andrew C. Yao

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Deniable Internet Key Exchange Andrew C. Yao Frances F. Yao Yunlei Zhao§ Bin Zhu¶ Abstract In this work, we develop a family of protocols for deniable Internet Key-Exchange (IKE) with the following of privacy protection (especially for E-commerce over Internet), this work is naturally of practical interest

  5. Rsf-1 is overexpressed in non-small cell lung cancers and regulates cyclinD1 expression and ERK activity

    SciTech Connect (OSTI)

    Li, Qingchang; Dong, Qianze [Department of Pathology, First Affiliated Hospital and College of Basic Medical Sciences, China Medical University, Shenyang 110001, Liaoning (China)] [Department of Pathology, First Affiliated Hospital and College of Basic Medical Sciences, China Medical University, Shenyang 110001, Liaoning (China); Wang, Enhua, E-mail: wangenhuacmu@hotmail.com [Department of Pathology, First Affiliated Hospital and College of Basic Medical Sciences, China Medical University, Shenyang 110001, Liaoning (China)] [Department of Pathology, First Affiliated Hospital and College of Basic Medical Sciences, China Medical University, Shenyang 110001, Liaoning (China)

    2012-03-30

    Highlights: Black-Right-Pointing-Pointer Rsf-1 expression is elevated in non-small cell lung cancers. Black-Right-Pointing-Pointer Rsf-1 depletion inhibits proliferation and increased apoptosis in lung cancer cells. Black-Right-Pointing-Pointer Rsf-1 depletion decreases the level of cyclinD1 and phosphor-ERK expression. -- Abstract: Rsf-1 (HBXAP) was recently reported to be overexpressed in various cancers and associated with the malignant behavior of cancer cells. However, the expression of Rsf-1 in primary lung cancer and its biological roles in non-small cell lung cancer (NSCLC) have not been reported. The molecular mechanism of Rsf-1 in cancer aggressiveness remains ambiguous. In the present study, we analyzed the expression pattern of Rsf-1 in NSCLC tissues and found that Rsf-1 was overexpressed at both the mRNA and protein levels. There was a significant association between Rsf-1 overexpression and TNM stage (p = 0.0220) and poor differentiation (p = 0.0013). Furthermore, knockdown of Rsf-1 expression in H1299 and H460 cells with high endogenous Rsf-1 expression resulted in a decrease of colony formation ability and inhibition of cell cycle progression. Rsf-1 knockdown also induced apoptosis in these cell lines. Further analysis showed that Rsf-1 knockdown decreased cyclin D1 expression and phospho-ERK levels. In conclusion, Rsf-1 is overexpressed in NSCLC and contributes to malignant cell growth by cyclin D1 and ERK modulation, which makes Rsf-1 a candidate therapeutic target in lung cancer.

  6. Innovation Impact: Breakthrough Research Results (Brochure)

    SciTech Connect (OSTI)

    Not Available

    2013-07-01

    The Innovation Impact brochure captures key breakthrough results across NREL's primary areas of renewable energy and energy efficiency research: solar, wind, bioenergy, transportation, buildings, analysis, and manufacturing technologies.

  7. November 2012 Key Performance Indicator (KPI): Carbon Management

    E-Print Network [OSTI]

    Evans, Paul

    November 2012 Key Performance Indicator (KPI): Carbon Management NTU report our carbon footprint provided. The carbon emissions are calculated using Carbon Trust conversion factors, as used in NTU's EMS.64 2011/2012 18,130 4.20 The recorded changes in emissions are a result of carbon management projects

  8. Captured key electrical safety lockout system

    DOE Patents [OSTI]

    Darimont, Daniel E. (Aurora, IL)

    1995-01-01

    A safety lockout apparatus for an electrical circuit includes an electrical switch, a key, a lock and a blocking mechanism. The electrical switch is movable between an ON position at which the electrical circuit is energized and an OFF position at which the electrical circuit is deactivated. The lock is adapted to receive the key and is rotatable among a plurality of positions by the key. The key is only insertable and removable when the lock is at a preselected position. The lock is maintained in the preselected position when the key is removed from the lock. The blocking mechanism physically maintains the switch in its OFF position when the key is removed from the lock. The blocking mechanism preferably includes a member driven by the lock between a first position at which the electrical switch is movable between its ON and OFF positions and a second position at which the member physically maintains the electrical switch in its OFF position. Advantageously, the driven member's second position corresponds to the preselected position at which the key can be removed from and inserted into the lock.

  9. Captured key electrical safety lockout system

    SciTech Connect (OSTI)

    Darimont, D.E.

    1995-10-31

    A safety lockout apparatus for an electrical circuit includes an electrical switch, a key, a lock and a blocking mechanism. The electrical switch is movable between an ON position at which the electrical circuit is energized and an OFF position at which the electrical circuit is deactivated. The lock is adapted to receive the key and is rotatable among a plurality of positions by the key. The key is only insertable and removable when the lock is at a preselected position. The lock is maintained in the preselected position when the key is removed from the lock. The blocking mechanism physically maintains the switch in its OFF position when the key is removed from the lock. The blocking mechanism preferably includes a member driven by the lock between a first position at which the electrical switch is movable between its ON and OFF positions and a second position at which the member physically maintains the electrical switch in its OFF position. Advantageously, the driven member`s second position corresponds to the preselected position at which the key can be removed from and inserted into the lock. 7 figs.

  10. Key Renewable Energy Opportunities for Oklahoma Tribes

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterested Parties - WAPA Public CommentInverted253.16582104) Kenmore:Key2: ProjectKeyKEY

  11. Untappable key distribution system: a one-time-pad booster

    E-Print Network [OSTI]

    Geraldo A. Barbosa; Jeroen van de Graaf

    2015-07-08

    One-time-pad (OTP) encryption simply cannot be cracked, even by a quantum computer. The need of sharing in a secure way supplies of symmetric random keys turned the method almost obsolete as a standing-alone method for fast and large volume telecommunication. Basically, this secure sharing of keys and their renewal, once exhausted, had to be done through couriers, in a slow and costly process. This paper presents a solution for this problem providing a fast and unlimited renewal of secure keys: An untappable key distribution system is presented and detailed. This fast key distribution system utilizes two layers of confidentially protection: 1) Physical noise intrinsic to the optical channel that turn the coded signals into stealth signals and 2) Privacy amplification using a bit pool of refreshed entropy run after run, to eliminate any residual information. The resulting level of security is rigorously calculated and demonstrates that the level of information an eavesdropper could obtain is completely negligible. The random bit sequences, fast and securely distributed, can be used to encrypt text, data or voice.

  12. Cooperative problem solving in a social carnivore Christine M. Drea a,b,c,*, Allisa N. Carter d,1

    E-Print Network [OSTI]

    Indiana University

    Cooperative problem solving in a social carnivore Christine M. Drea a,b,c,*, Allisa N. Carter d,1 described cooperative hunting in social carnivores, but experimental evidence of cooperative problem solving of cooperative problem solving, as their abilities provide a comparative framework for testing theories about

  13. Short-pulse photoassociation in rubidium below the D1 line Christiane P. Koch* and Ronnie Kosloff

    E-Print Network [OSTI]

    Koch, Christiane

    Short-pulse photoassociation in rubidium below the D1 line Christiane P. Koch* and Ronnie Kosloff is investigated theoretically. The method employs laser pulses inducing transitions via excited states correlated be created by a single pulse while the formation of more deeply bound molecules requires a two-color pump

  14. Microscopic description of fission in neutron-rich plutonium isotopes with the Gogny-D1M energy density functional

    E-Print Network [OSTI]

    R. Rodriguez-Guzman; L. M. Robledo

    2014-05-27

    The most recent parametrization D1M of the Gogny energy density functional is used to describe fission in the isotopes $^{232-280}$ Pu. We resort to the methodology introduced in our previous studies [Phys. Rev. C \\textbf{88}, 054325 (2013) and Phys. Rev. C \\textbf {89}, 054310 (2014)] to compute the fission paths, collective masses and zero point quantum corrections within the Hartree-Fock-Bogoliubov framework. The systematics of the spontaneous fission half-lives t$_{SF}$, masses and charges of the fragments in Plutonium isotopes is analyzed and compared with available experimental data. We also pay attention to isomeric states, the deformation properties of the fragments as well as to the competition between the spontaneous fission and $\\alpha$-decay modes. The impact of pairing correlations on the predicted t$_{SF}$ values is demonstrated with the help of calculations for $^{232-280}$Pu in which the pairing strengths of the Gogny-D1M energy density functional are modified by 5 $\\%$ and 10 $\\%$, respectively. We further validate the use of the D1M parametrization through the discussion of the half-lives in $^{242-262}$Fm. Our calculations corroborate that, though the uncertainties in the absolute values of physical observables are large, the Gogny-D1M Hartree-Fock-Bogoliubov framework still reproduces the trends with mass and/or neutron numbers and therefore represents a reasonable starting point to describe fission in heavy nuclear systems from a microscopic point of view.

  15. Combined effects of fly ash and waste ferrochromium on properties of concrete Osman Gencel a,d,,1

    E-Print Network [OSTI]

    North Texas, University of

    Combined effects of fly ash and waste ferrochromium on properties of concrete Osman Gencel a,d,,1 Accepted 24 November 2011 Keywords: Concrete durability Ferrochromium Fly ash Waste in concrete a b s t r was replaced with fly ash at the ratio of 10, 20 and 30 wt.%. Coarse limestone aggregates were replaced

  16. BACK TO BASICS: YOUR KEYS TO SAFE

    E-Print Network [OSTI]

    Kirschner, Denise

    BACK TO BASICS: YOUR KEYS TO SAFE DRIVING FINE-TUNE THE FUNDAMENTALS DRIVE SAFELY WORK WEEK: FRIDAY an occasional refresher. In fact, most company fleet safety programs emphasize basic skills and defensive

  17. Civil Engineering BEng (Hons) Key details

    E-Print Network [OSTI]

    Painter, Kevin

    Civil Engineering BEng (Hons) Key details Duration: Full-time: 4 years (BEng Hons) Delivery type engineering disciplines of Structures, Geotechnics, Water Engineering and Transportation Engineering civil or structural engineers. After graduation, students are equipped to work for consultants

  18. Extracting secret keys from integrated circuits

    E-Print Network [OSTI]

    Lim, Daihyun, 1976-

    2004-01-01

    Modern cryptographic protocols are based on the premise that only authorized participants can obtain secret keys and access to information systems. However, various kinds of tampering methods have been devised to extract ...

  19. 4th Annual CHP Roadmap Breakout Group Results, September 2003

    Broader source: Energy.gov [DOE]

    Breakout Group Results for Utilities Issues Including Key Issues and Action Items During the CHP Roadmap Workshop

  20. Low Timing Jitter Detector for Gigahertz Quantum Key Distribution

    E-Print Network [OSTI]

    R. J. Collins; R. H. Hadfield; V. Fernandez; S. W. Nam; G. S. Buller

    2007-02-23

    A superconducting single-photon detector based on a niobium nitride nanowire is demonstrated in an optical-fibre-based quantum key distribution test bed operating at a clock rate of 3.3 GHz and a transmission wavelength of 850 nm. The low jitter of the detector leads to significant reduction in the estimated quantum bit error rate and a resultant improvement in the secrecy efficiency compared to previous estimates made by use of silicon single-photon avalanche detectors.

  1. Almost every set of $N\\ge d+1$ orthogonal states on $d^{\\otimes n}$ is locally indistinguishable

    E-Print Network [OSTI]

    Scott M. Cohen

    2008-01-25

    I consider the problem of deterministically distinguishing the state of a multipartite system, from a set of $N\\ge d+1$ orthogonal states, where $d$ is the dimension of each party's subsystem. It is shown that if the set of orthogonal states is chosen at random, then there is a vanishing probability that this set will be perfectly distinguishable under the restriction that the parties use only local operations on their subsystems and classical communication amongst themselves.

  2. BACK TO BASICS: YOUR KEYS TO SAFE

    E-Print Network [OSTI]

    Kirschner, Denise

    BACK TO BASICS: YOUR KEYS TO SAFE DRIVING BUCKLE UP! Seat belts should never have time off DRIVE the back seat to the front seat.4 ·The back is the best place for pets. According to AAA, similar. Never place the shoulder portion under your arm or behind your back! ·Drivers should sit with at least

  3. Mechanical Engineering BEng / BEng (Hons) Key details

    E-Print Network [OSTI]

    Painter, Kevin

    Mechanical engineers play key roles in all industrial sectors, from aerospace and oil and gas, through food for Mechanical Engineering graduates in many sectors, including power production, oil and petrochemicals, manufacturing, power plant, medical engineering and many others l Whatever your final career path, developing

  4. Fashion Marketing & Retailing BA (Hons) Key details

    E-Print Network [OSTI]

    Painter, Kevin

    Fashion Marketing & Retailing BA (Hons) Key details Duration: Full-time: 3 years (BA) / 4 years (BA Hons) Delivery type: Day Intake date: September Fees: 54000 AED per year Overview Our Fashion Marketing and Retailing programme confidently prepares students for a career within the marketing and retailing industry

  5. Key Management Challenges in Smart Grid

    SciTech Connect (OSTI)

    Sheldon, Frederick T; Duren, Mike

    2012-01-01

    Agenda Awarded in February 2011 Team of industry and research organizations Project Objectives Address difficult issues Complexity Diversity of systems Scale Longevity of solution Participate in standards efforts and working groups Develop innovative key management solutions Modeling and simulation ORNL Cyber Security Econometric Enterprise System Demonstrate effectiveness of solution Demonstrate scalability

  6. Organisational Change -Key Steps LocalCollege/

    E-Print Network [OSTI]

    Botea, Adi

    Resources Division START Version 1.0 X:\\Employment Strategies\\Workplace Change & Innovation\\Change Management Frameworks\\Change Management - Key Steps 021111.vsd FINISH NOTES: * For information on formal vs informal change refer to the managing change clause in the ANU Enterprise Agreement and the managing change policy

  7. Chemical Engineering BEng (Hons) Key details

    E-Print Network [OSTI]

    Painter, Kevin

    Chemical Engineering BEng (Hons) Key details Duration: Full-time: 3 years (BEng) / 4 years (BEng Hons) Delivery type: Day Intake date: September Fees: 58000 AED per year Overview Chemical engineering successful and thriving types of business in the world. Chemical engineers play a vital role in achieving

  8. Management strategies for endangered Florida Key deer 

    E-Print Network [OSTI]

    Peterson, Markus Nils

    2004-09-30

    species. These data were used to address my study objectives. I found the most commonly cited FSR (2.67:1, male:female) for Florida Key deer to be inaccurate. A male biased FSR of 1.45:1 was more probable. Modified drop and drive nets were appropriate...

  9. Psychology with Management BSc (Hons) Key details

    E-Print Network [OSTI]

    Painter, Kevin

    Psychology with Management BSc (Hons) Key details Duration: Full-time: 4 years Delivery type: Day% Psychology with 25% Business and Management modules. Psychology modules cover a range of core approaches to psychology as well as research design and analysis and applied specialist topics. The curriculum is based

  10. Roadmap for selected key measurements of LHCb

    E-Print Network [OSTI]

    The LHCb Collaboration; B. Adeva; M. Adinolfi; A. Affolder; Z. Ajaltouni; J. Albrecht; F. Alessio; M. Alexander; P. Alvarez Cartelle; A. A. Alves Jr; S. Amato; Y. Amhis; J. Amoraal; J. Anderson; O. Aquines Gutierrez; L. Arrabito; M. Artuso; E. Aslanides; G. Auriemma; S. Bachmann; Y. Bagaturia; D. S. Bailey; V. Balagura; W. Baldini; MdC. Barandela Pazos; R. J. Barlow; S. Barsuk; A. Bates; C. Bauer; Th. Bauer; A. Bay; I. Bediaga; K. Belous; I. Belyaev; M. Benayoun; G. Bencivenni; R. Bernet; M. -O. Bettler; A. Bizzeti; T. Blake; F. Blanc; C. Blanks; J. Blouw; S. Blusk; A. Bobrov; V. Bocci; A. Bondar; N. Bondar; W. Bonivento; S. Borghi; A. Borgia; E. Bos; T. J. V. Bowcock; C. Bozzi; J. Bressieux; S. Brisbane; M. Britsch; N. H. Brook; H. Brown; A. Büchler-Germann; J. Buytaert; J. -P. Cachemiche; S. Cadeddu; J. M. Caicedo Carvajal; O. Callot; M. Calvi; M. Calvo Gomez; A. Camboni; W. Cameron; P. Campana; A. Carbone; G. Carboni; A. Cardini; L. Carson; K. Carvalho Akiba; G. Casse; M. Cattaneo; M. Charles; Ph. Charpentier; A. Chlopik; P. Ciambrone; X. Cid Vidal; P. J. Clark; P. E. L. Clarke; M. Clemencic; H. V. Cliff; J. Closier; C. Coca; V. Coco; J. Cogan; P. Collins; F. Constantin; G. Conti; A. Contu; G. Corti; G. A. Cowan; B. D'Almagne; C. D'Ambrosio; D. G. d'Enterria; W. Da Silva; P. David; I. De Bonis; S. De Capua; M. De Cian; F. De Lorenzi; J. M. De Miranda; L. De Paula; P. De Simone; H. De Vries; D. Decamp; H. Degaudenzi; M. Deissenroth; L. Del Buono; C. Deplano; O. Deschamps; F. Dettori; J. Dickens; H. Dijkstra; M. Dima; S. Donleavy; A. C. dos Reis; A. Dovbnya; T. Du Pree; P. -Y. Duval; L. Dwyer; R. Dzhelyadin; C. Eames; S. Easo; U. Egede; V. Egorychev; F. Eisele; S. Eisenhardt; L. Eklund; D. Esperante Pereira; L. Estève; S. Eydelman; E. Fanchini; C. Färber; G. Fardell; C. Farinelli; S. Farry; V. Fave; V. Fernandez Albor; M. Ferro-Luzzi; S. Filippov; C. Fitzpatrick; F. Fontanelli; R. Forty; M. Frank; C. Frei; M. Frosini; J. L. Fungueirino Pazos; S. Furcas; A. Gallas Torreira; D. Galli; M. Gandelman; Y. Gao; J-C. Garnier; L. Garrido; C. Gaspar; N. Gauvin; M. Gersabeck; T. Gershon; Ph. Ghez; V. Gibson; Yu. Gilitsky; V. V. Gligorov; C. Göbel; D. Golubkov; A. Golutvin; A. Gomes; M. Grabalosa Gándara; R. Graciani Diaz; L. A. Granado Cardoso; E. Graugés; G. Graziani; A. Grecu; G. Guerrer; E. Gushchin; Yu. Guz; Z. Guzik; T. Gys; F. Hachon; G. Haefeli; S. C. Haines; T. Hampson; S. Hansmann-Menzemer; R. Harji; N. Harnew; P. F. Harrison; J. He; K. Hennessy; P. Henrard; J. A. Hernando Morata; A. Hicheur; E. Hicks; W. Hofmann; K. Holubyev; P. Hopchev; W. Hulsbergen; P. Hunt; T. Huse; R. S. Huston; D. Hutchcroft; V. Iakovenko; C. Iglesias Escudero; J. Imong; R. Jacobsson; M. Jahjah Hussein; E. Jans; F. Jansen; P. Jaton; B. Jean-Marie; M. John; C. R. Jones; B. Jost; F. Kapusta; T. M. Karbach; J. Keaveney; U. Kerzel; T. Ketel; A. Keune; S. Khalil; B. Khanji; Y. M. Kim; M. Knecht; J. Knopf; S. Koblitz; A. Konoplyannikov; P. Koppenburg; I. Korolko; A. Kozlinskiy; M. Krasowski; L. Kravchuk; P. Krokovny; K. Kruzelecki; M. Kucharczyk; I. Kudryashov; T. Kvaratskheliya; D. Lacarrere; A. Lai; R. W. Lambert; G. Lanfranchi; C. Langenbruch; T. Latham; R. Le Gac; R. Lefevre; A. Leflat; J. Lefrançois; O. Leroy; K. Lessnoff; L. Li; Y. Y. Li; J. Libby; M. Lieng; R. Lindner; S. Lindsey; C. Linn; B. Liu; G. Liu; J. H. Lopes; E. Lopez Asamar; J. Luisier; F. Machefert; I. Machikhiliyan; F. Maciuc; O. Maev; J. Magnin; A. Maier; R. M. D. Mamunur; G. Manca; G. Mancinelli; N. Mangiafave; U. Marconi; F. Marin; J. Marks; G. Martellotti; A. Martens; L. Martin; D. Martinez Santos; Z. Mathe; C. Matteuzzi; V. Matveev; A. Mazurov; G. McGregor; B. Mcharek; C. Mclean; R. McNulty; M. Merk; J. Merkel; M. Merkin; R. Messi; F. C. D. Metlica; J. Michalowski; S. Miglioranzi; M. -N. Minard; S. Monteil; D. Moran; J. V. Morris; R. Mountain; I. Mous; F. Muheim; R. Muresan; F. Murtas; B. Muryn; M. Musy; J. Mylroie-Smith; P. Naik; T. Nakada; R. Nandakumar; J. Nardulli; Z. Natkaniec; M. Nedos; M. Needham; N. Neufeld; L. Nicolas; S. Nies; V. Niess; N. Nikitin; A. Noor; A. Oblakowska-Mucha; V. Obraztsov; S. Oggero; O. Okhrimenko; R. Oldeman; M. Orlandea; A. Ostankov; J. Palacios; M. Palutan; J. Panman; A. Papadelis; A. Papanestis; M. Pappagallo; C. Parkes; G. Passaleva; G. D. Patel; M. Patel; S. K. Paterson; G. N. Patrick; E. Pauna; C. Pauna; C. Pavel; A. Pazos Alvarez; A. Pellegrino; G. Penso; M. Pepe Altarelli; S. Perazzini; D. L. Perego; A. Pérez-Calero Yzquierdo; E. Perez Trigo; P. Perret; G. Pessina; A. Petrella; A. Petrolini; B. Pietrzyk; D. Pinci; S. Playfer; M. Plo Casasus; G. Polok; A. Poluektov; E. Polycarpo; D. Popov; B. Popovici; S. Poss; C. Potterat; A. Powell; S. Pozzi; V. Pugatch; A. Puig Navarro; W. Qian; J. H. Rademacker; B. Rakotomiaramanana; I. Raniuk; G. Raven; S. Redford; W. Reece

    2010-11-23

    Six of the key physics measurements that will be made by the LHCb experiment, concerning CP asymmetries and rare B decays, are discussed in detail. The "road map" towards the precision measurements is presented, including the use of control channels and other techniques to understand the performance of the detector with the first data from the LHC.

  11. Business Management BA / MA (Hons) Key details

    E-Print Network [OSTI]

    Painter, Kevin

    Business Management BA / MA (Hons) Key details Duration: Full-time: 3 years (BA) / 4 years (MSc Management degree programme follows a number of guiding principles that mirror the values of managers of leading organisations and reflect current business management thinking. In the first two years of all

  12. Vermont's Changing Forests Key Findings on the

    E-Print Network [OSTI]

    Keeton, William S.

    1 Vermont's Changing Forests Key Findings on the Health of Forested Ecosystems from the Vermont Members Anne Archie, USDA Forest Service Douglas Lantagne, University of Vermont Ed O'Leary, Vermont, USDA Farm Service Agency Charles Scott, USDA Forest Service Steven Sinclair, Vermont Agency of Natural

  13. Automotive Engineering BEng (Hons) Key details

    E-Print Network [OSTI]

    Painter, Kevin

    Automotive Engineering BEng (Hons) Key details Duration: Full-time: 3 years (BEng) / 4 years (BEng programme, but allows students in the later years to specialise in subjects relating to automotive technology. Automotive engineering continues to be a major employer of professional engineers, owing

  14. CAREER RESOURCES Canadian Key Business Directory

    E-Print Network [OSTI]

    Thompson, Michael

    CAREER RESOURCES BOOKS Canadian Key Business Directory - Includes the largest companies in Canada companies - Search by name, geography, SIC code and more! - Online version available through library: http://www.jobsetc.gc.ca/eng/ - Training, career and worker information - Career Exploration resources

  15. NCLC November 1999 Cem Kaner Page 1 UCITA: Key Consumer IssuesUCITA: Key Consumer Issues

    E-Print Network [OSTI]

    NCLC November 1999 Cem Kaner Page 1 UCITA: Key Consumer IssuesUCITA: Key Consumer Issues Cem Kaner, J.D., Ph.D., ASQ-CQE November 1999 Contact Information: kaner@kaner.com www.kaner.com (testing November 1999 Cem Kaner Page 2 UCITA? Huh?UCITA? Huh? · Uniform Computer Information Transactions Act

  16. Key Frame Selection Algorithms for Automatic Generation of Panoramic Images from

    E-Print Network [OSTI]

    Shahabi, Cyrus

    acquire and fuse various sensor data (e.g., geospatial metadata) together with video to create sensor, and possibly even on-demand. Our experimental results demonstrate that by using geospatial metadata qual- ity. Key words:Geo-tagged videos, crowdsourcing, key frame selection, geospa- tial metadata

  17. A correct security evaluation of quantum key distribution

    E-Print Network [OSTI]

    Osamu Hirota

    2014-09-21

    There is no doubt that quantum key distribution is an excellent result as a science. However, this paper presents a view on quantum key distribution (QKD) wherein QKD may have a difficulty to provide a sufficient security and good communication performance in real world networks. In fact, a one-time pad forwarded by QKD model with $\\bar{\\epsilon}=10^{-6}$ may be easily decrypted by key estimation. Despite that researchers know several criticisms on the theoretical incompleteness on the security evaluation, Portmann and Rennner, and others still avert from the discussion on criticism, and experimental groups tend to make exaggerated claims about their own work by making it seems that QKD is applicable to commercial communication systems. All such claims are based on a misunderstanding of the meaning of criteria of information theoretic security in cryptography. A severe situation has arisen as a result, one that will impair a healthy development of quantum information science (QIS). Thus, the author hopes that this paper will help to stimulate discussions on developing a more detailed theory.

  18. Chemical and Petroleum Engineering Key and Lab Space Agreement

    E-Print Network [OSTI]

    Chemical and Petroleum Engineering Key and Lab Space Agreement Key Holder Information Last Name and Petroleum Engineering remain the property of the Department. I agree to pay a deposit for the keys

  19. No-signaling Quantum Key Distribution: Solution by Linear Programming

    E-Print Network [OSTI]

    Won-Young Hwang; Joonwoo Bae; Nathan Killoran

    2013-01-15

    We outline a straightforward approach for obtaining a secret key rate using only no-signaling constraints and linear programming. Assuming an individual attack, we consider all possible joint probabilities. Initially, we study only the case where Eve has binary outcomes, and we impose constraints due to the no-signaling principle and given measurement outcomes. Within the remaining space of joint probabilities, by using linear programming, we get bound on the probability of Eve correctly guessing Bob's bit. We then make use of an inequality that relates this guessing probability to the mutual information between Bob and a more general Eve, who is not binary-restricted. Putting our computed bound together with the Csisz\\'ar-K\\"orner formula, we obtain a positive key generation rate. The optimal value of this rate agrees with known results, but was calculated in a more straightforward way, offering the potential of generalization to different scenarios.

  20. Secure password-based authenticated key exchange for web services

    SciTech Connect (OSTI)

    Liang, Fang; Meder, Samuel; Chevassut, Olivier; Siebenlist, Frank

    2004-11-22

    This paper discusses an implementation of an authenticated key-exchange method rendered on message primitives defined in the WS-Trust and WS-SecureConversation specifications. This IEEE-specified cryptographic method (AuthA) is proven-secure for password-based authentication and key exchange, while the WS-Trust and WS-Secure Conversation are emerging Web Services Security specifications that extend the WS-Security specification. A prototype of the presented protocol is integrated in the WSRF-compliant Globus Toolkit V4. Further hardening of the implementation is expected to result in a version that will be shipped with future Globus Toolkit releases. This could help to address the current unavailability of decent shared-secret-based authentication options in the Web Services and Grid world. Future work will be to integrate One-Time-Password (OTP) features in the authentication protocol.

  1. Identification of Key Barriers in Workforce Development

    SciTech Connect (OSTI)

    2008-03-31

    This report documents the identification of key barriers in the development of an adequate national security workforce as part of the National Security Preparedness Project, being performed under a Department of Energy/National Nuclear Security Administration grant. Many barriers exist that prevent the development of an adequate number of propertly trained national security personnel. Some barriers can be eliminated in a short-term manner, whereas others will involve a long-term strategy that takes into account public policy.

  2. Key Physical Mechanisms in Nanostructured Solar Cells

    SciTech Connect (OSTI)

    Dr Stephan Bremner

    2010-07-21

    The objective of the project was to study both theoretically and experimentally the excitation, recombination and transport properties required for nanostructured solar cells to deliver energy conversion efficiencies well in excess of conventional limits. These objectives were met by concentrating on three key areas, namely, investigation of physical mechanisms present in nanostructured solar cells, characterization of loss mechanisms in nanostructured solar cells and determining the properties required of nanostructured solar cells in order to achieve high efficiency and the design implications.

  3. Rapid Compression Machine ? A Key Experimental Device to Effectively...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Compression Machine A Key Experimental Device to Effectively Collaborate with Basic Energy Sciences Rapid Compression Machine A Key Experimental Device to Effectively...

  4. Cooling Towers: Understanding Key Components of Cooling Towers...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Cooling Towers: Understanding Key Components of Cooling Towers and How to Improve Water Efficiency Cooling Towers: Understanding Key Components of Cooling Towers and How to Improve...

  5. Single, Key Gene Discovery Could Streamline Production of Biofuels...

    Energy Savers [EERE]

    Single, Key Gene Discovery Could Streamline Production of Biofuels Single, Key Gene Discovery Could Streamline Production of Biofuels August 11, 2011 - 3:51pm Addthis WASHINGTON,...

  6. Building America Expert Meeting: Key Innovations for Adding Energy...

    Energy Savers [EERE]

    Expert Meeting: Key Innovations for Adding Energy Efficiency to Maintenance Projects Building America Expert Meeting: Key Innovations for Adding Energy Efficiency to Maintenance...

  7. Technology Key to Harnessing Natural Gas Potential | Department...

    Office of Environmental Management (EM)

    Technology Key to Harnessing Natural Gas Potential Technology Key to Harnessing Natural Gas Potential July 18, 2012 - 3:52pm Addthis Deputy Secretary Daniel Poneman tours Proinlosa...

  8. Key Energy-Saving Projects for Smaller Facilities | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Key Energy-Saving Projects for Smaller Facilities Key Energy-Saving Projects for Smaller Facilities This presentation discusses how smaller industrial facilities can save energy...

  9. Generation of a squeezed vacuum resonant on Rubidium D_1 line with periodically-poled KTiOPO_4

    E-Print Network [OSTI]

    Takahito Tanimura; Daisuke Akamatsu; Yoshihiko Yokoi; Akira Furusawa; Mikio Kozuma

    2006-03-23

    We report generation of a continuous-wave squeezed vacuum resonant on the Rb D_1 line (795 nm) using periodically poled KTiOPO_4 (PPKTP) crystals. With a frequency doubler and an optical parametric oscillator based on PPKTP crystals, we observed a squeezing level of -2.75 +- 0.14 dB and an anti-squeezing level of +7.00 +- 0.13 dB. This system could be utilized for demonstrating storage and retrieval of the squeezed vacuum, which is important for the ultra-precise measurement of atomic spins as well as quantum information processing.

  10. Hydrogen Fuel Cell Performance in the Key Early Markets of Material Handling Equipment and Backup Power (Presentation)

    SciTech Connect (OSTI)

    Kurtz, J.; Sprik, S.; Ramsden, T.; Saur, G.; Ainscough, C.; Post, M.; Peters, M.

    2013-10-01

    This presentation summarizes the results of NREL's analysis of hydrogen fuel cell performance in the key early markets of material handling equipment (MHE) and backup power.

  11. Sifting attacks in finite-size quantum key distribution

    E-Print Network [OSTI]

    Corsin Pfister; Patrick J. Coles; Stephanie Wehner; Norbert Lütkenhaus

    2015-09-02

    A central assumption in quantum key distribution (QKD) is that Eve has no knowledge about which rounds will be used for parameter estimation or key distillation. Here we show that this assumption is violated for iterative sifting, a commonly used sifting procedure that has been em- ployed in both theoretical and experimental finite-size QKD. We show that iterative sifting leads to two problems: (1) some rounds are more likely to be key rounds than others, (2) the public communication of past measurement choices changes this bias round by round. We analyze these two previously unnoticed problems, present eavesdropping strategies that exploit them, and find that the two problems are independent. We propose corrections to the protocol and prove that the resulting protocol, which we call the fixed round number sifting protocol, is secure and can thus replace iterative sifting in future QKD protocols. It outperforms other recently suggested protocols, increasing the efficiency by a factor of almost two. More generally, we present two formal criteria for a sifting protocol which ensure that they are secure. Our criteria may guide the design of future protocols and inspire a more rigorous QKD analysis, which has neglected sifting-related attacks so far.

  12. Properties and performance of the IEEE 802.11b complementary-code-key signal sets

    E-Print Network [OSTI]

    Royster, Thomas C., IV

    We describe similarities and differences between complementary-code-key (CCK) modulation and modulation that is derived from biorthogonal signals, and we present performance results and other information that may be useful ...

  13. Analysing ZigBee Key Establishment Protocols

    E-Print Network [OSTI]

    Yüksel, Ender

    2012-01-01

    In this report, we present our approach for protocol analysis together with a real example where we find an important flow in a contemporary wireless sensor network security protocol. We start by modelling protocols using a specific process algebraic formalism called LySa process calculus. We then apply an analysis based on a special program analysis technique called control flow analysis. We apply this technique to the ZigBee-2007 End-to-End Application Key Establishment Protocol and with the help of the analysis discover an unknown flaw. Finally we suggest a fix for the protocol, and verify that the fix works by using the same technique.

  14. Another key Y-12 General Foreman remembered

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 OutreachProductswsicloudwsiclouddenDVA N C E D B L O O D S TAPropaneandAn319Another key Y-12 General Foreman

  15. Keyes, California: Energy Resources | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History View NewTexas: Energy ResourcesOrder atHills,NewKeithDelaware:DLRKettering,KeyTex Energy LLCKeyes,

  16. NERSC.COE.key.actions-4.pptx

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration wouldMass map shines light on77 PAGEMissionStressMoveMuncriefB ONERSCNERSC8 CoE Key Actions

  17. Composite keys? | OpenEI Community

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTIONRobertsdale, Alabama (Utility Company)| Open EnergyColoradoBiomassPlusComposite keys? Home >

  18. Fermilab | Science | Particle Physics | Key Discoveries

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDid you not find whatGasEnergyfeature photo featureParticleDark matterKey

  19. Key Agency Targets Summary _FY 2012_.doc

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACTThousand Cubic Feet) SoldDepartment ofKenThousandtheKevlar andKey5 B

  20. Key Actions for Optimizing for KNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJesse Bergkamp Graduate student Subtask 4Photo4> TheKevin Morris Title:AnaKey

  1. Bioenergy Key Publications | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative FuelsofProgram:Y-12Power, IncBio Centers Announcement at theproduceƈ GOAL:Key

  2. Fair Encryption of RSA Keys Guillaume Poupard and Jacques Stern

    E-Print Network [OSTI]

    Stern, Jacques

    based on verifiable encryption of secret keys using double decker exponentiation which makes the proofs

  3. Session-Key Generation using Human Passwords Only Oded Goldreich

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Session-Key Generation using Human Passwords Only Oded Goldreich Department of Computer Science present session-key generation protocols in a model where the legitimate parties share only a human assumptions. Keywords: Session-key generation (authenticated key-exchange), mutual authentication proto- cols

  4. SessionKey Generation using Human Passwords Only # Oded Goldreich +

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Session­Key Generation using Human Passwords Only # Oded Goldreich + Department of Computer Science present session­key generation protocols in a model where the legitimate parties share only a human setup assumptions. Keywords: Session­key generation (authenticated key­exchange), mutual authentication

  5. The impacts of urbanization on endangered florida key deer 

    E-Print Network [OSTI]

    Harveson, Patricia Moody

    2006-04-12

    of peninsular Florida. Key deer range is restricted to the Lower Florida Keys with approximately 60% residing on Big Pine Key and 15% residing on No Name Key which have undergone rapid human population growth and development over the past 30 years. Urban...

  6. Microscopic description of fission in neutron-rich plutonium isotopes with the Gogny-D1M energy density functional

    E-Print Network [OSTI]

    Rodriguez-Guzman, R

    2014-01-01

    The most recent parametrization D1M of the Gogny energy density functional is used to describe fission in the isotopes $^{232-280}$ Pu. We resort to the methodology introduced in our previous studies [Phys. Rev. C \\textbf{88}, 054325 (2013) and Phys. Rev. C \\textbf {89}, 054310 (2014)] to compute the fission paths, collective masses and zero point quantum corrections within the Hartree-Fock-Bogoliubov framework. The systematics of the spontaneous fission half-lives t$_{SF}$, masses and charges of the fragments in Plutonium isotopes is analyzed and compared with available experimental data. We also pay attention to isomeric states, the deformation properties of the fragments as well as to the competition between the spontaneous fission and $\\alpha$-decay modes. The impact of pairing correlations on the predicted t$_{SF}$ values is demonstrated with the help of calculations for $^{232-280}$Pu in which the pairing strengths of the Gogny-D1M energy density functional are modified by 5 $\\%$ and 10 $\\%$, respective...

  7. Geometric Engineering, Mirror Symmetry and 6d (1,0) -> 4d, N=2

    E-Print Network [OSTI]

    Michele Del Zotto; Cumrun Vafa; Dan Xie

    2015-05-31

    We study compactification of 6 dimensional (1,0) theories on T^2. We use geometric engineering of these theories via F-theory and employ mirror symmetry technology to solve for the effective 4d N=2 geometry for a large number of the (1,0) theories including those associated with conformal matter. Using this we show that for a given 6d theory we can obtain many inequivalent 4d N=2 SCFTs. Some of these respect the global symmetries of the 6d theory while others exhibit SL(2,Z) duality symmetry inherited from global diffeomorphisms of the T^2. This construction also explains the 6d origin of moduli space of 4d affine ADE quiver theories as flat ADE connections on T^2. Among the resulting 4d N=2 CFTs we find theories whose vacuum geometry is captured by an LG theory (as opposed to a curve or a local CY geometry). We obtain arbitrary genus curves of class S with punctures from toroidal compactification of (1,0) SCFTs where the curve of the class S theory emerges through mirror symmetry. We also show that toroidal compactification of the little string version of these theories can lead to class S theories with no punctures on arbitrary genus Riemann surface.

  8. Data:63618e21-2a4f-46d0-8350-3b68af7c50d1 | Open Energy Information

    Open Energy Info (EERE)

    af7c50d1 No revision has been approved for this page. It is currently under review by our subject matter experts. Jump to: navigation, search Loading... 1. Basic Information 2....

  9. Data:5c21e410-1432-4f35-b5d1-e0e3eefd8018 | Open Energy Information

    Open Energy Info (EERE)

    b5d1-e0e3eefd8018 No revision has been approved for this page. It is currently under review by our subject matter experts. Jump to: navigation, search Loading... 1. Basic...

  10. Data:0a710392-0262-4cde-a5ba-d1dd41e15527 | Open Energy Information

    Open Energy Info (EERE)

    cde-a5ba-d1dd41e15527 No revision has been approved for this page. It is currently under review by our subject matter experts. Jump to: navigation, search Loading... 1. Basic...

  11. Security Issues Associated With Error Correction And Privacy Amplification In Quantum Key Distribution

    E-Print Network [OSTI]

    Horace Yuen

    2014-11-10

    Privacy amplification is a necessary step in all quantum key distribution protocols, and error correction is needed in each except when signals of many photons are used in the key communication in quantum noise approach. No security analysis of error correcting code information leak to the attacker has ever been provided, while an ad hoc formula is currently employed to account for such leak in the key generation rate. It is also commonly believed that privacy amplification allows the users to at least establish a short key of arbitrarily close to perfect security. In this paper we show how the lack of rigorous error correction analysis makes the otherwise valid privacy amplification results invalid, and that there exists a limit on how close to perfect a generated key can be obtained from privacy amplification. In addition, there is a necessary tradeoff between key rate and security, and the best theoretical values from current theories would not generate enough near-uniform key bits to cover the message authentication key cost in disturbance-information tradeoff protocols of the BB84 variety.

  12. Appendix D-1

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 OutreachProductswsicloudwsiclouddenDVA N C E D B L O O D SFederal Facility Agreement and Consent04 STANDARDC.

  13. Kinetic study of acid-catalyzed cellulose hydrolysis in 1-butyl-3-methylimidazolium Zehui Zhang a,d,1

    E-Print Network [OSTI]

    Li, Weixue

    . Zhao a,c, a Division of Biotechnology, Dalian Institute of Chemical Physics, CAS, 457 Zhongshan Road, Dalian 116023, China b The State Key Laboratory of Catalysis, Dalian Institute of Chemical Physics, CAS, 457 Zhongshan Road, Dalian 116023, China c Dalian National Laboratory for Clean Energy, Dalian 116023

  14. Electricity and Development: Global Trends and Key Challenges

    E-Print Network [OSTI]

    ;3. Prospects for Electricity Development Electricity Access Projected Electrification Rates by Region globalElectricity and Development: Global Trends and Key Challenges Romeo Pacudan, PhD Risoe National · Prospects for electricity development · Investment requirements · Key challenges · Final remarks #12

  15. Energy Storage: The Key to a Reliable, Clean Electricity Supply...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Storage: The Key to a Reliable, Clean Electricity Supply Energy Storage: The Key to a Reliable, Clean Electricity Supply February 22, 2012 - 4:52pm Addthis Improved energy...

  16. Exploring the context : a small hotel in Key West

    E-Print Network [OSTI]

    VanBeuzekom, Edrick

    1984-01-01

    This thesis develops a personal method and approach for designing in a delicate context such as the Key West Historic District. This thesis is composed of two parts. The first part presents observations of Key West, focusing ...

  17. SOW and Key Performance Parameters (KPP) Handbook Final Version...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    SOW and Key Performance Parameters (KPP) Handbook Final Version 9-30-2014 SOW and Key Performance Parameters (KPP) Handbook Final Version 9-30-2014 This handbook provides suggested...

  18. Could Solar Energy Storage be Key for Residential Solar? | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Could Solar Energy Storage be Key for Residential Solar? Could Solar Energy Storage be Key for Residential Solar? October 26, 2010 - 4:52pm Addthis This is the silent power storage...

  19. Relationship between key events in Earth history

    E-Print Network [OSTI]

    Gillman, Michael

    2015-01-01

    A model of cyclical (sinusoidal) motion of the solar system, intercepting event lines distributed at fixed intervals, explains the pattern of timings of mass extinctions, earlier glaciations, largest impact craters and the largest known extrusions of magma in the history of the Earth. The model reveals links between several sets of key events, including the end-Cretaceous and end-Ordovician extinctions with the Marinoan glaciation, and the end-Permian with the end-Serpukhovian extinctions. The model is supported by significant clusters of events and a significant reduction of impact crater size with position (sine value). The pattern of event lines is sustained to the earliest-dated impact craters (2023 and 1849 Ma) and to the origin of the solar system, close to 4567.4 Ma. The implication is that, for the entirety of its existence, the solar system has passed in a consistent manner through a predictably structured galaxy. Dark matter is a possible contender for the structure determining the event lines.

  20. Residential Energy Efficiency Financing: Key Elements of Program Design

    Broader source: Energy.gov [DOE]

    Presents key programmatic elements and context of financing initiatives, including contractor support, rebates, quality assurance, and more.

  1. Master Thesis Group Key Agreement for Ad Hoc Networks

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Master Thesis Group Key Agreement for Ad Hoc Networks Lijun Liao Date: 06 July 2005 Supervisor: M their financial support. #12;Abstract Over the last 30 years the study of group key agreement has stimulated much present a Tree-based group key agreement Framework for Ad-hoc Networks (TFAN). TFAN is especially suitable

  2. Distributed Key Generation in the Wild Aniket Kate1

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Distributed Key Generation in the Wild Aniket Kate1 Yizhou Huang2 Ian Goldberg2 1 Max Planck of Waterloo, Canada aniket@mpi-sws.org, {y226huan, iang}@uwaterloo.ca Abstract Distributed key generation (DKG communication model. computational setting. distributed key generation. uniform randomness. implementation 1

  3. A Linearization Attack on the Bluetooth Key Stream Generator

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    A Linearization Attack on the Bluetooth Key Stream Generator Frederik Armknecht ? University on the key stream generator underlying the E0 yet. 1 Introduction The encryption system E 0 , which key stream generator (KSG) is used. In this paper, we propose an attack on the underlying KSG. We

  4. Leakage-Resilient Cryptography with Key Derived from Sensitive Data

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Leakage-Resilient Cryptography with Key Derived from Sensitive Data Konrad Durnoga , Tomasz Kazana subject to adversarial leakage. We propose a method to derive keys for such protocols on-the-fly from the actual keys are derived from. That is, an adversary can hardly gain any knowledge about the private data

  5. A passive transmitter for quantum key distribution with coherent light

    E-Print Network [OSTI]

    Marcos Curty; Marc Jofre; Valerio Pruneri; Morgan W. Mitchell

    2011-08-03

    Signal state preparation in quantum key distribution schemes can be realized using either an active or a passive source. Passive sources might be valuable in some scenarios; for instance, in those experimental setups operating at high transmission rates, since no externally driven element is required. Typical passive transmitters involve parametric down-conversion. More recently, it has been shown that phase-randomized coherent pulses also allow passive generation of decoy states and Bennett-Brassard 1984 (BB84) polarization signals, though the combination of both setups in a single passive source is cumbersome. In this paper, we present a complete passive transmitter that prepares decoy-state BB84 signals using coherent light. Our method employs sum-frequency generation together with linear optical components and classical photodetectors. In the asymptotic limit of an infinite long experiment, the resulting secret key rate (per pulse) is comparable to the one delivered by an active decoy-state BB84 setup with an infinite number of decoy settings.

  6. Bell gems naturally split dynamics information from $SU(2^{2d}) \\rightarrow U(1)^{2^{2d-1}-1} \\times SU(2)^{2^{2d-1}}$

    E-Print Network [OSTI]

    Francisco Delgado

    2015-09-25

    Quantum Computation and Quantum Information are continuously growing research areas which are based on nature and resources of quantum mechanics, as superposition and entanglement. In its gate array version, the use of convenient and appropriate gates is essential. But while those proposed gates adopt convenient forms for computational algorithms, in the practice, their design depends on specific quantum systems and stuff being used. Gates design is restricted to properties and limitations of interactions and physical elements being involved, where Quantum Control plays a deep role. Quantum complexity of multipartite systems and their interactions requires a tight control to manipulate their quantum states, either local and non-local ones, but still a reducibility procedure should be addressed. This work shows how a general $2d$-partite two level spin system in $SU(2d)$ could be decomposed in $2^{n-1}$ subsystems on $SU(2)$, letting establish control operations. In particular, it is shown that Bell gems basis is a set of natural states on which decomposition happen naturally under some interaction restrictions. Thus, alternating the direction of local interaction terms in the Hamiltonian, this procedure states a universal exchange semantics on those basis. The structure developed could be understood as a splitting of the $2d$ information channels into $2^{2d-1}$ pairs of $2$ level information subsystems.

  7. Unconditional Security of Time-energy Entanglement Quantum Key Distribution using Dual-basis Interferometry

    E-Print Network [OSTI]

    Zheshen Zhang; Jacob Mower; Dirk Englund; Franco N. C. Wong; Jeffrey H. Shapiro

    2014-01-23

    High-dimensional quantum key distribution (HDQKD) offers the possibility of high secure-key rate with high photon-information efficiency. We consider HDQKD based on the time-energy entanglement produced by spontaneous parametric downconversion, and show that it is secure against collective attacks. Its security rests upon visibility data -- obtained from Franson and conjugate-Franson interferometers -- that probe photon-pair frequency correlations and arrival-time correlations. From these measurements an upper bound can be established on the eavesdropper's Holevo information by translating the Gaussian-state security analysis for continuous-variable quantum key distribution so that it applies to our protocol. We show that visibility data from just the Franson interferometer provides a weaker, but nonetheless useful, secure-key rate lower bound. To handle multiple-pair emissions, we incorporate the decoy-state approach into our protocol. Our results show that over 200\\,km transmission distance in optical fiber, time-energy entanglement HDQKD could permit a 700 bit/sec secure-key rate, and a photon information efficiency of 2 secure-key bits per photon coincidence in the key-generation phase using receivers with 15% system efficiency.

  8. Radiative transfer modeling of the enigmatic scattering polarization in the solar NaI D1 line

    E-Print Network [OSTI]

    Belluzzi, Luca; Degl'Innocenti, Egidio Landi

    2015-01-01

    The modeling of the peculiar scattering polarization signals observed in some diagnostically important solar resonance lines requires the consideration of the detailed spectral structure of the incident radiation field as well as the possibility of ground level polarization, along with the atom's hyperfine structure and quantum interference between hyperfine F-levels pertaining either to the same fine structure J-level, or to different J-levels of the same term. Here we present a theoretical and numerical approach suitable for solving this complex non-LTE radiative transfer problem. This approach is based on the density-matrix metalevel theory (where each level is viewed as a continuous distribution of sublevels) and on accurate formal solvers of the transfer equations and efficient iterative methods. We show an application to the D-lines of NaI, with emphasis on the enigmatic D1 line, pointing out the observable signatures of the various physical mechanisms considered. We demonstrate that the linear polariza...

  9. Hacking on decoy-state quantum key distribution system with partial phase randomization

    E-Print Network [OSTI]

    Shi-Hai Sun; Mu-Sheng Jiang; Xiang-Chun Ma; Chun-Yan Li; Lin-Mei Liang

    2014-07-15

    Quantum key distribution (QKD) provides means for unconditional secure key transmission between two distant parties. However, in practical implementations, it suffers from quantum hacking due to device imperfections. Here we propose a hybrid measurement attack, with only linear optics, homodyne detection, and single photon detection, to the widely used vacuum+weak decoy state QKD system when the phase of source is partially randomized. Our analysis shows that, in some parameter regimes, the proposed attack would result in an entanglement breaking channel but still be able to trick the legitimate users to believe they have transmitted secure keys. That is, the eavesdropper is able to steal all the key information without discovered by the users. Thus, our proposal reveals that partial phase randomization is not sufficient to guarantee the security of phase-encoding QKD systems with weak coherent states.

  10. Passive decoy state quantum key distribution with practical light sources

    E-Print Network [OSTI]

    Marcos Curty; Xiongfeng Ma; Bing Qi; Tobias Moroder

    2009-11-14

    Decoy states have been proven to be a very useful method for significantly enhancing the performance of quantum key distribution systems with practical light sources. While active modulation of the intensity of the laser pulses is an effective way of preparing decoy states in principle, in practice passive preparation might be desirable in some scenarios. Typical passive schemes involve parametric down-conversion. More recently, it has been shown that phase randomized weak coherent pulses (WCP) can also be used for the same purpose [M. Curty {\\it et al.}, Opt. Lett. {\\bf 34}, 3238 (2009).] This proposal requires only linear optics together with a simple threshold photon detector, which shows the practical feasibility of the method. Most importantly, the resulting secret key rate is comparable to the one delivered by an active decoy state setup with an infinite number of decoy settings. In this paper we extend these results, now showing specifically the analysis for other practical scenarios with different light sources and photo-detectors. In particular, we consider sources emitting thermal states, phase randomized WCP, and strong coherent light in combination with several types of photo-detectors, like, for instance, threshold photon detectors, photon number resolving detectors, and classical photo-detectors. Our analysis includes as well the effect that detection inefficiencies and noise in the form of dark counts shown by current threshold detectors might have on the final secret ket rate. Moreover, we provide estimations on the effects that statistical fluctuations due to a finite data size can have in practical implementations.

  11. Multiple Shear Key Connections for Precast

    E-Print Network [OSTI]

    for elevator shaft shear wall panelsOne of the main concerns in precast 104 #12;utilize a combination elevator shaft shear wall panels. The tests results were used to develop analytical models to predict the shear Synopsis Seven horizontal connections typi- cally used in precast concrete elevator shaft shear

  12. Key Response Planning Factors for the Aftermath of Nuclear Terrorism

    SciTech Connect (OSTI)

    Buddemeier, B R; Dillon, M B

    2009-01-21

    Despite hundreds of above-ground nuclear tests and data gathered from Hiroshima and Nagasaki, the effects of a ground-level, low-yield nuclear detonation in a modern urban environment are still the subject of considerable scientific debate. Extensive review of nuclear weapon effects studies and discussions with nuclear weapon effects experts from various federal agencies, national laboratories, and technical organizations have identified key issues and bounded some of the unknowns required to support response planning for a low-yield, ground-level nuclear detonation in a modern U.S. city. This study, which is focused primarily upon the hazards posed by radioactive fallout, used detailed fallout predictions from the advanced suite of three-dimensional (3-D) meteorology and plume/fallout models developed at Lawrence Livermore National Laboratory (LLNL), including extensive global Key Response Planning Factors for the Aftermath of Nuclear Terrorism geographical and real-time meteorological databases to support model calculations. This 3-D modeling system provides detailed simulations that account for complex meteorology and terrain effects. The results of initial modeling and analysis were presented to federal, state, and local working groups to obtain critical, broad-based review and feedback on strategy and messaging. This effort involved a diverse set of communities, including New York City, National Capitol Regions, Charlotte, Houston, Portland, and Los Angeles. The largest potential for reducing casualties during the post-detonation response phase comes from reducing exposure to fallout radiation. This can be accomplished through early, adequate sheltering followed by informed, delayed evacuation.B The response challenges to a nuclear detonation must be solved through multiple approaches of public education, planning, and rapid response actions. Because the successful response will require extensive coordination of a large number of organizations, supplemented by appropriate responses by local responders and the general population within the hazard zones, regional planning is essential to success. The remainder of this Executive Summary provides summary guidance for response planning in three areas: (1) Public Protection Strategy details the importance of early, adequate shelter followed by informed evacuation. (2) Responder Priorities identify how to protect response personnel, perform regional situational assessment, and support public safety. (3) Key Planning Considerations refute common myths and provide important information on planning how to respond in the aftermath of nuclear terrorism.

  13. Updated distribution and reintroduction of the Lower Keys marsh rabbit 

    E-Print Network [OSTI]

    Faulhaber, Craig Alan

    2005-02-17

    , for their advice and interest in the project. Kim Rohrs of the Monroe County Department of Planning and Environmental Resources provided valuable spatial and tabular data on land ownership and land-use planning in the Keys. My interns, Josh Harris, Kyle........................ 29 3.1 The number of individual Lower Keys marsh rabbits captured in 13 occupied populations on 4 keys from October 2001?August 2002. Data are arranged according to sex and age class...

  14. Water dynamics clue to key residues in protein folding

    SciTech Connect (OSTI)

    Gao, Meng [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Zhu, Huaiqiu, E-mail: hqzhu@pku.edu.cn [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Yao, Xin-Qiu [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China) [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Department of Biophysics, Kyoto University, Sakyo Kyoto 606-8502 (Japan); She, Zhen-Su, E-mail: she@pku.edu.cn [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)

    2010-01-29

    A computational method independent of experimental protein structure information is proposed to recognize key residues in protein folding, from the study of hydration water dynamics. Based on all-atom molecular dynamics simulation, two key residues are recognized with distinct water dynamical behavior in a folding process of the Trp-cage protein. The identified key residues are shown to play an essential role in both 3D structure and hydrophobic-induced collapse. With observations on hydration water dynamics around key residues, a dynamical pathway of folding can be interpreted.

  15. Key Practical Issues in Strengthening Safety Culture, INSAG-15

    Broader source: Energy.gov [DOE]

    Key Pratical Issues in Strengthening Safety Culture, INSAG-15. A report by the International Nuclear Safety Advisory Gorup, International Atomic Energy Agency, Vienna, 2002.

  16. Deputy Secretary Sherwood-Randall Meets Key Government Officials...

    Broader source: Energy.gov (indexed) [DOE]

    Pritzker and Deputy Secretary Sherwood-Randall had the opportunity to engage with key Chinese government officials while in Beijing. Both met with Premier Li Keqiang and Vice...

  17. Climate Action Planning: A Review of Best Practices, Key Elements...

    Open Energy Info (EERE)

    Climate Action Planning: A Review of Best Practices, Key Elements, and Common Climate Strategies for Signatories to the American College & University Presidents' Climate Commitment...

  18. California Energy Incentive Programs An Annual Update on Key...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Issues and Financial Opportunities for Federal Sites in California California Energy Incentive Programs An Annual Update on Key Energy Issues and Financial Opportunities...

  19. Intercropped silviculture systems, a key to achieving soil fungal...

    Office of Scientific and Technical Information (OSTI)

    Intercropped silviculture systems, a key to achieving soil fungal community management in eucalyptus plantations Citation Details In-Document Search Title: Intercropped...

  20. Strategic Energy Management.  Keys to Behavioral and Operational Change.

    E-Print Network [OSTI]

    Kroll, Ryan M; Willems, Phil; Rubado, Dan; Belkhayat, Kathleen

    2015-01-01

    Strategic Energy Management Keys to Behavioral andof Oregon’s Strategic Energy Management (SEM) initiative.Introduction Strategic energy management (SEM) is defined

  1. MasterKey Cryptosystems AT&T Bell Labs

    E-Print Network [OSTI]

    Blaze, Matthew

    then be converted to a stream­ cipher via one of the usual block­chaining methods). We use the public­key encryption

  2. Pantex Plant Achieves Key Safety Milestone Ahead of Schedule...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Achieves Key Safety Milestone Ahead of Schedule | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

  3. Data:Eac1dd3a-0268-4e5c-b1d1-ed9feeb2a12a | Open Energy Information

    Open Energy Info (EERE)

    Eac1dd3a-0268-4e5c-b1d1-ed9feeb2a12a No revision has been approved for this page. It is currently under review by our subject matter experts. Jump to: navigation, search Loading......

  4. Ebullitive methane emissions from oxygenated wetland J O H N T . C R A W F O R D 1 , 2

    E-Print Network [OSTI]

    Stanley, Emily

    (CO2) emissions are recognized as an important component of the global carbon (C) cycle (Cole et al of emissions, particularly in wet- lands, with a potential `missing' wetland CH4 source of ~87 Tg C yrÀ1Ebullitive methane emissions from oxygenated wetland streams J O H N T . C R A W F O R D 1 , 2 , E

  5. AES Flow Interception : Key Snooping Method on Virtual Machine.

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    AES Flow Interception : Key Snooping Method on Virtual Machine. - Exception Handling Attack for AES for snooping AES en- cryption key on Virtual Machine Monitor (VMM), and we present coun- termeasures against. In general, the virtualization technology composes two software parts: one is vir- tual machine (VM

  6. Entity Authentication and Authenticated Key Exchange with Tree Parity Machines

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    synchronization of two in­ teracting identically structured Tree Parity Machines (TPMs) has been proposed underEntity Authentication and Authenticated Key Exchange with Tree Parity Machines Markus Volkmer key exchange in the framework of Tree Parity Machines (TPMs). The interaction of TPMs has been

  7. Energy Security: A Key Requirement forSustainable Development

    E-Print Network [OSTI]

    1 Energy Security: A Key Requirement forSustainable Development Perspective and Action Plan Robert Card Under Secretary US Department of Energy August 30, 2002 Session One: Maintaining Energy Security WSSD Side Event Energy for Sustainable Development IEA/UNEP/Eskom #12;2 Energy Security is a Key

  8. A Distributed Public Key Caching Scheme in Large Wireless Networks

    E-Print Network [OSTI]

    Deng, Jing

    -constrained, in terms of computational power, battery energy, and on-board memory space. For example, the prototypeA Distributed Public Key Caching Scheme in Large Wireless Networks Yuan Kong Jing Deng Stephen R in wireless networks, the public keys of the nodes need to be widely available and signed by a Certificate

  9. Improved Key Generation For Gentry's Fully Homomorphic Encryption Scheme

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Improved Key Generation For Gentry's Fully Homomorphic Encryption Scheme P. Scholl and N.P. Smart scheme was the slow key generation process. Gentry and Halevi provided a fast technique for 2-power cyclo. In particular they focused on the field generated by the polynomial F(X) = X2n + 1, but they noted

  10. Zero-one laws for connectivity in random key graphs

    E-Print Network [OSTI]

    Yagan, Osman

    with the random key predistribution scheme of Eschenauer and Gligor for wireless sensor networks. For this class which are more realistic for applications to wireless sensor networks. Keywords: Wireless sensor- dom key predistribution for wireless sensor networks (WSNs) [6], [7], [9]. For the sake

  11. Baton: Key Agility for Android without a Centralized Certificate Infrastructure

    E-Print Network [OSTI]

    Van Oorschot, Paul

    Baton: Key Agility for Android without a Centralized Certificate Infrastructure David Barrera,dmccarney}@ccsl.carleton.ca {clark,paulv}@scs.carleton.ca ABSTRACT Android's trust-on-first-use application signing model asso transfer signing au- thority to a new signing key. Our proposal, Baton, modifies Android's app installation

  12. Comparative Analysis of Software Libraries for Public Key Cryptography

    E-Print Network [OSTI]

    Gaj, Krzysztof

    Comparative Analysis of Software Libraries for Public Key Cryptography Ashraf Abusharekh1 and Kris libraries implementing such operations exist both commercially and in the public domain, in this paper, we, using performance and support of public key primitive operations. The performance of all libraries

  13. k-Connectivity in Random Key Graphs with Unreliable Links

    E-Print Network [OSTI]

    Yagan, Osman

    of Eschenauer and Gligor for securing wireless sensor network (WSN) communications. Random key graphs have real-world networks; e.g., with secure WSN application in mind, link unreliability can be attributed for securing WSN communications is the random predistribution of cryptographic keys to sensor nodes

  14. Wireless sensor networks under the random pairwise key predistribution scheme

    E-Print Network [OSTI]

    Yagan, Osman

    Wireless sensor networks under the random pairwise key predistribution scheme: Can resiliency, College Park, MD 20742. Email: armand@isr.umd.edu Abstract--We investigate the resiliency of wireless the classical key predistribution scheme of Eschenauer and Gligor. Keywords: Wireless sensor networks, Security

  15. Apparatus, system, and method for synchronizing a timer key

    DOE Patents [OSTI]

    Condit, Reston A; Daniels, Michael A; Clemens, Gregory P; Tomberlin, Eric S; Johnson, Joel A

    2014-04-22

    A timer key relating to monitoring a countdown time of a countdown routine of an electronic device is disclosed. The timer key comprises a processor configured to respond to a countdown time associated with operation of the electronic device, a display operably coupled with the processor, and a housing configured to house at least the processor. The housing has an associated structure configured to engage with the electronic device to share the countdown time between the electronic device and the timer key. The processor is configured to begin a countdown routine based at least in part on the countdown time, wherein the countdown routine is at least substantially synchronized with a countdown routine of the electronic device when the timer key is removed from the electronic device. A system and method for synchronizing countdown routines of a timer key and an electronic device are also disclosed.

  16. TEST RESULTS FOR INITIAL PRODUCTION OF LHC INSERTION REGION DIPOLE MAGNETS*

    E-Print Network [OSTI]

    Large Hadron Collider Program

    TEST RESULTS FOR INITIAL PRODUCTION OF LHC INSERTION REGION DIPOLE MAGNETS* J. F. Muratore , M at 7.56 TeV. The magnets will be tested at 4.5 K using either forced flow supercritical helium or liquid helium. This paper reports the results of tests of four D1 magnets, including spontaneous quench

  17. Temperature-driven decoupling of key phases of organic matter degradation in marine sediments

    E-Print Network [OSTI]

    Weston, Nathaniel B.

    Temperature-driven decoupling of key phases of organic matter degradation in marine sediments for review August 29, 2005) The long-term burial of organic carbon in sediments results in the net and atmosphere. Sediment microbial activity plays a major role in determining whether particulate organic carbon

  18. Quantum Hacking: Experimental demonstration of time-shift attack against practical quantum key distribution systems

    E-Print Network [OSTI]

    Yi Zhao; Chi-Hang Fred Fung; Bing Qi; Christine Chen; Hoi-Kwong Lo

    2011-04-01

    Quantum key distribution (QKD) systems can send signals over more than 100 km standard optical fiber and are widely believed to be secure. Here, we show experimentally for the first time a technologically feasible attack, namely the time-shift attack, against a commercial QKD system. Our result shows that, contrary to popular belief, an eavesdropper, Eve, has a non-negligible probability (~4%) to break the security of the system. Eve's success is due to the well-known detection efficiency loophole in the experimental testing of Bell inequalities. Therefore, the detection efficiency loophole plays a key role not only in fundamental physics, but also in technological applications such as QKD.

  19. Key Facts about Argonne National Laboratory | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACTThousand Cubic Feet) SoldDepartment ofKenThousandtheKevlarKeyKeyKey

  20. Entanglement-based continuous-variable quantum key distribution with multimode states and detectors

    E-Print Network [OSTI]

    Vladyslav C. Usenko; Laszlo Ruppert; Radim Filip

    2014-12-18

    Secure quantum key distribution with multimode Gaussian entangled states and multimode homodyne detectors is proposed. In general the multimode character of both the sources of entanglement and the homodyne detectors can cause a security break even for a perfect channel when trusted parties are unaware of the detection structure. Taking into account the multimode structure and potential leakage of information from a homodyne detector reduces the loss of security to some extent. We suggest the symmetrization of the multimode sources of entanglement as an efficient method allowing us to fully recover the security irrespectively to multimode structure of the homodyne detectors. Further, we demonstrate that by increasing the number of the fluctuating but similar source modes the multimode protocol stabilizes the security of the quantum key distribution. The result opens the pathway towards quantum key distribution with multimode sources and detectors.

  1. Protein kinase D1 stimulates proliferation and enhances tumorigenesis of MCF-7 human breast cancer cells through a MEK/ERK-dependent signaling pathway

    SciTech Connect (OSTI)

    Karam, Manale; Legay, Christine; Auclair, Christian; Ricort, Jean-Marc, E-mail: jean-marc.ricort@univ-montp2.fr

    2012-03-10

    Protein kinase D1, PKD1, is a novel serine/threonine kinase whose altered expression and dysregulation in many tumors as well as its activation by several mitogens suggest that this protein could regulate proliferation and tumorigenesis. Nevertheless, the precise signaling pathways used are still unclear and the potential direct role of PKD1 in tumor development and progression has not been yet investigated. In order to clarify the role of PKD1 in cell proliferation and tumorigenesis, we studied the effects of PKD1 overexpression in a human adenocarcinoma breast cancer cell line, MCF-7 cells. We demonstrated that overexpression of PKD1 specifically promotes MCF-7 cell proliferation through accelerating G0/G1 to S phase transition of the cell cycle. Moreover, inhibition of endogenous PKD1 significantly reduced cell proliferation. Taken together, these results clearly strengthen the regulatory role of PKD1 in cell growth. We also demonstrated that overexpression of PKD1 specifically diminished serum- and anchorage-dependence for proliferation and survival in vitro and allowed MCF-7 cells to form tumors in vivo. Thus, all these data highlight the central role of PKD1 in biological processes which are hallmarks of malignant transformation. Analysis of two major signaling pathways implicated in MCF-7 cell proliferation showed that PKD1 overexpression significantly increased ERK1/2 phosphorylation state without affecting Akt phosphorylation. Moreover, PKD1 overexpression-stimulated cell proliferation and anchorage-independent growth were totally impaired by inhibition of the MEK/ERK kinase cascade. However, neither of these effects was affected by blocking the PI 3-kinase/Akt signaling pathway. Thus, the MEK/ERK signaling appears to be a determining pathway mediating the biological effects of PKD1 in MCF-7 cells. Taken together, all these data demonstrate that PKD1 overexpression increases the aggressiveness of MCF-7 breast cancer cells through enhancing their oncogenic properties and would, therefore, define PKD1 as a potentially new promising anti-tumor therapeutic target.

  2. Distributing Secret Keys with Quantum Continuous Variables: Principle, Security and Implementations

    E-Print Network [OSTI]

    Eleni Diamanti; Anthony Leverrier

    2015-06-09

    The ability to distribute secret keys between two parties with information-theoretic security, that is, regardless of the capacities of a malevolent eavesdropper, is one of the most celebrated results in the field of quantum information processing and communication. Indeed, quantum key distribution illustrates the power of encoding information on the quantum properties of light and has far reaching implications in high-security applications. Today, quantum key distribution systems operate in real-world conditions and are commercially available. As with most quantum information protocols, quantum key distribution was first designed for qubits, the individual quanta of information. However, the use of quantum continuous variables for this task presents important advantages with respect to qubit based protocols, in particular from a practical point of view, since it allows for simple implementations that require only standard telecommunication technology. In this review article, we describe the principle of continuous-variable quantum key distribution, focusing in particular on protocols based on coherent states. We discuss the security of these protocols and report on the state-of-the-art in experimental implementations, including the issue of side-channel attacks. We conclude with promising perspectives in this research field.

  3. Distributing Secret Keys with Quantum Continuous Variables: Principle, Security and Implementations

    E-Print Network [OSTI]

    Eleni Diamanti; Anthony Leverrier

    2015-08-31

    The ability to distribute secret keys between two parties with information-theoretic security, that is, regardless of the capacities of a malevolent eavesdropper, is one of the most celebrated results in the field of quantum information processing and communication. Indeed, quantum key distribution illustrates the power of encoding information on the quantum properties of light and has far reaching implications in high-security applications. Today, quantum key distribution systems operate in real-world conditions and are commercially available. As with most quantum information protocols, quantum key distribution was first designed for qubits, the individual quanta of information. However, the use of quantum continuous variables for this task presents important advantages with respect to qubit based protocols, in particular from a practical point of view, since it allows for simple implementations that require only standard telecommunication technology. In this review article, we describe the principle of continuous-variable quantum key distribution, focusing in particular on protocols based on coherent states. We discuss the security of these protocols and report on the state-of-the-art in experimental implementations, including the issue of side-channel attacks. We conclude with promising perspectives in this research field.

  4. Practical Attacks on Decoy State Quantum Key Distribution Systems with Detector Efficiency Mismatch

    E-Print Network [OSTI]

    Fei Yangyang; Gao Ming; Wang Weilong; Li Chaobo; Ma Zhi

    2015-07-23

    To the active basis choice decoy state quantum key distribution systems with detector efficiency mismatch, we present a modified attack strategy, which is based on faked states attack, with quantum nondemolition measurement ability to restress the threat of detector efficiency mismatch. Considering that perfect quantum nondemolition measurement ability dose not exist in real life, we also propose a practical attack strategy using photon number resolving detectors. Theoretical analysis and numerical simulation results show that, without changing the channel, our attack strategies are serious threats to decoy state quantum key distribution systems. The eavesdropper may get some information ab out the secret key without causing any alarms. Besides, the lower bound of detector efficiency mismatch to run our modified faked states attack successfully with perfect quantum nondemolition measurement ability is also given out, which provides the producers of quantum key distribution systems with a reference and can be treated as the approximate secure bound of detector efficiency mismatch in decoy state quantum key distribution systems.

  5. OIMB GK12 CURRICULUM Name: _____KEY__________ Fun Crab Facts!

    E-Print Network [OSTI]

    OIMB GK12 CURRICULUM Name: _____KEY__________ Fun Crab Facts! Eyestalk mouth antenna cheliped CURRICULUM Name: _____________________ Fun Crab Facts! Eyestalk Mouth Antenna Cheliped Carapace Walking metamorphosis motorcycle exoskeleton omnivores butterfly pea #12;OIMB GK12 CURRICULUM Masked crab Fiddler crab

  6. EnergySmart Schools National Financing Roundtable - Key Outcomes

    SciTech Connect (OSTI)

    2009-04-01

    This document presents key outcomes from the EnergySmart Schools National Financing Roundtable as a follow-up to the release of its Guide to FInancing EnergySmart Schools

  7. LANL breaks ground on key sediment control project

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    project LANL breaks ground on key sediment control project Called "grade-control" structures, the approximately 2 million features are up to eight feet high and made of rocks...

  8. Turbulence may be key to "fast magnetic reconnection" mystery

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    A paper published in the journal Nature asserts to have found the key to a long-standing mystery in plasma physics and astrophysics, and it's all about turbulence....

  9. Refine the Concept of Public Key Encryption with Delegated Search

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    with the public key of Bob, but unfortunately, her computer is infected by some virus which embeds a malware contents. However, in this way, Bob's computer will be under the risk of infection by the malware

  10. Worldwide Trends in Energy Use and Efficiency: Key Insights from...

    Open Energy Info (EERE)

    Trends in Energy Use and Efficiency: Key Insights from International Energy Agency (IEA) Indicator Analysis in Support of the Group of Eight (G8) Plan of Action Jump to:...

  11. A Key Review On Exergetic Analysis And Assessment Of Renewable...

    Open Energy Info (EERE)

    A Key Review On Exergetic Analysis And Assessment Of Renewable Energy Resources For A Sustainable Future Jump to: navigation, search OpenEI Reference LibraryAdd to library Journal...

  12. Mind Your Manners: Socially Appropriate Wireless Key Establishment for Groups

    E-Print Network [OSTI]

    Xu, Wenyuan

    Mind Your Manners: Socially Appropriate Wireless Key Establishment for Groups Cynthia Kuo Ahren students may want to (quietly) opt out of their friends' illicit file trading activities, but academics

  13. Practical Non-Interactive Key Distribution Based on Pairings

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    , the Private Key Generator (PKG), who possesses additional privileged information in the form of a master in a non- interactive system is that the synchronous communication between Alice and Bob is replaced

  14. Efficiency in Quantum Key Distribution Protocols using entangled Gaussian states

    E-Print Network [OSTI]

    Carles Rodó

    2010-05-14

    Efficiency is a key issue in any real implementation of a cryptographic protocol since the physical resources are not unlimited. We will first show that Quantum Key Distribution is possible with an "Entanglement based" scheme with NPPT symmetric Gaussian states in spite of the fact that these systems cannot be distilled with Gaussian operations (they are all bound entangled). In this work we analyze the secrecy properties of Gaussian states under Gaussian operations. Although such operations are useless for quantum distillation, we prove that it is possible to distill efficiently a secret key secure against finite coherent attacks from sufficiently entangled Gaussian states with non-positive partial transposition. Moreover, all such states allow for efficient key distillation, when the eavesdropper is assumed to perform individual attacks before in an efficient way.

  15. Reflective cracking of shear keys in multi-beam bridges 

    E-Print Network [OSTI]

    Sharpe, Graeme Peter

    2009-06-02

    strength to resist cracking from vehicular loads, but uneven temperature changes and shrinkage strains cause high tensile stresses in the shear key regions and lead to reflective cracking. The analyses showed the highest stresses were often times near...

  16. Key Factors in Displacement Ventilation Systems for Better IAQ 

    E-Print Network [OSTI]

    Wang, X.; Chen, J.; Li, Y.; Wang, Z.

    2006-01-01

    This paper sets up a mathematical model of three-dimensional steady turbulence heat transfer in an air-conditioned room of multi-polluting heat sources. Numerical simulation helps identify key factors in displacement ventilation systems that affect...

  17. Darcy Q. Hou State Key Laboratory of Hydraulic

    E-Print Network [OSTI]

    Tijsseling, A.S.

    Darcy Q. Hou State Key Laboratory of Hydraulic Engineering Simulation and Safety, and School to severe dam- ages. Over 50 incidents have been attributed to this mechanism and an accident was reported

  18. Cold Boot Key Recovery by Solving Polynomial Systems with Noise

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    the observed set of round subkeys in memory (computed via the cipher's key schedule operation), which were, for transparent en- cryption and decryption of data. One could apply the method from [9] to obtain the computer

  19. Quantum Public-Key Encryption with Information Theoretic Security

    E-Print Network [OSTI]

    Jiangyou Pan; Li Yang

    2012-02-20

    We propose a definition for the information theoretic security of a quantum public-key encryption scheme, and present bit-oriented and two-bit-oriented encryption schemes satisfying our security definition via the introduction of a new public-key algorithm structure. We extend the scheme to a multi-bitoriented one, and conjecture that it is also information theoretically secure, depending directly on the structure of our new algorithm.

  20. Final Results from U.S. FCEV Learning Demonstration (Presentation)

    SciTech Connect (OSTI)

    Wipke, K.; Sprik, S.; Kurtz, J.; Ramsden, T.; Ainscough, C.; Saur, G.

    2012-05-01

    This presentation discusses the objectives of the U.S. DOE Fuel Cell Electric Vehicle Learning Demonstration Project, describes NREL's technology validation approach, and summarizes key technical results from the project.

  1. Continuous Variable Quantum Key Distribution with a Noisy Laser

    E-Print Network [OSTI]

    Christian S. Jacobsen; Tobias Gehring; Ulrik L. Andersen

    2015-07-06

    Existing experimental implementations of continuous-variable quantum key distribution require shot-noise limited operation, achieved with shot-noise limited lasers. However, loosening this requirement on the laser source would allow for cheaper, potentially integrated systems. Here, we implement a theoretically proposed prepare-and-measure continuous-variable protocol and experimentally demonstrate the robustness of it against preparation noise stemming for instance from technical laser noise. Provided that direct reconciliation techniques are used in the post-processing we show that for small distances large amounts of preparation noise can be tolerated in contrast to reverse reconciliation where the key rate quickly drops to zero. Our experiment thereby demonstrates that quantum key distribution with non-shot-noise limited laser diodes might be feasible.

  2. Efficiency in Quantum Key Distribution Protocols with Entangled Gaussian States

    E-Print Network [OSTI]

    C. Rodó; O. Romero-Isart; K. Eckert; A. Sanpera

    2007-03-21

    Quantum key distribution (QKD) refers to specific quantum strategies which permit the secure distribution of a secret key between two parties that wish to communicate secretly. Quantum cryptography has proven unconditionally secure in ideal scenarios and has been successfully implemented using quantum states with finite (discrete) as well as infinite (continuous) degrees of freedom. Here, we analyze the efficiency of QKD protocols that use as a resource entangled gaussian states and gaussian operations only. In this framework, it has already been shown that QKD is possible (M. Navascu\\'es et al. Phys. Rev. Lett. 94, 010502 (2005)) but the issue of its efficiency has not been considered. We propose a figure of merit (the efficiency $E$) to quantify the number of classical correlated bits that can be used to distill a key from a sample of $N$ entangled states. We relate the efficiency of the protocol to the entanglement and purity of the states shared between the parties.

  3. Secret Key Generation via a Modified Quantum Secret Sharing Protocol

    SciTech Connect (OSTI)

    Smith IV, Amos M; Evans, Philip G; Lawrie, Benjamin J; Legre, Matthieu; Lougovski, Pavel; Ray, William R; Williams, Brian P; Qi, Bing; Grice, Warren P

    2015-01-01

    We present and experimentally show a novel protocol for distributing secret information between two and only two parties in a N-party single-qubit Quantum Secret Sharing (QSS) system. We demonstrate this new algorithm with N = 3 active parties over 6km of telecom. ber. Our experimental device is based on the Clavis2 Quantum Key Distribution (QKD) system built by ID Quantique but is generalizable to any implementation. We show that any two out of the N parties can build secret keys based on partial information from each other and with collaboration from the remaining N > 2 parties. This algorithm allows for the creation of two-party secret keys were standard QSS does not and signicantly reduces the number of resources needed to implement QKD on a highly connected network such as the electrical grid.

  4. Impact of ANSI X9.24-1:2009 Key Check Value on ISO/IEC 9797-1:2011 MACs

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Impact of ANSI X9.24-1:2009 Key Check Value on ISO/IEC 9797-1:2011 MACs Tetsu Iwata1 and Lei Wang2, wang.lei@ntu.edu.sg Abstract. ANSI X9.24-1:2009 specifies the key check value, which is used to verify check value. As a result, we obtain a complete characterization of the impact of using ANSI X9.24-1 key

  5. A Key to Common Caterpillar Pests of Vegetables 

    E-Print Network [OSTI]

    Sparks Jr., Alton N.; Liu, Tong-Xian

    2001-08-10

    of the head capsule. The proximity of the juncture of the adfrontal and epicranial sutures to the vertical triangle is used in separating armyworms and cutworms. Using the key The key will help you identify the most destructive and most com- mon caterpillar...; sp=spiracle Figure 3. Common arrangement of crochets on prolegs. A?complete circle B?semicircle C?two rows D?single row Figure 4. Head capsule of a caterpillar. vt=vertical triangle; epi=epicranial suture; adf=adfrontal suture 3 1 Body has numerous...

  6. Robust Shot Noise Measurement for Continuous Variable Quantum Key Distribution

    E-Print Network [OSTI]

    Sébastien Kunz-Jacques; Paul Jouguet

    2015-01-17

    We study a practical method to measure the shot noise in real time in Continuous Variable Quantum Key Distribution (CVQKD) systems. The amount of secret key that can be extracted from the raw statistics depends strongly on this quantity since it affects in particular the computation of the excess noise (i.e. noise in excess of the shot noise) added by an eavesdropper on the quantum channel. Some powerful quantum hacking attacks relying on faking the estimated value of the shot noise to hide an intercept and resend strategy were proposed. Here, we provide experimental evidence that our method can defeat the saturation attack and the wavelength attack.

  7. Feasibility of underwater free space quantum key distribution

    E-Print Network [OSTI]

    Peng Shi; Shi-Cheng Zhao; Wen-Dong Li; Yong-Jian Gu

    2014-04-04

    We investigate the optical absorption and scattering properties of underwater media pertinent to our underwater free space quantum key distribution (QKD) channel model. With the vector radiative transfer theory and Monte Carlo method, we obtain the attenuation of photons, the fidelity of the scattered photons, the quantum bit error rate and the sifted key generation rate of underwater quantum communication. It can be observed from our simulations that the most secure single photon underwater free space QKD is feasible in the clearest ocean water.

  8. Key Dates | U.S. DOE Office of Science (SC)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACTThousand Cubic Feet) SoldDepartment ofKenThousandtheKevlarKeyKey

  9. Introduction Main Result

    E-Print Network [OSTI]

    Yan, Catherine Huafei

    Introduction Main Result Enumeration Crossings and Nestings of Two Edges in Set Partitions Yan Crossings and Nestings of Set Partitions #12;Introduction Main Result Enumeration Definition} Catherine Yan Crossings and Nestings of Set Partitions #12;Introduction Main Result Enumeration Definition

  10. Cleanroom energy benchmarking results

    E-Print Network [OSTI]

    Tschudi, William; Xu, Tengfang

    2001-01-01

    emeu/consumption) Cleanroom benchmarking results, (http://Fok, and P. Rumsey. 2001. Cleanroom Energy Benchmarking inin the proceedings. Cleanroom Energy Benchmarking Results

  11. Dictionaries Using Variable-Length Keys and Data, with Applications *

    E-Print Network [OSTI]

    Blelloch, Guy E.

    (Isil- logn, 1) + Itil) and Isil is the length of bit string si. We assume a word length w > log m. We present string Isil > 1, Itil > 1 for all bit-strings si and ti. Fox' fixed-length keys the dictionary problem

  12. Key Factors for Digital Collections August 7, 2007

    E-Print Network [OSTI]

    by Fondren's Digital Library Initiative We evaluate digital projects on a case by case basis. There is no oneKey Factors for Digital Collections August 7, 2007 Rice University Digital Repository Supported formula for this process and in fact welcome open discussion on potential digital projects

  13. Automation-considered Logic of Authentication and Key Distribution

    E-Print Network [OSTI]

    Kwon, Taekyoung

    methods are focused on the automation-based model checking that relies on building a finite modelAutomation-considered Logic of Authentication and Key Distribution Taekyoung Kwon1 and Seongan Lim2 Abstract. This paper presents an automation-considered logic of au- thentication for reasoning about

  14. Offshore Wind Power Experiences, Potential and Key Issues for

    E-Print Network [OSTI]

    offshore wind farms are installed in British, Swedish and Danish waters, and present-day costs in 2015, 2030 and 2050 14 3.1 Offshore wind farms under construction and in planning stage 14 3Offshore Wind Power Experiences, Potential and Key Issues for Deployment Jørgen Lemming, Poul Erik

  15. Architecture of the Secoqc Quantum Key Distribution network

    E-Print Network [OSTI]

    Mehrdad Dianati; Romain Alleaume

    2006-10-25

    The European projet Secoqc (Secure Communication based on Quantum Cryptography) aims at developing a global network for unconditionally secure key distribution. This paper specifies the requirements and presents the principles guiding the design of this network, and relevant to its architecture and protocols.

  16. The Key Coal Producers ONLINE SUPPORTING MATERIALS to

    E-Print Network [OSTI]

    Patzek, Tadeusz W.

    The Key Coal Producers ONLINE SUPPORTING MATERIALS to A Global Coal Production Forecast with Multi's most important coal-producing area is North-Central China. The provinces of Inner Mongolia, Ningxia, Shaanxi and Shanxi together accounted for 83 percent of China's proven coal reserves in 2000, and Shanxi

  17. Preparing Turkey Safely Turkey provides protein along with other key

    E-Print Network [OSTI]

    Preparing Turkey Safely Nutrition Turkey provides protein along with other key nutrients. A serving is 3 ounces cooked poultry (about the size of a deck of cards). One serving of roasted, skinless turkey protein; iron--8% daily value Right Size Turkey Use this chart as a helpful guide: Whole bird ­ 1 pound

  18. PEM FUEL CELL TECHNOLOGY Key Research Needs and Approaches

    E-Print Network [OSTI]

    Developer University #12;8 FUEL CELL RESEARCH NEEDS MEA optimization should focus on new materials Pt (full1 PEM FUEL CELL TECHNOLOGY Key Research Needs and Approaches Tom Jarvi UTC Power South Windsor, CT 06074 23 January 2008 #12;2 UTC POWER MARKET FOCUS Transportation Fuel Cells On-Site Power Solutions #12

  19. GIS and Spectral Soil Laboratory Key faculty member: Sabine Grunwald

    E-Print Network [OSTI]

    Ma, Lena

    GIS and Spectral Soil Laboratory Key faculty member: Sabine Grunwald Contact: Soil and Water information systems (GIS), geostatistical and statistical methods, space-time landscape modeling, remote laboratory. Available software include: MS Office Suite; MS SQL database; ArcGIS Suite (ESRI) including

  20. Experimental quantum key distribution with proven security against realistic attacks

    E-Print Network [OSTI]

    Salvail, Louis

    , center of the Danish National Research Foundation, Dept. of Computer Science,University of Aarhus,8000, Denmark Abstract We report on a realization of a fully automated 20 km quantum key distribution system­ cated security analysis against realistic attacks is used to optimize the system parameters in order

  1. Experimental quantum key distribution without monitoring signal disturbance

    E-Print Network [OSTI]

    Hiroki Takesue; Toshihiko Sasaki; Kiyoshi Tamaki; Masato Koashi

    2015-05-29

    Since the invention of Bennett-Brassard 1984 (BB84) protocol, many quantum key distribution (QKD) protocols have been proposed and some protocols are operated even in field environments. One of the striking features of QKD is that QKD protocols are provably secure unlike cryptography based on computational complexity assumptions. It has been believed that, to guarantee the security of QKD, Alice and Bob have to monitor the statistics of the measurement outcomes which are used to determine the amount of the privacy amplification to generate a key. Recently a new type of QKD protocol, called round robin differential phase shift (RRDPS) protocol, was proposed, and remarkably this protocol can generate a key without monitoring any statistics of the measurement outcomes. Here we report an experimental realization of the RRDPS protocol. We used a setup in which Bob randomly chooses one from four interferometers with different pulse delays so that he could implement phase difference measurements for all possible combinations with five-pulse time-bin states. Using the setup, we successfully distributed keys over 30 km of fiber, making this the first QKD experiment that does not rely on signal disturbance monitoring.

  2. The Seven Keys to Success in Energy Management and Conservation 

    E-Print Network [OSTI]

    Darby, D. F.

    1984-01-01

    This paper is a summary of the seven key elements of the Deere & Company Energy Management and Conservation Program. These elements have been found to be essential for the ultimate success of any company-wide energy management program. The process...

  3. FAST GENERATORS FOR THE DIFFIEHELLMAN KEY AGREEMENT PROTOCOL

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    FAST GENERATORS FOR THE DIFFIE­HELLMAN KEY AGREEMENT PROTOCOL AND MALICIOUS STANDARDS BOAZ TSABAN­order cyclic group. Some generators allow faster exponentiation. We show that to a large extent, using the fast that if there is some case in which fast generators are less secure, then this could be used by a malicious authority

  4. FAST GENERATORS FOR THE DIFFIE-HELLMAN KEY AGREEMENT PROTOCOL

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    FAST GENERATORS FOR THE DIFFIE-HELLMAN KEY AGREEMENT PROTOCOL AND MALICIOUS STANDARDS BOAZ TSABAN, using the fast generators is as secure as using a randomly chosen generator. On the other hand, we show that if there is some case in which fast generators are less secure, then this could be used by a malicious authority

  5. Appendix 30 Fire Effects on Key Ecological Processes in Forested

    E-Print Network [OSTI]

    Appendix 30 Fire Effects on Key Ecological Processes in Forested Ecosystems The following paragraphs on fire effects on forest succession are from Stickney (1982) Forest Succession ...the severity of the pre-disturbance forest herb species also demonstrated the ability to survive fire, particularly those

  6. Outline Overview Design Principles Key Points Design Principles

    E-Print Network [OSTI]

    Almulhem, Ahmad

    Engineering Department, KFUPM Spring 2008 Ahmad Almulhem - Network Security Engineering - 2008 1 / 12 #12-Safe Defaults Economy of Mechanism Complete Mediation Open Design Separation of Privilege Least Common Mechanism Psychological Acceptability 3 Key Points Ahmad Almulhem - Network Security Engineering - 2008 2 / 12 #12;Outline

  7. Annual Report 2004 1 Key events during 2004

    E-Print Network [OSTI]

    Svenningsson, Josef

    Johansson studying the separation of carbon dioxide in a reactor system for two-stage combustion. #12;1 Key for innovation systems and entrepreneurship A year of anniversaries ­ the University, the Foundation, Chalmers are among those hardest struck,but many holidaying Swedes,especially in Thailand,fall victim to the tsunami

  8. MOLECULAR ENTOMOLOGY Molecular Identification Key for Pest Species of Scirtothrips

    E-Print Network [OSTI]

    Hoddle, Mark S.

    primers and determining the size of the products by using standard agarose gel electrophoresis, followed, Neohydatothrips, molecular identiÞcation key, exotic pests, nondestruc- tive DNA extraction The genus Scirtothrips, several species of Scirtothrips have (or have the potential to) spread from their natural habitats

  9. Introduction Adhesion complexes play key roles in many events, including

    E-Print Network [OSTI]

    Hardin, Jeff

    Introduction Adhesion complexes play key roles in many events, including cell migration cell adhesion are remarkably similar in Caenorhabditis elegans, Drosophila and humans (Hynes and Zhao to reveal much about the basic, conserved molecular mechanisms that mediate and regulate cell adhesion

  10. Keys for growth in Japan's mature mobile market

    E-Print Network [OSTI]

    Oto, Hiroyuki

    2005-01-01

    The objective of this thesis is to identify key factors that will produce further growth for NTT DoCoMo in Japan's mature mobile market. Since the early 1990s, the mobile phone market in Japan has grown rapidly, and ...

  11. Page 1 of 4 Creating and Submitting a Key Request

    E-Print Network [OSTI]

    Howitt, Ivan

    of employees. Enter search criteria in the search fields available and select the down red arrow to filter the terms. #12;Page 3 of 4 13. On the Key Request Form - Room List windowpane, select Add New. 14 use the Select Drawing button after entering the building and floor to display the floor plan

  12. news and views A key issue for hydrogen storage materi-

    E-Print Network [OSTI]

    Palumbi, Stephen

    news and views A key issue for hydrogen storage materi- als is that the hydrogenation and dehydro be possible to discover stable hydrogen hydrates with higher storage Hydrogen Posture Plan www.eere.energy.gov/hydrogenandfuelcells/pdfs/ hydrogen_posture_plan.pdf 7. Kuhs, W

  13. Key Directions and a Roadmap for Electrical Design for Manufacturability

    E-Print Network [OSTI]

    Kahng, Andrew B.

    Key Directions and a Roadmap for Electrical Design for Manufacturability (Invited Talk) Andrew B by design and design-for- manufacturability (DFM) techniques. This talk addresses trends and a roadmap assumptions come true? The second part will give a roadmap for electrical DFM technologies, motivated

  14. Key Title Marine Ecology www.wiley.com

    E-Print Network [OSTI]

    Wall, Diana

    Key Title Marine Ecology www.wiley.com Antarctic Ecosystems: An Extreme Environment in a Changing their genomes. Chapters address both Antarctic terrestrial and marine ecosystems, and the scientific and evolution Part II: Marine habitats and regions Chapter 4. The impact of regional climate change

  15. Key Facts About Hurricane Readiness Preparing for a Hurricane

    E-Print Network [OSTI]

    HURRICANES Key Facts About Hurricane Readiness Preparing for a Hurricane If you are under a hurricane watch or warning, here are some basic steps to take to prepare for the storm: · Learn about your. · Identify potential home hazards and know how to secure or protect them before the hurricane strikes

  16. Definitions Main Result

    E-Print Network [OSTI]

    Heubach, Silvia

    Background Definitions Main Result Special Types of Patterns Summary Avoidance of partially ordered Avoidance of partially ordered patterns in compositions #12;Background Definitions Main Result Special Types of Patterns Summary Outline 1 Background 2 Definitions 3 Main Result Preliminaries Main Result 4 Special Types

  17. been the key to their success is the use of high-throughput experiments to assess various zeo-

    E-Print Network [OSTI]

    Silver, Whendee

    it and the resulting pore structure. It could be that the hexamethonium molecules pack in such a way as to providebeen the key to their success is the use of high- throughput experiments to assess various zeo and shape of the resulting pores cor- responds to the size and shape of the organic molecule. ITQ-33

  18. Notes on the CRTDH Group Key Agreement Protocol Spyros Magliveras and Wandi Wei

    E-Print Network [OSTI]

    Magliveras, Spyros

    , the distributed schemes help in the uniform distribution of the work-load for key management and eliminate: xkzou@cs.iupui.edu Abstract Group key management (GKM) is one of the primary is- sues for secure group Key Management (GKM), Contributory Group Key Agreement, Chinese Remainder Theorem, Diffie-Hellman Key

  19. An archaeological Survey of the Proposed Royal Oil and Gas Corporation Foster Minerals D-1 Well and Access Road in the Sam Houston National Forest, San Jacinto County, Texas 

    E-Print Network [OSTI]

    Moore, William

    2015-06-05

    . of Corpus Christi, Texas. The project area is the Foster Minerals D-1 well and access road in the Sam Houston National Forest, San Jacinto County, Texas. This investigation was performed using the pedestrian survey method supported by shovel testing...

  20. Data:B831a092-b2f7-4f35-957e-d1fa374af3a8 | Open Energy Information

    Open Energy Info (EERE)

    f35-957e-d1fa374af3a8 No revision has been approved for this page. It is currently under review by our subject matter experts. Jump to: navigation, search Loading... 1. Basic...

  1. Hazard analysis results report

    SciTech Connect (OSTI)

    Niemi, B.J., Westinghouse Hanford

    1996-09-30

    This document describes and defines the Hazard Analysis Results for the Tank Waste Remediation System Final Safety Analysis Report.

  2. Simple rate-adaptive LDPC coding for quantum key distribution

    E-Print Network [OSTI]

    Mo Li; Chun-Mei Zhang; Zhen-Qiang Yin; Wei Chen; Chuan Wang; Zheng-Fu Han

    2015-05-24

    Although quantum key distribution (QKD) comes from the development of quantum theory, the implementation of a practical QKD system does involve a lot of classical process, such as key reconciliation and privacy amplification, which is called post-processing. Post-processing has been a crucial element to high speed QKD systems, even the bottleneck of it because of its relatively high time consumption. Low density parity check (LDPC) is now becoming a promising approach of overcoming the bottleneck due to its good performance in processing throughput. In this article we propose and simulate an easily implemented but efficiently rate-adaptive LDPC coding approach of reconciliation, different from the previously proposed puncturing- and shortening-based approach. We also give a measure for choosing the optimal LDPC parameter for our rate-adaptive approach according to error rates.

  3. Quantum Hacking on Quantum Key Distribution using Homodyne Detection

    E-Print Network [OSTI]

    Jing-Zheng Huang; Sébastien Kunz-Jacques; Paul Jouguet; Christian Weedbrook; Zhen-Qiang Yin; Shuang Wang; Wei Chen; Guang-Can Guo; Zheng-Fu Han

    2014-02-27

    Imperfect devices in commercial quantum key distribution systems open security loopholes that an eavesdropper may exploit. An example of one such imperfection is the wavelength dependent coupling ratio of the fiber beam splitter. Utilizing this loophole, the eavesdropper can vary the transmittances of the fiber beam splitter at the receiver's side by inserting lights with wavelengths different from what is normally used. Here, we propose a wavelength attack on a practical continuous-variable quantum key distribution system using homodyne detection. By inserting light pulses at different wavelengths, this attack allows the eavesdropper to bias the shot noise estimation even if it is done in real time. Based on experimental data, we discuss the feasibility of this attack and suggest a prevention scheme by improving the previously proposed countermeasures.

  4. 1. Aim of the Code of Practice 2. Key points

    E-Print Network [OSTI]

    Roelleke, Thomas

    family leave provisions 1August 2011 #12;1 Aim of the Code of Practice The aim is to: 1 promote good1. Aim of the Code of Practice 2. Key points 3. Maternity leave and pay 4. Ante-natal leave 5. Compassionate leave for family and other reasons 1 1 3 4 5 7 8 9 10 HR Code of Practice 14. Maternity and other

  5. Key Renewable Energy Opportunities for Oklahoma Tribes | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCED MANUFACTURING OFFICE INDUSTRIALU.S. DepartmentJeanKey Meeting Takeaways from 2014 Meeting

  6. Key Activities in Energy Efficiency | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterested Parties - WAPA Public CommentInverted253.16582104) Kenmore: ENERGYKevinKey

  7. Key Concepts in Project Development and Financing in Alaska

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterested Parties - WAPA Public CommentInverted253.16582104) Kenmore:Key2: Project

  8. Vehicle Technologies Office: Key Activities in Vehicles | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative FuelsofProgram: Report1538-1950 TimelineUtility-ScaleTechnology|Energy Key

  9. Conformal Partial Waves: Further Mathematical Results

    E-Print Network [OSTI]

    Dolan, F A

    2011-01-01

    Further results for conformal partial waves for four point functions for conformal primary scalar fields in conformally invariant theories are obtained. They are defined as eigenfunctions of the differential Casimir operators for the conformal group acting on two variable functions subject to appropriate boundary conditions. As well as the scale dimension $\\Delta$ and spin $\\ell$ the conformal partial waves depend on two parameters $a,b$ related to the dimensions of the operators in the four point function. Expressions for the Mellin transform of conformal partial waves are obtained in terms of polynomials of the Mellin transform variables given in terms of finite sums. Differential operators which change $a,b$ by $\\pm 1$, shift the dimension $d$ by $\\pm 2$ and also change $\\Delta,\\ell$ are found. Previous results for $d=2,4,6$ are recovered. The trivial case of $d=1$ and also $d=3$ are also discussed. For $d=3$ formulae for the conformal partial waves in some restricted cases as a single variable integral re...

  10. Relaxation mechanisms affecting magneto-optical resonances in an extremely thin cell: experiment and theory for the cesium D$_1$ line

    E-Print Network [OSTI]

    Auzinsh, M; Ferber, R; Gahbauer, F; Kalnins, U; Kalvans, L; Rundans, R; Sarkisyan, D

    2014-01-01

    We have measured magneto-optical signals obtained by exciting the $D_1$ line of cesium atoms confined to an extremely thin cell (ETC), whose walls are separated by less than one micrometer, and developed an improved theoretical model to describe these signals with experimental precision. The theoretical model was based on the optical Bloch equations and included all neighboring hyperfine transitions, the mixing of the magnetic sublevels in an external magnetic field, and the Doppler effect, as in previous studies. However, in order to model the extreme conditions in the ETC more realistically, the model was extended to include a unified treatment of transit relaxation and wall collisions with relaxation rates that were obtained directly from the thermal velocities of the atoms and the length scales involved. Furthermore, the interaction of the atoms with different regions of the laser beam were modeled separately to account for the varying laser beam intensity over the beam profile as well as saturation effec...

  11. Overview of ALICE results

    E-Print Network [OSTI]

    Antonio Ortiz; for the ALICE Collaboration

    2015-01-22

    The ALICE detector was designed to study the physics of matter under extreme conditions of high energy density. Different results were reported by the experiment using data from the successful run I of the LHC. The goal of the present work is to present an overview of recent ALICE results. This comprises selected results from several analyses of pp, p-pb and Pb-Pb data at the LHC energies.

  12. Practical Training in Microalgae Utilization with Key Industry Engineering Group Key Industry Engineering Group s.r.o. has developed a biotechnology for the production of an animal

    E-Print Network [OSTI]

    Practical Training in Microalgae Utilization with Key Industry Engineering Group Key Industry on a suspension of Planktochlorella microalgae. The product consists of a suspension of algae in the growing

  13. Recent results from TRISTAN

    SciTech Connect (OSTI)

    Enomoto, Ryoji [National Laboratory for High Energy Physics, Ibaraki (Japan)

    1997-01-01

    TRISTAN results on {gamma}{gamma} physics from 1994 to 1995 are reviewed in this report. We have systematically investigated jet production, the {gamma}-structure function, and charm pair production in {gamma}{gamma} processes. The results are discussed, and future prospects are presented.

  14. Gaussian Quadrature Inference for Multicarrier Continuous-Variable Quantum Key Distribution

    E-Print Network [OSTI]

    Laszlo Gyongyosi

    2015-04-21

    We propose the Gaussian quadrature inference (GQI) method for multicarrier continuous-variable quantum key distribution (CVQKD). A multicarrier CVQKD protocol utilizes Gaussian subcarrier quantum continuous variables (CV) for information transmission. The GQI framework provides a minimal error estimate of the quadratures of the CV quantum states from the discrete, measured noisy subcarrier variables. GQI utilizes the fundamentals of regularization theory and statistical information processing. We characterize GQI for multicarrier CVQKD, and define a method for the statistical modeling and processing of noisy Gaussian subcarrier quadratures. We demonstrate the results through the adaptive multicarrier quadrature division (AMQD) scheme. We define direct GQI (DGQI), and prove that it achieves a theoretical minimal magnitude error. We introduce the terms statistical secret key rate and statistical private classical information, which quantities are derived purely by the statistical functions of GQI. We prove the secret key rate formulas for a multiple access multicarrier CVQKD via the AMQD-MQA (multiuser quadrature allocation) scheme. The GQI and DGQI frameworks can be established in an arbitrary CVQKD protocol and measurement setting, and are implementable by standard low-complexity statistical functions, which is particularly convenient for an experimental CVQKD scenario.

  15. Sensitivity and Scenario Results

    E-Print Network [OSTI]

    Yu, Winston

    Presents the results of various scenarios using models used to study water, climate, agriculture and the economy in Pakistan's Indus Basin, and discusses the policy and investment implications. The water allocations per ...

  16. NA57 main results

    E-Print Network [OSTI]

    G. E. Bruno; for the NA57 Collaboration

    2007-10-15

    The CERN NA57 experiment was designed to study the production of strange and multi-strange particles in heavy ion collisions at SPS energies; its physics programme is essentially completed. A review of the main results is presented.

  17. Electroweak results from CDF

    SciTech Connect (OSTI)

    D. S. Waters

    2004-06-02

    Inclusive W and Z production cross-sections have been measured by CDF and certain electroweak parameters extracted with high precision from these measurements. New results on diboson production at the Tevatron are also presented.

  18. Solar neutrinos results and oscillation analysis from SuperKamiokande

    E-Print Network [OSTI]

    Tokyo, University of

    ­Kamiokande is presented. The precise measurement of the solar neutrino enegy spectrum is one of the most important keyHE.4.1.12 Solar neutrinos results and oscillation analysis from Super­Kamiokande Y. Koshio 1­Mozumi Kamioka, Gifu 506­1205, Japan Abstract The results of the solar neutrino spectrum measurement in Super

  19. Some results on Euler class groups Manoj K. Keshari

    E-Print Network [OSTI]

    Keshari, Manoj

    Some results on Euler class groups Manoj K. Keshari Department of Mathematics, IIT Mumbai, Mumbai element, then w(P) is the zero map. Mathematics Subject Classification (2000): Primary 13C10. Key words a unimodular element, then w(P) is the zero map. We will generalize above results as follows. Let

  20. 2014 CATEE: Collaboration is the Key- Public/Private Partnerships 

    E-Print Network [OSTI]

    Lin, L.

    2014-01-01

    stream_source_info ESL-KT-14-11-24.pdf.txt stream_content_type text/plain stream_size 9508 Content-Encoding UTF-8 stream_name ESL-KT-14-11-24.pdf.txt Content-Type text/plain; charset=UTF-8 2014 CATEE Collaboration... is the Key - Public/Private Partnerships November 19, 2014 Lisa Lin, Sustainability Manager, City of Houston ESL-KT-14-11-24 CATEE 2014: Clean Air Through Efficiency Conference, Dallas, Texas Nov. 18-20 City of Houston Energy Efficiency Programs 2000...

  1. Upconversion based receivers for quantum hacking resistant quantum key distribution

    E-Print Network [OSTI]

    Nitin Jain; Gregory S. Kanter

    2015-09-21

    We propose a novel upconversion (sum frequency generation) based quantum-optical setup that can be employed as a receiver (Bob) in practical quantum key distribution systems. The pump governing the upconversion process is produced and utilized inside the physical receiver, making its access or control unrealistic for an external adversary (Eve). This pump facilitates several properties which permit Bob to define and control the modes that can participate in the quantum measurement. Furthermore, by manipulating and monitoring the characteristics of the pump pulses, Bob can detect a wide range of quantum hacking attacks launched by Eve.

  2. KeyTex Energy LLC | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History View NewTexas: Energy ResourcesOrder atHills,NewKeithDelaware:DLRKettering,KeyTex Energy LLC Jump

  3. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach HomeA Better Anode Design to Improve Lithium-Ion Batteries Print Lithium-ionA FirstA Key Enzyme to the

  4. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach HomeA Better Anode Design to Improve Lithium-Ion Batteries Print Lithium-ionA FirstA Key Enzyme to theA

  5. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach HomeA Better Anode Design to Improve Lithium-Ion Batteries Print Lithium-ionA FirstA Key Enzyme to theAA

  6. Florida Keys El Coop Assn, Inc | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LISTStar2-0057-EA Jump to:ofEnia SpAFlex Fuels Energy Jump to:Flora HomeKeys El Coop

  7. SimTable key tool for preparing, responding to wildfire

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust,Field-effect Photovoltaics -7541 UnlimitedShift EndShutdownSolar PhotovoltaicSimTable key

  8. Sandia Energy - The Brain: Key To a Better Computer

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-Throughput AnalysisSinkholeCapabilities General overview of theBrain: Key To a

  9. Catalysis Center for Energy Innovation KEY ACCOMPLISHMENTS AND CORE CAPABILITIES

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory of raregovAboutRecoveryplanning Career Planning for theFebruary 26, 2014andKEY

  10. GE Key Partner in Innovation Institutes | GE Global Research

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HABFESOpportunities Nuclear Physics (NP)aboutRio de Janeiro,theIs Key

  11. Key Dates | U.S. DOE Office of Science (SC)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACTThousand Cubic Feet) SoldDepartment ofKenThousandtheKevlar andKey5

  12. Key Dates | U.S. DOE Office of Science (SC)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACTThousand Cubic Feet) SoldDepartment ofKenThousandtheKevlarKey Dates

  13. Key Dates | U.S. DOE Office of Science (SC)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACTThousand Cubic Feet) SoldDepartment ofKenThousandtheKevlarKey

  14. Iron is the Key to Preserving Dinosaur Soft Tissue

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation CurrentHenryInhibitingInteractivePGAS andUniversity IonIron is the Key to

  15. Key Publications - Natural Gas Regulation | Department of Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJesse Bergkamp Graduate student Subtask 4Photo4> TheKevin MorrisKey

  16. Robotics Key to Subsea Exploration | GE Global Research

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II) byMultidayAlumni > The Energy Materials CenterRobotics Key to Subsea

  17. Minimum Energy Per Bit for Secret Key Acquisition Over Multipath Wireless Channels

    E-Print Network [OSTI]

    Sayeed, Akbar M.

    Minimum Energy Per Bit for Secret Key Acquisition Over Multipath Wireless Channels Tzu-Han Chou the secret key capacity. We analyze the low-SNR regime to quantify the minimum energy per secret key bit of conventional channel capacity, there is a non-zero SNR that achieves the minimum energy per key bit. A time

  18. A look at the PGP ecosystem through the key server data

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    to be challenging. GnuPG does not provide library access to low level functions that would allow parsing the data-based encryption systems use a network of key servers to share public keys. These key server operate on an add only basis, thus the data gives us access to PGP public keys from over 20 years of PGP usage. Analyzing

  19. Additionally, a key based primarily on vegetative features is pro-vided for North Carolina species of Desmodium.

    E-Print Network [OSTI]

    Krings, Alexander

    Additionally, a key based primarily on vegetative features is pro- vided for North Carolina species of Desmodium. METHODS The foliar morphology of North Carolina Desmodium species was critically studied based by Wilbur (1963). RESULTS and DISCUSSION North Carolina Desmodium species can be artificially categorized

  20. Implementing Performance-Based Sustainability Requirements for the Low Carbon Fuel Standard – Key Design Elements and Policy Considerations

    E-Print Network [OSTI]

    Yeh, Sonia; Sumner, Daniel A.; Kaffka, Stephen R.; Ogden, J; Jenkins, Bryan M.

    2009-01-01

    Standard – Key Design Elements and Policy ConsiderationsStandard ? Key Design Elements and Policy Considerations:Standard ? Key Design Elements and Policy Considerations:

  1. Photon counting for quantum key distribution with Peltier cooled InGaAs/InP APD's

    E-Print Network [OSTI]

    Damien Stucki; Grégoire Ribordy; André Stefanov; Hugo Zbinden; John G. Rarity; Tom Wall

    2001-06-01

    The performance of three types of InGaAs/InP avalanche photodiodes is investigated for photon counting at 1550 nm in the temperature range of thermoelectric cooling. The best one yields a dark count probability of $% 2.8\\cdot 10^{-5}$ per gate (2.4 ns) at a detection efficiency of 10% and a temperature of -60C. The afterpulse probability and the timing jitter are also studied. The results obtained are compared with those of other papers and applied to the simulation of a quantum key distribution system. An error rate of 10% would be obtained after 54 kilometers.

  2. Photon counting for quantum key distribution with Peltier cooled InGaAs/InP APD's

    E-Print Network [OSTI]

    Stucki, D; Stefanov, A; Zbinden, H; Rarity, J G; Wall, T; Stucki, Damien; Ribordy, Gr\\'{e}goire; Stefanov, Andr\\'{e}; Zbinden, Hugo; Rarity, John G.; Wall, Tom

    2001-01-01

    The performance of three types of InGaAs/InP avalanche photodiodes is investigated for photon counting at 1550 nm in the temperature range of thermoelectric cooling. The best one yields a dark count probability of $% 2.8\\cdot 10^{-5}$ per gate (2.4 ns) at a detection efficiency of 10% and a temperature of -60C. The afterpulse probability and the timing jitter are also studied. The results obtained are compared with those of other papers and applied to the simulation of a quantum key distribution system. An error rate of 10% would be obtained after 54 kilometers.

  3. Bright Integrated Photon-Pair Source for Practical Passive Decoy-State Quantum Key Distribution

    E-Print Network [OSTI]

    Stephan Krapick; Michael Stefszky; Michal Jachura; Benjamin Brecht; Malte Avenhaus; Christine Silberhorn

    2014-01-28

    We report on a bright, nondegenerate type-I parametric down-conversion source, which is well suited for passive decoy-state quantum key distribution. We show the photon-number-resolved analysis over a broad range of pump powers and we prove heralded higher-order $n$-photon states up to $n=4$. The inferred photon click statistics exhibit excellent agreements to the theoretical predictions. From our measurement results we conclude that our source meets the requirements to avert photon-number-splitting attacks.

  4. Observations of Supernova Remnants and Pulsar Wind Nebulae: A VERITAS Key Science Project

    E-Print Network [OSTI]

    Humensky, Brian

    2009-01-01

    The study of supernova remnants and pulsar wind nebulae was one of the Key Science Projects for the first two years of VERITAS observations. VERITAS is an array of four imaging Cherenkov telescopes located at the Whipple Observatory in southern Arizona. Supernova remnants are widely considered to be the strongest candidate for the source of cosmic rays below the knee at around 10^15 eV. Pulsar wind nebulae are synchrotron nebulae powered by the spin-down of energetic young pulsars, and comprise one of the most populous very-high-energy gamma-ray source classes. This poster will summarize the results of this observation program.

  5. Room temperature single-photon detectors for high bit rate quantum key distribution

    SciTech Connect (OSTI)

    Comandar, L. C.; Patel, K. A.; Fröhlich, B. Lucamarini, M.; Sharpe, A. W.; Dynes, J. F.; Yuan, Z. L.; Shields, A. J.; Penty, R. V.

    2014-01-13

    We report room temperature operation of telecom wavelength single-photon detectors for high bit rate quantum key distribution (QKD). Room temperature operation is achieved using InGaAs avalanche photodiodes integrated with electronics based on the self-differencing technique that increases avalanche discrimination sensitivity. Despite using room temperature detectors, we demonstrate QKD with record secure bit rates over a range of fiber lengths (e.g., 1.26 Mbit/s over 50?km). Furthermore, our results indicate that operating the detectors at room temperature increases the secure bit rate for short distances.

  6. Recent results from MAC

    SciTech Connect (OSTI)

    MAC Collaboration

    1982-05-01

    Some preliminary results from the MAC detector at PEP are presented. These include measurements of the angular distribution of ..gamma gamma.., ..mu mu.. and tau tau final states, a determination of the tau lifetime, a measurement of R, and a presentation of the inclusive muon p/sub perpendicular/ distribution for hadronic events.

  7. Plans, Implementation, and Results

    Broader source: Energy.gov [DOE]

    The Bioenergy Technologies Office carries out technology research, development, and deployment through an ongoing process of planning and analysis, implementation, and review. This Web page includes links to documents that support and document the program management process, and the results and public benefits that derive from it.

  8. Supplementary Results Behavioral Performance

    E-Print Network [OSTI]

    Knutson, Brian

    of the performance measures. #12;Full Brain fMRI Analyses for Reward Anticipation See Tables 1 and 2 for the results of whole brain analyses. #12;Table 1. Patterns of Activation for Contrasts of BOLD Signal Immediately coordinates Area Side Talairach coordinates Area Side -24,-32,55 Postcentral gyrus Left 23,0,67 Middle frontal

  9. Cleanroom energy benchmarking results

    SciTech Connect (OSTI)

    Tschudi, William; Xu, Tengfang

    2001-09-01

    A utility market transformation project studied energy use and identified energy efficiency opportunities in cleanroom HVAC design and operation for fourteen cleanrooms. This paper presents the results of this work and relevant observations. Cleanroom owners and operators know that cleanrooms are energy intensive but have little information to compare their cleanroom's performance over time, or to others. Direct comparison of energy performance by traditional means, such as watts/ft{sup 2}, is not a good indicator with the wide range of industrial processes and cleanliness levels occurring in cleanrooms. In this project, metrics allow direct comparison of the efficiency of HVAC systems and components. Energy and flow measurements were taken to determine actual HVAC system energy efficiency. The results confirm a wide variation in operating efficiency and they identify other non-energy operating problems. Improvement opportunities were identified at each of the benchmarked facilities. Analysis of the best performing systems and components is summarized, as are areas for additional investigation.

  10. Tevatron Top Results

    E-Print Network [OSTI]

    Christophe Clement

    2006-05-28

    I present the latest results from the CDF and D0 collaborations on top quark production (single top and top quark pair production) at the Tevatron proton-antiproton collider at sqrt(s) =1.96 TeV, measurements of the top quark decay properties such as the branching ratio B(t -> Wb), the W helicity in t -> Wb decays, and measurements of fundamental parameters such as the top quark charge and mass.

  11. Double Chooz: Latest results

    E-Print Network [OSTI]

    J. I. Crespo-Anadón; for the Double Chooz collaboration

    2014-12-11

    The latest results from the Double Chooz experiment on the neutrino mixing angle $\\theta_{13}$ are presented. A detector located at an average distance of 1050 m from the two reactor cores of the Chooz nuclear power plant has accumulated a live time of 467.90 days, corresponding to an exposure of 66.5 GW-ton-year (reactor power $\\times$ detector mass $\\times$ live time). A revised analysis has boosted the signal efficiency and reduced the backgrounds and systematic uncertainties compared to previous publications, paving the way for the two detector phase. The measured $\\sin^2 2\\theta_{13} = 0.090^{+0.032}_{-0.029}$ is extracted from a fit to the energy spectrum. A deviation from the prediction above a visible energy of 4 MeV is found, being consistent with an unaccounted reactor flux effect, which does not affect the $\\theta_{13}$ result. A consistent value of $\\theta_{13}$ is measured in a rate-only fit to the number of observed candidates as a function of the reactor power, confirming the robustness of the result.

  12. Security of Power Packet Dispatching Using Differential Chaos Shift Keying

    E-Print Network [OSTI]

    Yanzi Zhou; Ryo Takahashi; Takashi Hikihara

    2015-02-19

    This paper investigates and confirms one advantageous function of a power packet dispatching system, which has been proposed by authors' group with being apart from the conventional power distribution system. Here is focused on the function to establish the security of power packet dispatching for prohibiting not only information but also power of power packet from being stolen by attackers. For the purpose of protecting power packets, we introduce a simple encryption of power packets before sending them. Encryption scheme based on chaotic signal is one possibility for this purpose. This paper adopts the Differential Chaos Shift Keying (DCSK) scheme for the encryption, those are partial power packet encryption and whole power packet encryption.

  13. Modern hydrocracking is the key to upgrading processes

    SciTech Connect (OSTI)

    Corbett, R.A.

    1989-06-26

    Hydrocracking technology is the key to Canada's heavy oil and bitumen upgrading facilities that have recently started or are due to start up during the next few years. The upgrader at Consumers' Cooperative Refineries Ltd. in Regina Sask.; the capacity addition program (CAP) at Syncrude Canada Ltd.'s Fort McMurray, Alta., plant; Husky Oil Operations Ltd.'s Bi-Provincial upgrader to be built near Lloydminster, Sask.; and the OSLO project to be built near Fort McMurray, all rely on this modern technology for primary upgrading. All of the projects are designed to upgrade heavy oil and bitumen extracted from oil sands to a high-quality synthetic crude oil (SCO) that is a blend of high-quality naphtha and gas oil.

  14. Quantum public-key algorithms to encrypt and authenticate quantum messages with information-theoretic security

    E-Print Network [OSTI]

    Min Liang; Li Yang

    2012-05-10

    Public-key cryptosystems for quantum messages are considered from two aspects: public-key encryption and public-key authentication. Firstly, we propose a general construction of quantum public-key encryption scheme, and then construct an information-theoretic secure instance. Then, we propose a quantum public-key authentication scheme, which can protect the integrity of quantum messages. This scheme can both encrypt and authenticate quantum messages. It is information-theoretic secure with regard to encryption, and the success probability of tampering decreases exponentially with the security parameter with regard to authentication. Compared with classical public-key cryptosystems, one private-key in our schemes corresponds to an exponential number of public-keys, and every quantum public-key used by the sender is an unknown quantum state to the sender.

  15. Quantum public-key algorithms to encrypt and authenticate quantum messages with information-theoretic security

    E-Print Network [OSTI]

    Liang, Min

    2012-01-01

    Public-key cryptosystems for quantum messages are considered from two aspects: public-key encryption and public-key authentication. Firstly, we propose a general construction of quantum public-key encryption scheme, and then construct an information-theoretic secure instance. Then, we propose a quantum public-key authentication scheme, which can protect the integrity of quantum messages. This scheme can both encrypt and authenticate quantum messages. It is information-theoretic secure with regard to encryption, and the success probability of tampering decreases exponentially with the security parameter with regard to authentication. Compared with classical public-key cryptosystems, one private-key in our schemes corresponds to an exponential number of public-keys, and every quantum public-key used by the sender is an unknown quantum state to the sender.

  16. Recent BABAR Results

    SciTech Connect (OSTI)

    Eigen, Gerald

    2015-04-29

    We present herein the most recent BABAR results on direct CP asymmetry measurements in B ? Xs?, on partial branching fraction and CP asymmetry measurements in B ? Xsl+l-, on a search for B ? ? / ?l+l- decays, on a search for lepton number violation in B+ ? X-l+l'+ modes and a study of B0 ??? and B0 ? ?? decays.

  17. 2012 User Survey Results

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.TheoryTuesday, August 10, 2010 james-r.giusti@srs.govTuesday, FebruaryResults 2012

  18. Recent Results from HAPPEX

    SciTech Connect (OSTI)

    Robert Michaels

    2006-09-18

    New measurements of the parity-violating asymmetry in elastic scattering of 3GeV electrons off hydrogen and helium-4 targets at theta{sub lab} = 6 degrees are reported. The helium-4 result is A = (+6.40 {+-} 0.23 (stat) {+-} 0.12 (syst)) * 10{sup -6}. The hydrogen result is A = (-1.58 {+-} 0.12 (stat) {+-} 0.04 (syst)) * 10{sup -6}. The asymmetry for hydrogen is a function of a linear combination of G{sub E}{sup s} and G{sub M}{sup s}, the strange quark contributions to the electric and magnetic form factors of the nucleon respectively, and that for helium-4 is a function solely of G{sub E}{sup s}. The combination of the two measurements separates G{sub E}{sup s} and G{sub M}{sup s} and provide new limits on the role of strange quarks in the nucleon charge and magnetization distributions. We extract G{sub E}{sup s} = 0.002 {+-} 0.014 {+-} 0.007 at Q{sup 2} = 0.077 GeV{sup 2} and G{sub E}{sup s} + 0.09 G{sub M}{sup s} = 0.007 {+-} 0.011 {+-} 0.006 at Q{sup 2} = 0.109 GeV{sup 2}.

  19. Organic Separation Test Results

    SciTech Connect (OSTI)

    Russell, Renee L.; Rinehart, Donald E.; Peterson, Reid A.

    2014-09-22

    Separable organics have been defined as “those organic compounds of very limited solubility in the bulk waste and that can form a separate liquid phase or layer” (Smalley and Nguyen 2013), and result from three main solvent extraction processes: U Plant Uranium Recovery Process, B Plant Waste Fractionation Process, and Plutonium Uranium Extraction (PUREX) Process. The primary organic solvents associated with tank solids are TBP, D2EHPA, and NPH. There is concern that, while this organic material is bound to the sludge particles as it is stored in the tanks, waste feed delivery activities, specifically transfer pump and mixer pump operations, could cause the organics to form a separated layer in the tank farms feed tank. Therefore, Washington River Protection Solutions (WRPS) is experimentally evaluating the potential of organic solvents separating from the tank solids (sludge) during waste feed delivery activities, specifically the waste mixing and transfer processes. Given the Hanford Tank Waste Treatment and Immobilization Plant (WTP) waste acceptance criteria per the Waste Feed Acceptance Criteria document (24590-WTP-RPT-MGT-11-014) that there is to be “no visible layer” of separable organics in the waste feed, this would result in the batch being unacceptable to transfer to WTP. This study is of particular importance to WRPS because of these WTP requirements.

  20. Nucleosynthesis results from INTEGRAL

    E-Print Network [OSTI]

    G. Weidenspointner

    2006-01-15

    Since its launch in October 2002, ESA's INTEGRAL observatory has enabled significant advances to be made in the study of Galactic nucleosynthesis. In particular, the imaging Ge spectrometer SPI combines for the first time the diagnostic powers of high resolution gamma-ray line spectroscopy and moderate spatial resolution. This review summarizes the major nucleosynthesis results obtained with INTEGRAL so far. Positron annihilation in our Galaxy is being studied in unprecented detail. SPI observations yield the first sky maps in both the 511 keV annihilation line and the positronium continuum emission, and the most accurate spectrum at 511 keV to date, thereby imposing new constraints on the source(s) of Galactic positrons which still remain(s) unidentified. For the first time, the imprint of Galactic rotation on the centroid and shape of the 1809 keV gamma-ray line due to the decay of 26Al has been seen, confirming the Galactic origin of this emission. SPI also provided the most accurate determination of the gamma-ray line flux due to the decay of 60Fe. The combined results for 26Al and 60Fe have important implications for nucleosynthesis in massive stars, in particular Wolf-Rayet stars. Both IBIS and SPI are searching the Galactic plane for young supernova remnants emitting the gamma-ray lines associated with radioactive 44Ti. None have been found so far, which raises important questions concerning the production of 44Ti in supernovae, the Galactic supernova rate, and the Galaxy's chemical evolution.

  1. High-Rate Quantum Key Distribution with Superconducting Nanowire Single Photon Detectors

    E-Print Network [OSTI]

    Spellmeyer, Neal W.

    We demonstrate the potential for 1.85 Mbit/s secure key rates over 101 km of fiber, >100 times faster than previously demonstrated, using the differential phase shift quantum key distribution protocol and superconducting ...

  2. Blast furnace key to earth's birth P11 Balancing the body clock P14

    E-Print Network [OSTI]

    Liley, David

    Newage Blast furnace key to earth's birth P11 Balancing the body clock P14 Research readies to the stars Julian criBB 11 blast furnace holds key to earth's birth Julian criBB 12 agency audit raises

  3. Lowest Engine-Out Emissions as the Key to the Future of the Heavy...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Lowest Engine-Out Emissions as the Key to the Future of the Heavy-Duty Diesel Engine: New Development Rersults Lowest Engine-Out Emissions as the Key to the Future of the...

  4. The Energy Cost of Cryptographic Key Establishment in Wireless Sensor Networks #

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    The Energy Cost of Cryptographic Key Establishment in Wireless Sensor Networks # Johann Großsch, Security. Keywords Wireless networking, security protocols, cryptography, key establishment, energy Inffeldgasse 16a, A--8010 Graz, Austria ABSTRACT Wireless sensor nodes generally face serious limitations

  5. A World Wide Web key to the grass genera of Texas 

    E-Print Network [OSTI]

    Dawson, John Edward

    2001-01-01

    An illustrated dichotomous key to the grass genera of Texas is presented in hypertext markup language (HTML) format. The key combines scanned images of inflorescences, digitized images of dissected spikelets, text descriptions ...

  6. ASTROPHYSICS Thesaurus of key words used in the annual subject indexes

    E-Print Network [OSTI]

    Xu, Ren-Xin

    ASTRONOMY AND ASTROPHYSICS Thesaurus of key words used in the annual subject indexes (valid from processing 03.20.2 Techniques: interferometric 03.20.3 Techniques: miscellaneous #12;2 Thesaurus of key words

  7. Large trees-key climate influencers-die first in drought

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Large trees-key climate influencers-die first in drought Large trees-key climate influencers-die first in drought A team of researchers studied forests worldwide, ranging from...

  8. Unconditional Security of Time-Energy Entanglement Quantum Key Distribution Using Dual-Basis Interferometry

    E-Print Network [OSTI]

    Zhang, Zheshen

    High-dimensional quantum key distribution (HDQKD) offers the possibility of high secure-key rate with high photon-information efficiency. We consider HDQKD based on the time-energy entanglement produced by spontaneous ...

  9. Expert Meeting Report. Foundations Research Results

    SciTech Connect (OSTI)

    Ojczyk, C.; Huelman, P.; Carmody, J.

    2013-05-01

    The NorthernSTAR Building America Partnership held an expert meeting on Foundations–Research Results on November 15, 2011, in Minneapolis, MN. Audience participation was actively encouraged during each presentation to uncover needs and promote dialog among researchers and industry professionals. Key results were: greater understanding of the role of moisture transport through foundation and insulation materials and its potential impact on building durability; greater understanding of the role of foundation type in the process of selecting an insulation system for energy performance and building durability; need for research to quantify the risks associated with insulation processes to better enable users to weigh costs and benefits against the existing conditions of a home; need for improved performance modeling capabilities that address variations in foundation types and soil conditions.

  10. 2001: PUBLICATIONS WITH RESULTS FROM USERS' IRAM OBSERVATIONS

    E-Print Network [OSTI]

    RadioAstronomie Millimétrique, Institut de (IRAM)

    2001: PUBLICATIONS WITH RESULTS FROM USERS' IRAM OBSERVATIONS 829. WARM H2 IN THE GALACTIC CENTER. Hüttemeister 2001, A&A 365, 174 830. THE IRAM KEY-PROJECT: SMALL- SCALE STRUCTURE OF PRE-STAR FORMING REGIONS. Heithausen, E. Falgarone 2001, A&A 365, 275 831. METHODS AND CONSTRAINTS FOR THE CORRECTION OF THE ERROR BEAM

  11. Key issues of ultraviolet radiation of OH at high altitudes

    SciTech Connect (OSTI)

    Zhang, Yuhuai; Wan, Tian; Jiang, Jianzheng; Fan, Jing

    2014-12-09

    Ultraviolet (UV) emissions radiated by hydroxyl (OH) is one of the fundamental elements in the prediction of radiation signature of high-altitude and high-speed vehicle. In this work, the OH A{sup 2}?{sup +}?X{sup 2}? ultraviolet emission band behind the bow shock is computed under the experimental condition of the second bow-shock ultraviolet flight (BSUV-2). Four related key issues are discussed, namely, the source of hydrogen element in the high-altitude atmosphere, the formation mechanism of OH species, efficient computational algorithm of trace species in rarefied flows, and accurate calculation of OH emission spectra. Firstly, by analyzing the typical atmospheric model, the vertical distributions of the number densities of different species containing hydrogen element are given. According to the different dominating species containing hydrogen element, the atmosphere is divided into three zones, and the formation mechanism of OH species is analyzed in the different zones. The direct simulation Monte Carlo (DSMC) method and the Navier-Stokes equations are employed to compute the number densities of the different OH electronically and vibrationally excited states. Different to the previous work, the trace species separation (TSS) algorithm is applied twice in order to accurately calculate the densities of OH species and its excited states. Using a non-equilibrium radiation model, the OH ultraviolet emission spectra and intensity at different altitudes are computed, and good agreement is obtained with the flight measured data.

  12. Key Geomechanics Issues at the Waste Isolation Pilot Plant Geomechanics

    SciTech Connect (OSTI)

    HANSEN,FRANCIS D.

    1999-09-01

    Mechanical and hydrological properties of rock salt provide excellent bases for geological isolation of hazardous materials. Regulatory compliance determinations for the Waste Isolation Pilot Plant (WIPP) stand as testament to the widely held conclusion that salt provides excellent isolation properties. The WIPP saga began in the 1950s when the U.S. National Academy of Sciences (NAS) recommended a salt vault as a promising solution to the national problem of nuclear waste disposal. For over 20 years, the Scientific basis for the NAS recommendation has been fortified by Sandia National Laboratories through a series of large scale field tests and laboratory investigations of salt properties. These scientific investigations helped develop a comprehensive understanding of salt's 4 reformational behavior over an applicable range of stresses and temperatures. Sophisticated constitutive modeling, validated through underground testing, provides the computational ability to model long-term behavior of repository configurations. In concert with advancement of the mechanical models, fluid flow measurements showed not only that the evaporite lithology was essentially impermeable but that the WIPP setting was hydrologically inactive. Favorable mechanical properties ensure isolation of materials placed in a salt geological setting. Key areas of the geomechanics investigations leading to the certification of WIPP are in situ experiments, laboratory tests, and shaft seal design.

  13. Do myoepithelial cells hold the key for breast tumorprogression?

    SciTech Connect (OSTI)

    Polyak, Kornelia; Hu, Min

    2005-11-18

    Mammary myoepithelial cells have been the foster child of breast cancer biology and have been largely ignored since they were considered to be less important for tumorigenesis than luminal epithelial cells from which most of breast carcinomas are thought to arise. In recent years as our knowledge in stem cell biology and the cellular microenvironment has been increasing myoepithelial cells are slowly starting to gain more attention. Emerging data raise the hypothesis if myoepithelial cells play a key role in breast tumor progression by regulating the in situ to invasive carcinoma transition and if myoepithelial cells are part of the mammary stem cell niche. Paracrine interactions between myoepithelial and luminal epithelial cells are known to be important for cell cycle arrest, establishing epithelial cell polarity, and inhibiting migration and invasion. Based on these functions normal mammary myoepithelial cells have been called ''natural tumor suppressors''. However, during tumor progression myoepithelial cells seem to loose these properties and eventually they themselves diminish as tumors become invasive. Better understanding of myoepithelial cell function and their role in tumor progression may lead to their exploitation for cancer therapeutic and preventative measures.

  14. Time-cost analysis of a quantum key distribution system clocked at 100 MHz

    E-Print Network [OSTI]

    Xiaofan Mo; Itzel Lucio Martinez; Philip Chan; Chris Healey; Steve Hosier; Wolfgang Tittel

    2011-05-18

    We describe the realization of a quantum key distribution (QKD) system clocked at 100 MHz. The system includes classical postprocessing implemented via software, and is operated over a 12 km standard telecommunication dark fiber in a real-world environment. A time-cost analysis of the sifted, error-corrected, and secret key rates relative to the raw key rate is presented, and the scalability of our implementation with respect to higher secret key rates is discussed.

  15. EETimes.com -Sensor nets bridge safety gap http://www.eetimes.com/showArticle.jhtml;jsessionid=ZNLFDCJ5D... 1 of 2 8/13/2007 10:25 PM

    E-Print Network [OSTI]

    Lu, Chenyang

    , ships, wind turbines, nuclear power plants and even the fuel tanks in hydrogen-powered vehiclesEETimes.com - Sensor nets bridge safety gap http://www.eetimes.com/showArticle.jhtml;jsessionid=ZNLFDCJ5D... 1 of 2 8/13/2007 10:25 PM EE Times: Sensor nets bridge safety gap R. Colin Johnson (08

  16. Final Hazard Categorization for the Remediation of the 118-D-1, 118-D-2, 118-D-3, 118-H-1, 118-H-2 and 118-H-3 Solid Waste Burial Grounds

    SciTech Connect (OSTI)

    K. L. Vialetti

    2008-05-20

    This report presents the final hazard categorization for the remediation of the 118-D-1, 118-D-2, and 118-D-3 Burial Grounds located within the 100-D/DR Area of the Hanford Site and the 118-H-1, 118-H-2, and 118-H-3 Burial Grounds located within the 100-H Area of the Hanford Site.

  17. Final Hazard Categorization for the Remediation of the 118-D-1, 118-D-2, 118-D-3, 118-H-1, 118-H-2, and 118-H-3 Solid Waste Burial Grounds

    SciTech Connect (OSTI)

    T. J. Rodovsky

    2006-12-06

    This report presents the final hazard categorization (FHC) for the remediation of the 118-D-1, 118-D-2, and 118-D-3 Burial Grounds located within the 100-D/DR Area of the Hanford Site and the 118-H-1, 118-H-2, and 118-H-3 Burial Grounds located within the 100-H Area of the Hanford Site.

  18. Final Hazard Categorization for the Remediation of the 118-D-1, 118-D-2, 118-D-3, 118-H-1, 118-H-2, and 118-H-3 Solid Waste Burial Grounds

    SciTech Connect (OSTI)

    T. J. Rodovsky

    2007-04-12

    This report presents the final hazard categorization (FHC) for the remediation of the 118-D-1, 118-D-2, and 118-D-3 Burial Grounds located within the 100-D/DR Area of the Hanford Site and the 118-H-1, 118-H-2, and 118-H-3 Burial Grounds located within the 100-H Area of the Hanford Site.

  19. A Thesis for the Degree of Master An Efficient Tree-based Group Key

    E-Print Network [OSTI]

    Kim, Kwangjo

    A Thesis for the Degree of Master An Efficient Tree-based Group Key Agreement using Bilinear Map-based Group Key Agreement using Bilinear Map #12;An Efficient Tree-based Group Key Agreement using Bilinear in partial fulfillment of the require- ments for the degree of Master of Science in the School of Engineering

  20. A Thesis for the Degree of Master A New Group Key Agreement

    E-Print Network [OSTI]

    Kim, Kwangjo

    A Thesis for the Degree of Master A New Group Key Agreement Scheme based on Ternary Tree Sang-won Lee School of Engineering Information and Communications University 2003 #12;A New Group Key Agreement Scheme based on Ternary Tree #12;A New Group Key Agreement Scheme based on Ternary Tree Advisor

  1. Master's Thesis A Study on Location-Based Authenticated Key Agreement

    E-Print Network [OSTI]

    Kim, Kwangjo

    Master's Thesis A Study on Location-Based Authenticated Key Agreement Scheme in Wireless Sensor Institute of Science and Technology 2010 #12;A Study on Location-Based Authenticated Key Agreement Scheme in Wireless Sensor and Actor Networks #12;A Study on Location-Based Authenticated Key Agreement Scheme

  2. Scalable Storage Scheme from Forward Key Rotation Chunbo Ma1,2

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Scalable Storage Scheme from Forward Key Rotation Chunbo Ma1,2 , Jun Ao3 , and Jianhua Li1 1 School@263.net Abstract. Kallahalla et al. presented a RSA-based Forward Key Rotation mechanism in secure storage present a Forward Key Rotation storage scheme based on discrete logarithm and discuss its security

  3. State Key Laboratory of Disaster Reduction in Civil Engineering, Tongji University

    E-Print Network [OSTI]

    State Key Laboratory of Disaster Reduction in Civil Engineering, Tongji University Experimental for energy dissipation mechanism. State Key Laboratory of Disaster Reduction in Civil Engineering #12;· Scope on Horizontal connection. State Key Laboratory of Disaster Reduction in Civil Engineering, Tongji University

  4. Scalable Compilers for Group Key Establishment : Two/Three Party to Group

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Scalable Compilers for Group Key Establishment : Two/Three Party to Group S. Sree Vivek1, , S presents the first scalable, efficient and generic compilers to construct group key exchange (GKE) protocols from two/three party key exchange (2-KE/3-KE) protocols. We propose three different compilers

  5. Scalable Compilers for Group Key Establishment : Two/Three Party to Group

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Scalable Compilers for Group Key Establishment : Two/Three Party to Group S. Sree Vivek 1,# , S presents the first scalable, e#cient and generic compilers to construct group key exchange (GKE) protocols from two/three party key exchange (2­KE/3­KE) protocols. We propose three di#erent compilers where

  6. The GH Public-key Cryptosystem Guang Gong, Lein Harn , and Huapeng Wu

    E-Print Network [OSTI]

    Gong, Guang

    The GH Public-key Cryptosystem Guang Gong, Lein Harn #3; , and Huapeng Wu #3;#3; Department-order characteristic sequences which was proposed by Gong and Harn in 1999. Key words. Public-key cryptosystem, digital signature, third-order linear feedback shift register sequences over #12;nite #12;elds. 1 Introduction Gong

  7. Table of Contents A Multivariate Signature Scheme with an almost cyclic public key . . . . . . . . . . . . . . . . . . . . . 2

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Table of Contents A Multivariate Signature Scheme with an almost cyclic public key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 #12;A Multivariate Signature Scheme with an almost cyclic public key Albrecht Petzoldt1,buchmann}@cdc.informatik.tu-darmstadt.de Abstract. Multivariate public key cryptography is one of the main approaches to guarantee the security

  8. TOT, a Fast Multivariate Public Key Cryptosystem with Basic Secure Trapdoor

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    TOT, a Fast Multivariate Public Key Cryptosystem with Basic Secure Trapdoor Wuqiang Shen-way trapdoor function, and then propose a new multivariate public key cryptosystem called TOT, which can though C was broken, its high speed has been affirmed). Keywords: TOT; multivariate public key

  9. Table of Contents A Multivariate Signature Scheme with an almost cyclic public key . . . . . . . . . . . . . . . . . . . . . 2

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Table of Contents A Multivariate Signature Scheme with an almost cyclic public key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 #12; A Multivariate Signature Scheme with an almost cyclic public key Albrecht Petzoldt 1,buchmann}@cdc.informatik.tu­darmstadt.de Abstract. Multivariate public key cryptography is one of the main approaches to guarantee the security

  10. A Key Technology Evaluation Case Study: Applying a New Middleware Architecture on the

    E-Print Network [OSTI]

    Zdun, Uwe

    A Key Technology Evaluation Case Study: Applying a New Middleware Architecture on the Enterprise in (all) the new key technology areas, it was hard for the management to estimate which new technologies, fgoedickejuzdung@informatik.uni-essen.de Abstract Decisions for key technologies, like middleware, for large scale

  11. A Key Establishment IP-Core for Ubiquitous Computing Markus Volkmer and Sebastian Wallner

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    A Key Establishment IP-Core for Ubiquitous Computing Markus Volkmer and Sebastian Wallner Hamburg in the ubiquitous and pervasive comput- ing setting is secure key exchange. The restrictions moti- vate-core in ¢¡¤£¦¥¨§ -CMOS technology are evaluated. 1. Introduction In ubiquitous and pervasive computing scenarios, key

  12. Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships Mohammad, ymu}@uow.edu.au Abstract. In this paper, we revisit security notions for dedicated-key hash functions notions for dedicated-key hash functions. The provision of this set of enhanced properties has been

  13. Breakeven Cost for Residential Photovoltaics in the United States: Key Drivers and Sensitivities (Report Summary) (Presentation)

    SciTech Connect (OSTI)

    Denholm, P.; Margolis, R. M.; Ong, S.; Roberts, B.

    2009-12-01

    "Break-even cost" for photovoltaic (PV) technology is defined as the point where the cost of PV-generated electricity equals the cost of electricity purchased from the grid. Break-even cost is expressed in $/W of an installed system. Achieving break-even cost is a function of many variables. Consequently, break-even costs vary by location and time for a country, such as the United States, with a diverse set of resources, electricity prices, and other variables. In this presentation, we introduce an analysis of PV break-even costs for residential customers in the United States, including an evaluation of some of the key drivers of PV breakeven both regionally and over time. This presentation includes our methodology and presents results for both near-term residential breakeven costs(2009) and future market sensitivities of break-even costs (2015). See also the the report "Break-Even Cost for Residential Photovoltaics in the United States: Key Drivers and Sensitivities". Presentation for NREL/TP-6A2-45991.

  14. Passive sources for the Bennett-Brassard 1984 quantum key distribution protocol with practical signals

    E-Print Network [OSTI]

    Marcos Curty; Xiongfeng Ma; Hoi-Kwong Lo; Norbert Lütkenhaus

    2010-09-20

    Most experimental realizations of quantum key distribution are based on the Bennett-Brassard 1984 (so-called BB84) protocol. In a typical optical implementation of this scheme, the sender uses an active source to produce the required BB84 signal states. While active state preparation of BB84 signals is a simple and elegant solution in principle, in practice passive state preparation might be desirable in some scenarios, for instance, in those experimental setups operating at high transmission rates. Passive schemes might also be more robust against side-channel attacks than active sources. Typical passive devices involve parametric down-conversion. In this paper, we show that both coherent light and practical single photon sources are also suitable for passive generation of BB84 signal states. Our method does not require any external-driven element, but only linear optical components and photodetectors. In the case of coherent light, the resulting key rate is similar to the one delivered by an active source. When the sender uses practical single photon sources, however, the distance covered by a passive transmitter might be longer than the one of an active configuration.

  15. Passive faraday mirror attack in practical two-way quantum key distribution system

    E-Print Network [OSTI]

    Shi-Hai Sun; Mu-Sheng Jiang; Lin-Mei Liang

    2012-03-04

    The faraday mirror (FM) plays a very important role in maintaining the stability of two way plug-and-play quantum key distribution (QKD) system. However, the practical FM is imperfect, which will not only introduce additional quantum bit error rate (QBER) but also leave a loophole for Eve to spy the secret key. In this paper, we propose a passive faraday mirror attack in two way QKD system based on the imperfection of FM. Our analysis shows that, if the FM is imperfect, the dimension of Hilbert space spanned by the four states sent by Alice is three instead of two. Thus Eve can distinguish these states with a set of POVM operators belonging to three dimension space, which will reduce the QBER induced by her attack. Furthermore, a relationship between the degree of the imperfection of FM and the transmittance of the practical QKD system is obtained. The results show that, the probability that Eve loads her attack successfully depends on the degree of the imperfection of FM rapidly, but the QBER induced by Eve's attack changes with the degree of the imperfection of FM slightly.

  16. Microsoft Word - fact sheet alternatives and key findings 090214...

    National Nuclear Security Administration (NNSA)

    drinking water standard of 4 millirem per year to avoid the undesirable future contamination of public water supplies as a result of controllable human activities. In so...

  17. Key establishment à la Merkle in a quantum world

    E-Print Network [OSTI]

    Gilles Brassard; Peter Hoyer; Kassem Kalach; Marc Kaplan; Sophie Laplante; Louis Salvail

    2015-02-13

    In 1974, Ralph Merkle proposed the first unclassified scheme for secure communications over insecure channels. When legitimate communicating parties are willing to spend an amount of computational effort proportional to some parameter N, an eavesdropper cannot break into their communication without spending a time proportional to N^2, which is quadratically more than the legitimate effort. Two of us showed in 2008 that Merkle's schemes are completely insecure against a quantum adversary, but that their security can be partially restored if the legitimate parties are also allowed to use quantum computation: the eavesdropper needed to spend a time proportional to N^{3/2} to break our earlier quantum scheme. Furthermore, all previous classical schemes could be broken completely by the onslaught of a quantum eavesdropper and we conjectured that this is unavoidable. We give now two novel key establishment schemes in the spirit of Merkle's. The first one can be broken by a quantum adversary who makes an effort proportional to N^{5/3}, which is the optimal attack against this scheme. Our second scheme is purely classical, yet it cannot be broken by a quantum eavesdropper who is only willing to expend an effort proportional to that of the legitimate parties. We then introduce two families of more elaborate protocols. The first family consists in quantum protocols whose security is arbitrarily close to quadratic in the query complexity model. The second is a family of classical protocols whose security against a quantum adversary is arbitrarily close to N^{3/2} in the same model.

  18. Studies on the switching speed effect of the phase shift keying in SLED for generating high power microwave

    E-Print Network [OSTI]

    Zhengfeng, Xiong; Jian, Yu; Huaibi, Chen; Hui, Ning

    2015-01-01

    SLAC energy doubler (SLED) type radio-frequency pulse compressors are widely used in large-scale particle accelerators for converting long-duration moderate-power input pulse into short-duration high-power output pulse. The phase shift keying (PSK) is one of the key components in SLED pulse compression systems. Performance of the PSK will influence the output characteristics of SLED, such as rise-time of the output pulse, the maximal peak power gain, and the energy efficiency. In this paper, high power microwave source based on power combining and pulse compression of conventional klystrons was introduced, the nonideal PSK with slow switching speed and without power output during the switching process were investigated, the experimental results with nonideal PSK agreed well with the analytical results.

  19. Energy Audits: The Key to Performance Contracting Projects 

    E-Print Network [OSTI]

    Tharoor, M.

    1994-01-01

    The term "Performance Contracting" relates to projects where the performance of various energy conservation retrofits result in eavings that exceed the implementation cost of the entire project when financed over a fixed term. Such projects minimize...

  20. Using Key Performance Indicators to Manage Energy Costs 

    E-Print Network [OSTI]

    Van Gorp, J. C.

    2005-01-01

    ) and measurement and verification protocols (such as IPMVP 2001) often highlight the importance an information system has in maximizing results. The increasing adoption of energy information systems has led, however, to an interesting paradox: while it is now cost...

  1. Risk analysis of Trojan-horse attacks on practical quantum key distribution systems

    E-Print Network [OSTI]

    Nitin Jain; Birgit Stiller; Imran Khan; Vadim Makarov; Christoph Marquardt; Gerd Leuchs

    2014-12-19

    An eavesdropper Eve may probe a quantum key distribution (QKD) system by sending a bright pulse from the quantum channel into the system and analyzing the back-reflected pulses. Such Trojan-horse attacks can breach the security of the QKD system if appropriate safeguards are not installed or if they can be fooled by Eve. We present a risk analysis of such attacks based on extensive spectral measurements, such as transmittance, reflectivity, and detection sensitivity of some critical components used in typical QKD systems. Our results indicate the existence of wavelength regimes where the attacker gains considerable advantage as compared to launching an attack at 1550 nm. We also propose countermeasures to reduce the risk of such attacks.

  2. Passive-scheme analysis for solving untrusted source problem in quantum key distribution

    E-Print Network [OSTI]

    Xiang Peng; Bingjie Xu; Hong Guo

    2010-04-28

    As a practical method, the passive scheme is useful to monitor the photon statistics of an untrusted source in a "Plug & Play" quantum key distribution (QKD) system. In a passive scheme, three kinds of monitor mode can be adopted: average photon number (APN) monitor, photon number analyzer (PNA) and photon number distribution (PND) monitor. In this paper, the security analysis is rigorously given for APN monitor, while for PNA, the analysis including statistical fluctuation and random noise, is addressed with a confidence level. The results show that the PNA can achieve better performance than the APN monitor and can asymptotically approach the theoretical limit of the PND monitor. Also, the passive scheme with the PNA works efficiently when the signal-to-noise ratio ($R^{SN}$) is not too low and so is highly applicable to solve the untrusted source problem in the QKD system.

  3. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    results Search results Enter terms Search Showing 1 - 10 of 11 results. Video Energy 101: Hydroelectric Power Learn how hydropower captures the kinetic energy of flowing water and...

  4. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    results Search results Enter terms Search Showing 1 - 2 of 2 results. Video Energy 101: Hydroelectric Power Learn how hydropower captures the kinetic energy of flowing water and...

  5. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Usage Search results Search results Enter terms Search Showing 1 - 4 of 4 results. Download Energy Management Students will review energy basics and what they have...

  6. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Usage Search results Search results Enter terms Search Showing 1 - 3 of 3 results. Download Energy Management Students will review energy basics and what they have...

  7. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Usage Search results Search results Enter terms Search Showing 1 - 7 of 7 results. Download Making Energy Personal Students will work with an interactive website in oder...

  8. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Usage Search results Search results Enter terms Search Showing 1 - 7 of 7 results. Download Energy Production Students will compare and contrast renewable and...

  9. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Usage Search results Search results Enter terms Search Showing 1 - 2 of 2 results. Download Energy Production Students will compare and contrast renewable and nonrenewable...

  10. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Usage Search results Search results Enter terms Search Showing 1 - 3 of 3 results. Download Energy Production Students will compare and contrast renewable and...

  11. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Usage Search results Search results Enter terms Search Showing 1 - 2 of 2 results. Download Life With Energy Students will describe ways in which technology affects the...

  12. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Usage Search results Search results Enter terms Search Showing 1 - 8 of 8 results. Download Making Energy Personal Students will work with an interactive website in oder...

  13. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Usage Search results Search results Enter terms Search Showing 1 - 4 of 4 results. Download Energy Transmission Students will learn about everyday energy usage by...

  14. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Usage Search results Search results Enter terms Search Showing 1 - 4 of 4 results. Download Green Fuel This activity allows students the opportunity to explore different...

  15. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Usage Search results Search results Enter terms Search Showing 1 - 4 of 4 results. Download Making Energy Personal Students will work with an interactive website in oder...

  16. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Usage Search results Search results Enter terms Search Showing 1 - 5 of 5 results. Download Energy Management Students will review energy basics and what they have...

  17. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Usage Search results Search results Enter terms Search Showing 1 - 10 of 10 results. Download Making Energy Personal Students will work with an interactive website in...

  18. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Usage Search results Search results Enter terms Search Showing 1 - 1 of 1 result. Download Energy Management Students will review energy basics and what they have learned...

  19. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Usage Search results Search results Enter terms Search Showing 1 - 10 of 15 results. Download Reducing Energy Loss Students will learn about the Law of Conservation of Energy....

  20. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Usage Search results Search results Enter terms Search Showing 1 - 7 of 7 results. Download Energy Management Students will review energy basics and what they have learned in...

  1. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Usage Search results Search results Enter terms Search Showing 1 - 2 of 2 results. Download Green Fuel This activity allows students the opportunity to explore different...

  2. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Usage Search results Search results Enter terms Search Showing 1 - 3 of 3 results. Download Power to the Plug: An Introduction to Energy, Electricity, Consumption, and...

  3. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Usage Search results Search results Enter terms Search Showing 1 - 3 of 3 results. Download Monitoring and Mentoring These activities explore energy use and conservation using...

  4. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Usage Search results Search results Enter terms Search Showing 1 - 2 of 2 results. Download Electrolysis of Water Students observe the electrolysis of water using either...

  5. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Usage Search results Search results Enter terms Search Showing 1 - 6 of 6 results. Download Making Energy Personal Students will work with an interactive website in oder...

  6. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Usage Download Search results Search results Enter terms Search Showing 21 - 30 of 23 results. Download Life With Energy Students will describe ways in which...

  7. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Usage Search results Search results Enter terms Search Showing 1 - 5 of 5 results. Download Green Fuel This activity allows students the opportunity to explore different...

  8. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Usage Search results Search results Enter terms Search Showing 1 - 3 of 3 results. Download Energy Management Students will review energy basics and what they have learned in...

  9. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Usage Search results Search results Enter terms Search Showing 1 - 5 of 5 results. Download Making Energy Personal Students will work with an interactive website in oder...

  10. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Search results Search results Enter terms Search Showing 1 - 10 of 22 results. Video Energy 101: Wind Turbines- 2014 Update The video highlights the basic principles at work...

  11. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Wind Search results Search results Enter terms Search Showing 1 - 5 of 5 results. Download Energy Production Students will compare and contrast renewable and nonrenewable...

  12. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    results Search results Enter terms Search Showing 11 - 20 of 15 results. Download Rain Machine (Solar Still) Working in groups, students build simple solar stills filled with salt...

  13. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    results Search results Enter terms Search Showing 11 - 20 of 13 results. Download Rain Machine (Solar Still) Working in groups, students build simple solar stills filled with salt...

  14. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Consumption Search results Search results Enter terms Search Showing 1 - 2 of 2 results. Download Energy Production Students will compare and contrast renewable and nonrenewable...

  15. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Technology High School (9-12) Teachers Search results Search results Enter terms Search Showing 1 - 1 of 1 result. Download Exploring Photovoltaics (9 investigations)...

  16. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Technology High School (9-12) Teachers Search results Search results Enter terms Search Showing 1 - 3 of 3 results. Download An Exploration of Wind Energy & Wind Turbines...

  17. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Technology High School (9-12) Teachers Search results Search results Enter terms Search Showing 1 - 1 of 1 result. Download Exploring Hydroelectricity (9 activities)...

  18. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Solar Search results Search results Enter terms Search Showing 1 - 1 of 1 result. Download Exploring Photovoltaics (9 investigations) Hands-on investigations to teach secondary...

  19. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Search results Search results Enter terms Search Showing 11 - 20 of 16 results. Download Photovoltaics and Solar Energy (2 Activities) This module addresses issues dealing with...

  20. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Search results Search results Enter terms Search Showing 41 - 50 of 59 results. Download Photovoltaics and Solar Energy (2 Activities) This module addresses issues dealing with...

  1. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Solar Search results Search results Enter terms Search Showing 1 - 1 of 1 result. Download Power to the Plug: An Introduction to Energy, Electricity, Consumption, and Efficiency...

  2. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Solar Search results Search results Enter terms Search Showing 1 - 2 of 2 results. Download Energy Production Students will compare and contrast renewable and nonrenewable...

  3. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Solar Search results Search results Enter terms Search Showing 1 - 4 of 4 results. Download Energy Production Students will compare and contrast renewable and nonrenewable...

  4. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Solar Search results Search results Enter terms Search Showing 1 - 2 of 2 results. Download Power to the Plug: An Introduction to Energy, Electricity, Consumption, and...

  5. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Solar Search results Search results Enter terms Search Showing 1 - 5 of 5 results. Download Energy Production Students will compare and contrast renewable and nonrenewable...

  6. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Solar Search results Search results Enter terms Search Showing 1 - 3 of 3 results. Download Energy Production Students will compare and contrast renewable and nonrenewable...

  7. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Solar Search results Search results Enter terms Search Showing 1 - 3 of 3 results. Download Power to the Plug: An Introduction to Energy, Electricity, Consumption, and...

  8. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Solar Elementary (K-5) Teachers Search results Search results Enter terms Search Showing 1 - 1 of 1 result. Download Power to the Plug: An Introduction to Energy,...

  9. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Search results Search results Enter terms Search Showing 1 - 10 of 12 results. Download Energy Production Students will compare and contrast renewable and nonrenewable resources...

  10. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Search results Search results Enter terms Search Showing 1 - 10 of 10 results. Download Energy Production Students will compare and contrast renewable and nonrenewable resources...

  11. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Search results Search results Enter terms Search Showing 1 - 4 of 4 results. Download Water and Energy (18 activities) An inquiry-based curriculum that introduces students to...

  12. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Search results Search results Enter terms Search Showing 1 - 5 of 5 results. Download Water and Energy (18 activities) An inquiry-based curriculum that introduces students to...

  13. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Page Search results Search results Enter terms Search Showing 1 - 4 of 4 results. Page Analytical Tools The Bioenergy Technologies Office and its national lab partners provide a...

  14. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6 Search results Search results Enter terms Search Showing 1 - 2 of 2 results. Article Energy Literacy in Action: Nevada Teachers Helping Students Learn About Energy Energy...

  15. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    4 Search results Search results Enter terms Search Showing 1 - 7 of 7 results. Download Energy Literacy Video Analysis Guide A guide for discussion related to the information...

  16. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Educators Search results Search results Enter terms Search Showing 1 - 6 of 6 results. Article Energy Literacy in Action: Nevada Teachers Helping Students Learn About Energy...

  17. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Consumers Search results Search results Enter terms Search Showing 1 - 4 of 4 results. Download Energy Literacy Videos New video series, Energy Literacy highlights the 7...

  18. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Professors Search results Search results Enter terms Search Showing 1 - 1 of 1 result. Page How Distributed Wind Works Wind generator http:energy.goveerewind...

  19. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1 Search results Search results Enter terms Search Showing 1 - 1 of 1 result. Download Energy Literacy Videos New video series, Energy Literacy highlights the 7 Essential...

  20. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Parents Search results Search results Enter terms Search Showing 1 - 3 of 3 results. Article Energy Literacy in Action: Nevada Teachers Helping Students Learn About Energy...

  1. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Parents Search results Search results Enter terms Search Showing 1 - 5 of 5 results. Article Energy Literacy in Action: Nevada Teachers Helping Students Learn About Energy...

  2. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Policymaker Search results Search results Enter terms Search Showing 1 - 1 of 1 result. Page Advantages and Challenges of Wind Energy Wind energy offers many advantages, which...

  3. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7 Search results Search results Enter terms Search Showing 1 - 2 of 2 results. Article Energy Literacy in Action: Nevada Teachers Helping Students Learn About Energy Energy...

  4. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7 Search results Search results Enter terms Search Showing 1 - 4 of 4 results. Download Energy Literacy Video Analysis Guide A guide for discussion related to the information...

  5. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Educators Search results Search results Enter terms Search Showing 1 - 10 of 11 results. Download Energy Literacy Video Analysis Guide A guide for discussion related to the...

  6. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Consumers Search results Search results Enter terms Search Showing 1 - 3 of 3 results. Page How Distributed Wind Works Wind generator http:energy.goveerewind...

  7. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Students Search results Search results Enter terms Search Showing 1 - 4 of 4 results. Download Energy Literacy Videos New video series, Energy Literacy highlights the 7...

  8. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6 Search results Search results Enter terms Search Showing 1 - 4 of 4 results. Download Energy Literacy Video Analysis Guide A guide for discussion related to the information...

  9. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Parents Search results Search results Enter terms Search Showing 1 - 3 of 3 results. Download Energy Literacy Videos New video series, Energy Literacy highlights the 7 Essential...

  10. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    3 Search results Search results Enter terms Search Showing 1 - 4 of 4 results. Page Analytical Tools The Bioenergy Technologies Office and its national lab partners provide a...

  11. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Educators Search results Search results Enter terms Search Showing 1 - 3 of 3 results. Article Energy Literacy in Action: Nevada Teachers Helping Students Learn About Energy...

  12. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Students Search results Search results Enter terms Search Showing 1 - 3 of 3 results. Article Energy Literacy in Action: Nevada Teachers Helping Students Learn About Energy...

  13. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Consumers Search results Search results Enter terms Search Showing 1 - 1 of 1 result. Page How Distributed Wind Works Wind generator http:energy.goveerewind...

  14. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Consumers Search results Search results Enter terms Search Showing 1 - 2 of 2 results. Download Energy Literacy Videos New video series, Energy Literacy highlights the 7...

  15. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    4 Search results Search results Enter terms Search Showing 1 - 2 of 2 results. Page Advantages and Challenges of Wind Energy Wind energy offers many advantages, which explains...

  16. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Parents Search results Search results Enter terms Search Showing 1 - 4 of 4 results. Article Energy Literacy in Action: Nevada Teachers Helping Students Learn About Energy...

  17. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Educators Search results Search results Enter terms Search Showing 1 - 4 of 4 results. Download Energy Literacy Videos New video series, Energy Literacy highlights the 7...

  18. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Students Search results Search results Enter terms Search Showing 1 - 6 of 6 results. Article Energy Literacy in Action: Nevada Teachers Helping Students Learn About Energy...

  19. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    4 Search results Search results Enter terms Search Showing 1 - 4 of 4 results. Download Energy Literacy Videos New video series, Energy Literacy highlights the 7 Essential...

  20. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Students Search results Search results Enter terms Search Showing 1 - 2 of 2 results. Article Energy Literacy in Action: Nevada Teachers Helping Students Learn About Energy...

  1. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    4 Search results Search results Enter terms Search Showing 1 - 7 of 7 results. Page Frequently Asked Questions about Wind Energy This page lists frequently asked questions about...

  2. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Educators Search results Search results Enter terms Search Showing 1 - 6 of 6 results. Page Explore Bioenergy Technology Careers http:energy.goveereeducation...

  3. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6 Search results Search results Enter terms Search Showing 1 - 1 of 1 result. Article Energy Literacy in Action: Nevada Teachers Helping Students Learn About Energy Energy...

  4. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Homeowner Search results Search results Enter terms Search Showing 1 - 2 of 2 results. Page How Distributed Wind Works Wind generator http:energy.goveerewind...

  5. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    4 Search results Search results Enter terms Search Showing 1 - 3 of 3 results. Download Energy Literacy Videos New video series, Energy Literacy highlights the 7 Essential...

  6. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    3 Search results Search results Enter terms Search Showing 1 - 3 of 3 results. Download Energy Literacy Videos New video series, Energy Literacy highlights the 7 Essential...

  7. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Usage Search results Search results Enter terms Search Showing 1 - 7 of 7 results. Download Learning and Conserving (10 activities) These activities explore energy use...

  8. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    results Search results Enter terms Search Showing 1 - 10 of 13 results. Download Energy Literacy Videos New video series, Energy Literacy highlights the 7 Essential...

  9. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Usage Search results Search results Enter terms Search Showing 1 - 10 of 10 results. Download Energy Management Students will review energy basics and what they have...

  10. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Usage Search results Search results Enter terms Search Showing 1 - 4 of 4 results. Download Energy Production Students will compare and contrast renewable and...

  11. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Search results Search results Enter terms Search Showing 1 - 2 of 2 results. Download Energy Literacy Videos New video series, Energy Literacy highlights the 7 Essential...

  12. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Usage Search results Search results Enter terms Search Showing 1 - 3 of 3 results. Download Powering the Future Using the Environmental Protection Agency's climate change...

  13. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Usage Search results Search results Enter terms Search Showing 1 - 10 of 18 results. Download Reducing Energy Loss Students will learn about the Law of Conservation of...

  14. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Usage Search results Search results Enter terms Search Showing 1 - 6 of 6 results. Download Powering the Future Using the Environmental Protection Agency's climate change...

  15. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Usage Search results Search results Enter terms Search Showing 1 - 10 of 16 results. Download Reducing Energy Loss Students will learn about the Law of Conservation of...

  16. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Usage Search results Search results Enter terms Search Showing 1 - 6 of 6 results. Download Learning and Conserving (10 activities) These activities explore energy use...

  17. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Usage Search results Search results Enter terms Search Showing 1 - 8 of 8 results. Download Energy Management Students will review energy basics and what they have...

  18. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    results Search results Enter terms Search Showing 1 - 10 of 22 results. Download Energy Literacy Videos New video series, Energy Literacy highlights the 7 Essential...

  19. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Usage Search results Search results Enter terms Search Showing 1 - 9 of 9 results. Download Energy Management Students will review energy basics and what they have...

  20. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Usage Search results Search results Enter terms Search Showing 1 - 8 of 8 results. Download Energy Production Students will compare and contrast renewable and...

  1. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Search results Search results Enter terms Search Showing 1 - 8 of 8 results. Download Energy Literacy Videos New video series, Energy Literacy highlights the 7 Essential...

  2. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Search results Search results Enter terms Search Showing 1 - 10 of 23 results. Article Energy Literacy in Action: Nevada Teachers Helping Students Learn About Energy Energy...

  3. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Search results Search results Enter terms Search Showing 1 - 7 of 7 results. Download Energy Management Students will review energy basics and what they have learned in energy...

  4. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Usage Search results Search results Enter terms Search Showing 1 - 5 of 5 results. Download Energy Production Students will compare and contrast renewable and...

  5. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Search results Search results Enter terms Search Showing 1 - 7 of 7 results. Download Energy Literacy Videos New video series, Energy Literacy highlights the 7 Essential...

  6. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Usage Search results Search results Enter terms Search Showing 1 - 4 of 4 results. Download Powering the Future Using the Environmental Protection Agency's climate change...

  7. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    results Search results Enter terms Search Showing 11 - 20 of 16 results. Download Energy Conservation Contract (4 activities) Students learn about saving energy and encourage...

  8. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Usage Search results Search results Enter terms Search Showing 1 - 3 of 3 results. Download Monitoring and Mentoring These activities explore energy use and conservation...

  9. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Usage High School (9-12) Teachers Search results Search results Enter terms Search Showing 1 - 2 of 2 results. Download Energy Conservation Contract (4 activities)...

  10. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Usage Search results Search results Enter terms Search Showing 1 - 2 of 2 results. Download Energy Management Students will review energy basics and what they have...

  11. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Usage Search results Search results Enter terms Search Showing 1 - 10 of 23 results. Download Reducing Energy Loss Students will learn about the Law of Conservation of...

  12. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Search results Search results Enter terms Search Showing 1 - 6 of 6 results. Article Energy Literacy in Action: Nevada Teachers Helping Students Learn About Energy Energy...

  13. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Usage Search results Search results Enter terms Search Showing 1 - 9 of 9 results. Download Learning and Conserving (10 activities) These activities explore energy use...

  14. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    results Search results Enter terms Search Showing 1 - 10 of 26 results. Download Energy Literacy Videos New video series, Energy Literacy highlights the 7 Essential...

  15. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Search results Search results Enter terms Search Showing 1 - 8 of 8 results. Download Energy Management Students will review energy basics and what they have learned in energy...

  16. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    results Search results Enter terms Search Showing 1 - 10 of 28 results. Download Energy Literacy Videos New video series, Energy Literacy highlights the 7 Essential...

  17. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Sources Search results Search results Enter terms Search Showing 1 - 1 of 1 result. Video Energy 101: Fuel Cell Technology This video illustrates the fundamentals of fuel...

  18. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Search results Search results Enter terms Search Showing 1 - 1 of 1 result. Video Energy 101: Fuel Cell Technology This video illustrates the fundamentals of fuel cell technology...

  19. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Geothermal Search results Search results Enter terms Search Showing 1 - 3 of 3 results. Download Energy Production Students will compare and contrast renewable and nonrenewable...

  20. Search results | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Geothermal Search results Search results Enter terms Search Showing 1 - 2 of 2 results. Download Power to the Plug: An Introduction to Energy, Electricity, Consumption, and...