Powered by Deep Web Technologies
Note: This page contains sample records for the topic "d1 key results" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

Key results from SB8 simulant flowsheet studies  

SciTech Connect (OSTI)

Key technically reviewed results are presented here in support of the Defense Waste Processing Facility (DWPF) acceptance of Sludge Batch 8 (SB8). This report summarizes results from simulant flowsheet studies of the DWPF Chemical Process Cell (CPC). Results include: Hydrogen generation rate for the Sludge Receipt and Adjustment Tank (SRAT) and Slurry Mix Evaporator (SME) cycles of the CPC on a 6,000 gallon basis; Volume percent of nitrous oxide, N2O, produced during the SRAT cycle; Ammonium ion concentrations recovered from the SRAT and SME off-gas; and, Dried weight percent solids (insoluble, soluble, and total) measurements and density.

Koopman, D. C.

2013-04-26T23:59:59.000Z

2

E-Print Network 3.0 - access technologies key Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

electronic identifier (IdentiKey) including access and password requirements, account lockout... that are accessed using a university electronic identifier or IdentiKey. The...

3

E-Print Network 3.0 - apoptosis key players Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Summary: -publication: http:www.landesbioscience.comjournalsccabstract.php?id3262 KEY WORDS cyclin A, apoptosis, Xenopus... is Sufficient but not Required for the...

4

E-Print Network 3.0 - address key issues Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

term schedule. Summary: to their rental fees, before they obtain their locker key. Lockout situations can only be addressed through... of the renter to clean out hisher locker...

5

Key Research Results Achievement  

E-Print Network [OSTI]

generation observed in P3HT:PCBM blends. Potential Impact Elucidating the origin of the energetic barrier.S. Department of Energy, Office of Energy Efficiency and Renewable Energy, operated by the Alliance for Sustainable Energy, LLC. 15013 Denver West Parkway | Golden, CO 80401 | 303-275-3000 | www.nrel.gov NREL

6

Key Research Results Achievement  

E-Print Network [OSTI]

market. NREL is a national laboratory of the U.S. Department of Energy, Office of Energy Efficiency and Renewable Energy, operated by the Alliance for Sustainable Energy, LLC. 15013 Denver West Parkway | Golden-film photovoltaics (PV). Networks made of single-walled carbon nanotubes (SWCNTs), metallic NWs, and graphene thin

7

Key Research Results Achievement  

E-Print Network [OSTI]

school in Greensburg, Kansas, used many of the energy efficiency measures outlined in the Advanced Energy Design Guides and was built to be 60% more energy efficient than a similar building constructed, and modeling tools created by the laboratory. The AEDGs provide specific measures, best practices, and tips

8

Quantum dense key distribution  

SciTech Connect (OSTI)

This paper proposes a protocol for quantum dense key distribution. This protocol embeds the benefits of a quantum dense coding and a quantum key distribution and is able to generate shared secret keys four times more efficiently than the Bennet-Brassard 1984 protocol. We hereinafter prove the security of this scheme against individual eavesdropping attacks, and we present preliminary experimental results, showing its feasibility.

Degiovanni, I.P.; Ruo Berchera, I.; Castelletto, S.; Rastello, M.L.; Bovino, F.A.; Colla, A.M.; Castagnoli, G. [Istituto Elettrotecnico Nazionale G. Ferraris, Strada delle Cacce 91, 10135 Torino (Italy); ELSAG SpA, Via Puccini 2, 16154, Genova (Italy)

2004-03-01T23:59:59.000Z

9

The Open Biomedical Annotator Clement Jonquet, PhD1  

E-Print Network [OSTI]

The Open Biomedical Annotator Clement Jonquet, PhD1 , Nigam H. Shah, M.B.B.S, PhD1 and Mark A. Musen, MD, PhD1 1 Stanford Center for Biomedical Informatics Research and the National Center for Biomedical Ontology, Stanford University, Stanford, CA Abstract The range of publicly available biomedical

Paris-Sud XI, Université de

10

Cryptographic Key Management System  

SciTech Connect (OSTI)

This report summarizes the outcome of U.S. Department of Energy (DOE) contract DE-OE0000543, requesting the design of a Cryptographic Key Management System (CKMS) for the secure management of cryptographic keys for the energy sector infrastructure. Prime contractor Sypris Electronics, in collaboration with Oak Ridge National Laboratories (ORNL), Electric Power Research Institute (EPRI), Valicore Technologies, and Purdue University's Center for Education and Research in Information Assurance and Security (CERIAS) and Smart Meter Integration Laboratory (SMIL), has designed, developed and evaluated the CKMS solution. We provide an overview of the project in Section 3, review the core contributions of all contractors in Section 4, and discuss bene#12;ts to the DOE in Section 5. In Section 6 we describe the technical construction of the CKMS solution, and review its key contributions in Section 6.9. Section 7 describes the evaluation and demonstration of the CKMS solution in different environments. We summarize the key project objectives in Section 8, list publications resulting from the project in Section 9, and conclude with a discussion on commercialization in Section 10 and future work in Section 11.

No, author

2014-02-21T23:59:59.000Z

11

U.S. Geothermal Announces More Test Results From the Neal Hot Springs Production Well and a Key Addition to Senior Staff  

Broader source: Energy.gov [DOE]

U.S. Geothermal Inc. ("U.S. Geothermal"), a renewable energy company focused on the production of electricity from geothermal energy, announced today results from a second, higher rate flow test of the first full size production well (NHS-1) at the Neal Hot Springs Project.

12

Alkaline Leaching of Key, Non-Radioactive Components from Simulants and Hanford Tank Sludge 241-S-110: Results of FY01 Studies  

SciTech Connect (OSTI)

This study addressed three aspects in selected alkaline leaching: first, the use of oxidants persulfate, permanganate, and ferrate as selective chromium-leaching agents from washed Hanford Tank S-110 solids under varying conditions of hydroxide concentration, temperature, and time was investigated. Second, the selective dissolution of solids containing mercury(II) oxide under alkaline conditions was examined. Various compounds were studied for their effectiveness in dissolving mercury under varying conditions of time, temperature, and hydroxide concentration in the leachate. Three compounds were studied: cysteine, iodide, and diethyldithiophosphoric acid (DEDTPA). Finally, the possibility of whether an oxidant bound to an anion-exchange resin can be used to effectively oxidize chromium(III) in alkaline solutions was addressed. The experimental results remain ambiguous to date; further work is required to reach any definitive conclusions as to the effectiveness of this approach.

Rapko, Brian M.; Vienna, John D.; Sinkov, Serguei I.; Kim, Jinseong; Cisar, Alan J.

2002-09-10T23:59:59.000Z

13

Transient Analysis of a Preemptive Resume M/D/1/2/2 through Petri Nets \\Lambda  

E-Print Network [OSTI]

Transient Analysis of a Preemptive Resume M/D/1/2/2 through Petri Nets \\Lambda Andrea Bobbio a semantical generalization of the DSPNs by including preemptive mechanisms of resume type. This generalization different preemptive resume policies. Key words: Markov regenerative processes, Stochastic Petri Nets

Telek, Miklós

14

Public Key Cryptography and Key Management  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The use and management of certificate-based public key cryptography for the Department of Energy (DOE) requires the establishment of a public key infrastructure (PKI). This chapter defines the policy related to roles, requirements, and responsibilities for establishing and maintaining a DOE PKI and the documentation necessary to ensure that all certificates are managed in a manner that maintains the overall trust required to support a viable PKI. Canceled by DOE N 251.112.

2000-02-15T23:59:59.000Z

15

Buildings and Areas 1001 Broadway Building D1 BDWY  

E-Print Network [OSTI]

Design (LEED) Green Building Rating System is a nationally accepted benchmark for the designBuildings and Areas 1001 Broadway Building D1 BDWY 1313 East Columbia Building B3 CLMB Administration Building D1 ADMN Admissions & C2 ADAL Alumni Building Archbishop Murphy A1 ATMA Apartments Arrupe

Carter, John

16

Key Milestones/Outlook  

Broader source: Energy.gov [DOE]

Key Milestones/Outlook per the Department of Energy 2015 Congressional Budget Request, Environmental Management, March 2014

17

Uniform Gauge for D1-brane in General Background  

E-Print Network [OSTI]

We construct uniform gauge D1-brane action in general background. We also discuss how this action transforms under double Wick rotation and determine transformation properties of background fields.

Kluson, J

2015-01-01T23:59:59.000Z

18

Underground storage tank 291-D1U1: Closure plan  

SciTech Connect (OSTI)

The 291-D1U1 tank system was installed in 1983 on the north side of Building 291. It supplies diesel fuel to the Building 291 emergency generator and air compressor. The emergency generator and air compressor are located southwest and southeast, respectively, of the tank (see Appendix B, Figure 2). The tank system consists of a single-walled, 2,000- gallon, fiberglass tank and a fuel pump system, fill pipe, vent pipe, electrical conduit, and fuel supply and return piping. The area to be excavated is paved with asphalt and concrete. It is not known whether a concrete anchor pad is associated with this tank. Additionally, this closure plan assumes that the diesel tank is below the fill pad. The emergency generator and air compressor for Building 291 and its associated UST, 291-D1U1, are currently in use. The generator and air compressor will be supplied by a temporary above-ground fuel tank prior to the removal of 291-D1U1. An above-ground fuel tank will be installed as a permanent replacement for 291-D1U1. The system was registered with the State Water Resources Control Board on June 27, 1984, as 291-41D and has subsequently been renamed 291-D1U1. Figure 1 (see Appendix B) shows the location of the 291-D1U1 tank system in relation to the Lawrence Livermore National Laboratory (LLNL). Figure 2 (see Appendix B) shows the 291-D1U1 tank system in relation to Building 291. Figure 3 (see Appendix B) shows a plan view of the 291-D1U1 tank system.

Mancieri, S.; Giuntoli, N.

1993-09-01T23:59:59.000Z

19

1D-1D tunneling between vertically coupled GaAs/AlGaAs quantum wires.  

SciTech Connect (OSTI)

We report low-dimensional transport and tunneling in an independently contacted vertically coupled quantum wire system, with a 7.5 nm barrier between the wires. The derivative of the linear conductance shows evidence for both single wire occupation and coupling between the wires. This provides a map of the subband occupation that illustrates the control that we have over the vertically coupled double quantum wires. Preliminary tunneling results indicate a sharp 1D-1D peak in conjunction with a broad 2D-2D background signal. This 1D-1D peak is sensitively dependent on the top and bottom split gate voltage.

Seamons, John Andrew; Lilly, Michael Patrick; Reno, John Louis; Bielejec, Edward Salvador

2004-07-01T23:59:59.000Z

20

Key Events Timeline  

Broader source: Energy.gov [DOE]

This document lists key events beginning with the April 20 fire on the Deepwater Horizon through July 28th. Updated July 28, 2010.

Note: This page contains sample records for the topic "d1 key results" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

ANALYSIS OF BIOLOGICAL BENEFITS APPENDIX D FISH AND WILDLIFE PROGRAM D-1 December 15, 1994  

E-Print Network [OSTI]

ANALYSIS OF BIOLOGICAL BENEFITS APPENDIX D FISH AND WILDLIFE PROGRAM D-1 December 15, 1994 Appendix D STAFF ANALYSIS OF BIOLOGICAL BENEFITS OF MAINSTEM PASSAGE ACTIONS During the course. This report provides the results of the biological analysis of the adopted actions. The package was termed

22

Optical key system  

DOE Patents [OSTI]

An optical key system comprises a battery-operated optical key and an isolated lock that derives both its operating power and unlock signals from the correct optical key. A light emitting diode or laser diode is included within the optical key and is connected to transmit a bit-serial password. The key user physically enters either the code-to-transmit directly, or an index to a pseudorandom number code, in the key. Such person identification numbers can be retained permanently, or ephemeral. When a send button is pressed, the key transmits a beam of light modulated with the password information. The modulated beam of light is received by a corresponding optical lock with a photovoltaic cell that produces enough power from the beam of light to operate a password-screen digital logic. In one application, an acceptable password allows a two watt power laser diode to pump ignition and timing information over a fiberoptic cable into a sealed engine compartment. The receipt of a good password allows the fuel pump, spark, and starter systems to each operate. Therefore, bypassing the lock mechanism as is now routine with automobile thieves is pointless because the engine is so thoroughly disabled.

Hagans, Karla G. (Livermore, CA); Clough, Robert E. (Danville, CA)

2000-01-01T23:59:59.000Z

23

2D/1D approximations to the 3D neutron transport equation. I: Theory  

SciTech Connect (OSTI)

A new class of '2D/1D' approximations is proposed for the 3D linear Boltzmann equation. These approximate equations preserve the exact transport physics in the radial directions x and y and diffusion physics in the axial direction z. Thus, the 2D/1D equations are more accurate approximations of the 3D Boltzmann equation than the conventional 3D diffusion equation. The 2D/1D equations can be systematically discretized, to yield accurate simulation methods for 3D reactor core problems. The resulting solutions will be more accurate than 3D diffusion solutions, and less expensive to generate than standard 3D transport solutions. In this paper, we (i) show that the simplest 2D/1D equation has certain desirable properties, (ii) systematically discretize this equation, and (iii) derive a stable iteration scheme for solving the discrete system of equations. In a companion paper [1], we give numerical results that confirm the theoretical predictions of accuracy and iterative stability. (authors)

Kelley, B. W.; Larsen, E. W. [Department of Nuclear Engineering and Radiological Sciences, University of Michigan, Ann Arbor, MI 48109 (United States)

2013-07-01T23:59:59.000Z

24

Underground storage tank 511-D1U1 closure plan  

SciTech Connect (OSTI)

This document contains the closure plan for diesel fuel underground storage tank 511-D1U1 and appendices containing supplemental information such as staff training certification and task summaries. Precision tank test data, a site health and safety plan, and material safety data sheets are also included.

Mancieri, S.; Giuntoli, N.

1993-09-01T23:59:59.000Z

25

Emission from the D1D5 CFT  

E-Print Network [OSTI]

It is believed that the D1D5 brane system is described by an 'orbifold CFT' at a special point in moduli space. We first develop a general formulation relating amplitudes in a d-dimensional CFT to absorption/emission of quanta from flat infinity. We then construct the D1D5 vertex operators for minimally coupled scalars in supergravity, and use these to compute the CFT amplitude for emission from a state carrying a single excitation. Using spectral flow we relate this process to one where we have emission from a highly excited initial state. In each case the radiation rate is found to agree with the radiation found in the gravity dual.

Steven G. Avery; Borun D. Chowdhury; Samir D. Mathur

2009-11-06T23:59:59.000Z

26

Emission from the D1D5 CFT: Higher Twists  

E-Print Network [OSTI]

We study a certain class of nonextremal D1D5 geometries and their ergoregion emission. Using a detailed CFT computation and the formalism developed in arXiv:0906.2015 [hep-th], we compute the full spectrum and rate of emission from the geometries and find exact agreement with the gravity answer. Previously, only part of the spectrum had been reproduced using a CFT description. We close with a discussion of the context and significance of the calculation.

Steven G. Avery; Borun D. Chowdhury

2009-07-10T23:59:59.000Z

27

Underground storage tank 431-D1U1, Closure Plan  

SciTech Connect (OSTI)

This document contains information about the decommissioning of Tank 431-D1U1. This tank was installed in 1965 for diesel fuel storage. This tank will remain in active usage until closure procedures begin. Soils and ground water around the tank will be sampled to check for leakage. Appendices include; proof of proper training for workers, health and safety briefing record, task hazard analysis summary, and emergency plans.

Mancieri, S.

1993-09-01T23:59:59.000Z

28

ARM - Key Science Questions  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc Documentation RUC : XDCResearch Related Information Collaborations Meetings ofgovScienceKey

29

NETL: Key Staff  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recovery challengeMultiscaleLogos NERSCJeffreyKey Actions forEnergy Systems

30

Key recycling in authentication  

E-Print Network [OSTI]

In their seminal work on authentication, Wegman and Carter propose that to authenticate multiple messages, it is sufficient to reuse the same hash function as long as each tag is encrypted with a one-time pad. They argue that because the one-time pad is perfectly hiding, the hash function used remains completely unknown to the adversary. Since their proof is not composable, we revisit it using a composable security framework. It turns out that the above argument is insufficient: if the adversary learns whether a corrupted message was accepted or rejected, information about the hash function is leaked, and after a bounded finite amount of rounds it is completely known. We show however that this leak is very small: Wegman and Carter's protocol is still $\\epsilon$-secure, if $\\epsilon$-almost strongly universal$_2$ hash functions are used. This implies that the secret key corresponding to the choice of hash function can be reused in the next round of authentication without any additional error than this $\\epsilon$. We also show that if the players have a mild form of synchronization, namely that the receiver knows when a message should be received, the key can be recycled for any arbitrary task, not only new rounds of authentication.

Christopher Portmann

2014-09-29T23:59:59.000Z

31

Key-shift transmission  

SciTech Connect (OSTI)

A key-shift transmission is described, characterized by the speed-change shaft being divided into a pair of trough-shaped shaft halves each having an arched inner surface which defines a part of a cylindrical bore extending axially through the speed-change shaft thereby the shaft being formed into a hollow shaft, and by each of the shaft halves including a pair of flattened end surfaces which extend axially of each shaft half at both sides of the inner surface, one of the end surfaces having thereon an axially elongated projection and the other of the end surfaces having herein an axially elongated recess of a depth smaller than the height of the projection. The pair of shaft halves are engaged to each other co-rotatably by fitting the projections of the respective shaft halves into the recesses of the respective shaft halves so as to form in an outer surface of the speed-change shaft a pair of elongated axial grooves which are located radially outwardly of the elongated projections of the respective shaft halves and between the flattened end surfaces of the respective shaft halves. A pair of the shift keys are disposed within the pair of elongated axial grooves.

Nemoto, S.

1989-03-07T23:59:59.000Z

32

Experimental quantum key distribution with finite-key security analysis for noisy channels  

E-Print Network [OSTI]

In quantum key distribution implementations, each session is typically chosen long enough so that the secret key rate approaches its asymptotic limit. However, this choice may be constrained by the physical scenario, as in the perspective use with satellites, where the passage of one terminal over the other is restricted to a few minutes. Here we demonstrate experimentally the extraction of secure keys leveraging an optimal design of the prepare-and-measure scheme, according to recent finite-key theoretical tight-bounds. The experiment is performed in different channel conditions, and assuming two distinct attack models: individual attacks, or general quantum attacks. The request on the number of exchanged qubits is then obtained as a function of the key size and of the ambient quantum bit error rate. The results indicate that viable conditions for effective symmetric, and even one-time-pad, cryptography are achievable.

Davide Bacco; Matteo Canale; Nicola Laurenti; Giuseppe Vallone; Paolo Villoresi

2014-06-17T23:59:59.000Z

33

Quantum key distribution with key extracted from basis information  

E-Print Network [OSTI]

In conventional quantum key distribution protocols, the secure key is normally extracted from the measurement outcomes of the system. Here, a different approach is proposed, where the secure key is extracted from the measurement bases, rather than outcomes. Compared to the original Bennett-Brassard-1984 protocol, the proposed protocol involves no hardware change but modifications in data postprocessing. We show that this protocol is more robust against detector efficiency attacks and photon-number-splitting attacks when practical detectors and photon sources are used.

Xiongfeng Ma

2014-10-20T23:59:59.000Z

34

Tomography increases key rates of quantum-key-distribution protocols  

E-Print Network [OSTI]

We construct a practically implementable classical processing for the BB84 protocol and the six-state protocol that fully utilizes the accurate channel estimation method, which is also known as the quantum tomography. Our proposed processing yields at least as high key rate as the standard processing by Shor and Preskill. We show two examples of quantum channels over which the key rate of our proposed processing is strictly higher than the standard processing. In the second example, the BB84 protocol with our proposed processing yields a positive key rate even though the so-called error rate is higher than the 25% limit.

Shun Watanabe; Ryutaroh Matsumoto; Tomohiko Uyematsu

2008-07-22T23:59:59.000Z

35

DOE/LX/07-0319&D1 Secondary Document DMSA C-333-24 Solid Waste...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

LX07-0319&D1 Secondary Document SWMU 280 SWMU 280 * " D ,., .. '" "' .. , ... ," ""'''',1 ,..'"" """,,0,';1< ,.,. , NPm><" , + C-333 Ground Floor, West Ha lf - SWMU 280...

36

Serial Intraoperative MR Imaging of Brain Shift Arya Nabavi, M.D.1  

E-Print Network [OSTI]

Serial Intraoperative MR Imaging of Brain Shift Arya Nabavi, M.D.1 , Peter McL. Black, M.D. Ph.D.1 , David T. Gering, M.S.4 , Carl-Fredrik Westin, Ph.D3 , Vivek Mehta, M.D.1 , Richard S. Pergolizzi Jr., M, M.D., Ph.D.2 , William M. Wells III, Ph.D4 ., Ron Kikinis, M.D.3 , Ferenc A. Jolesz, M.D.3 1

37

DOE/LX/07-0178&D1 Secondary Document DMSA OS-13 Solid Waste Management...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

8&D1 Secondary Document DMSA OS-13 Solid Waste Management Unit (SWMU) Assessment Report SWMUAOC NUMBER: 224 DATE OF ORIGINAL SAR: 120100 DATE OF SAR REVISIONS: 031509...

38

DOE/LX/07-0170&D1 Secondary Document DMSA OS-02 Solid Waste Management...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

0&D1 Secondary Document DMSA OS-02 Solid Waste Management Unit (SWMU) Assessment Report SWMUAOC NUMBER: 213 DATE OF ORIGINAL SAR: 120100 DATE OF SAR REVISIONS: 031509...

39

DOE/LX/07-0175&D1 Secondary Document DMSA OS-10 Solid Waste Management...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

5&D1 Secondary Document DMSA OS-10 Solid Waste Management Unit (SWMU) Assessment Report SWMUAOC NUMBER: 221 DATE OF ORIGINAL SAR: 120100 DATE OF SAR REVISIONS: 031509...

40

Topic : Computation of ? sec ?d? 1. Usual method Observe d d? (ln ...  

E-Print Network [OSTI]

Page 1. Topic : Computation of. ? sec ?d?. 1. Usual method. Observe d d?. (ln | sec ? + tan ?|) = sec ? tan ? + sec2 ? sec ? + tan ?. = sec ?(tan ? + sec ?) sec ? +

2015-02-21T23:59:59.000Z

Note: This page contains sample records for the topic "d1 key results" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

DOE/LX/07-0181&D1 Secondary Document DMSA OS-16 Solid Waste Management...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

and miscellaneous DOELX07-0181&D1 Secondary Document items. Newly discovered RCRA hazardous waste formerly stored included light bulbs. Newly generated RCRA hazardous mixed...

42

DOE/LX/07-0182&D1 Secondary Document DMSA OS-17 Solid Waste Management...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

as forklifts, tow vehicles, and outdated fire trucks. Newly generated RCRA-regulated, hazardousmixed waste included light bulbs, DOELX07-0182&D1 Secondary Document fuses,...

43

2 Key Achievements 7 Greenhouse Gas Reduction  

E-Print Network [OSTI]

Princeton University Reports Contents 2 Key Achievements 7 Greenhouse Gas Reduction Campus Energy was established in 2008, the University has invested $5.3 million in energy-savings projects, resulting in annual of a 5.2-megawatt solar collector field. · Audit the remaining 20 of the top 50 energy- consuming

44

The LOFAR Transients Key Project  

E-Print Network [OSTI]

LOFAR, the Low Frequency Array, is a new radio telescope under construction in the Netherlands, designed to operate between 30 and 240 MHz. The Transients Key Project is one of the four Key Science Projects which comprise the core LOFAR science case. The remit of the Transients Key Project is to study variable and transient radio sources detected by LOFAR, on timescales from milliseconds to years. This will be achieved via both regular snapshot monitoring of historical and newly-discovered radio variables and, most radically, the development of a `Radio Sky Monitor' which will survey a large fraction of the northern sky on a daily basis.

Rob Fender; Robert Braun; Ben Stappers; Ralph Wijers; Michael Wise; Thijs Coenen; Heino Falcke; Jean-Mathias Griessmeier; Michiel van Haarlem; Peter Jonker; Casey Law; Sera Markoff; Joseph Masters; James Miller-Jones; Rachel Osten; Bart Scheers; Hanno Spreeuw; John Swinbank; Corina Vogt; Rudy Wijnands; Philippe Zarka

2006-11-09T23:59:59.000Z

45

Universit Paris Descartes -UFR STAPS -Planning 2013-2014 (proposition 1B2) Arts Thrapies D 1 Ma 1 V 1 D 1 Me 1 S 1 S 1 Ma 1 J 1 D 1 Ma 1  

E-Print Network [OSTI]

Université Paris Descartes - UFR STAPS - Planning 2013-2014 (proposition 1B2) Arts Thérapies D 1 Ma 1 V 1 D 1 Me 1 S 1 S 1 Ma 1 J 1 D 1 Ma 1 L 2 Me 2 S 2 L 2 J 2 D 2 D 2 Me 2 V 2 L 2 Me 2 Ma 3 J 3 D 3 Ma 3 V 3 L 3 L 3 J 3 S 3 Ma 3 J 3 Me 4 V 4 L 4 Me 4 S 4 Ma 4 Ma 4 V 4 D 4 Me 4 V 4 J 5 S 5 Ma 5 J 5 D

Pellier, Damien

46

Mediated Semi-Quantum Key Distribution  

E-Print Network [OSTI]

In this paper, we design a new quantum key distribution protocol, allowing two limited semi-quantum or "classical" users to establish a shared secret key with the help of a fully quantum server. A semi-quantum user can only prepare and measure qubits in the computational basis and so must rely on this quantum server to produce qubits in alternative bases and also to perform alternative measurements. However, we assume that the sever is untrusted and we prove the unconditional security of our protocol even in the worst case: when this quantum server is an all-powerful adversary. We also compute a lower bound of the key rate of our protocol, in the asymptotic scenario, as a function of the observed error rate in the channel allowing us to compute the maximally tolerated error of our protocol. Our results show that a semi-quantum protocol may hold similar security to a fully quantum one.

Walter O. Krawec

2014-11-21T23:59:59.000Z

47

Above-threshold ionization near the 3p4d 1 autoionizing state in magnesium  

E-Print Network [OSTI]

Above-threshold ionization near the 3p4d 1 Fo autoionizing state in magnesium A. Reber,1 T. Baynard ionization of magnesium from the 3 1 P state in the region of the 3p4d 1 Fo autoionizing resonance, in which of magnesium atoms just inside the focus of a magnetic bottle spectrometer MBS 13 . One laser is tuned

Berry, R. Stephen

48

COMPLEX ORIENTANTION FORMULAS FOR MCURVES OF DEGREE 4d + 1 WITH 4 NESTS  

E-Print Network [OSTI]

COMPLEX ORIENTANTION FORMULAS FOR M­CURVES OF DEGREE 4d + 1 WITH 4 NESTS S.Yu. Orevkov Abstract. We prove complex orientation formulas for M­curves in RP 2 of degree 4d + 1 with 4 nests. They generalize the formulas of complex orientations for M­ curves in RP 2 with a deep nest. This is a step towards the isotopy

Orevkov, Stepan

49

COMPLEX ORIENTANTION FORMULAS FOR M-CURVES OF DEGREE 4d + 1 WITH 4 NESTS  

E-Print Network [OSTI]

COMPLEX ORIENTANTION FORMULAS FOR M-CURVES OF DEGREE 4d + 1 WITH 4 NESTS S.Yu. Orevkov Abstract. We prove complex orientation formulas for M-curves in RP2 of degree 4d + 1 with 4 nests. They generalize the formulas of complex orientations for M- curves in RP2 with a deep nest. This is a step towards the isotopy

Orevkov, Stepan

50

Public key infrastructure for DOE security research  

SciTech Connect (OSTI)

This document summarizes the Department of Energy`s Second Joint Energy Research/Defence Programs Security Research Workshop. The workshop, built on the results of the first Joint Workshop which reviewed security requirements represented in a range of mission-critical ER and DP applications, discussed commonalties and differences in ER/DP requirements and approaches, and identified an integrated common set of security research priorities. One significant conclusion of the first workshop was that progress in a broad spectrum of DOE-relevant security problems and applications could best be addressed through public-key cryptography based systems, and therefore depended upon the existence of a robust, broadly deployed public-key infrastructure. Hence, public-key infrastructure ({open_quotes}PKI{close_quotes}) was adopted as a primary focus for the second workshop. The Second Joint Workshop covered a range of DOE security research and deployment efforts, as well as summaries of the state of the art in various areas relating to public-key technologies. Key findings were that a broad range of DOE applications can benefit from security architectures and technologies built on a robust, flexible, widely deployed public-key infrastructure; that there exists a collection of specific requirements for missing or undeveloped PKI functionality, together with a preliminary assessment of how these requirements can be met; that, while commercial developments can be expected to provide many relevant security technologies, there are important capabilities that commercial developments will not address, due to the unique scale, performance, diversity, distributed nature, and sensitivity of DOE applications; that DOE should encourage and support research activities intended to increase understanding of security technology requirements, and to develop critical components not forthcoming from other sources in a timely manner.

Aiken, R.; Foster, I.; Johnston, W.E. [and others

1997-06-01T23:59:59.000Z

51

Thailand-Key Results and Policy Recommendations for Future Bioenergy...  

Open Energy Info (EERE)

biofuel feedstock crops. How the Thai Government manages the potential pressures that the bioenergy sector will exert on its natural resources and agricultural markets and the...

52

Transportation Energy Futures Study: The Key Results and Conclusions...  

Open Energy Info (EERE)

Energy Futures study, which highlights underexplored opportunities to reduce petroleum use and greenhouse gas emissions from the U.S. transportation sector. There will be...

53

Thailand-Key Results and Policy Recommendations for Future Bioenergy  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of InspectorConcentrating SolarElectric Coop, Inc Place:Innovation &InformationLoading(CTI PFAN) |

54

Transportation Energy Futures Study: The Key Results and Conclusions  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of InspectorConcentrating SolarElectric Coop, IncTipmontInformation WaynesvilleTracy,Ltd (NewTAMT)

55

Key Issues | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:YearRound-UpHeatMulti-Dimensionalthe10 DOEWashington, DC 20585on253.16582104)Key Issues Key Issues

56

Key Activities | Department of Energy  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGY TAX POLICIES7.pdfFuel2007 | Department7JanuaryWASTE-TO-ENERGY:About » KeyKey

57

Key Activities | Department of Energy  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGY TAX POLICIES7.pdfFuel2007 | Department7JanuaryWASTE-TO-ENERGY:About » KeyKeyAbout the

58

QKD with finite resources: secret key rates via Rnyi entropies  

E-Print Network [OSTI]

A realistic Quantum Key Distribution (QKD) protocol necessarily deals with finite resources, such as the number of signals exchanged by the two parties. We derive a bound on the secret key rate which is expressed as an optimization problem over R\\'enyi entropies. Under the assumption of collective attacks by an eavesdropper, a computable estimate of our bound for the six-state protocol is provided. This bound leads to improved key rates in comparison to previous results.

Silvestre Abruzzo; Hermann Kampermann; Markus Mertz; Dagmar Bru

2011-05-27T23:59:59.000Z

59

Monroe County Extension Services Key West Office  

E-Print Network [OSTI]

Energy Services: 305-295-1010 Florida Keys Electric Co-op: 305-852-2431 Monroe County Roads & Bridges-292-4501 http://monroe.ifas.ufl.edu Key Largo Office: 102050 Overseas Highway, Room 244 City and County Tree Lower Keys: 305-797-4929 Upper Keys: 305-852-7161 Contact local tree services throughout the Keys

Jawitz, James W.

60

Key-Insulated Symmetric Key Cryptography and Mitigating Attacks against Cryptographic Cloud Software  

E-Print Network [OSTI]

Key-Insulated Symmetric Key Cryptography and Mitigating Attacks against Cryptographic Cloud- sociated cryptographic keys in their entirety. In this paper, we investigate key-insulated symmetric key. To illustrate the feasibility of key-insulated symmetric key cryptography, we also report a proof

Dodis, Yevgeniy

Note: This page contains sample records for the topic "d1 key results" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

DOE/LX/07-0301&D1 Secondary Document DMSA OS-14 Solid Waste Management...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

1&D1 Secondary Document DMSA OS-14 Solid Waste Management Unit (SWMU) Assessment Report SWMUAOC NUMBER: 225 DATE OF ORIGINAL SAR: 120100 DATE OF SAR REVISIONS: 031509, 0115...

62

DOE/LX/07-0183&D1 Secondary Document DMSA OS-18 Solid Waste Management...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

3&D1 Secondary Document DMSA OS-18 Solid Waste Management Unit (SWMU) Assessment Report SWMUAOC NUMBER: 229 DATE OF ORIGINAL SAR: 120100 DATE OF SAR REVISIONS: 52803, 031509...

63

DOE/LX/07-0299&D1 Secondary Document DMSA OS-06 Solid Waste Management...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

9&D1 Secondary Document DMSA OS-06 Solid Waste Management Unit (SWMU) Assessment Report SWMUAOC NUMBER: 217 DATE OF ORIGINAL SAR: 120100 DATE OF SAR REVISIONS: 100703, 0115...

64

DOE/LX/07-0062&D1 Secondary Document DMSA-331-24 Solid Waste...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

2&D1 Secondary Document DMSA-331-24 Solid Waste Management Unit (SWMU) Assessment Report SWMUAOC NUMBER: 255 DATE OF ORIGINAL SAR: 120100 DATE OF SAR REVISION: 031509...

65

DOE/LX/07-0113&D1 Secondary Document DMSA-331-17 Solid Waste...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

3&D1 Secondary Document DMSA-331-17 Solid Waste Management Unit (SWMU) Assessment Report SWMUAOC NUMBER: 553 DATE OF ORIGINAL SAR: 121605 DATE OF SAR REVISION: 031509...

66

DOE/LX/07-0114&D1 Secondary Document DMSA-331-21 Solid Waste...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

4&D1 Secondary Document DMSA-331-21 Solid Waste Management Unit (SWMU) Assessment Report SWMUAOC NUMBER: 555 DATE OF ORIGINAL SAR: 121605 DATE OF SAR REVISION: 031509...

67

DOE/LX/07-0302&D1 Secondary Document DMSA OS-15 Solid Waste Management...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

quantity removed 22,585 ft 3 . DOELX07-0302&D1 Secondary Document SUMMARY OF ENVIRONMENTAL SAMPLING DATA: Radiological surveys of the surface soil in 1995 indicated soil...

68

Brain Receptor Structures Key to Future Therapeutics  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Brain Receptor Structures Key to Future Therapeutics Brain Receptor Structures Key to Future Therapeutics Print Wednesday, 28 January 2015 00:00 With an aging population in...

69

Key Activities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGYWomen OwnedofDepartment ofJared Temanson - Project LeaderDepartment's DirectivesKey

70

Key Activities | Department of Energy  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGY TAX POLICIES7.pdfFuel2007 | Department7JanuaryWASTE-TO-ENERGY:About » Key

71

Public/private key certification authority and key distribution. Draft  

SciTech Connect (OSTI)

Traditional encryption, which protects messages from prying eyes, has been used for many decades. The present concepts of encryption are built from that heritage. Utilization of modern software-based encryption techniques implies much more than simply converting files to an unreadable form. Ubiquitous use of computers and advances in encryption technology coupled with the use of wide-area networking completely changed the reasons for utilizing encryption technology. The technology demands a new and extensive infrastructure to support these functions. Full understanding of these functions, their utility and value, and the need for an infrastructure, takes extensive exposure to the new paradigm. This paper addresses issues surrounding the establishment and operation of a key management system (i.e., certification authority) that is essential to the successful implementation and wide-spread use of encryption.

Long, J.P.; Christensen, M.J.; Sturtevant, A.P.; Johnston, W.E.

1995-09-25T23:59:59.000Z

72

COLLEGE AVE CAMPUS (CAC) KEY PICK UP  

E-Print Network [OSTI]

COLLEGE AVE CAMPUS (CAC) KEY PICK UP NOTE TO ALL STUDENTS: ONLY YOU CAN PICK UP YOUR KEY. You in and key pick up. If you are unable to pick up your key by 5:00 p.m. on September 1st , please make prior in Clothier Hall on CAC. Keys not picked up during the above-noted hours can be picked up at the Housing

73

Data:B9059af3-9f98-43d1-a844-bc870704d1a6 | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onb5-dcc1fcffd1f2 No revision has38865d08 Nocadf-323f-4b6f-9089-15e8154a5fd970704d1a6 No revision has been approved for

74

Answering Key Fuel Cycle Questions  

SciTech Connect (OSTI)

The Advanced Fuel Cycle Initiative (AFCI) program has both outcome and process goals because it must address both waste already accumulating as well as completing the fuel cycle in connection with advanced nuclear power plant concepts. The outcome objectives are waste geological repository capacity and cost, energy security and sustainability, proliferation resistance, fuel cycle economics, and safety. The process objectives are readiness to proceed and adaptability and robustness in the face of uncertainties. A classic decision-making approach to such a multi-attribute problem would be to weight individual quantified criteria and calculate an overall figure of merit. This is inappropriate for several reasons. First, the goals are not independent. Second, the importance of different goals varies among stakeholders. Third, the importance of different goals is likely to vary with time, especially the energy future. Fourth, some key considerations are not easily or meaningfully quantifiable at present. Instead, at this point, we have developed 16 questions the AFCI program should answer and suggest an approach of determining for each whether relevant options improve meeting each of the program goals. We find that it is not always clear which option is best for a specific question and specific goal; this helps identify key issues for future work. In general, we suggest attempting to create as many win-win decisions (options that are attractive or neutral to most goals) as possible. Thus, to help clarify why the program is exploring the options it is, and to set the stage for future narrowing of options, we have developed 16 questions, as follows: What are the AFCI program goals? Which potential waste disposition approaches do we plan for? What are the major separations, transmutation, and fuel options? How do we address proliferation resistance? Which potential energy futures do we plan for? What potential external triggers do we plan for? Should we separate uranium? If we separate uranium, should we recycle it, store it or dispose of it? Is it practical to plan to fabricate and handle hot fuel? Which transuranic elements (TRU) should be separated and transmuted? Of those TRU separated, which should be transmuted together? Should we separate and/or transmute Cs and Sr isotopes that dominate near-term repository heating? Should we separate and/or transmute very long-lived Tc and I isotopes? Which separation technology? What mix of transmutation technologies? What fuel technology best supports the above decisions?

Steven J. Piet; Brent W. Dixon; J. Stephen Herring; David E. Shropshire; Mary Lou Dunzik-Gougar

2003-10-01T23:59:59.000Z

75

Quantum key distribution with entangled photon sources  

E-Print Network [OSTI]

A parametric down-conversion (PDC) source can be used as either a triggered single photon source or an entangled photon source in quantum key distribution (QKD). The triggering PDC QKD has already been studied in the literature. On the other hand, a model and a post-processing protocol for the entanglement PDC QKD are still missing. In this paper, we fill in this important gap by proposing such a model and a post-processing protocol for the entanglement PDC QKD. Although the PDC model is proposed to study the entanglement-based QKD, we emphasize that our generic model may also be useful for other non-QKD experiments involving a PDC source. Since an entangled PDC source is a basis independent source, we apply Koashi-Preskill's security analysis to the entanglement PDC QKD. We also investigate the entanglement PDC QKD with two-way classical communications. We find that the recurrence scheme increases the key rate and Gottesman-Lo protocol helps tolerate higher channel losses. By simulating a recent 144km open-air PDC experiment, we compare three implementations -- entanglement PDC QKD, triggering PDC QKD and coherent state QKD. The simulation result suggests that the entanglement PDC QKD can tolerate higher channel losses than the coherent state QKD. The coherent state QKD with decoy states is able to achieve highest key rate in the low and medium-loss regions. By applying Gottesman-Lo two-way post-processing protocol, the entanglement PDC QKD can tolerate up to 70dB combined channel losses (35dB for each channel) provided that the PDC source is placed in between Alice and Bob. After considering statistical fluctuations, the PDC setup can tolerate up to 53dB channel losses.

Xiongfeng Ma; Chi-Hang Fred Fung; Hoi-Kwong Lo

2007-03-14T23:59:59.000Z

76

1. Telefnica I+D 1.1. Implementacin y evaluacin de prestaciones de un  

E-Print Network [OSTI]

1. Telefónica I+D 1.1. Implementación y evaluación de prestaciones de un PCE multicapa Tutor: Dr del protocolo PCE en entornos multicapa. El alumno partirá sobre un desarrollo del PCE, por lo que debe realizar únicamente las extensiones necesarias. El alumno deberá evaluar las prestaciones del PCE

Autonoma de Madrid, Universidad

77

Malcolm E Scott, MSW, Ph.D. 1 Malcolm E. Scott, MSW, Ph.D.  

E-Print Network [OSTI]

Malcolm E Scott, MSW, Ph.D. 1 Malcolm E. Scott, MSW, Ph.D. Curriculum Vitae Business Address Seeking Advanced Social Work Education M.S.W. (2001) Colorado State University, Fort Collins, CO 80523 Department of Social Work Baton Rouge, LA Major: Social Work #12;Malcolm E Scott, MSW, Ph.D. 2 LICENSES

Stephens, Graeme L.

78

NIFS Fusion Engineering Research Project and Helical Demo FFHR-d1  

E-Print Network [OSTI]

NIFS Fusion Engineering Research Project and Helical Demo FFHR-d1 International Workshop on MFE. Large amount of DT fuel circulation is required in pellet injector. 3. But, the hydrogen inventory in solid hydrogen reservoir assuming = 40 s to solidify hydrogen gas. 3x1023/s ~1000 Pa·m3/s Sagara- 21

79

Engineered Heart Tissue Model of Diabetic Myocardium Hannah Song, Ph.D.,1  

E-Print Network [OSTI]

Engineered Heart Tissue Model of Diabetic Myocardium Hannah Song, Ph.D.,1 Peter W. Zandstra, Ph of cardiomyocytes (CMs) is a leading cause of heart failure. Previously, we reported an in vitro test-bed for screening cell integration between injected test cells and host CM using the engineered heart tissue

Zandstra, Peter W.

80

Culvert Design for Flood Routing considering Sediment Transport W.J. Rahmeyer PhD.1  

E-Print Network [OSTI]

Culvert Design for Flood Routing considering Sediment Transport W.J. Rahmeyer PhD.1 and W routing methodologies do not consider sediment bed-load transport through the culverts or pipelines of road crossings. Many practitioners either ignore the transport of sediment through a culvert or assume

Rahmeyer, William J.

Note: This page contains sample records for the topic "d1 key results" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

(01)UC06/PhD/1 Audiology1 To introduce a new subject, Audiology,  

E-Print Network [OSTI]

(01)UC06/PhD/1 ­ Audiology1 To introduce a new subject, Audiology, to the Doctor of Philosophy of proposal To introduce a new subject, Audiology, for the Doctor of Philosophy. 2. Justification To advance is widespread. The inability to recruit new PhD faculty is already putting some academic programs at risk

Hickman, Mark

82

Analysis of the rotational structure in the high-resolution infrared spectra of trans-hexatriene-2-d1 and -3-d1  

SciTech Connect (OSTI)

The 2-d1 and 3-d1 isotopologues of trans-hexatriene have been synthesized, and their high-resolution (0.0015 cm-1) IR spectra have been recorded. For each of the isotopologues the rotational structure in four C-type bands for out-of-plane vibrational modes has been analyzed, and the ground state combination differences (GSCDs) have been pooled. Ground state rotational constants have been fitted to the GSCDs. For the 2-d species, A0, B0, and C0 values of 0.7837254(5), 0.0442806(3), and 0.0419299(2) cm-1 were fitted to 2450 GSCDs. For the 3-d species, A0, B0, and C0 values of 0.7952226(8), 0.0446149(7), and 0.0422661(4) cm-1 were fitted to 2234 GSCDs. For the eleven out-of-plane modes of the two isotopologues, predictions of anharmonic wavenumbers and harmonic intensities have been computed and compared with experiment where possible.

Craig, Norman C.; Chen, Yihui; van Besien, Herman; Blake, Thomas A.

2014-09-01T23:59:59.000Z

83

Lightweight Key Establishment for Distributed Networking Environments  

E-Print Network [OSTI]

/ COSIC Seminar 2007 Keith Martin #12;Lightweight Key Establishment/Introduction The plan 1. Wireless sensor networks 2. A key establishment framework 3. Key establishment for grids COSIC Seminar 2007 Keith Establishment/Wireless sensor networks The "classical" scenario COSIC Seminar 2007 Keith Martin #12;Lightweight

Martin, Keith

84

Note on Evaluation of AWG Port Utilization Probabilities dl(1, j), j = 1, D, D -1, and  

E-Print Network [OSTI]

1 Note on Evaluation of AWG Port Utilization Probabilities dl(1, j), j = 1, D, D - 1, and dl(1, 1, D - 1 In this appendix we evaluate dl(1, j) for j = 1, D, D-1, i.e., the output port j is not a direct neighbor of sender port D, and note that the dl(1, j) are the same for these AWG ports j. We

Reisslein, Martin

85

Brain Receptor Structures Key to Future Therapeutics  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Brain Receptor Structures Key to Future Therapeutics Print With an aging population in America, it is more important than ever to discover ways to treat or prevent diseases...

86

Plasma Boundary Colloquium.key  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 - September 2006Photovoltaic Theory and ModelingPinkand ResultsExcitement at the

87

Monroe County Extension Services Key West Office  

E-Print Network [OSTI]

-292-4501 http://monroe.ifas.ufl.edu Key Largo Office: 102050 Overseas Highway, Room 244 City and County Tree Energy Services: 305-295-1010 Florida Keys Electric Co-op: 305-852-2431 Monroe County Roads & Bridges conditions based on USDA zone, water and light requirements, soil conditions, salt and wind tolerance

Florida, University of

88

Captured key electrical safety lockout system  

DOE Patents [OSTI]

A safety lockout apparatus for an electrical circuit includes an electrical switch, a key, a lock and a blocking mechanism. The electrical switch is movable between an ON position at which the electrical circuit is energized and an OFF position at which the electrical circuit is deactivated. The lock is adapted to receive the key and is rotatable among a plurality of positions by the key. The key is only insertable and removable when the lock is at a preselected position. The lock is maintained in the preselected position when the key is removed from the lock. The blocking mechanism physically maintains the switch in its OFF position when the key is removed from the lock. The blocking mechanism preferably includes a member driven by the lock between a first position at which the electrical switch is movable between its ON and OFF positions and a second position at which the member physically maintains the electrical switch in its OFF position. Advantageously, the driven member`s second position corresponds to the preselected position at which the key can be removed from and inserted into the lock. 7 figs.

Darimont, D.E.

1995-10-31T23:59:59.000Z

89

Captured key electrical safety lockout system  

SciTech Connect (OSTI)

A safety lockout apparatus for an electrical circuit includes an electrical switch, a key, a lock and a blocking mechanism. The electrical switch is movable between an ON position at which the electrical circuit is energized and an OFF position at which the electrical circuit is deactivated. The lock is adapted to receive the key and is rotatable among a plurality of positions by the key. The key is only insertable and removable when the lock is at a preselected position. The lock is maintained in the preselected position when the key is removed from the lock. The blocking mechanism physically maintains the switch in its OFF position when the key is removed from the lock. The blocking mechanism preferably includes a member driven by the lock between a first position at which the electrical switch is movable between its ON and OFF positions and a second position at which the member physically maintains the electrical switch in its OFF position. Advantageously, the driven member's second position corresponds to the preselected position at which the key can be removed from and inserted into the lock.

Darimont, Daniel E. (Aurora, IL)

1995-01-01T23:59:59.000Z

90

The U.S. ISO Key Project on Quasars  

E-Print Network [OSTI]

Observations for the U.S. key project on quasars using ISO were completed in April when the satellite's cryogen supply expired. This proceeding presents an update of the project, including information on the final sample, a discussion of some of the data reduction challenges and current efforts to meet them, plus a comparison of preliminary results with IRAS fluxes.

Eric Hooper; Belinda Wilkes; Kim McLeod; Jonathan McDowell; Martin Elvis; Matthew Malkan; Carol Lonsdale; Chris Impey

1998-09-22T23:59:59.000Z

91

Experimental study of high speed polarization-coding quantum key distribution with sifted-key  

E-Print Network [OSTI]

and links 1. C. H. Bennet and G. Brassard, "Quantum cryptography: Public key distribution and coin tossing

92

Field Test of Measurement-Device-Independent Quantum Key Distribution  

E-Print Network [OSTI]

A main type of obstacles of practical applications of quantum key distribution (QKD) network is various attacks on detection. Measurement-device-independent QKD (MDIQKD) protocol is immune to all these attacks and thus a strong candidate for network security. Recently, several proof-of-principle demonstrations of MDIQKD have been performed. Although novel, those experiments are implemented in the laboratory with secure key rates less than 0.1 bps. Besides, they need manual calibration frequently to maintain the system performance. These aspects render these demonstrations far from practicability. Thus, justification is extremely crucial for practical deployment into the field environment. Here, by developing an automatic feedback MDIQKD system operated at a high clock rate, we perform a field test via deployed fiber network of 30 km total length, achieving a 16.9 bps secure key rate. The result lays the foundation for a global quantum network which can shield from all the detection-side attacks.

Yan-Lin Tang; Hua-Lei Yin; Si-Jing Chen; Yang Liu; Wei-Jun Zhang; Xiao Jiang; Lu Zhang; Jian Wang; Li-Xing You; Jian-Yu Guan; Dong-Xu Yang; Zhen Wang; Hao Liang; Zhen Zhang; Nan Zhou; Xiongfeng Ma; Teng-Yun Chen; Qiang Zhang; Jian-Wei Pan

2014-08-11T23:59:59.000Z

93

Key Implications of the Global Economic Environment  

E-Print Network [OSTI]

Key Implications of the Global Economic Environment For PCT Filings: A Survey of the Issues DMI...............................................................................9 Annex 1: Incentives for Patent Filing: The Analytical Framework...........................11 I-1 Intellectual property, innovation, and economic growth.................................13 2-2 Individual

Lansky, Joshua

94

Extracting secret keys from integrated circuits  

E-Print Network [OSTI]

Modern cryptographic protocols are based on the premise that only authorized participants can obtain secret keys and access to information systems. However, various kinds of tampering methods have been devised to extract ...

Lim, Daihyun, 1976-

2004-01-01T23:59:59.000Z

95

Research Summary Key Ingredients of Collaborative Management  

E-Print Network [OSTI]

, wildlife management and water catchments. This project, developed in discussion with stakeholders, soughtResearch Summary Key Ingredients of Collaborative Management It is widely accepted that collaboration amongst stakeholders can lead to more sustainable land-management. Voluntary collaboration

96

DOE/LX/07-0123&D1 Secondary Document DMSA C-400-06 Solid Waste...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

3&D1 Secondary Document DMSA C-400-06 Solid Waste Management Unit (SWMU) Assessment Report SWMUAOC NUMBER: 352 DATE OF ORIGINAL SAR: 120100 DATE OF SAR REVISIONS: 31509...

97

DOE/LX/07-0312&D1 Secondary Document DMSA C-333-06 Solid Waste...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

2&D1 Secondary Document DMSA C-333-06 Solid Waste Management Unit (SWMU) Assessment Report SWMUAOC NUMBER: 261 DATE OF ORIGINAL SAR: 120100 DATE OF SAR REVISIONS: 031509, 03...

98

DOE/LX/07-0238&D1 Secondary Document DMSA C-337-21 Solid Waste...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

8&D1 Secondary Document DMSA C-337-21 Solid Waste Management Unit (SWMU) Assessment Report SWMUAOC NUMBER: 328 DATE OF ORIGINAL SAR: 120100 DATE OF SAR REVISIONS: 030110...

99

DOE/LX/07-0168&D1 Secondary Document DMSA C-720-03 Solid Waste...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

8&D1 Secondary Document DMSA C-720-03 Solid Waste Management Unit (SWMU) Assessment Report SWMUAOC NUMBER: 358 DATE OF ORIGINAL SAR: 120100 DATE OF SAR REVISIONS: 031509...

100

DOE/LX/07-0310&D1 Secondary Document DMSA C-333-04 Solid Waste...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

10&D1 Secondary Document DMSA C-333-04 Solid Waste Management Unit (SWMU) Assessment Report SWMUAOC NUMBER: 259 DATE OF ORIGINAL SAR: 120100 DATE OF SAR REVISIONS: 031509, 03...

Note: This page contains sample records for the topic "d1 key results" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

DOE/LX/07-0068&D1 Secondary Document DMSA C-335-01 Solid Waste...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

8&D1 Secondary Document DMSA C-335-01 Solid Waste Management Unit (SWMU) Assessment Report SWMUAOC NUMBER: 297 DATE OF ORIGINAL SAR: 120100 DATE OF SAR REVISION: 031509...

102

DOE/LX/07-0097&D1 Secondary Document DMSA C-400-04 Solid Waste...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

7&D1 Secondary Document DMSA C-400-04 Solid Waste Management Unit (SWMU) Assessment Report SWMUAOC NUMBER: 350 DATE OF ORIGINAL SAR: 120100 DATE OF SAR REVISIONS: 12604; 03...

103

DOE/LX/07-0208&D1 Secondary Document DMSA C-335-02 Solid Waste...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

8&D1 Secondary Document DMSA C-335-02 Solid Waste Management Unit (SWMU) Assessment Report SWMUAOC NUMBER: 298 DATE OF ORIGINAL SAR: 120100 DATE OF SAR REVISIONS: 031509...

104

DOE/LX/07-0148&D1 Secondary Document DMSA C-337-07 Solid Waste...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

8&D1 Secondary Document DMSA C-337-07 Solid Waste Management Unit (SWMU) Assessment Report SWMUAOC NUMBER: 314 DATE OF ORIGINAL SAR: 120100 DATE OF SAR REVISIONS: 031509...

105

DOE/LX/07-0209&D1 Secondary Document DMSA C-335-06 Solid Waste...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

9&D1 Secondary Document DMSA C-335-06 Solid Waste Management Unit (SWMU) Assessment Report SWMUAOC NUMBER: 302 DATE OF ORIGINAL SAR: 120100 DATE OF SAR REVISIONS: 031509...

106

DOE/LX/07-0152&D1 Secondary Document DMSA C-337-14 Solid Waste...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

2&D1 Secondary Document DMSA C-337-14 Solid Waste Management Unit (SWMU) Assessment Report SWMUAOC NUMBER: 321 DATE OF ORIGINAL SAR: 120100 DATE OF SAR REVISIONS: 031909...

107

DOE/LX/07-0284&D1 Secondary Document DMSA C-337-36 Solid Waste...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

4&D1 Secondary Document DMSA C-337-36 Solid Waste Management Unit (SWMU) Assessment Report SWMUAOC NUMBER: 339 DATE OF ORIGINAL SAR: 120100 DATE OF SAR REVISIONS: 061410...

108

DOE/LX/07-0328&D1 Secondary Document DMSA C-337-19 Solid Waste...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

8&D1 Secondary Document DMSA C-337-19 Solid Waste Management Unit (SWMU) Assessment Report SWMUAOC NUMBER: 326 DATE OF ORIGINAL SAR: 120100 DATE OF SAR REVISIONS: 030110...

109

DOE/LX/07-0164&D1 Secondary Document DMSA C-337-39 Solid Waste...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

4&D1 Secondary Document DMSA C-337-39 Solid Waste Management Unit (SWMU) Assessment Report SWMUAOC NUMBER: 342 DATE OF ORIGINAL SAR: 120100 DATE OF SAR REVISIONS: 020205, 03...

110

DOE/LX/07-0281&D1 Secondary Document DMSA C-333-28 Solid Waste...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

1&D1 Secondary Document DMSA C-333-28 Solid Waste Management Unit (SWMU) Assessment Report SWMUAOC NUMBER: 284 DATE OF ORIGINAL SAR: 120100 DATE OF SAR REVISIONS: 061410...

111

DOE/LX/07-0216&D1 Secondary Document DMSA C-337-16 Solid Waste...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

6&D1 Secondary Document DMSA C-337-16 Solid Waste Management Unit (SWMU) Assessment Report SWMUAOC NUMBER: 323 DATE OF ORIGINAL SAR: 120100 DATE OF SAR REVISIONS: 031509...

112

DOE/LX/07-0047&D1 Secondary Document DMSA C-335-11 Solid Waste...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

7&D1 Secondary Document DMSA C-335-11 Solid Waste Management Unit (SWMU) Assessment Report UNIT NUMBER: 306 DATE OF ORIGINAL SAR: 120100 DATE OF SAR REVISION: 031509 REGULATORY...

113

DOE/LX/07-0308&D1 Secondary Document DMSA C-333-02 Solid Waste...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

8&D1 Secondary Document DMSA C-333-02 Solid Waste Management Unit (SWMU) Assessment Report SWMUAOC NUMBER: 257 DATE OF ORIGINAL SAR: 120100 DATE OF SAR REVISIONS: 031509, 03...

114

DOE/LX/07-0153&D1 Secondary Document DMSA C-337-15 Solid Waste...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

3&D1 Secondary Document DMSA C-337-15 Solid Waste Management Unit (SWMU) Assessment Report SWMUAOC NUMBER: 322 DATE OF ORIGINAL SAR: 120100 DATE OF SAR REVISIONS: 031909...

115

DOE/LX/07-0264&D1 Secondary Document DMSA C-337-03 Solid Waste...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

4&D1 Secondary Document DMSA C-337-03 Solid Waste Management Unit (SWMU) Assessment Report SWMUAOC NUMBER: 310 DATE OF ORIGINAL SAR: 120100 DATE OF SAR REVISION: 061410...

116

DOE/LX/07-0160&D1 Secondary Document DMSA C-337-34 Solid Waste...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

0&D1 Secondary Document DMSA C-337-34 Solid Waste Management Unit (SWMU) Assessment Report SWMUAOC NUMBER: 337 DATE OF ORIGINAL SAR: 120100 DATE OF SAR REVISIONS: 031909...

117

DOE/LX/07-0163&D1 Secondary Document DMSA C-337-38 Solid Waste...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

3&D1 Secondary Document DMSA C-337-38 Solid Waste Management Unit (SWMU) Assessment Report SWMUAOC NUMBER: 341 DATE OF ORIGINAL SAR: 120100 DATE OF SAR REVISIONS: 031909...

118

DOE/LX/07-0329&D1 Secondary Document DMSA C-337-29 Solid Waste...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

9&D1 Secondary Document DMSA C-337-29 Solid Waste Management Unit (SWMU) Assessment Report SWMUAOC NUMBER: 332 DATE OF ORIGINAL SAR: 120100 DATE OF SAR REVISIONS: 030110...

119

DOE/LX/07-0154&D1 Secondary Document DMSA C-337-17 Solid Waste...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

4&D1 Secondary Document DMSA C-337-17 Solid Waste Management Unit (SWMU) Assessment Report SWMUAOC NUMBER: 324 DATE OF ORIGINAL SAR: 120100 DATE OF SAR REVISIONS: 031909...

120

DOE/LX/07-0280&D1 Secondary Document DMSA C-333-25 Solid Waste...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

0&D1 Secondary Document DMSA C-333-25 Solid Waste Management Unit (SWMU) Assessment Report SWMUAOC NUMBER: 281 DATE OF ORIGINAL SAR: 120100 DATE OF SAR REVISIONS: 061410...

Note: This page contains sample records for the topic "d1 key results" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

DOE/LX/07-0080&D1 Secondary Document DMSA C-331-04 Solid Waste...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

0&D1 Secondary Document DMSA C-331-04 Solid Waste Management Unit (SWMU) Assessment Report SWMUAOC NUMBER: 238 DATE OF ORIGINAL SAR: 120100 DATE OF SAR REVISIONS: 031509...

122

DOE/LX/07-0065&D1 Secondary Document DMSA C-333-37 Solid Waste...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

5&D1 Secondary Document DMSA C-333-37 Solid Waste Management Unit (SWMU) Assessment Report SWMUAOC NUMBER: 290 DATE OF ORIGINAL SAR: 120100 DATE OF SAR REVISIONS: 031509...

123

DOE/LX/07-0149&D1 Secondary Document DMSA C-337-08 Solid Waste...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

9&D1 Secondary Document DMSA C-337-08 Solid Waste Management Unit (SWMU) Assessment Report SWMUAOC NUMBER: 315 DATE OF ORIGINAL SAR: 120100 DATE OF SAR REVISIONS: 031909...

124

DOE/LX/07-0321&D1 Secondary Document DMSA C-333-29 Solid Waste...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

1&D1 Secondary Document DMSA C-333-29 Solid Waste Management Unit (SWMU) Assessment Report SWMUAOC NUMBER: 285 DATE OF ORIGINAL SAR: 120100 DATE OF SAR REVISIONS: 030110...

125

DOE/LX/07-0151&D1 Secondary Document DMSA C-337-10 Solid Waste...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

1&D1 Secondary Document DMSA C-337-10 Solid Waste Management Unit (SWMU) Assessment Report SWMUAOC NUMBER: 317 DATE OF ORIGINAL SAR: 120100 DATE OF SAR REVISIONS: 031909...

126

DOE/LX/07-0311&D1 Secondary Document DMSA C-333-05 Solid Waste...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

1&D1 Secondary Document DMSA C-333-05 Solid Waste Management Unit (SWMU) Assessment Report SWMUAOC NUMBER: 260 DATE OF ORIGINAL SAR: 120100 DATE OF SAR REVISIONS: 031509, 3...

127

DOE/LX/07-0320&D1 Secondary Document DMSA C-333-27 Solid Waste...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

0&D1 Secondary Document DMSA C-333-27 Solid Waste Management Unit (SWMU) Assessment Report SWMUAOC NUMBER: 283 DATE OF ORIGINAL SAR: 120100 DATE OF SAR REVISIONS: 031509, 03...

128

DOE/LX/07-0064&D1 Secondary Document DMSA C-331-22 Solid Waste...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

4&D1 Secondary Document DMSA C-331-22 Solid Waste Management Unit (SWMU) Assessment Report UNIT NUMBER: 253 DATE OF ORIGINAL SAR: 120100 DATE OF SAR REVISION: 031509 REGULATORY...

129

DOE/LX/07-0167&D1 Secondary Document DMSA C-720-02 Solid Waste...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

7&D1 Secondary Document DMSA C-720-02 Solid Waste Management Unit (SWMU) Assessment Report SWMUAOC NUMBER: 357 DATE OF ORIGINAL SAR: 120100 DATE OF SAR REVISIONS: 031509...

130

DOE/LX/07-0046&D1 Secondary Document DMSA C-333-10 Solid Waste...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

6&D1 Secondary Document DMSA C-333-10 Solid Waste Management Unit (SWMU) Assessment Report UNIT NUMBER: 265 DATE OF ORIGINAL SAR: 120100 DATE OF SAR REVISION: 030110 REGULATORY...

131

DOE/LX/07-0155&D1 Secondary Document DMSA C-337-18 Solid Waste...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

5&D1 Secondary Document DMSA C-337-18 Solid Waste Management Unit (SWMU) Assessment Report SWMUAOC NUMBER: 325 DATE OF ORIGINAL SAR: 120100 DATE OF SAR REVISIONS: 031909...

132

DOE/LX/07-0150&D1 Secondary Document DMSA C-337-09 Solid Waste...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

0&D1 Secondary Document DMSA C-337-09 Solid Waste Management Unit (SWMU) Assessment Report SWMUAOC NUMBER: 316 DATE OF ORIGINAL SAR: 120100 DATE OF SAR REVISIONS: 031909...

133

DOE/LX/07-0276&D1 Secondary Document DMSA C-333-09 Solid Waste...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

6&D1 Secondary Document DMSA C-333-09 Solid Waste Management Unit (SWMU) Assessment Report SWMUAOC NUMBER: 264 DATE OF ORIGINAL SAR: 120100 DATE OF SAR REVISIONS: 061410...

134

DOE/LX/07-0048&D1 Secondary Document DMSA C-331-03 Solid Waste...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

48&D1 Secondary Document DMSA C-331-03 Solid Waste Management Unit (SWMU) Assessment Report SWMUAOC NUMBER: 237 DATE OF ORIGINAL SAR: 120100 DATE OF SAR REVISION: 031509...

135

DOE/LX/07-0058&D1 Secondary Document DMSA C-331-19 Solid Waste...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

8&D1 Secondary Document DMSA C-331-19 Solid Waste Management Unit (SWMU) Assessment Report SWMUAOC NUMBER: 251 DATE OF ORIGINAL SAR: 120100 DATE OF SAR REVISIONS: 32103; 03...

136

MEASUREMENT OF IMPEDANCE CHARACTERISTICS OF COMPUTER KEYBOARD KEYS1  

E-Print Network [OSTI]

of computer keyboard keys are commonly used: rubber-dome and coil-spring keys. As indicated by their names, a rubber-dome key has a rubber dome under the keycap whereas a coil-spring key has a coil spring under of keys. From a user's perspective, the rubber-dome and coil-spring keys feel different. The properties

Nagurka, Mark L.

137

Complete Genome Sequence of a thermotolerant sporogenic lactic acid bacterium, Bacillus coagulans strain 36D1  

SciTech Connect (OSTI)

Bacillus coagulans is a ubiquitous soil bacterium that grows at 50-55 C and pH 5.0 and fer- ments various sugars that constitute plant biomass to L (+)-lactic acid. The ability of this spo- rogenic lactic acid bacterium to grow at 50-55 C and pH 5.0 makes this organism an attrac- tive microbial biocatalyst for production of optically pure lactic acid at industrial scale not only from glucose derived from cellulose but also from xylose, a major constituent of hemi- cellulose. This bacterium is also considered as a potential probiotic. Complete genome se- quence of a representative strain, B. coagulans strain 36D1, is presented and discussed.

Rhee, Mun Su [University of Florida, Gainesville; Moritz, Brelan E. [University of Florida, Gainesville; Xie, Gary [Los Alamos National Laboratory (LANL); Glavina Del Rio, Tijana [U.S. Department of Energy, Joint Genome Institute; Dalin, Eileen [U.S. Department of Energy, Joint Genome Institute; Tice, Hope [U.S. Department of Energy, Joint Genome Institute; Bruce, David [Los Alamos National Laboratory (LANL); Goodwin, Lynne A. [Los Alamos National Laboratory (LANL); Chertkov, Olga [Los Alamos National Laboratory (LANL); Brettin, Thomas S [ORNL; Han, Cliff [Los Alamos National Laboratory (LANL); Detter, J. Chris [U.S. Department of Energy, Joint Genome Institute; Pitluck, Sam [U.S. Department of Energy, Joint Genome Institute; Land, Miriam L [ORNL; Patel, Milind [University of Florida, Gainesville; Ou, Mark [University of Florida, Gainesville; Harbrucker, Roberta [University of Florida, Gainesville; Ingram, Lonnie O. [University of Florida; Shanmugam, Keelnathan T. [University of Florida

2011-01-01T23:59:59.000Z

138

The generation of shared cryptographic keys through channel impulse response estimation at 60 GHz.  

SciTech Connect (OSTI)

Methods to generate private keys based on wireless channel characteristics have been proposed as an alternative to standard key-management schemes. In this work, we discuss past work in the field and offer a generalized scheme for the generation of private keys using uncorrelated channels in multiple domains. Proposed cognitive enhancements measure channel characteristics, to dynamically change transmission and reception parameters as well as estimate private key randomness and expiration times. Finally, results are presented on the implementation of a system for the generation of private keys for cryptographic communications using channel impulse-response estimation at 60 GHz. The testbed is composed of commercial millimeter-wave VubIQ transceivers, laboratory equipment, and software implemented in MATLAB. Novel cognitive enhancements are demonstrated, using channel estimation to dynamically change system parameters and estimate cryptographic key strength. We show for a complex channel that secret key generation can be accomplished on the order of 100 kb/s.

Young, Derek P.; Forman, Michael A.; Dowdle, Donald Ryan

2010-09-01T23:59:59.000Z

139

Market-Based Incentives for Green Building Alternatives K.R. Grosskopf, Ph.D.1  

E-Print Network [OSTI]

be addressed. Key Words Best management practices (BMPs), demand-side management, externalities, rebates for developing market-based initiatives to stimulate demand-side conservation. This approach is founded on the principal that reducing water use and subsequent wastewater discharge through demand-side or "user

Jawitz, James W.

140

Weaknesses in the Key Scheduling Algorithm of Scott Fluhrer1, Itsik Mantin2, and Adi Shamir2  

E-Print Network [OSTI]

Weaknesses in the Key Scheduling Algorithm of RC4 Scott Fluhrer1, Itsik Mantin2, and Adi Shamir2 1 and previous results about its security. In Section 3 we consider a slightly mod- i ed variant of the Key

Sirer, Emin Gun

Note: This page contains sample records for the topic "d1 key results" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

On the Security of Public Key Protocols  

E-Print Network [OSTI]

Recently the use of public key encryption to provide secure network communication has received considerable attention. Such public key systems are usually effective against passive eavesdroppers, who merely tap the lines and try to decipher the message. It has been pointed out, however, that an improperly designed protocol could be vulnerable to an active saboteur, one who may impersonate another user or alter the message being transmitted. Several models are formulated in which the security of protocols can be discussed precisely. Algorithms and characteri-zations that can be used to determine protocol security in these models are given.

Danny Dolev; et al.

1983-01-01T23:59:59.000Z

142

Key facts about Argonne National Laboratory  

E-Print Network [OSTI]

Key facts about Argonne National Laboratory Argonne National Laboratory occupies 1,500 wooded acres in southeast DuPage County near Chicago. Mission Argonne's mission is to apply a unique blend of world needs of our nation. Argonne conducts R&D in many areas of basic and applied science and engineering

Kemner, Ken

143

CHEMICAL ABBREVIATION KEY ABBREVIATION CHEMICAL NAME HAZARDS  

E-Print Network [OSTI]

Corrosive - base LiCl Lithium chloride Harmful MeOH Methanol Flammable #12;CHEMICAL ABBREVIATION KEY Irritant destain Methanol,acetic acid,H2O Flammable, Corrosive - acid DI H2O Deionized water DCM FeCl3 Iron(III) chloride Corrosive - acid FeSO4 Iron(II) sulfate Toxic H2O Water HCl Hydrochloric

Pawlowski, Wojtek

144

Roadmap for selected key measurements of LHCb  

E-Print Network [OSTI]

Six of the key physics measurements that will be made by the LHCb experiment, concerning CP asymmetries and rare B decays, are discussed in detail. The "road map" towards the precision measurements is presented, including the use of control channels and other techniques to understand the performance of the detector with the first data from the LHC.

The LHCb Collaboration; B. Adeva; M. Adinolfi; A. Affolder; Z. Ajaltouni; J. Albrecht; F. Alessio; M. Alexander; P. Alvarez Cartelle; A. A. Alves Jr; S. Amato; Y. Amhis; J. Amoraal; J. Anderson; O. Aquines Gutierrez; L. Arrabito; M. Artuso; E. Aslanides; G. Auriemma; S. Bachmann; Y. Bagaturia; D. S. Bailey; V. Balagura; W. Baldini; MdC. Barandela Pazos; R. J. Barlow; S. Barsuk; A. Bates; C. Bauer; Th. Bauer; A. Bay; I. Bediaga; K. Belous; I. Belyaev; M. Benayoun; G. Bencivenni; R. Bernet; M. -O. Bettler; A. Bizzeti; T. Blake; F. Blanc; C. Blanks; J. Blouw; S. Blusk; A. Bobrov; V. Bocci; A. Bondar; N. Bondar; W. Bonivento; S. Borghi; A. Borgia; E. Bos; T. J. V. Bowcock; C. Bozzi; J. Bressieux; S. Brisbane; M. Britsch; N. H. Brook; H. Brown; A. Bchler-Germann; J. Buytaert; J. -P. Cachemiche; S. Cadeddu; J. M. Caicedo Carvajal; O. Callot; M. Calvi; M. Calvo Gomez; A. Camboni; W. Cameron; P. Campana; A. Carbone; G. Carboni; A. Cardini; L. Carson; K. Carvalho Akiba; G. Casse; M. Cattaneo; M. Charles; Ph. Charpentier; A. Chlopik; P. Ciambrone; X. Cid Vidal; P. J. Clark; P. E. L. Clarke; M. Clemencic; H. V. Cliff; J. Closier; C. Coca; V. Coco; J. Cogan; P. Collins; F. Constantin; G. Conti; A. Contu; G. Corti; G. A. Cowan; B. D'Almagne; C. D'Ambrosio; D. G. d'Enterria; W. Da Silva; P. David; I. De Bonis; S. De Capua; M. De Cian; F. De Lorenzi; J. M. De Miranda; L. De Paula; P. De Simone; H. De Vries; D. Decamp; H. Degaudenzi; M. Deissenroth; L. Del Buono; C. Deplano; O. Deschamps; F. Dettori; J. Dickens; H. Dijkstra; M. Dima; S. Donleavy; A. C. dos Reis; A. Dovbnya; T. Du Pree; P. -Y. Duval; L. Dwyer; R. Dzhelyadin; C. Eames; S. Easo; U. Egede; V. Egorychev; F. Eisele; S. Eisenhardt; L. Eklund; D. Esperante Pereira; L. Estve; S. Eydelman; E. Fanchini; C. Frber; G. Fardell; C. Farinelli; S. Farry; V. Fave; V. Fernandez Albor; M. Ferro-Luzzi; S. Filippov; C. Fitzpatrick; F. Fontanelli; R. Forty; M. Frank; C. Frei; M. Frosini; J. L. Fungueirino Pazos; S. Furcas; A. Gallas Torreira; D. Galli; M. Gandelman; Y. Gao; J-C. Garnier; L. Garrido; C. Gaspar; N. Gauvin; M. Gersabeck; T. Gershon; Ph. Ghez; V. Gibson; Yu. Gilitsky; V. V. Gligorov; C. Gbel; D. Golubkov; A. Golutvin; A. Gomes; M. Grabalosa Gndara; R. Graciani Diaz; L. A. Granado Cardoso; E. Graugs; G. Graziani; A. Grecu; G. Guerrer; E. Gushchin; Yu. Guz; Z. Guzik; T. Gys; F. Hachon; G. Haefeli; S. C. Haines; T. Hampson; S. Hansmann-Menzemer; R. Harji; N. Harnew; P. F. Harrison; J. He; K. Hennessy; P. Henrard; J. A. Hernando Morata; A. Hicheur; E. Hicks; W. Hofmann; K. Holubyev; P. Hopchev; W. Hulsbergen; P. Hunt; T. Huse; R. S. Huston; D. Hutchcroft; V. Iakovenko; C. Iglesias Escudero; J. Imong; R. Jacobsson; M. Jahjah Hussein; E. Jans; F. Jansen; P. Jaton; B. Jean-Marie; M. John; C. R. Jones; B. Jost; F. Kapusta; T. M. Karbach; J. Keaveney; U. Kerzel; T. Ketel; A. Keune; S. Khalil; B. Khanji; Y. M. Kim; M. Knecht; J. Knopf; S. Koblitz; A. Konoplyannikov; P. Koppenburg; I. Korolko; A. Kozlinskiy; M. Krasowski; L. Kravchuk; P. Krokovny; K. Kruzelecki; M. Kucharczyk; I. Kudryashov; T. Kvaratskheliya; D. Lacarrere; A. Lai; R. W. Lambert; G. Lanfranchi; C. Langenbruch; T. Latham; R. Le Gac; R. Lefevre; A. Leflat; J. Lefranois; O. Leroy; K. Lessnoff; L. Li; Y. Y. Li; J. Libby; M. Lieng; R. Lindner; S. Lindsey; C. Linn; B. Liu; G. Liu; J. H. Lopes; E. Lopez Asamar; J. Luisier; F. Machefert; I. Machikhiliyan; F. Maciuc; O. Maev; J. Magnin; A. Maier; R. M. D. Mamunur; G. Manca; G. Mancinelli; N. Mangiafave; U. Marconi; F. Marin; J. Marks; G. Martellotti; A. Martens; L. Martin; D. Martinez Santos; Z. Mathe; C. Matteuzzi; V. Matveev; A. Mazurov; G. McGregor; B. Mcharek; C. Mclean; R. McNulty; M. Merk; J. Merkel; M. Merkin; R. Messi; F. C. D. Metlica; J. Michalowski; S. Miglioranzi; M. -N. Minard; S. Monteil; D. Moran; J. V. Morris; R. Mountain; I. Mous; F. Muheim; R. Muresan; F. Murtas; B. Muryn; M. Musy; J. Mylroie-Smith; P. Naik; T. Nakada; R. Nandakumar; J. Nardulli; Z. Natkaniec; M. Nedos; M. Needham; N. Neufeld; L. Nicolas; S. Nies; V. Niess; N. Nikitin; A. Noor; A. Oblakowska-Mucha; V. Obraztsov; S. Oggero; O. Okhrimenko; R. Oldeman; M. Orlandea; A. Ostankov; J. Palacios; M. Palutan; J. Panman; A. Papadelis; A. Papanestis; M. Pappagallo; C. Parkes; G. Passaleva; G. D. Patel; M. Patel; S. K. Paterson; G. N. Patrick; E. Pauna; C. Pauna; C. Pavel; A. Pazos Alvarez; A. Pellegrino; G. Penso; M. Pepe Altarelli; S. Perazzini; D. L. Perego; A. Prez-Calero Yzquierdo; E. Perez Trigo; P. Perret; G. Pessina; A. Petrella; A. Petrolini; B. Pietrzyk; D. Pinci; S. Playfer; M. Plo Casasus; G. Polok; A. Poluektov; E. Polycarpo; D. Popov; B. Popovici; S. Poss; C. Potterat; A. Powell; S. Pozzi; V. Pugatch; A. Puig Navarro; W. Qian; J. H. Rademacker; B. Rakotomiaramanana; I. Raniuk; G. Raven; S. Redford; W. Reece

2010-11-23T23:59:59.000Z

145

www.defra.gov.uk Environmental Key  

E-Print Network [OSTI]

that good environmental performance makes good business sense. Environmental risks and uncertainties impact. These Guidelines seek to help companies report their environmental impacts in a meaningful and cost-effective waywww.defra.gov.uk Environmental Key Performance Indicators Reporting Guidelines for UK Business #12

146

Rangeland ecology: Key global research issues & questions  

E-Print Network [OSTI]

1 Rangeland ecology: Key global research issues & questions Robin Reid and Maria Fernandez-Gimenez This paper discusses developments in our understanding about rangeland ecology and rangeland dynamics in the last 20 years. Before the late 1980's, the mainstream view in range ecology was that livestock

147

Rangeland ecology: Key global research issues & questions  

E-Print Network [OSTI]

1 Rangeland ecology: Key global research issues & questions Robin Reid1 and Maria Fernandez Ecology Lab 2Associate Professor Colorado State University, Fort Collins, Colorado, USA Global Issues and Questions in Rangeland Ecology · Despite the focus here on global issues, we need to recognize that Mongolia

148

Key Management Challenges in Smart Grid  

SciTech Connect (OSTI)

Agenda Awarded in February 2011 Team of industry and research organizations Project Objectives Address difficult issues Complexity Diversity of systems Scale Longevity of solution Participate in standards efforts and working groups Develop innovative key management solutions Modeling and simulation ORNL Cyber Security Econometric Enterprise System Demonstrate effectiveness of solution Demonstrate scalability

Sheldon, Frederick T [ORNL] [ORNL; Duren, Mike [Sypris Electronics, LLC] [Sypris Electronics, LLC

2012-01-01T23:59:59.000Z

149

The perfect magnetic conductor (PMC) Casimir piston in d+1 dimensions  

E-Print Network [OSTI]

Perfect magnetic conductor (PMC) boundary conditions are dual to the more familiar perfect electric conductor (PEC) conditions and can be viewed as the electromagnetic analog of the boundary conditions in the bag model for hadrons in QCD. Recent advances and requirements in communication technologies have attracted great interest in PMC's and Casimir experiments involving structures that approximate PMC's may be carried out in the not too distant future. In this paper, we make a study of the zero-temperature PMC Casimir piston in $d+1$ dimensions. The PMC Casimir energy is explicitly evaluated by summing over $p+1$-dimensional Dirichlet energies where p ranges from 2 to $d$ inclusively. We derive two exact $d$-dimensional expressions for the Casimir force on the piston and find that the force is negative (attractive) in all dimensions. Both expressions are applied to the case of 2+1 and 3+1 dimensions. A spin-off from our work is a contribution to the PEC literature: we obtain a useful alternative expression for the PEC Casimir piston in 3+1 dimensions and also evaluate the Casimir force per unit area on an infinite strip, a geometry of experimental interest.

A. Edery; V. Marachevsky

2008-05-27T23:59:59.000Z

150

BCS Instability and Finite Temperature Corrections to Tachyon Mass in Intersecting D1-Branes  

E-Print Network [OSTI]

A holographic description of BCS superconductivity is given in arxiv:1104.2843. This model was constructed by insertion of a pair of D8-branes on a D4-background. The spectrum of intersecting D8-branes has tachyonic modes indicating an instability which is identified with the BCS instability in superconductors. Our aim is to study the stability of the intersecting branes under finite temperature effects. Many of the technical aspects of this problem are captured by a simpler problem of two intersecting D1-branes on flat background. In the simplified set-up we compute the one-loop finite temperature corrections to the tree-level tachyon mass using the frame-work of SU(2) Yang-Mills theory in (1 + 1)-dimensions. We show that the one-loop two-point functions are ultraviolet finite due to cancellation of ultraviolet divergence between the amplitudes containing bosons and fermions in the loop. The amplitudes are found to be infrared divergent due to the presence of massless fields in the loops. We compute the finite temperature mass correction to all the massless fields and use these temperature dependent masses to compute the tachyonic mass correction. We show numerically the existence of a transition temperature at which the effective mass of the tree-level tachyons becomes zero, thereby stabilizing the brane configuration.

Sudipto Paul Chowdhury; Swarnendu Sarkar; B. Sathiapalan

2014-09-12T23:59:59.000Z

151

Chemical and Petroleum Engineering Key and Lab Space Agreement  

E-Print Network [OSTI]

Chemical and Petroleum Engineering Key and Lab Space Agreement Key Holder Information Last Name and Petroleum Engineering remain the property of the Department. I agree to pay a deposit for the keys

Calgary, University of

152

Key Physical Mechanisms in Nanostructured Solar Cells  

SciTech Connect (OSTI)

The objective of the project was to study both theoretically and experimentally the excitation, recombination and transport properties required for nanostructured solar cells to deliver energy conversion efficiencies well in excess of conventional limits. These objectives were met by concentrating on three key areas, namely, investigation of physical mechanisms present in nanostructured solar cells, characterization of loss mechanisms in nanostructured solar cells and determining the properties required of nanostructured solar cells in order to achieve high efficiency and the design implications.

Dr Stephan Bremner

2010-07-21T23:59:59.000Z

153

Three key elements necessary for successful testing  

SciTech Connect (OSTI)

Real-time surface readout during data acquisition, downhole shutting, and appropriate pressure gauges are three key elements for successful well tests. These elements are often overlooked in designing and implementing a successful well test. This second in a series of three articles on well testing shows how these elements affected the testing of an example well. Also reviewed are the capabilities of several new testing tools and techniques.

Ehlig-Economides, C.A.; Hegeman, P. (Schlumberger Oilfield Services, Houston, TX (United States)); Clark, G. (Schlumberger Oilfield Services, Aberdeen (United Kingdom))

1994-07-25T23:59:59.000Z

154

Public key Steganography Using Discrete Cross-Coupled Chaotic Maps  

E-Print Network [OSTI]

By cross-coupling two logistic maps a novel method is proposed for the public key steganography in JPEG image. Chaotic maps entail high complexity in the used algorithm for embedding secret data in a medium. In this paper, discrete cross- coupled chaotic maps are used to specifying the location of the different parts of the secret data in the image. Modifying JPEG format during compressing and decompressing, and also using public key enhanced difficulty of the algorithm. Simulation results show that in addition to excessive capacity, this method has high robustness and resistance against hackers and can be applicable in secret communication. Also the PSNR value is high compared to the other works.

Sodeif Ahadpour; Mahdiyeh Majidpour; Yaser Sadra

2012-11-01T23:59:59.000Z

155

Midstream Infrastructure Improvements Key to Realizing Full Potential...  

Office of Environmental Management (EM)

Midstream Infrastructure Improvements Key to Realizing Full Potential of Domestic Natural Gas Midstream Infrastructure Improvements Key to Realizing Full Potential of Domestic...

156

Vehicle Electrification is Key to Reducing Petroleum Dependency...  

Broader source: Energy.gov (indexed) [DOE]

Vehicle Electrification is Key to Reducing Petroleum Dependency and Greenhouse Gas Emission Vehicle Electrification is Key to Reducing Petroleum Dependency and Greenhouse Gas...

157

analysis material key: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Temperature(C) 200 2 Finite key analysis for symmetric attacks in quantum key distribution Quantum Physics (arXiv) Summary: We introduce a constructive method to calculate...

158

Sandia National Laboratories: Direct Measurement of Key Molecule...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Modeling & SimulationDirect Measurement of Key Molecule Will Increase Accuracy of Combustion Models Direct Measurement of Key Molecule Will Increase Accuracy of Combustion...

159

Does cognitive reserve shape cognitive decline? Archana Singh-Manoux, PhD 1,2,3  

E-Print Network [OSTI]

1 Does cognitive reserve shape cognitive decline? Archana Singh-Manoux, PhD 1,2,3 Michael G Marmot head: Cognitive reserve Word count: abstract: 243; Text: 3527 Number of tables: 4; Number of figures: 1: Cognitive reserve is associated with a lower risk of dementia but the extent to which it shapes cognitive

Paris-Sud XI, Université de

160

An Optimal (d -1)-Fault-Tolerant All-to-All Broadcasting Scheme for d-Dimensional Hypercubes  

E-Print Network [OSTI]

An Optimal (d - 1)-Fault-Tolerant All-to-All Broadcasting Scheme for d-Dimensional Hypercubes Siu, Shatin, Hong Kong e-mail: adafucse.cuhk.edu.hk Abstract All-to-all broadcasting (Gossiping a message to transmit to all other members of the network. We proposed a k-fault- tolerant scheme

Fu, Ada Waichee

Note: This page contains sample records for the topic "d1 key results" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Tips for Key Maps / Inset Maps How Do I Add a Key Maps or Inset Maps  

E-Print Network [OSTI]

Tips for Key Maps / Inset Maps How Do I Add a Key Maps or Inset Maps You need a new data frame o the properties/look of the extent rectangle Tips Index Map o Should be a simplified version of the map o Should cover at least 5X the area of the main map o Should have its own scale/coordinates/title o Main coverage

Brownstone, Rob

162

Keyes, California: Energy Resources | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia: Energy Resources Jump to:46 - 429 Throttled (botOpen6Kentwood, Michigan: EnergyKesona PowerStatistics-2010Keyes,

163

Key Renewable Energy Opportunities for Oklahoma Tribes  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGY TAX POLICIES7.pdfFuel2007 | Department7JanuaryWASTE-TO-ENERGY:About »KEY RENEWABLE

164

Fermilab | Science | Particle Physics | Key Discoveries  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation Desert Southwest Region service area. TheEPSCI Home ItDarkDiscoveries WorldwideDarkKey

165

Another key Y-12 General Foreman remembered  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth (AOD)ProductssondeadjustsondeadjustAbout theOFFICEAmes Laboratory Site|Andrea4»Another key Y-12 General

166

Key Agency Targets Summary _FY 2012_.doc  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation ProposedUsingFunInfraredJeffersonJonathan PershingrelocatesKaye D.Ken T.NA>Kevlar andKey5 B

167

Quantum key distribution with entangled photon sources  

E-Print Network [OSTI]

A parametric down-conversion (PDC) source can be used as either a triggered single photon source or an entangled photon source in quantum key distribution (QKD). The triggering PDC QKD has already been studied in the literature. On the other hand, a model and a post-processing protocol for the entanglement PDC QKD are still missing. In this paper, we fill in this important gap by proposing such a model and a post-processing protocol for the entanglement PDC QKD. Although the PDC model is proposed to study the entanglement-based QKD, we emphasize that our generic model may also be useful for other non-QKD experiments involving a PDC source. Since an entangled PDC source is a basis independent source, we apply Koashi-Preskill's security analysis to the entanglement PDC QKD. We also investigate the entanglement PDC QKD with two-way classical communications. We find that the recurrence scheme increases the key rate and Gottesman-Lo protocol helps tolerate higher channel losses. By simulating a recent 144km open-a...

Ma, X; Lo, H K; Ma, Xiongfeng; Fung, Chi-Hang Fred; Lo, Hoi-Kwong

2007-01-01T23:59:59.000Z

168

Hydrogen Fuel Cell Performance in the Key Early Markets of Material Handling Equipment and Backup Power (Presentation)  

SciTech Connect (OSTI)

This presentation summarizes the results of NREL's analysis of hydrogen fuel cell performance in the key early markets of material handling equipment (MHE) and backup power.

Kurtz, J.; Sprik, S.; Ramsden, T.; Saur, G.; Ainscough, C.; Post, M.; Peters, M.

2013-10-01T23:59:59.000Z

169

Efficient all-optical production of large $^6$Li quantum gases using D$_1$ gray-molasses cooling  

E-Print Network [OSTI]

We use a gray molasses operating on the D$_1$ atomic transition to produce degenerate quantum gases of $^{6}$Li with a large number of atoms. This sub-Doppler cooling phase allows us to lower the initial temperature of 10$^9$ atoms from 500 to 40 $\\mu$K in 2 ms. We observe that D$_1$ cooling remains effective into a high-intensity infrared dipole trap where two-state mixtures are evaporated to reach the degenerate regime. We produce molecular Bose-Einstein condensates of up to 5$\\times$10$^{5}$ molecules and weakly-interacting degenerate Fermi gases of $7\\times$10$^{5}$ atoms at $T/T_{F}<0.1$ with a typical experimental duty cycle of 11 seconds.

A. Burchianti; G. Valtolina; J. A. Seman; E. Pace; M. De Pas; M. Inguscio; M. Zaccanti; G. Roati

2014-06-18T23:59:59.000Z

170

Innovation Impact: Breakthrough Research Results (Brochure)  

SciTech Connect (OSTI)

The Innovation Impact brochure captures key breakthrough results across NREL's primary areas of renewable energy and energy efficiency research: solar, wind, bioenergy, transportation, buildings, analysis, and manufacturing technologies.

Not Available

2013-07-01T23:59:59.000Z

171

Building America Expert Meeting: Foundations Research Results...  

Energy Savers [EERE]

Key results were: * Greater understanding of the role of moisture transport through foundation and insulation materials and its potential impact on building durability * Greater...

172

Compression station key to Texas pipeline project  

SciTech Connect (OSTI)

This was probably the largest pipeline project in the US last year, and the largest in Texas in the last decade. The new compressor station is a key element in this project. TECO, its servicing dealer, and compression packager worked closely throughout the planning and installation stages of the project. To handle the amount of gas required, TECO selected the GEMINI F604-1 compressor, a four-throw, single-stage unit with a six-inch stroke manufactured by Weatherford Enterra Compression Co. (WECC) in Corpus Christi, TX. TECO also chose WECC to package the compressors. Responsibility for ongoing support of the units will be shared among TECO, the service dealer and the packager. TECO is sending people to be trained by WECC, and because the G3600 family of engines is still relatively new, both the Caterpillar dealer and WECC sent people for advanced training at Caterpillar facilities in Peoria, IL. As part of its service commitment to TECO, the servicing dealer drew up a detailed product support plan, encompassing these five concerns: Training, tooling; parts support; service support; and commissioning.

NONE

1996-10-01T23:59:59.000Z

173

The impacts of urbanization on endangered florida key deer  

E-Print Network [OSTI]

for resources between man and wildlife continues, it is important to understand the effects of urbanization on species. Endangered Key deer (Odocoileus virginianus clavium) are endemic to the Florida Keys archipelago stretching southwest off the southern tip...

Harveson, Patricia Moody

2006-04-12T23:59:59.000Z

174

actual key success: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

key exchange over an insecure channel. The security of the proposed algorithm grows as NPm, where M, P are the size of the key and the computational commplexity fo the linear...

175

Updated distribution and reintroduction of the Lower Keys marsh rabbit  

E-Print Network [OSTI]

Listed as federally-endangered in 1990, the Lower Keys marsh rabbit (LKMR, Sylvilagus palustris hefneri) exists as a metapopulation in patches of wetland habitat in Florida?s Lower Keys. This study sought to address 2 priority actions identified...

Faulhaber, Craig Alan

2005-02-17T23:59:59.000Z

176

authenticated key agreement: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

desirable attributes. Index Terms--Mutual Authentication; Key Management; SRP; Security; Smart Meter; Smart Leung, Victor C.M. 53 On the security of some password-based key...

177

Exploring the context : a small hotel in Key West  

E-Print Network [OSTI]

This thesis develops a personal method and approach for designing in a delicate context such as the Key West Historic District. This thesis is composed of two parts. The first part presents observations of Key West, focusing ...

VanBeuzekom, Edrick

1984-01-01T23:59:59.000Z

178

Residential Energy Efficiency Financing: Key Elements of Program Design  

Broader source: Energy.gov [DOE]

Presents key programmatic elements and context of financing initiatives, including contractor support, rebates, quality assurance, and more.

179

A QUICK KEY TO THE SUBFAMILIES AND GENERA OF ANTS OF THE SAVANNAH RIVER SITE  

SciTech Connect (OSTI)

This taxonomic key was devised to support development of a Rapid Bioassessment Protocol using ants at the Savannah River Site. The emphasis is on 'rapid' and, because the available keys contained a very large number of genera not known to occur at the Savannah River Site, we found that the available keys were unwieldy. Because these keys contained many more genera than we would ever encounter and because this larger number of genera required more couplets in the key and often required examination of characters that are difficult to assess without higher magnifications (60X or higher), more time was required to process samples. In developing this set of keys I emphasized character states that are easier for nonspecialists to recognize. I recognize that the character sets used may lead to some errors but I believe that the error rate will be small and, for the purpose of rapid bioassessment, this error rate will be acceptable provided that overall sample sizes are adequate. Oliver and Beattie (1996a, 1996b) found that for rapid assessment of biodiversity the same results were found when identifications were done to morphospecies by people with minimal expertise as when the same data sets were identified by subject matter experts. Basset et al. (2004) concluded that it was not as important to correctly identify all species as it was to be sure that the study included as many functional groups as possible. If your study requires high levels of accuracy, it is highly recommended that, when you key out a specimen and have any doubts concerning the identification, you should refer to keys in Bolton (1994) or to the other keys used to develop this area specific taxonomic key.

Martin, D

2007-09-04T23:59:59.000Z

180

A Full Key Recovery Attack on HMAC-AURORA-512  

E-Print Network [OSTI]

A Full Key Recovery Attack on HMAC-AURORA-512 Yu Sasaki NTT Information Sharing Platform.yu@lab.ntt.co.jp Abstract. In this note, we present a full key recovery attack on HMAC- AURORA-512 when 512-bit secret keys is 2259 AURORA-512 operations, which is significantly less than the complexity of the exhaustive search

Note: This page contains sample records for the topic "d1 key results" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

K:\\Operations\\Forms\\201 Key or Vendor Card Request.pdf Rev ASU DPc Key/Vendor Card Request  

E-Print Network [OSTI]

K:\\Operations\\Forms\\201 Key or Vendor Card Request.pdf Rev ASU DPc Key/Vendor Card Request Complete/Staff Undergrad Grad Asst Other Department or Vendor PO # or Agency/ORG Mail Code Affiliation (place X in one box am personally accountable for all ASU keys/vendor cards issued to me. I understand that only I am

Rhoads, James

182

Data:Bcb98367-8669-436a-8fa0-605589477d1e | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onb5-dcc1fcffd1f2 No revisionBc32c6c2-7336-4ed7-9ed7-6e5811369aef No revisiondf0d3c5b No589477d1e No revision has been

183

Data:158847a9-e149-4803-8d41-b98678d1c062 | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of48d9ff47edf3 No revision has beenba5b1d371 No revision78ced93e0 No52cae72-0bc79931e0fa Nob98678d1c062 No

184

E-Print Network 3.0 - arrest key fungal Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Invasion of living tissue distinguishes this fungal infection from those caused... by conventional transmissible dermatophytes. Although fungal hyphae penetrate the connective...

185

E-Print Network 3.0 - absorption line key Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Line Shapes: Application to the Heterodimer... to the formalism of Fano's treatment for atomic absorption line shapes associated with autoionization (Fano, U... bands are...

186

E-Print Network 3.0 - accident conditions key Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

1 Why System Safety Professionals Should Read Accident Reports C. M. Holloway*, C. W. Johnson Summary: Why System Safety Professionals Should Read Accident Reports C. M....

187

E-Print Network 3.0 - applied key strategies Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

perform in order to meet... fieldwork objectives. These skillsstrategies constitute the Learning Contract. Exceeds Expectations Meets... organizational chart f. Reviews agency...

188

The United States Industrial Electric Motor Systems Market Opportunities Assessment: Key Results  

E-Print Network [OSTI]

portrait of the inventory of motor systems currently in use in US industrial facilities, estimate motor system energy use and potential for energy savings. The research and analysis to support these objectives consisted primarily of on-site motor system...

Rosenberg, M.

189

E-Print Network 3.0 - australia key findings Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Sciences and Ecology 22 Submission to the Prime Minister's Task Group on Emissions Trading in response to the Task Group's Issues Paper of February 2007 Summary: )). For...

190

E-Print Network 3.0 - america key issues Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Mexican Source: Louisiana Forest Products Development Center Collection: Renewable Energy 63 National Conference and Expo on Coastal and Estuarine Habitat Restoration Summary:...

191

E-Print Network 3.0 - all-alpha greek key Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Title: Philosophy and Greek 6) UCAS Code: QV75... analytical activity. Students who study philosophy with Greek will gain a foundation in both subjects Source: Edinburgh,...

192

E-Print Network 3.0 - adaptive key component Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Antwerpen, Universiteit, Departement Wiskunde & Informatica, Performance Analysis of Telecommunication Systems Group Collection: Engineering ; Computer Technologies and...

193

A comparison of experimental results and theoretical predictions for the rotordynamic and leakage characteristics of short (L/D=1/6) honeycomb and smooth annular pressure seals  

E-Print Network [OSTI]

of absolute pressure vs. axial position for seals 1, 4, and 7 (Cr=0.41 mm) at high inlet preswirl, rotor speed of 16000 rpm, and inlet pressure of 18.3 bar 32 Fig. 19 A comparison of absolute pressure vs. axial position for seals 2, 5, 8, and 10 (Cr=0... angle (radians) y Specific heat ratio 5 Uncertainty identifier e Eccentricity perturbation (m) P Fluid viscosity (N-s/m2) P Fluid density (kg/m3) ? Flow coefficient CO Rotor angular velocity (rad/s) Subscripts 0, 1 Zeroth and first...

Kleynhans, George Frederick

1991-01-01T23:59:59.000Z

194

High Field EPR Study of the Pheophytin Anion Radical in Wild Type and D1-E130 Mutants of Photosystem II in Chlamydomonas  

E-Print Network [OSTI]

High Field EPR Study of the Pheophytin Anion Radical in Wild Type and D1-E130 Mutants insufficient to accurately determine such interactions. In this paper, we re- port on HF-EPR measurements

Sayre, Richard

195

Key Response Planning Factors for the Aftermath of Nuclear Terrorism  

SciTech Connect (OSTI)

Despite hundreds of above-ground nuclear tests and data gathered from Hiroshima and Nagasaki, the effects of a ground-level, low-yield nuclear detonation in a modern urban environment are still the subject of considerable scientific debate. Extensive review of nuclear weapon effects studies and discussions with nuclear weapon effects experts from various federal agencies, national laboratories, and technical organizations have identified key issues and bounded some of the unknowns required to support response planning for a low-yield, ground-level nuclear detonation in a modern U.S. city. This study, which is focused primarily upon the hazards posed by radioactive fallout, used detailed fallout predictions from the advanced suite of three-dimensional (3-D) meteorology and plume/fallout models developed at Lawrence Livermore National Laboratory (LLNL), including extensive global Key Response Planning Factors for the Aftermath of Nuclear Terrorism geographical and real-time meteorological databases to support model calculations. This 3-D modeling system provides detailed simulations that account for complex meteorology and terrain effects. The results of initial modeling and analysis were presented to federal, state, and local working groups to obtain critical, broad-based review and feedback on strategy and messaging. This effort involved a diverse set of communities, including New York City, National Capitol Regions, Charlotte, Houston, Portland, and Los Angeles. The largest potential for reducing casualties during the post-detonation response phase comes from reducing exposure to fallout radiation. This can be accomplished through early, adequate sheltering followed by informed, delayed evacuation.B The response challenges to a nuclear detonation must be solved through multiple approaches of public education, planning, and rapid response actions. Because the successful response will require extensive coordination of a large number of organizations, supplemented by appropriate responses by local responders and the general population within the hazard zones, regional planning is essential to success. The remainder of this Executive Summary provides summary guidance for response planning in three areas: (1) Public Protection Strategy details the importance of early, adequate shelter followed by informed evacuation. (2) Responder Priorities identify how to protect response personnel, perform regional situational assessment, and support public safety. (3) Key Planning Considerations refute common myths and provide important information on planning how to respond in the aftermath of nuclear terrorism.

Buddemeier, B R; Dillon, M B

2009-01-21T23:59:59.000Z

196

Fake state attack on practically decoy state quantum key distribution  

E-Print Network [OSTI]

In this paper, security of practically decoy state quantum key distribution under fake state attack is considered. If quantum key distribution is insecure under this type of attack, decoy sources can not also provide it with enough security. Strictly analysis shows that Eve should eavesdrop with the aid of photon-number-resolving instruments. In practical implementation of decoy state quantum key distribution where statistical fluctuation is considered, however, Eve can attack it successfully with threshold detectors.

Yong-gang Tan

2012-02-15T23:59:59.000Z

197

Climate Action Planning: A Review of Best Practices, Key Elements...  

Open Energy Info (EERE)

Planning: A Review of Best Practices, Key Elements, and Common Climate Strategies for Signatories to the American College & University Presidents' Climate Commitment Jump to:...

198

TEC Working Group Topic Groups Rail Key Documents Radiation Monitoring...  

Broader source: Energy.gov (indexed) [DOE]

Radiation Monitoring Subgroup TEC Working Group Topic Groups Rail Key Documents Radiation Monitoring Subgroup Radiation Monitoring Subgroup Draft Work Plan - February 4, 2008 More...

199

LANL breaks ground on key sediment control project  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Sediment control project LANL breaks ground on key sediment control project Called "grade-control" structures, the approximately 2 million features are up to eight feet high and...

200

Hydrodynamic experiment provides key data for Stockpile Stewardship  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

predictively model and assess weapon performance in the absence of full-scale underground nuclear testing," said Webster. Los Alamos hydrodynamic experiment provides key data for...

Note: This page contains sample records for the topic "d1 key results" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Worldwide Trends in Energy Use and Efficiency: Key Insights from...  

Open Energy Info (EERE)

Efficiency: Key Insights from International Energy Agency (IEA) Indicator Analysis in Support of the Group of Eight (G8) Plan of Action Jump to: navigation, search Tool Summary...

202

Water dynamics clue to key residues in protein folding  

SciTech Connect (OSTI)

A computational method independent of experimental protein structure information is proposed to recognize key residues in protein folding, from the study of hydration water dynamics. Based on all-atom molecular dynamics simulation, two key residues are recognized with distinct water dynamical behavior in a folding process of the Trp-cage protein. The identified key residues are shown to play an essential role in both 3D structure and hydrophobic-induced collapse. With observations on hydration water dynamics around key residues, a dynamical pathway of folding can be interpreted.

Gao, Meng [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Zhu, Huaiqiu, E-mail: hqzhu@pku.edu.cn [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Yao, Xin-Qiu [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China) [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Department of Biophysics, Kyoto University, Sakyo Kyoto 606-8502 (Japan); She, Zhen-Su, E-mail: she@pku.edu.cn [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)

2010-01-29T23:59:59.000Z

203

Pantex Plant Achieves Key Safety Milestone Ahead of Schedule...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Achieves Key Safety Milestone Ahead of Schedule | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

204

Key Practical Issues in Strengthening Safety Culture, INSAG-15  

Broader source: Energy.gov [DOE]

Key Pratical Issues in Strengthening Safety Culture, INSAG-15. A report by the International Nuclear Safety Advisory Gorup, International Atomic Energy Agency, Vienna, 2002.

205

Chromidio: an interface for color tracking with key frames in Max and Nato  

E-Print Network [OSTI]

11 QuickTime Movie Input 11 Interactive Color Picking 12 Key Frames 12 Useful Output 14 File Management 16 C.play I 6 IV I M P L E M E N T A T I O N A N D RESULTS 17 Chromidio User Interface 17 QuickTime Movie Display and Playback 22 vi i... CHAPTER Page Interactive Color Picking 26 Key Frame Management 27 Data Analysis and Output 32 Project File Management 36 C.play 39 User Interface 39 Mathematical Functions and F ilters 41 MIDI Implementations 44 Output : 46 Results Using C...

Tucker, Amy Rebecca

2002-01-01T23:59:59.000Z

206

Building commissioning: The key to quality assurance  

SciTech Connect (OSTI)

This Guide is written to aid building owners and retrofit project managers currently participating in the Rebuild America program. The Guide provides information on implementing building commissioning projects that will optimize the results of existing building equipment improvements and retrofits projects. It should be used in coordination with Rebuild America`s Community Partnership Handbook. The Handbook describes, in detail, eight important steps necessary for planning and carrying out a community-wide energy-efficiency program. In step number 7 of the Handbook, commissioning is shown to be an integral aspect of implementing a building retrofit. The commissioning process ensures that a facility is safe, efficient, comfortable, and conducive to the presumed activities for which it was constructed. Rebuild America strongly encourages its partners to incorporate commissioning into their retrofit projects. By verifying the correct installation, functioning, operation, and maintenance of equipment, the commissioning process ensures that efficiency measures will continue to deliver benefits over the long term. Although commissioning can take place after the equipment has been installed, it is more effective when it takes place over the entire equipment installation process.

NONE

1998-05-01T23:59:59.000Z

207

Energy Security: A Key Requirement forSustainable Development  

E-Print Network [OSTI]

1 Energy Security: A Key Requirement forSustainable Development Perspective and Action Plan Robert Card Under Secretary US Department of Energy August 30, 2002 Session One: Maintaining Energy Security WSSD Side Event Energy for Sustainable Development IEA/UNEP/Eskom #12;2 Energy Security is a Key

208

Prairie Fruit Summary, 2010 Some key considerations for the homeowner  

E-Print Network [OSTI]

1 Prairie Fruit Summary, 2010 Some key considerations for the homeowner by Bob Bors The following list highlights some key positive (+), negative (-) and variable ( ± ) attributes for growing fruit into account. For more info visit: www.fruit.usask.ca Haskap/Blue Honeysuckle: - All varieties are very cold

Peak, Derek

209

Efficient Hybrid Key Agreement Protocol for Wireless Ad Hoc Networks  

E-Print Network [OSTI]

Efficient Hybrid Key Agreement Protocol for Wireless Ad Hoc Networks Xiang-Yang Li Yu Wang Ophir important aspects in ad-hoc wireless networks. To ensure the security, several cryptography protocols must efficient when applied to wireless ad-hoc networks. In this paper, we propose a key agreement protocol

Wang, Yu

210

Reflective cracking of shear keys in multi-beam bridges  

E-Print Network [OSTI]

..............................................2 Figure 2: PCI 33? Box Girder with Shear Keys................................................................5 Figure 3: TxDOT 34? Box Girder with Shear Keys .........................................................5 Figure 4: Test Specimen... Under Tension.........................................................................12 Figure 5: Test Specimen in Bending ...............................................................................12 Figure 6: Test Specimen in Shear...

Sharpe, Graeme Peter

2009-06-02T23:59:59.000Z

211

Public Key Encryption that Allows PIR Queries Eyal Kushilevitz  

E-Print Network [OSTI]

Public Key Encryption that Allows PIR Queries Dan Boneh Eyal Kushilevitz Rafail Ostrovsky William E to create a public- key encryption scheme for Alice that allows PIR searching over encrypted documents. Our allows for Single-Database PIR writing with sublinear communication complexity, which we consider

212

Public Key Encryption that Allows PIR Queries Eyal Kushilevitz  

E-Print Network [OSTI]

Public Key Encryption that Allows PIR Queries Dan Boneh Eyal Kushilevitz Rafail Ostrovsky William E. In this paper, we show how to create a public-key encryption scheme for Alice that allows PIR searching over allows for Single-Database PIR writing with sublinear communication complexity, which we consider

Ostrovsky, Rafail

213

Electricity and Development: Global Trends and Key Challenges  

E-Print Network [OSTI]

Electricity and Development: Global Trends and Key Challenges Romeo Pacudan, PhD Risoe National · Prospects for electricity development · Investment requirements · Key challenges · Final remarks #12 and the transport burden in Tanzania. Source: Modi, 2004 #12;2. Energy and Human Development Access to electricity

214

Key ornamental innovations facilitate diversification in an avian radiation  

E-Print Network [OSTI]

Key ornamental innovations facilitate diversification in an avian radiation Rafael Maiaa,1 , Dustin novel ways of interacting with the en- vironment (key innovations) play a fundamental role in promoting evolution of orna- mental traits. Because selection can operate only on existing vari- ation, the tendency

Rubenstein, Dustin R.

215

Practical Key-Recovery for All Possible Parameters of SFLASH  

E-Print Network [OSTI]

function over a finite field. However, unlike RSA this power function is an easy-to-invert bijec- tion a new practical key-recovery attack on the SFLASH signature scheme. SFLASH is a derivative of the older from the public-key. The attack uses new crypt- analytic tools, most notably pencils of matrices

Fouque, Pierre-Alain

216

Offshore Wind Power Experiences, Potential and Key Issues for  

E-Print Network [OSTI]

Offshore Wind Power Experiences, Potential and Key Issues for Deployment Jørgen Lemming, Poul Erik-Erik Clausen Title: Offshore Wind Power Experiences, Potential and Key Issues for Deployment Division: VEA, SYS Risø-R-1673(EN) January 2008 Abstract: Wind power has been growing at spectacular rates. Today

217

Apparatus, system, and method for synchronizing a timer key  

DOE Patents [OSTI]

A timer key relating to monitoring a countdown time of a countdown routine of an electronic device is disclosed. The timer key comprises a processor configured to respond to a countdown time associated with operation of the electronic device, a display operably coupled with the processor, and a housing configured to house at least the processor. The housing has an associated structure configured to engage with the electronic device to share the countdown time between the electronic device and the timer key. The processor is configured to begin a countdown routine based at least in part on the countdown time, wherein the countdown routine is at least substantially synchronized with a countdown routine of the electronic device when the timer key is removed from the electronic device. A system and method for synchronizing countdown routines of a timer key and an electronic device are also disclosed.

Condit, Reston A; Daniels, Michael A; Clemens, Gregory P; Tomberlin, Eric S; Johnson, Joel A

2014-04-22T23:59:59.000Z

218

Appendix D-1  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth (AOD)ProductssondeadjustsondeadjustAbout theOFFICEAmes LaboratoryAntonyaAppeals4 STANDARD TERMS AND

219

Reactive Support and Voltage Control Service: Key Issues and Challenges  

E-Print Network [OSTI]

reactive support and voltage control services. Keywords ­ Competitive Electricity Markets, Reactive PowerReactive Support and Voltage Control Service: Key Issues and Challenges George Gross^, Paolo Marannino° and Gianfranco Chicco* ^ Department of Electrical and Computer Engineering, University

Gross, George

220

Detailed Description of Key NIF Milestones for NNSA Description  

E-Print Network [OSTI]

1 Detailed Description of Key NIF Milestones for NNSA Short Description NIC EP Rev 4.0 Approved = Milestone Reporting Tool, which NNSA uses to support quarterly status reporting of NIC Level 1-2 milestones

Note: This page contains sample records for the topic "d1 key results" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Key Factors in Displacement Ventilation Systems for Better IAQ  

E-Print Network [OSTI]

This paper sets up a mathematical model of three-dimensional steady turbulence heat transfer in an air-conditioned room of multi-polluting heat sources. Numerical simulation helps identify key factors in displacement ventilation systems that affect...

Wang, X.; Chen, J.; Li, Y.; Wang, Z.

2006-01-01T23:59:59.000Z

222

NREL: News - NREL Scientists Find Key Function for Ferredoxins...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

614 NREL Scientists Find Key Function for Ferredoxins in Algae Hydrogen Production Two of six iron-rich proteins shown to have role in algae metabolism; discovery could lead to...

223

Daylight quantum key distribution over 1.6 km  

E-Print Network [OSTI]

Quantum key distribution (QKD) has been demonstrated over a point-to-point transmission distance brings QKD a step closer to surface-to-satellite and other long-distance applications.

Buttler, W T; Lamoreaux, S K; Morgan, G L; Nordholt, J E; Peterson, C G

2000-01-01T23:59:59.000Z

224

Building America Expert Meeting: Key Innovations for Adding Energy...  

Broader source: Energy.gov (indexed) [DOE]

This report describes an expert meeting hosted by the Building America research team NAHB Research Center, which was held on February 8, 2012, in Orlando, Florida. The topic, Key...

225

Families First: Keys to Successful Family Functioning Communication  

E-Print Network [OSTI]

Families First: Keys to Successful Family Functioning Communication Rick Peterson, Extension Specialist and Assistant Professor, Department of Human Development, Virginia Tech Stephen Green, Department of Human Development, Virginia Tech www.ext.vt.edu Produced by Communications and Marketing, College

Liskiewicz, Maciej

226

Self-referenced continuous-variable quantum key distribution  

E-Print Network [OSTI]

We introduce a new continuous-variable quantum key distribution (CV-QKD) protocol, self-referenced CV-QKD, that eliminates the need for transmission of a high-power local oscillator between the communicating parties. In this protocol, each signal pulse is accompanied by a reference pulse (or a pair of twin reference pulses), used to align Alice's and Bob's measurement bases. We present a proof-of-principle, fiber-based experimental demonstration of the protocol and quantify the expected secret key rates by expressing them in terms of experimental parameters. Our analysis of the secret key rate fully takes into account the inherent uncertainty associated with the quantum nature of the reference pulse(s) and quantifies the limit at which the theoretical key rate approaches that of the respective conventional protocol that requires local oscillator transmission. The self-referenced protocol greatly simplifies the hardware required for CV-QKD, especially for potential integrated photonics implementations of trans...

Soh, Daniel B S; Coles, Patrick J; Ltkenhaus, Norbert; Camacho, Ryan M; Urayama, Junji; Sarovar, Mohan

2015-01-01T23:59:59.000Z

227

Nano Lect 1 Questions and Keypoints Key Points  

E-Print Network [OSTI]

Nano Lect 1 ­ Questions and Keypoints Key Points 1. What is nano technology: a. Very small technology with device in the 1nm to 100nm lots of useful properties Questions 1. Define nanotechnology. Is an nano

Smy, Tom

228

Input from Key Stakeholders in the National Security Technology Incubator  

SciTech Connect (OSTI)

This report documents the input from key stakeholders of the National Security Technology Incubator (NSTI) in developing a new technology incubator and related programs for southern New Mexico. The technology incubator is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes identification of key stakeholders as well as a description and analysis of their input for the development of an incubator.

None

2008-01-31T23:59:59.000Z

229

A QUICK KEY TO THE SUBFAMILIES AND GENERA OF ANTS OF THE SAVANNAH RIVER SITE, AIKEN, SC  

SciTech Connect (OSTI)

This taxonomic key was devised to support development of a Rapid Bioassessment Protocol using ants at the Savannah River Site. The emphasis is on ''rapid'' and, because the available keys contained a large number of genera not known to occur at the Savannah River Site, we found that the available keys were unwieldy. Because these keys contained more genera than we would likely encounter and because this larger number of genera required both more couplets in the key and often required examination of characters that are difficult to assess without higher magnifications (60X or higher) more time was required to process samples. In developing this set of keys I recognize that the character sets used may lead to some errors but I believe that the error rate will be small and, for the purpose of rapid bioassessment, this error rate will be acceptable provided that overall sample sizes are adequate. Oliver and Beattie (1996a, 1996b) found that for rapid assessment of biodiversity the same results were found when identifications were done to morphospecies by people with minimal expertise as when the same data sets were identified by subject matter experts. Basset et al. (2004) concluded that it was not as important to correctly identify all species as it was to be sure that the study included as many functional groups as possible. If your study requires high levels of accuracy, it is highly recommended that when you key out a specimen and have any doubts concerning the identification, you should refer to keys in Bolton (1994) or to the other keys used to develop this area specific taxonomic key.

Martin, D

2006-10-04T23:59:59.000Z

230

Ultrafast Excited-State Dynamics in the Green Fluorescent Protein Variant S65T/ H148D. 1. Mutagenesis and Structural Studies,  

E-Print Network [OSTI]

Articles Ultrafast Excited-State Dynamics in the Green Fluorescent Protein Variant S65T/ H148D. 1 Kanchanawong,# William Childs,# Steven G. Boxer,# and S. James Remington*,§ Institute of Molecular Biology chromophores, respectively. Excitation of either band leads to green emission. In wt-GFP, excitation of band

Boxer, Steven G.

231

Ebullitive methane emissions from oxygenated wetland J O H N T . C R A W F O R D 1 , 2  

E-Print Network [OSTI]

Ebullitive methane emissions from oxygenated wetland streams J O H N T . C R A W F O R D 1 , 2 , E are an important component of the global carbon cycle. Methane emis- sions from streams could also contribute methane emissions. Furthermore, the available data do not typically include the ebullitive (bubble

Stanley, Emily

232

Quantum-Secure Authentication with a Classical Key  

E-Print Network [OSTI]

Authentication provides the trust people need to engage in transactions. The advent of physical keys that are impossible to copy promises to revolutionize this field. Up to now, such keys have been verified by classical challenge-response protocols. Such protocols are in general susceptible to emulation attacks. Here we demonstrate Quantum-Secure Authentication ("QSA") of an unclonable classical physical key in a way that is inherently secure by virtue of quantum-physical principles. Our quantum-secure authentication operates in the limit of a large number of channels, represented by the more than thousand degrees of freedom of an optical wavefront shaped with a spatial light modulator. This allows us to reach quantum security with weak coherent pulses of light containing dozens of photons, too few for an adversary to determine their complex spatial shapes, thereby rigorously preventing emulation.

Sebastianus A. Goorden; Marcel Horstmann; Allard P. Mosk; Boris kori?; Pepijn W. H. Pinkse

2014-06-03T23:59:59.000Z

233

Security Proof of a Semi-Quantum Key Distribution Protocol  

E-Print Network [OSTI]

Semi-quantum key distribution protocols are designed to allow two users to establish a secure secret key when one of the two users is limited to performing certain "classical" operations. There have been several such protocols developed recently, however, due to their reliance on a two-way quantum communication channel (and thus, the attacker's opportunity to interact with the qubit twice), their security analysis is difficult and little is known concerning how secure they are compared to their fully quantum counterparts. In this paper we prove the unconditional security of a particular semi-quantum protocol. We derive an expression for the key rate of this protocol, in the asymptotic scenario, as a function of the quantum channel's noise. Finally, we will show that this semi-quantum protocol can tolerate a maximal noise level comparable to certain fully quantum protocols.

Walter O. Krawec

2014-11-30T23:59:59.000Z

234

Key Dates | U.S. DOE Office of Science (SC)  

Office of Science (SC) Website

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched5 IndustrialIsadore Perlman, 1960 The Ernest OrlandoJohn B.Jorge LuisKayeKey DatesKey

235

Key Dates | U.S. DOE Office of Science (SC)  

Office of Science (SC) Website

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched5 IndustrialIsadore Perlman, 1960 The Ernest OrlandoJohn B.Jorge LuisKayeKeyKey Dates

236

Key Dates | U.S. DOE Office of Science (SC)  

Office of Science (SC) Website

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched5 IndustrialIsadore Perlman, 1960 The Ernest OrlandoJohn B.Jorge LuisKayeKeyKey

237

Key Parameters Affecting DPF Performance Degradation and Impact on Lifetime  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:YearRound-UpHeatMulti-Dimensionalthe10 DOEWashington, DC 20585on253.16582104)Key Issues Key

238

Key Concepts in Project Development and Financing in Alaska  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGY TAX POLICIES7.pdfFuel2007 | Department7JanuaryWASTE-TO-ENERGY:About » KeyKeyAbout

239

BUSCH CAMPUS KEY PICK UP INSTRUCTIONS: ALL STUDENTS: ONLY YOU CAN PICK UP YOUR KEY. You will be required to present photo  

E-Print Network [OSTI]

BUSCH CAMPUS KEY PICK UP INSTRUCTIONS: ALL STUDENTS: ONLY YOU CAN PICK UP YOUR KEY. You at the Housing and Residence Life Office, 581 Taylor Road, Busch Campus. If you are unable to pick up your key. _____________________________________________________________________________________ FIRST-YEAR STUDENTS MOVE-IN DAY KEY PICK UP BUSCH CAMPUS SATURDAY, AUGUST 28th 8:00 a.m. 2:00 p

240

Gigahertz quantum key distribution with InGaAs avalanche photodiodes  

E-Print Network [OSTI]

We report a demonstration of quantum key distribution (QKD) at GHz clock rates with InGaAs avalanche photodiodes (APDs) operating in a self-differencing mode. Such a mode of operation allows detection of extremely weak avalanches so that the detector afterpulse noise is sufficiently suppressed. The system is characterized by a secure bit rate of 2.37 Mbps at 5.6 km and 27.9 kbps at 65.5 km when the fiber dispersion is not compensated. After compensating the fiber dispersion, the QKD distance is extended to 101 km, resulting in a secure key rate of 2.88 kbps. Our results suggest that InGaAs APDs are very well suited to GHz QKD applications.

Z. L. Yuan; A. R. Dixon; J. F. Dynes; A. W. Sharpe; A. J. Shields

2008-05-22T23:59:59.000Z

Note: This page contains sample records for the topic "d1 key results" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Cedar Key Aquaculture Workshop Sulfide Concentrations in Sediments  

E-Print Network [OSTI]

Cedar Key Aquaculture Workshop Sulfide Concentrations in Sediments and Water: Influence on Hard;ObjectivesObjectives Examine sediment sulfide levels in the SuwanneeExamine sediment sulfide levels of sulfide on hard clam survivalsurvival #12;MethodsMethods SedimentSediment porewaterporewater samples

Florida, University of

242

Dictionaries Using Variable-Length Keys and Data, with Applications *  

E-Print Network [OSTI]

(Isil- logn, 1) + Itil) and Isil is the length of bit string si. We assume a word length w > log m. We present string Isil > 1, Itil > 1 for all bit-strings si and ti. Fox' fixed-length keys the dictionary problem

Blelloch, Guy E.

243

TICKS: KEY TO GENERA IN UNITED STATES Harry D. Pratt  

E-Print Network [OSTI]

·38 TICKS: KEY TO GENERA IN UNITED STATES Harry D. Pratt I Capitulum inferior; scutum absent. without definite sutural line. anus, indistinct, or absent. j ~ I lated .... ~ :. / ORNITHODOROS I ment Mouthparts much longer than ..~".'LJv--_, .0",,,,L } }_..., ---'~':r,.-.__.{ Mouthparts as long as basis

244

news and views A key issue for hydrogen storage materi-  

E-Print Network [OSTI]

news and views A key issue for hydrogen storage materi- als is that the hydrogenation and dehydro be possible to discover stable hydrogen hydrates with higher storage Hydrogen Posture Plan www.eere.energy.gov/hydrogenandfuelcells/pdfs/ hydrogen_posture_plan.pdf 7. Kuhs, W

Palumbi, Stephen

245

Using Key Performance Indicators to Manage Energy Costs  

E-Print Network [OSTI]

-effective to collect much more data than ever before, many energy managers find themselves drowning in the volume of data generated. Business information systems faced a similar challenge a decade ago, and it is now common practice to use Key Performance Indicators...

Van Gorp, J. C.

2005-01-01T23:59:59.000Z

246

Page 1 of 4 Creating and Submitting a Key Request  

E-Print Network [OSTI]

of employees. Enter search criteria in the search fields available and select the down red arrow to filter the terms. #12;Page 3 of 4 13. On the Key Request Form - Room List windowpane, select Add New. 14 use the Select Drawing button after entering the building and floor to display the floor plan

Howitt, Ivan

247

Cold Boot Key Recovery by Solving Polynomial Systems with Noise  

E-Print Network [OSTI]

Cold Boot Key Recovery by Solving Polynomial Systems with Noise Martin Albrecht and Carlos Cid 1 proposed in [9]; the technique was called Cold Boot attacks. When considering block ciphers Cold Boot attacks, was proposed in [9] and also provided an insight into the strength of a particular

Sheldon, Nathan D.

248

The Seven Keys to Success in Energy Management and Conservation  

E-Print Network [OSTI]

This paper is a summary of the seven key elements of the Deere & Company Energy Management and Conservation Program. These elements have been found to be essential for the ultimate success of any company-wide energy management program. The process...

Darby, D. F.

1984-01-01T23:59:59.000Z

249

SETTING INITIAL SECRET KEYS IN A MOBILE AD HOC NETWORK  

E-Print Network [OSTI]

SETTING INITIAL SECRET KEYS IN A MOBILE AD HOC NETWORK Murat Cihan1 and C¸etin Kaya Ko¸c2,3 1 I@eecs.oregonstate.edu Abstract. Mobile ad hoc networks require specialized authentication protocols due to the mobility of users and lack of always-available trusted servers. There are a variety of mobile ad hoc authentication protocols

250

Termites, elephants and fire are key drivers of tree mortality  

E-Print Network [OSTI]

mortality: 2 dominated by elephant damage, 2 by termite attack and 1 by fire. Wind and human activity wereTermites, elephants and fire are key drivers of tree mortality 5 plots suffered substantial tree not major causes of tree mortality. Sample sizes are too small to reasonably determine the most significant

251

Daylight quantum key distribution over 1.6 km  

E-Print Network [OSTI]

Quantum key distribution (QKD) has been demonstrated over a point-to-point $\\sim1.6$-km atmospheric optical path in full daylight. This record transmission distance brings QKD a step closer to surface-to-satellite and other long-distance applications.

W. T. Buttler; R. J. Hughes; S. K. Lamoreaux; G. L. Morgan; J. E. Nordholt; C. G. Peterson

2000-01-25T23:59:59.000Z

252

Key words: STREAMLINE, yeast, scale up, automation, sanitization.  

E-Print Network [OSTI]

adsorption by defining a realistic process example at small scale and taking it all the way up to a fullyKey words: STREAMLINE, yeast, scale up, automation, sanitization. Abstract This application note was evaluated by performing a sanitization study in which the column and system were challenged with culture

Lebendiker, Mario

253

Highly Efficient Quantum Key Distribution Immune to All Detector Attacks  

E-Print Network [OSTI]

Vulnerabilities and imperfections of single-photon detectors have been shown to compromise security for quantum key distribution (QKD). The measurement-device-independent QKD (MDI-QKD) appears to be the most appealing solution to solve the issues. However, in practice one faces severe obstacles of having significantly lower key generation rate, difficult two photon interferences, and remote synchronization etc. In this letter, we propose a highly efficient and simple quantum key distribution scheme to remove all of these drawbacks. Our proposal can be implemented with only small modifications over the standard decoy BB84 system. Remarkably it enjoys both the advantages of high key generation rate (being almost two orders of magnitude higher than that based on conventional MDI-QKD) comparable to the normal decoy system, and security against any detector side channel attacks. Most favorably one can achieve complete Bell state measurements with resort to single photon interference, which reduces significantly experimental costs. Our approach enables utilization of high speed and efficient secure communication, particularly in real-life scenario of both metropolitan and intercity QKD network, with an attack free fashion from arbitrary detector side channels.

Wen-Fei Cao; Yi-Zheng Zhen; Yu-Lin Zheng; Zeng-Bing Chen; Nai-Le Liu; Kai Chen; Jian-Wei Pan

2014-10-10T23:59:59.000Z

254

Essentials of Energy Key concepts for the day  

E-Print Network [OSTI]

Essentials of Energy 4/14/05 Key concepts for the day Markets monopoly Substitution volatility Energy intensity Levelized costs externalities I. Market essentials Are there working energy markets · international geo-political issues Speculation Long lead times for development so supply is not very responsive

255

PEM FUEL CELL TECHNOLOGY Key Research Needs and Approaches  

E-Print Network [OSTI]

Developer University #12;8 FUEL CELL RESEARCH NEEDS MEA optimization should focus on new materials Pt (full1 PEM FUEL CELL TECHNOLOGY Key Research Needs and Approaches Tom Jarvi UTC Power South Windsor, CT 06074 23 January 2008 #12;2 UTC POWER MARKET FOCUS Transportation Fuel Cells On-Site Power Solutions #12

256

BERNAL and RESTREPO Key issues for decentralization in municipal  

E-Print Network [OSTI]

BERNAL and RESTREPO Key issues for decentralization in municipal wastewater treatment Diana Paola, the inadequate management and disposal of wastewater and the implementation of sophisticated treatment systems is the decentralisation in wastewater treatment. In this article, it is proposed an overview of the state of the art

Boyer, Edmond

257

Public-Key Locally-Decodable Codes Brett Hemenway  

E-Print Network [OSTI]

Semantically-Secure Public Key En- cryption (SS-PKE) and any Private Information Retrieval (PIR) protocol. Since Homomorphic encryption implies PIR, we also show a reduction from any Homomorphic encryption protocol to PKLDC. Applying our construction to the best known PIR protocol (that of Gentry and Ramzan), we

Ostrovsky, Rafail

258

In 2010 a group of key forestry players  

E-Print Network [OSTI]

Forestry Skills Action Plan #12;Summary #12;In 2010 a group of key forestry players came together to start a movement across the sector to upskill the current, and train the future, forestry workforce. #12;In May 2010 Forestry Commission England convened a small cross- sector task and finish group

259

Architecture of the Secoqc Quantum Key Distribution network  

E-Print Network [OSTI]

The European projet Secoqc (Secure Communication based on Quantum Cryptography) aims at developing a global network for unconditionally secure key distribution. This paper specifies the requirements and presents the principles guiding the design of this network, and relevant to its architecture and protocols.

Mehrdad Dianati; Romain Alleaume

2006-10-25T23:59:59.000Z

260

The Design of a Group Key Agreement API Giuseppe Ateniese  

E-Print Network [OSTI]

and communication-independent API. The rest of this paper is organized as follows. We be- gin with the notationThe Design of a Group Key Agreement API Giuseppe Ateniese Computer Science Department Johns Hopkins describes a protocol suite and an API geared for securing collab- orative applications. The API is based

Kim, Dae-Shik

Note: This page contains sample records for the topic "d1 key results" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Cryptanalysis of two knapsack public-key cryptosystems  

E-Print Network [OSTI]

Han1 {jguobi,hanlidong}@sdu.edu.cn mengxm@sdfi.edu.cn 1 Key Laboratory of Cryptologic Technology is useless to the security of the cryptosystem. Because of the special super increasing structure, we can. We show that the permutation algorithm is useless to avoid the low-density attack and the density

262

Putting cancer in focusPathologists key to picking the  

E-Print Network [OSTI]

Putting cancer in focusPathologists key to picking the right path to a cure momentum IN THIS ISSUE without cancer. #12;EDITOR Heather Newman DESIGN Diana Duren DIRECTOR OF PUBLICATIONS Wayne Wood ASSOCIATE / Photo Researchers, Inc. EDITORIAL OFFICE Vanderbilt-Ingram Cancer Center 691 Preston Building Nashville

Eichman, Brandt F.

263

Efficient Algorithms for Implementing Elliptic Curve PublicKey Schemes  

E-Print Network [OSTI]

Efficient Algorithms for Implementing Elliptic Curve Public­Key Schemes by Dan Beauregard A Thesis Cyganski Thesis Advisor Thesis Committee Dr. Stanley Selkow Dr. John Orr Thesis Committee Department Head #12; Preface This thesis describes the research which I conducted while completing my graduate work

264

Key issues of FED/INTOR impurity control system  

SciTech Connect (OSTI)

A key part of the FED/INTOR activity over the past year has focused on examining the critical issues and developing credible physics and engineering solutions for the impurity control system. The primary emphasis of the work was on the edge-region physics, plasma-wall interaction, materials, engineering and magnetic considerations of the poloidal divertor and pump limiter.

Abdou, M.A.

1982-10-01T23:59:59.000Z

265

The Key Coal Producers ONLINE SUPPORTING MATERIALS to  

E-Print Network [OSTI]

The Key Coal Producers ONLINE SUPPORTING MATERIALS to A Global Coal Production Forecast with Multi's most important coal-producing area is North-Central China. The provinces of Inner Mongolia, Ningxia, Shaanxi and Shanxi together accounted for 83 percent of China's proven coal reserves in 2000, and Shanxi

Patzek, Tadeusz W.

266

Impact of ANSI X9.24-1:2009 Key Check Value on ISO/IEC 9797-1:2011 MACs  

E-Print Network [OSTI]

Impact of ANSI X9.24-1:2009 Key Check Value on ISO/IEC 9797-1:2011 MACs Tetsu Iwata1 and Lei Wang2, wang.lei@ntu.edu.sg Abstract. ANSI X9.24-1:2009 specifies the key check value, which is used to verify check value. As a result, we obtain a complete characterization of the impact of using ANSI X9.24-1 key

267

Differential-phase-shift quantum key distribution with phase modulation to combat sequential attacks  

SciTech Connect (OSTI)

Phase-modulated differential-phase-shift (DPS) quantum key distribution (QKD) is presented for combating sequential attacks that most severely restrict the DPS-QKD system distance. Slow phase modulation imposed onto the DPS signal obstructs the optimum unambiguous state discrimination measurement conducted in the sequential attack and improves the QKD distance as a result. The condition with which the phase modulation does not degrade the DPS-QKD system performance is also described.

Kawahara, Hiroki; Oka, Toru; Inoue, Kyo [Osaka University, Osaka 565-0871 (Japan)

2011-11-15T23:59:59.000Z

268

Key-Insulated Signcryption (Science and Technology on Communication Security Laboratory,  

E-Print Network [OSTI]

Key-Insulated Signcryption Jia Fan 1 (Science and Technology on Communication Security Laboratory addresses the issue of key exposure by proposing a key-insulated signcryption technique. We define a security model for key-insulated signcryption and prove that the key- insulated signcryption technique

Zheng, Yuliang

269

I t=106sec3a 10 Energy key) 10'  

E-Print Network [OSTI]

. Optics for EUV, X-Ray, and Gamma-Ray Astronomy II, edited by Oberto Citterio, Stephen L. O'Dell, ProcRXTE HE& I t=106sec3a - AEIEH/2 a =10 - 10 Energy key) 10' IBIS NuSTAR Hard X-ray Optics Jason ESTAR will be the first satellite mission to employ focusing optics in the hard X-ray band (8- 80 keV). Its design

270

Economy key to 1992 U. S. oil, gas demand  

SciTech Connect (OSTI)

This paper provides a forecast US oil and gas markets and industry in 1992. An end to economic recession in the U.S. will boost petroleum demand modestly in 1992 after 2 years of decline. U.S. production will resume its slide after a fractional increase in 1991. Drilling in the U.S. will set a record low. Worldwide, the key questions are economic growth and export volumes from Iraq, Kuwait, and former Soviet republics.

Beck, R.J.

1992-01-27T23:59:59.000Z

271

City of Key West, Florida (Utility Company) | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartmentAUDITOhio (UtilityHolyrood, Kansas (Utility Company)JohnsonKennett, MissouriKey

272

New Approach to Quantum Key Distribution Via Quantum Encryption  

E-Print Network [OSTI]

In this Paper, we investigate the security of Zhang, Li and Guo quantum key distribution via quantum encryption protocol [$\\text{Phys. Rev. A} \\textbf{64}, 24302 (2001)$] and show that it is not secure against some of Eve's attacks and with the probability one half she gets all of keys without being detected by the two parties. The main defect in this protocol is that there is an attack strategy by which Eve can change the previously shared Bell state between Alice and Bob to two Bell states among herself and Alice and Bob. Hence, we show that with probability $1/d$ its generalization to $d$-dimension systems is not secure and show that its extension to the case of more partners based on the reusable GHZ states is not secure and with probability one half Eve gets all of keys without being detected by the two parties. In what follows, we show how in going to higher dimensions those protocols can be repaired.

A. Fahmi

2006-04-25T23:59:59.000Z

273

A Comparison of Key PV Backsheet and Module Properties from Fielded...  

Broader source: Energy.gov (indexed) [DOE]

of Key PV Backsheet and Module Properties from Fielded Module Exposures and Accelerated Test Conditions A Comparison of Key PV Backsheet and Module Properties from Fielded...

274

Practical Training in Microalgae Utilization with Key Industry Engineering Group Key Industry Engineering Group s.r.o. has developed a biotechnology for the production of an animal  

E-Print Network [OSTI]

Practical Training in Microalgae Utilization with Key Industry Engineering Group Key Industry on a suspension of Planktochlorella microalgae. The product consists of a suspension of algae in the growing

275

Orthogonal-state-based protocols of quantum key agreement  

E-Print Network [OSTI]

Two orthogonal-state-based protocols of quantum key agreement (QKA) are proposed. The first protocol of QKA proposed here is designed for two-party QKA, whereas the second protocol is designed for multi-party QKA. Security of these orthogonal-state-based protocols arise from monogamy of entanglement. This is in contrast to the existing protocols of QKA where security arises from the use of non-orthogonal state (non-commutativity principle). Further, it is shown that all the quantum systems that are useful for implementation of quantum dialogue and most of the protocols of secure direct quantum communication can be modified to implement protocols of QKA.

Chitra Shukla; Nasir Alam; Anirban Pathak

2013-10-05T23:59:59.000Z

276

2014 CATEE: Collaboration is the Key- Public/Private Partnerships  

E-Print Network [OSTI]

, Texas Nov. 18-20 HGOC Education and Outreach ? District Meetings ? Peer Exchange ? Workshops ? Webinars ? One-on-One Trainings ? Newsletters ? Social media ESL-KT-14-11-24 CATEE 2014: Clean Air Through Efficiency Conference, Dallas, Texas Nov. 18...2014 CATEE Collaboration is the Key - Public/Private Partnerships November 19, 2014 Lisa Lin, Sustainability Manager, City of Houston ESL-KT-14-11-24 CATEE 2014: Clean Air Through Efficiency Conference, Dallas, Texas Nov. 18-20 City of Houston...

Lin, L.

2014-01-01T23:59:59.000Z

277

LEDSGP/Transportation Toolkit/Key Actions | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia: Energy Resources Jump to:46 - 429 ThrottledInformation KumasiTools < LEDSGP‎ | DIA-Toolkit Jump<Key

278

NERSC Played Key Role in Nobel Laureate's Discovery  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recovery challengeMultiscaleLogos NERSC Logos NERSC logos arePlayed Key Role in Nobel

279

NNSA Administrator, Three Lab Directors Tour Key Weapons Facility |  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recovery challengeMultiscaleLogos NERSCJeffreyKey ActionsThe NextAwards

280

Key Dates | U.S. DOE Office of Science (SC)  

Office of Science (SC) Website

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched5 IndustrialIsadore Perlman, 1960 The Ernest OrlandoJohn B.Jorge LuisKayeKey Dates

Note: This page contains sample records for the topic "d1 key results" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Key Dates | U.S. DOE Office of Science (SC)  

Office of Science (SC) Website

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched5 IndustrialIsadore Perlman, 1960 The Ernest OrlandoJohn B.Jorge LuisKayeKey

282

A Key Enzyme to the Potency of an Anticancer Agent  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLasDelivered‰PNGExperience hands-onASTROPHYSICSHe β-Research andA Hollow-IonHybridA Key

283

A Key Enzyme to the Potency of an Anticancer Agent  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLasDelivered‰PNGExperience hands-onASTROPHYSICSHe β-Research andA Hollow-IonHybridA KeyA

284

A Key Enzyme to the Potency of an Anticancer Agent  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLasDelivered‰PNGExperience hands-onASTROPHYSICSHe β-Research andA Hollow-IonHybridA KeyAA

285

A Key Enzyme to the Potency of an Anticancer Agent  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLasDelivered‰PNGExperience hands-onASTROPHYSICSHe β-Research andA Hollow-IonHybridA KeyAAA

286

Iron is the Key to Preserving Dinosaur Soft Tissue  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-SeriesFlickrinformation for andFuel-Efficient Engines |Iron is the Key to

287

Iron is the Key to Preserving Dinosaur Soft Tissue  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-SeriesFlickrinformation for andFuel-Efficient Engines |Iron is the Key toIron is

288

Key Activities in Energy Efficiency | Department of Energy  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGY TAX POLICIES7.pdfFuel2007 | Department7JanuaryWASTE-TO-ENERGY:About » Key Activities

289

GE Key Partner in Innovation Institutes | GE Global Research  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation ProposedUsingFun with Big Sky Learning Fun with Big SkyDIII-D Performance ToolsGlobalIs Key

290

Key Activities in Wind Energy | Department of Energy  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |EnergyonSupport0.pdf5 OPAM SEMIANNUAL REPORT TOJaredKansas City DataKen Salazar AboutKey

291

Key Activities of the Geothermal Technologies Office | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists'Montana.ProgramJulietipDepartmentJuneWhen IAjani Stewart was close toKeri FultonKey

292

Catalysis Center for Energy Innovation KEY ACCOMPLISHMENTS AND CORE CAPABILITIES  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation InInformationCenterResearchCASL Symposium:and Technical Information Catalogue ofKEY

293

Florida Keys El Coop Assn, Inc | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of InspectorConcentrating Solar Power Basics (TheEtelligence (SmartHome Kyoung's pictureFlint ElectricKeys El

294

US Green Building Council Keys Branch Presents: Designing Mosquito Free Cisterns  

E-Print Network [OSTI]

Higgins, Sustainability Director - City of Key West Rainwater Harvesting from Roof Collection through

Watson, Craig A.

295

Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys  

E-Print Network [OSTI]

Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys Beno^it Libert1 in Identity-Based Encryption. In this model, if the Private Key Generator (PKG) maliciously re' public keys are public identifiers (e.g. email addresses) and the matching private keys are derived

Paris-Sud XI, Universit de

296

Encryption Key Search using Java-based ALiCE Grid  

E-Print Network [OSTI]

Encryption Key Search is a compute-intensive operation that consists of a brute-force search of a particular key in a given key space. Sequential execution time for a 56-bit encryption key search is approximately 200,000 ...

Virkar, Ameya

297

Data:65e2ef3e-1856-4467-996e-b98d1c894fb2 | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office695810186 No revision has been approved fore6e8eee4495-afb210887c9bf3ac6ed3cc6 No revisionb98d1c894fb2 No

298

Data:77827cc8-51e2-4106-acff-c1da0d1e7ef5 | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office695810186 No revision has6a0216321b No revision8390-f3c1d17c852d Nof0ac113123b15ccc3573 No4106-acff-c1da0d1e7ef5

299

Data:B68c5c90-723e-4089-a07f-4a1381e9d1f8 | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onb5-dcc1fcffd1f2 No revision has38865d08 No revisionb6dbbdc091c No47e8-8abc-986cbbaae197 Noa07f-4a1381e9d1f8 No revision

300

Data:B7b09e24-f63a-4031-90e6-d18e3c5776d1 | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onb5-dcc1fcffd1f2 No revision has38865d08 No revisionb6dbbdc091c4061e2fe19b Nob-a219ed0db0493-04960ea1178be6-d18e3c5776d1

Note: This page contains sample records for the topic "d1 key results" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Data:B93224d1-c11d-4d53-bff5-84194ed0f253 | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onb5-dcc1fcffd1f2 No revision has38865d08 Nocadf-323f-4b6f-9089-15e8154a5fd970704d1a6 No

302

Data:C21f9094-9531-4a3a-a975-46557d1bc96b | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onb5-dcc1fcffd1f2bb71-d4159a938742 No revision has beena032db6d83 No revisionf87c65d6b Noa975-46557d1bc96b No revision has

303

Data:C23670bf-4a09-42de-a173-f293447d1b3f | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onb5-dcc1fcffd1f2bb71-d4159a938742 No revision has beena032db6d83 No revisionf87c65d6b Noa975-46557d1bc96b No8e548a1d

304

Data:5f4e37ad-192a-4981-af3d-e9be532d1b40 | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office695810186 No revision has been approved for this page.f9b87a5 No9c38a3bad1d4 No revision has beene9be532d1b40 No

305

Data:647cf699-538b-44b4-a1ed-8a5aa1d1f684 | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office695810186 No revision has been approved fore6e8eee44 Nobfa2-747e1ee9f93d No revision has4623a5b0879da5aa1d1f684

306

Data:065fb21d-c75b-4a75-860e-13fd93d1dc6e | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of InspectorConcentratingRenewable Solutions6ae4e73fc No revision hasb9e2-8af452ac6862 Noa75-860e-13fd93d1dc6e

307

Data:45c71c2d-8c26-40fb-a7e0-fab503a49d1f | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of48d9ff47edf3a87dcc95b No revisione66e17fc7f7 No revision hasb9f1a905e225 No revision03a49d1f No revision has

308

Data:4c2f578f-bd36-4531-982e-3997d1c1fdbd | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of48d9ff47edf3a87dcc95b Nobfef8fa58cf7 No revision has been approved for7276d No revision has been997d1c1fdbd No

309

Data:4df5976e-ab36-46d0-81a5-2d1e82108a4e | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of48d9ff47edf3a87dcc95b Nobfef8fa58cf7 No revisionf377c06978a3 No revision has been approved-2d1e82108a4e No

310

Data:51dc30be-aed4-4d1d-a720-e557ec87f6b9 | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of48d9ff47edf3a87dcc95b Nobfef8fa58cf74865627f783 No revisionaa-f378570ebed7aed4-4d1d-a720-e557ec87f6b9 No

311

Data:0a710392-0262-4cde-a5ba-d1dd41e15527 | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of InspectorConcentratingRenewable-1a29da98863b No revision has beencde-a5ba-d1dd41e15527 No revision has been

312

Data:1610211f-2f08-4725-ae48-a3b41d1e1b73 | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of48d9ff47edf3 No revision has beenba5b1d371 Nob97eb4d202d0 No revision has been approved for this page.1d1e1b73

313

Data:17302544-0e41-45e0-8cb4-d72cb51d1b34 | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of48d9ff47edf3 No revision has beenba5b1d371 Nob97eb4d202d0 No8827bff3a72b1fa89b5548 No revisiond72cb51d1b34 No

314

Data:A2796869-40ca-41e7-859a-92e1abb021d1 | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office695810186 Nod2db5b31cb44 No revision-b209-069dd1fd7c05 Nod0a-20a071f2b985 No revision has beene1abb021d1 No

315

Data:A83c3e68-04f5-436d-bb99-9945eee5d1cc | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office695810186 Nod2db5b31cb44f-4cd6-87d8-e9253aab8d9c No revision hasf32924f922aa20e524 No9945eee5d1cc No revision has

316

Data:A85e82d1-4aff-4ab4-9692-9dcdbd383705 | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office695810186 Nod2db5b31cb44f-4cd6-87d8-e9253aab8d9c No revision hasf32924f922aa20e524 No9945eee5d1cc70b612fcee6

317

Data:A8d2d737-f785-4daa-802d-1b5de7065694 | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office695810186 Nod2db5b31cb44f-4cd6-87d8-e9253aab8d9c No revision82e6036a7 No revision-4daa-802d-1b5de7065694 No

318

Data:Aade79ec-8628-4e5e-a921-24d1b399e432 | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office695810186Aade79ec-8628-4e5e-a921-24d1b399e432 No revision has been approved for this page. It is currently under

319

Data:Ac14d1da-4faa-4613-95ed-33893718f9d7 | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office695810186Aade79ec-8628-4e5e-a921-24d1b399e432Abfc02b7-5501-4885-811d-4083ecf1a854 No revision has4f295293718f9d7

320

Data:9a4bfe26-062e-4964-8439-5d1e0fd4ef3b | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office695810186 Nod2db5b31cb44 No revision has been approved for this page. It137d62c3 No-8439-5d1e0fd4ef3b No revision

Note: This page contains sample records for the topic "d1 key results" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Data:9a5b478a-dce4-4c72-88d1-d8372c6aa060 | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office695810186 Nod2db5b31cb44 No revision has been approved for this page. It137d62c3 No-8439-5d1e0fd4ef3b No72c6aa060

322

Data:9ca73050-a0bb-4ebe-942c-35ffe219d1c3 | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office695810186 Nod2db5b31cb44 No revision has been approved095c1f504b No revisioneb70f22965ffe219d1c3 No revision has

323

Data:9df44fa2-436d-4aef-815f-6d1d76a6d646 | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office695810186 Nod2db5b31cb44 No revision has beenfcf13f143bb No revision has4299e78a9aef-815f-6d1d76a6d646 No

324

Data:Ccdb885d-1e20-4787-938c-2f7e696d485e | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onb5-dcc1fcffd1f2bb71-d4159a938742e80b26cc4 No revision has been930896adaac340c0bCcdb885d-1e20-4787-938c-2f7e696d485e No

325

Data:D7de60af-9dc7-427f-832f-f3e606f40d1a | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Pagec-01b596aa1744 No revision has been approved97069579d6d-b16b-9fabe37583c10d943651 Noa07078a79eff-f3e606f40d1a No revision

326

Data:D9aa9cd3-229c-4699-8692-d6f420785d1d | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Pagec-01b596aa1744 No revision has beenadf9-4884-b0c1-529b3bb19f9c No2-d6f420785d1d No revision has been approved for this

327

Data:D9d1d226-fdbc-4264-a53e-6b87ead3b324 | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Pagec-01b596aa1744 No revision has beenadf9-4884-b0c1-529b3bb19f9c No2-d6f420785d1d No revision has been

328

Data:Dfef1652-2729-4b5c-85c5-b5ec5bd650d1 | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Pagec-01b596aa1744b55997c1cc No revision has been approved for this page. It is currentlyDfef1652-2729-4b5c-85c5-b5ec5bd650d1

329

Data:E5198e9a-51ab-45e8-b24a-47f3d1a2fb05 | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Pagec-01b596aa1744b55997c1cc No revision has been approved for-1837723ccd6b No3f21d72298d8ae87cdee Nof3d1a2fb05 No revision has

330

Data:7b397e58-7cf3-4b15-a081-cef03812d1d0 | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office695810186 No revision has6a0216321b Nof667a9d7d88 No809d65569c0 Nob6a1826b076 No3812d1d0 No revision has been

331

Data:7da9fb6d-395e-466f-8865-016e956e7d1e | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office695810186 No revision has6a0216321b Nof667a9d7d88cc1e8c1443c Nod-5000bbb042b0 No-abbd647e170c Nofb84a3ece956e7d1e

332

Data:7ee17522-dea3-4dfa-8cb0-430d1a363a51 | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office695810186 No revision has6a0216321bfd-b46c-2ea652fe29afebeffe5-fb88-45f8-8376-6ba307047cb9cb0-430d1a363a51 No

333

Oxygen is a key element for biology and the cycling of geochemical elements, and has shaped the chemical  

E-Print Network [OSTI]

Oxygen is a key element for biology and the cycling of geochemical elements, and has shaped the chemical and biological evolution of Earth. The oceans appear to be loosing oxygen due to on-going climate change, with resulting impacts on marine ecosystems and global biogeochemical cycles. As oxygen levels

Handy, Todd C.

334

Topological Obstructions to Localization Results Radu V. Balan  

E-Print Network [OSTI]

Topological Obstructions to Localization Results Radu V. Balan Siemens Corporate Research, 755(x)j2 dx Z 2j^g( )j2 d = 1 (4) where ^g( ) = 1p2 R e;i xg(x)dx is the Fourier transform of g. Equation in San Diego, July 29 - August 3, 2001 E-mail address: radu.balan@scr.siemens.com #12;The proof shows

Maryland at College Park, University of

335

Photon counting for quantum key distribution with Peltier cooled InGaAs/InP APD's  

E-Print Network [OSTI]

The performance of three types of InGaAs/InP avalanche photodiodes is investigated for photon counting at 1550 nm in the temperature range of thermoelectric cooling. The best one yields a dark count probability of $% 2.8\\cdot 10^{-5}$ per gate (2.4 ns) at a detection efficiency of 10% and a temperature of -60C. The afterpulse probability and the timing jitter are also studied. The results obtained are compared with those of other papers and applied to the simulation of a quantum key distribution system. An error rate of 10% would be obtained after 54 kilometers.

Damien Stucki; Grgoire Ribordy; Andr Stefanov; Hugo Zbinden; John G. Rarity; Tom Wall

2001-06-01T23:59:59.000Z

336

Photon counting for quantum key distribution with Peltier cooled InGaAs/InP APD's  

E-Print Network [OSTI]

The performance of three types of InGaAs/InP avalanche photodiodes is investigated for photon counting at 1550 nm in the temperature range of thermoelectric cooling. The best one yields a dark count probability of $% 2.8\\cdot 10^{-5}$ per gate (2.4 ns) at a detection efficiency of 10% and a temperature of -60C. The afterpulse probability and the timing jitter are also studied. The results obtained are compared with those of other papers and applied to the simulation of a quantum key distribution system. An error rate of 10% would be obtained after 54 kilometers.

Stucki, D; Stefanov, A; Zbinden, H; Rarity, J G; Wall, T; Stucki, Damien; Ribordy, Gr\\'{e}goire; Stefanov, Andr\\'{e}; Zbinden, Hugo; Rarity, John G.; Wall, Tom

2001-01-01T23:59:59.000Z

337

Proof-of-principle experiment of a modified photon-number-splitting attack against quantum key distribution  

SciTech Connect (OSTI)

Any imperfections in a practical quantum key distribution (QKD) system may be exploited by an eavesdropper to collect information about the key without being discovered. We propose a modified photon-number-splitting attack scheme against QKD systems based on weak laser pulses taking advantage of possible multiphoton pulses. Proof-of-principle experiments are demonstrated. The results show that the eavesdropper can get information about the key generated between the legitimate parties without being detected. Since the equivalent attenuation introduced by the eavesdropper for pulses of different average photon numbers are different, the decoy-state method is effective in fighting against this kind of attack. This has also been proven in our experiments.

Liu Weitao; Sun Shihai; Liang Linmei; Yuan Jianmin [Department of Physics, College of Science, National University of Defense Technology, Changsha, 410073 (China)

2011-04-15T23:59:59.000Z

338

Rare Plant Conservation Planning Workshop Results  

E-Print Network [OSTI]

one of the most imperiled species in Colorado. The species is at risk of extinction due to its narrowRare Plant Conservation Planning Workshop Results PAGOSA SPRINGS Plant Species of Focus Pagosa............................................................................................................................. 12 Attachment 1. Additional key species and plant communities in the Pagosa Springs area 13

339

Genetic analysis of the endangered silver rice rat (Oryzomys palustris natator) and Lower Keys marsh rabbit (Sylvilagus palustris hefneri)  

E-Print Network [OSTI]

; Goodyear 1992; Forys et al. 1996), and increased mortality of neonates as a result of imported fire ants (Solenopsis invicta; Forys et al. 2002), a recent colonizer of the Florida Keys. As a result of concern over the loss of native endemic land.... Factors including loss of habitat, habitat fragmentation by road systems and multiple indirect anthropogenic effects (Goodyear 1992; Forys et al. 1996; Forys and Humphrey 1999; USFWS 1999; Forys et al. 2002; Harveson et al. 2004) have all contributed...

Crouse, Amanda Louise

2007-04-25T23:59:59.000Z

340

Bounds on entanglement distillation and secret key agreement for quantum broadcast channels  

E-Print Network [OSTI]

The squashed entanglement of a quantum channel is an additive function of quantum channels, which finds application as an upper bound on the rate at which secret key and entanglement can be generated when using a quantum channel a large number of times in addition to unlimited classical communication. This quantity has led to an upper bound of $\\log((1+\\eta )/(1-\\eta))$ on the capacity of an optical communication channel for such a task, where $\\eta$ is the average fraction of photons that make it from the input to the output of the channel. The purpose of the present paper is to extend these results beyond the single-sender single-receiver setting to the more general case of a single sender and multiple receivers (a quantum broadcast channel). We employ multipartite generalizations of the squashed entanglement to constrain the rates at which secret key and entanglement can be generated between any subset of the users of such a channel, along the way developing several new properties of these measures. We apply our results to the case of an optical broadcast channel with one sender and two receivers.

Kaushik P. Seshadreesan; Masahiro Takeoka; Mark M. Wilde

2015-03-27T23:59:59.000Z

Note: This page contains sample records for the topic "d1 key results" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Microsoft Word - fact sheet alternatives and key findings 090214...  

National Nuclear Security Administration (NNSA)

health of workers and the public. Worker dose would result in additional latent cancer fatality risk of a maximum of 1 chance in 100,000. Public dose would result in...

342

Risk and Performance Technologies: Identifying the Keys to Successful Implementation  

SciTech Connect (OSTI)

The nuclear power industry has been utilizing risk and performance based technologies for over thirty years. Applications of these technologies have included risk assessment (e.g. Individual Plant Examinations), burden reduction (e.g. Risk-Informed Inservice Inspection, RI-ISI) and risk management (Maintenance Rule, 10CFR50.65). Over the last five to ten years the number of risk-informed (RI) burden reduction initiatives has increased. Unfortunately, the efficiencies of some of these applications have been questionable. This paper investigates those attributes necessary to support successful, cost-effective RI-applications. The premise to this paper is that by understanding the key attributes that support one successful application, insights can be gleaned that will streamline/coordinate future RI-applications. This paper is an extension to a paper presented at the Pressure Vessel and Piping (PVP-2001) Conference. In that paper, a number issues and opportunities were identified that needed to be assessed in order to support future (and efficient) RI-applications. It was noted in the paper that a proper understanding and resolution of these issues will facilitate implementation of risk and performance technology in the operation, maintenance and design disciplines. In addition, it will provide the foundation necessary to support regulatory review and approval. (authors)

McClain, Lynn [Niagara Mohawk (United States); Smith, Art [Entergy Operations (United States); O'Regan, Patrick [Electric Power Research Institute - EPRI, 3420 Hillview Avenue, Palo Alto, California 94304 (United States)

2002-07-01T23:59:59.000Z

343

Environmental labelling of green electricity with LCA key parameter models  

E-Print Network [OSTI]

Since the opening of European electricity markets, companies are launching green electricity products. In Switzerland the privately initiated eco-label naturemade star ensures the environmental and ecological quality of electricity from renewable energy sources on a local scale and from a life cycle perspective. For the life cycle perspective, a simplified and partly site-specific life cycle assessment (LCA) is applied using the Eco-indicator 99 (Hierachist perspective) impact assessment method. In a first step, detailed LCAs case studies are made for power plants and technologies that are candidates for the naturemade star label. They allow identifying technology-specific parameters that dominate the outcome of the LCA and for which data are available for the owner or operator of the power plant at issue. Based on this knowledge, key parameter models for photovoltaic, wind and hydroelectric power and electricity from biogas have been established on a spreadsheet-basis. With the help of the parameter models, operators of power plants can carry out the required LCA within a few hours. At the same time, they can check whether the plant fulfils the naturemade star threshold or not, which has been set to 50 % of the environmental impact of a gas combined cycle power plant. Within a few months since the introduction of the labelling scheme, companies successfully applied the parameter models on nearly 50 photovoltaic and on several hydroelectric power plants. LCA is, in combination with other tools, a useful method for the definition of standards for environmental labelling of green electricity.

unknown authors

344

Key Geomechanics Issues at the Waste Isolation Pilot Plant Geomechanics  

SciTech Connect (OSTI)

Mechanical and hydrological properties of rock salt provide excellent bases for geological isolation of hazardous materials. Regulatory compliance determinations for the Waste Isolation Pilot Plant (WIPP) stand as testament to the widely held conclusion that salt provides excellent isolation properties. The WIPP saga began in the 1950s when the U.S. National Academy of Sciences (NAS) recommended a salt vault as a promising solution to the national problem of nuclear waste disposal. For over 20 years, the Scientific basis for the NAS recommendation has been fortified by Sandia National Laboratories through a series of large scale field tests and laboratory investigations of salt properties. These scientific investigations helped develop a comprehensive understanding of salt's 4 reformational behavior over an applicable range of stresses and temperatures. Sophisticated constitutive modeling, validated through underground testing, provides the computational ability to model long-term behavior of repository configurations. In concert with advancement of the mechanical models, fluid flow measurements showed not only that the evaporite lithology was essentially impermeable but that the WIPP setting was hydrologically inactive. Favorable mechanical properties ensure isolation of materials placed in a salt geological setting. Key areas of the geomechanics investigations leading to the certification of WIPP are in situ experiments, laboratory tests, and shaft seal design.

HANSEN,FRANCIS D.

1999-09-01T23:59:59.000Z

345

Final Results from U.S. FCEV Learning Demonstration (Presentation)  

SciTech Connect (OSTI)

This presentation discusses the objectives of the U.S. DOE Fuel Cell Electric Vehicle Learning Demonstration Project, describes NREL's technology validation approach, and summarizes key technical results from the project.

Wipke, K.; Sprik, S.; Kurtz, J.; Ramsden, T.; Ainscough, C.; Saur, G.

2012-05-01T23:59:59.000Z

346

Lowest Engine-Out Emissions as the Key to the Future of the Heavy...  

Broader source: Energy.gov (indexed) [DOE]

Lowest Engine-Out Emissions as the Key to the Future of the Heavy-Duty Diesel Engine: New Development Rersults Lowest Engine-Out Emissions as the Key to the Future of the...

347

Data:Eac1dd3a-0268-4e5c-b1d1-ed9feeb2a12a | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Pagec-01b596aa1744b55997c1cc No revision hasa3e396ee3eb No revision hasa749-1d1f78c6b844Eabaed13-77fe-41c4-89ac-60a1c1f40cb4

348

Data:20304d9b-73d5-4907-8c78-9f26eb4fd0d1 | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of48d9ff47edf3 No revision5af6d400c2d No529a57c00c0 No revision9f51-3428f5d69a69 Nof26eb4fd0d1 No revision has

349

Data:22288681-0b93-441f-9f5b-acace650b3d1 | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of48d9ff47edf3 No revision5af6d400c2d No529a57c00c098f5e77d9 No revision hasc4a21a0d7463acace650b3d1 No revision

350

Data:2ad1c300-ab2f-44e7-8304-619654d1b533 | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of48d9ff47edf3 Noc7e1a8ffe No revision has beena2ac591a5e3d617bf7be1a0 No revisione40-66f40e809c8e654d1b533 No

351

Data:Bbeef77a-b845-40d1-97cd-d4b34db32d5e | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onb5-dcc1fcffd1f2 No revision has38865d08d442d74d244d9f062625d8Bbeef77a-b845-40d1-97cd-d4b34db32d5e No revision has been

352

Data:5b91c00f-bbe4-44e4-a46d-88920120b0d1 | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of48d9ff47edf3a87dcc95b3da-78f7ef0b79f6dbb-9d4f0845d4379-e4cca9d37856 No revisiona1eec5b358 No920120b0d1 No

353

Data:199ed2e2-98c3-44c6-8576-8ca8481d1a5d | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of48d9ff47edf3 No revision has beenba5b1d371fdc-b6c0-9cd6b0d70ef9b4eb15e81c7 No revisionc25660bb9481d1a5d No

354

Data:Cde245d1-8107-462e-8237-ab32cb64d3b1 | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onb5-dcc1fcffd1f2bb71-d4159a938742e80b26cc4 No revision5d06fb2b0ba NoCde245d1-8107-462e-8237-ab32cb64d3b1 No revision has

355

Data:Dea85d1e-cbf4-4b55-972e-1b3624677cc4 | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Pagec-01b596aa1744 NoDce066cd-9c07-4949-aa43-5e5007829464 No6d5-44057ee7338b No revisionDea85d1e-cbf4-4b55-972e-1b3624677cc4 No

356

Data:33d0bee5-5909-4744-9eec-a8d1fda59711 | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of48d9ff47edf3 Noc7e1a8ffe No869d7ced0c4aa77f45ad4a No revisionc-a48386b08d41 Nobee5-5909-4744-9eec-a8d1fda59711

357

Data:367db7c3-fb51-4cf3-997d-989d1bfe8a22 | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of48d9ff47edf3 Noc7e1a8ffe No869d7ced0c4aa77f45ad4ae-5b31d61e0d79193a29b0f907010bfa1 No revision has89d1bfe8a22

358

Evaluation of the effects of a highway improvement project on Key deer  

E-Print Network [OSTI]

assessed the potential impacts of the US 1 corridor project to Key deer movements by comparing (1) radio-collared Key deer annual ranges (2) radio-collared deer corridor movements, and (3) assessing Key deer underpass and corridor use. Female and male...

Braden, Anthony Wayne

2006-10-30T23:59:59.000Z

359

Weak-Key Analysis of POET Mohamed Ahmed Abdelraheem, Andrey Bogdanov, and Elmar Tischhauser  

E-Print Network [OSTI]

Weak-Key Analysis of POET Mohamed Ahmed Abdelraheem, Andrey Bogdanov, and Elmar Tischhauser,anbog,ewti}@dtu.dk Abstract. We evaluate the security of the recently proposed authenticated encryption scheme POET. We give explicit constructions for weak key classes not covered by POET's weak key testing strategy

360

Weakness of two ID-based remote mutual authentication with key agreement protocols for mobile devices  

E-Print Network [OSTI]

to achieve explicit key confirmation. We also point out Wu's scheme decreases efficiency by using the double by the traditional public-key cryptography (Rivest et al., 1978; ElGama, l985). The computation ability and battery the number of users is increased, KAC needs a large storage space to store users' public keys

Note: This page contains sample records for the topic "d1 key results" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Imnaha Subbasin Assessment May 2004259 1.2.10.3 Key Environmental Correlates  

E-Print Network [OSTI]

, such as roads, buildings, and pollution. Including these fine-scale attributes of an animal's environment whenImnaha Subbasin Assessment May 2004259 1.2.10.3 Key Environmental Correlates Key environmental conditions. Key environmental correlates are the finest scale features that help to define wildlife habitat

362

Origin of a complex key innovation in an obligate insectplant mutualism  

E-Print Network [OSTI]

Origin of a complex key innovation in an obligate insect­plant mutualism Olle Pellmyr* and Harald W, and approved January 30, 2002 (received for review November 2, 2001) Evolutionary key innovations give for studies of coevolution, and it relies on the key innovation in the moths of complex tentacles used

Krenn, Harald W.

363

Private Key Recovery Combination Attacks: On Extreme Fragility of Popular Bitcoin  

E-Print Network [OSTI]

Private Key Recovery Combination Attacks: On Extreme Fragility of Popular Bitcoin Key Management and practical operational security in bitcoin digital currency storage systems. We study the security two most used bitcoin HD Wallet key management solutions (e.g. in BIP032 and in earlier systems). These systems

364

Distribution and abundance of endangered Florida Key deer on outer islands  

E-Print Network [OSTI]

parameters has limited status assessment and management of Key deer on outer islands. Traditional survey techniques for Key deer on Big Pine and No Name keys include road-counts, strip-counts, and mark-recapture methods. However, practical limitations render...

Watts, Dominque Elijah

2007-04-25T23:59:59.000Z

365

A Key Technology Evaluation Case Study: Applying a New Middleware Architecture on the  

E-Print Network [OSTI]

A Key Technology Evaluation Case Study: Applying a New Middleware Architecture on the Enterprise, fgoedickejuzdung@informatik.uni-essen.de Abstract Decisions for key technologies, like middleware, for large scale projects are hard, because the impact and relevance of key technologies go beyond their core technological

Zdun, Uwe

366

A key factor to the spin parameter of uniformly rotating compact stars: crust structure  

E-Print Network [OSTI]

We study the key factor to determine the dimensionless spin parameter $j\\equiv cJ/(GM^2)$ of different kinds of uniformly rotating compact stars, including the traditional neutron stars, hyperonic neutron stars, and hybrid stars, and check the reliability of the results on various types of equations of state of dense matter. The equations of state from the relativistic mean field theory and the MIT bag model are adopted to simulate compact stars. Numerical calculations of rigidly rotating neutron stars are performed using the RNS code in the framework of general relativity by solving the Einstein equations for stationary axis-symmetric spacetime. The crust structure of compact stars is found to be a key factor to determine the maximum value of the spin parameter $j_{\\rm max}$. For the stars with inclusion of the crust, $j_{\\rm max}\\sim 0.7$ is sustained for various kinds of compact stars with $M>0.5 M_{\\odot}$, and is found to be insensitive to the mass of star and selected equations of state. For the traditi...

Qi, B; Sun, B Y; Wang, S Y; Gao, J H

2014-01-01T23:59:59.000Z

367

Passive faraday mirror attack in practical two-way quantum key distribution system  

E-Print Network [OSTI]

The faraday mirror (FM) plays a very important role in maintaining the stability of two way plug-and-play quantum key distribution (QKD) system. However, the practical FM is imperfect, which will not only introduce additional quantum bit error rate (QBER) but also leave a loophole for Eve to spy the secret key. In this paper, we propose a passive faraday mirror attack in two way QKD system based on the imperfection of FM. Our analysis shows that, if the FM is imperfect, the dimension of Hilbert space spanned by the four states sent by Alice is three instead of two. Thus Eve can distinguish these states with a set of POVM operators belonging to three dimension space, which will reduce the QBER induced by her attack. Furthermore, a relationship between the degree of the imperfection of FM and the transmittance of the practical QKD system is obtained. The results show that, the probability that Eve loads her attack successfully depends on the degree of the imperfection of FM rapidly, but the QBER induced by Eve's attack changes with the degree of the imperfection of FM slightly.

Shi-Hai Sun; Mu-Sheng Jiang; Lin-Mei Liang

2012-03-04T23:59:59.000Z

368

Passive Faraday-mirror attack in a practical two-way quantum-key-distribution system  

SciTech Connect (OSTI)

The Faraday mirror (FM) plays a very important role in maintaining the stability of two-way plug-and-play quantum key distribution (QKD) systems. However, the practical FM is imperfect, which will not only introduce an additional quantum bit error rate (QBER) but also leave a loophole for Eve to spy the secret key. In this paper we propose a passive Faraday mirror attack in two-way QKD system based on the imperfection of FM. Our analysis shows that if the FM is imperfect, the dimension of Hilbert space spanned by the four states sent by Alice is three instead of two. Thus Eve can distinguish these states with a set of Positive Operator Valued Measure (POVM) operators belonging to three-dimension space, which will reduce the QBER induced by her attack. Furthermore, a relationship between the degree of the imperfection of FM and the transmittance of the practical QKD system is obtained. The results show that the probability that Eve loads her attack successfully depends on the degree of the imperfection of FM rapidly, but the QBER induced by Eve's attack changes slightly with the degree of the FM imperfection.

Sun Shihai; Jiang Musheng; Liang Linmei [Department of Physics, National University of Defense Technology, Changsha 410073 (China)

2011-06-15T23:59:59.000Z

369

Passive sources for the Bennett-Brassard 1984 quantum key distribution protocol with practical signals  

E-Print Network [OSTI]

Most experimental realizations of quantum key distribution are based on the Bennett-Brassard 1984 (so-called BB84) protocol. In a typical optical implementation of this scheme, the sender uses an active source to produce the required BB84 signal states. While active state preparation of BB84 signals is a simple and elegant solution in principle, in practice passive state preparation might be desirable in some scenarios, for instance, in those experimental setups operating at high transmission rates. Passive schemes might also be more robust against side-channel attacks than active sources. Typical passive devices involve parametric down-conversion. In this paper, we show that both coherent light and practical single photon sources are also suitable for passive generation of BB84 signal states. Our method does not require any external-driven element, but only linear optical components and photodetectors. In the case of coherent light, the resulting key rate is similar to the one delivered by an active source. When the sender uses practical single photon sources, however, the distance covered by a passive transmitter might be longer than the one of an active configuration.

Marcos Curty; Xiongfeng Ma; Hoi-Kwong Lo; Norbert Ltkenhaus

2010-09-20T23:59:59.000Z

370

Breakeven Cost for Residential Photovoltaics in the United States: Key Drivers and Sensitivities (Report Summary) (Presentation)  

SciTech Connect (OSTI)

"Break-even cost" for photovoltaic (PV) technology is defined as the point where the cost of PV-generated electricity equals the cost of electricity purchased from the grid. Break-even cost is expressed in $/W of an installed system. Achieving break-even cost is a function of many variables. Consequently, break-even costs vary by location and time for a country, such as the United States, with a diverse set of resources, electricity prices, and other variables. In this presentation, we introduce an analysis of PV break-even costs for residential customers in the United States, including an evaluation of some of the key drivers of PV breakeven both regionally and over time. This presentation includes our methodology and presents results for both near-term residential breakeven costs(2009) and future market sensitivities of break-even costs (2015). See also the the report "Break-Even Cost for Residential Photovoltaics in the United States: Key Drivers and Sensitivities". Presentation for NREL/TP-6A2-45991.

Denholm, P.; Margolis, R. M.; Ong, S.; Roberts, B.

2009-12-01T23:59:59.000Z

371

E-Print Network 3.0 - aiaa atmospheric flight Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

search results for: aiaa atmospheric flight Page: << < 1 2 3 4 5 > >> 1 Simulation Architecture Development of a Distributed Summary: , & Valasek 2008 - AIAA - MST Software Key...

372

Secure Cryptographic Key Management System (CKMS) Considerations for Smart Grid Devices  

SciTech Connect (OSTI)

In this paper, we examine some unique challenges associated with key management in the Smart Grid and concomitant research initiatives: 1) effectively model security requirements and their implementations, and 2) manage keys and key distribution for very large scale deployments such as Smart Meters over a long period of performance. This will set the stage to: 3) develop innovative, low cost methods to protect keying material, and 4) provide high assurance authentication services. We will present our perspective on key management and will discuss some key issues within the life cycle of a cryptographic key designed to achieve the following: 1) control systems designed, installed, operated, and maintained to survive an intentional cyber assault with no loss of critical function, and 2) widespread implementation of methods for secure communication between remote access devices and control centers that are scalable and cost-effective to deploy.

Abercrombie, Robert K [ORNL] [ORNL; Sheldon, Frederick T [ORNL] [ORNL; Aldridge, Hal [ORNL] [ORNL; Duren, Mike [Sypris Electronics, LLC] [Sypris Electronics, LLC; Ricci, Tracy [Sypris Electronics, LLC] [Sypris Electronics, LLC; Bertino, Elisa [ORNL] [ORNL; Kulatunga, Athula [Purdue University] [Purdue University; Navaratne, Uditha Sudheera [Purdue University] [Purdue University

2011-01-01T23:59:59.000Z

373

Energy Audits: The Key to Performance Contracting Projects  

E-Print Network [OSTI]

The term "Performance Contracting" relates to projects where the performance of various energy conservation retrofits result in eavings that exceed the implementation cost of the entire project when financed over a fixed term. Such projects minimize...

Tharoor, M.

1994-01-01T23:59:59.000Z

374

Sequential Attack with Intensity Modulation on the Differential-Phase-Shift Quantum Key Distribution Protocol  

E-Print Network [OSTI]

In this paper, we discuss the security of the differential-phase-shift quantum key distribution (DPSQKD) protocol by introducing an improved version of the so-called sequential attack, which was originally discussed by Waks et al. Our attack differs from the original form of the sequential attack in that the attacker Eve modulates not only the phases but also the amplitude in the superposition of the single-photon states which she sends to the receiver. Concentrating especially on the "discretized gaussian" intensity modulation, we show that our attack is more effective than the individual attack, which had been the best attack up to present. As a result of this, the recent experiment with communication distance of 100km reported by Diamanti et al. turns out to be insecure. Moreover it can be shown that in a practical experimental setup which is commonly used today, the communication distance achievable by the DPSQKD protocol is less than 95km.

Toyohiro Tsurumaru

2006-12-25T23:59:59.000Z

375

Risk analysis of Trojan-horse attacks on practical quantum key distribution systems  

E-Print Network [OSTI]

An eavesdropper Eve may probe a quantum key distribution (QKD) system by sending a bright pulse from the quantum channel into the system and analyzing the back-reflected pulses. Such Trojan-horse attacks can breach the security of the QKD system if appropriate safeguards are not installed or if they can be fooled by Eve. We present a risk analysis of such attacks based on extensive spectral measurements, such as transmittance, reflectivity, and detection sensitivity of some critical components used in typical QKD systems. Our results indicate the existence of wavelength regimes where the attacker gains considerable advantage as compared to launching an attack at 1550 nm. We also propose countermeasures to reduce the risk of such attacks.

Nitin Jain; Birgit Stiller; Imran Khan; Vadim Makarov; Christoph Marquardt; Gerd Leuchs

2014-12-19T23:59:59.000Z

376

LEAST-SQUARES METHODS FOR LINEAR ELASTICITY Key words ...  

E-Print Network [OSTI]

resulting algebraic equations can be efficiently solved by standard multigrid methods. or preconditioned by well-known .... symmetry of the stress stems from the conservation of angular momentum. ... the energy norm is equivalent to the H1 norm for a fixed ?. .... Since the minimum of the quadratic functional G(?, u ; f) is zero,.

377

Analyzing Porosity using Petrographic Imaging Methods: Key for Petrophysics  

E-Print Network [OSTI]

. Recrystallization with the filling of void space and growth of calcite and dolomite crystals is also shown in numerous images. Images under Choquette and Prays carbonate porosity classification system are dominated by non-fabric selective vuggy porosity... Archies Equation ................................................................................................. 20 III RESULTS ............................................................................................................. 24...

Mcdaniel, Kathleen

2013-09-25T23:59:59.000Z

378

BURNING PLASMA NEXT STEPS: DISCUSSION OF KEY DEVELOPMENTS  

E-Print Network [OSTI]

, and boundary physics in the regime of dominant self-heating. ­ TECHNOLOGY · 2. Plasma support technologies (heating, fuel delivery, exhaust, plasma- facing components, and magnets) will benefit most because technologies (remote handling, vacuum vessel, blankets, safety and materials) will advance as a result

379

Secure multi-party communication with quantum key distribution managed by trusted authority  

DOE Patents [OSTI]

Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD are extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.

Nordholt, Jane Elizabeth; Hughes, Richard John; Peterson, Charles Glen

2013-07-09T23:59:59.000Z

380

Daylight operation of a free space, entanglement-based quantum key distribution system  

E-Print Network [OSTI]

Many quantum key distribution (QKD) implementations using a free space transmission path are restricted to operation at night time in order to distinguish the signal photons used for a secure key establishment from background light. Here, we present a lean entanglement-based QKD system overcoming that imitation. By implementing spectral, spatial and temporal filtering techniques, we were able to establish a secure key continuously over several days under varying light and weather conditions.

Peloso, Matthew P; Ho, Caleb; Lamas-Linares, Antia; Kurtsiefer, Christian

2008-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "d1 key results" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Daylight operation of a free space, entanglement-based quantum key distribution system  

E-Print Network [OSTI]

Many quantum key distribution (QKD) implementations using a free space transmission path are restricted to operation at night time in order to distinguish the signal photons used for a secure key establishment from background light. Here, we present a lean entanglement-based QKD system overcoming that imitation. By implementing spectral, spatial and temporal filtering techniques, we were able to establish a secure key continuously over several days under varying light and weather conditions.

Matthew P. Peloso; Ilja Gerhardt; Caleb Ho; Antia Lamas-Linares; Christian Kurtsiefer

2008-12-10T23:59:59.000Z

382

Framework for Identifying Key Environmental Concerns in Marine Renewable Energy Projects- Appendices  

SciTech Connect (OSTI)

Marine wave and tidal energy technology could interact with marine resources in ways that are not well understood. As wave and tidal energy conversion projects are planned, tested, and deployed, a wide range of stakeholders will be engaged; these include developers, state and federal regulatory agencies, environmental groups, tribal governments, recreational and commercial fishermen, and local communities. Identifying stakeholders environmental concerns in the early stages of the industrys development will help developers address and minimize potential environmental effects. Identifying important concerns will also assist with streamlining siting and associated permitting processes, which are considered key hurdles by the industry in the U.S. today. In September 2008, RE Vision consulting, LLC was selected by the Department of Energy (DoE) to conduct a scenario-based evaluation of emerging hydrokinetic technologies. The purpose of this evaluation is to identify and characterize environmental impacts that are likely to occur, demonstrate a process for analyzing these impacts, identify the key environmental concerns for each scenario, identify areas of uncertainty, and describe studies that could address that uncertainty. This process is intended to provide an objective and transparent tool to assist in decision-making for siting and selection of technology for wave and tidal energy development. RE Vision worked with H. T. Harvey & Associates, to develop a framework for identifying key environmental concerns with marine renewable technology. This report describes the results of this study. This framework was applied to varying wave and tidal power conversion technologies, scales, and locations. The following wave and tidal energy scenarios were considered: ? 4 wave energy generation technologies ? 3 tidal energy generation technologies ? 3 sites: Humboldt coast, California (wave); Makapuu Point, Oahu, Hawaii (wave); and the Tacoma Narrows, Washington (tidal) ? 3 project sizes: pilot, small commercial, and large commercial The possible combinations total 24 wave technology scenarios and 9 tidal technology scenarios. We evaluated 3 of the 33 scenarios in detail: 1. A small commercial OPT Power Buoy project off the Humboldt County, California coast 2. A small commercial Pelamis Wave Power P-2 project off Makapuu Point, Oahu, Hawaii 3. A pilot MCT SeaGen tidal project, sited in the Tacoma Narrows, Washington This framework document used information available from permitting documents that were written to support actual wave or tidal energy projects, but the results obtained here should not be confused with those of the permitting documents1. The main difference between this framework document and permitting documents of currently proposed pilot projects is that this framework identifies key environmental concerns and describes the next steps in addressing those concerns; permitting documents must identify effects, find or declare thresholds of significance, evaluate the effects against the thresholds, and find mitigation measures that will minimize or avoid the effects so they can be considered less-than-significant. Two methodologies, 1) an environmental effects analysis and 2) Raptools, were developed and tested to identify potential environmental effects associated with wave or tidal energy conversion projects. For the environmental effects analysis, we developed a framework based on standard risk assessment techniques. The framework was applied to the three scenarios listed above. The environmental effects analysis addressed questions such as: ? What is the temporal and spatial exposure of a species at a site? ? What are the specific potential project effects on that species? ? What measures could minimize, mitigate, or eliminate negative effects? ? Are there potential effects of the project, or species response to the effect, that are highly uncertain and warrant additional study? The second methodology, Raptools, is a collaborative approach useful for evaluating multiple characteristi

Sharon Kramer; Mirko Previsic; Peter Nelson; Sheri Woo

2010-06-17T23:59:59.000Z

383

Modeling Metal Fatigue As a Key Step in PV Module Life Time Prediction (Presentation)  

SciTech Connect (OSTI)

This presentation covers modeling metal fatigue as a key step in photovoltaic (PV) module lifetime predictions. Described are time-dependent and time-independent case studies.

Bosco, N.

2012-02-01T23:59:59.000Z

384

Your biodiversity in my backyard : key local stakeholders' perceptions of biodiversity conservation in Gorontalo, Indonesia.  

E-Print Network [OSTI]

??The establishment of protected areas (PAs) has been the key national strategy in biodiversity conservation, through preserving the unique wildlife and ecosystems in Indonesia. As (more)

Kartikasari, Sri Nurani

2008-01-01T23:59:59.000Z

385

Target Selection for the LBTI Exozodi Key Science Program  

E-Print Network [OSTI]

The Hunt for Observable Signatures of Terrestrial planetary Systems (HOSTS) on the Large Binocular Telescope Interferometer will survey nearby stars for faint emission arising from ~300 K dust (exozodiacal dust), and aims to determine the exozodiacal dust luminosity function. HOSTS results will enable planning for future space telescopes aimed at direct spectroscopy of habitable zone terrestrial planets, as well as greater understanding of the evolution of exozodiacal disks and planetary systems. We lay out here the considerations that lead to the final HOSTS target list. Our target selection strategy maximizes the ability of the survey to constrain the exozodi luminosity function by selecting a combination of stars selected for suitability as targets of future missions and as sensitive exozodi probes. With a survey of approximately 50 stars, we show that HOSTS can enable an understanding of the statistical distribution of warm dust around various types of stars and is robust to the effects of varying levels ...

Weinberger, Alycia J; Kennedy, Grant M; Roberge, Aki; Defrre, Denis; Hinz, Philip M; Millan-Gabet, Rafael; Rieke, George; Bailey, Vanessa P; Danchi, William C; Haniff, Chris; Mennesson, Bertrand; Serabyn, Eugene; Skemer, Andrew J; Stapelfeldt, Karl R; Wyatt, Mark C

2015-01-01T23:59:59.000Z

386

Epimorphin Functions as a Key Morphoregulator for Mammary Epithelial Cells  

SciTech Connect (OSTI)

Hepatocyte growth factor (HGF) and EGF have been reported to promote branching morphogenesis of mammary epithelial cells. We now show that it is epimorphin that is primarily responsible for this phenomenon. In vivo, epimorphin was detected in the stromal compartment but not in lumenal epithelial cells of the mammary gland; in culture, however, a subpopulation of mammary epithelial cells produced significant amounts of epimorphin. When epimorphin-expressing epithelial cell clones were cultured in collagen gels they displayed branching morphogenesis in the presence of HGF, EGF, keratinocyte growth factor, or fibroblast growth factor, a process that was inhibited by anti-epimorphin but not anti-HGF antibodies. The branch length, however, was roughly proportional to the ability of the factors to induce growth. Accordingly, epimorphin-negative epithelial cells simply grew in a cluster in response to the growth factors and failed to branch. When recombinant epimorphin was added to these collagen gels, epimorphin-negative cells underwent branching morphogenesis. The mode of action of epimorphin on morphogenesis of the gland, however, was dependent on how it was presented to the mammary cells. If epimorphin was overexpressed in epimorphin-negative epithelial cells under regulation of an inducible promoter or was allowed to coat the surface of each epithelial cell in a nonpolar fashion, the cells formed globular, alveoli-like structures with a large central lumen instead of branching ducts. This process was enhanced also by addition of HGF, EGF, or other growth factors and was inhibited by epimorphin antibodies. These results suggest that epimorphin is the primary morphogen in the mammary gland but that growth factors are necessary to achieve the appropriate cell numbers for the resulting morphogenesis to be visualized.

Hirai, H.; Lochter, A.; Galosy, S.; Koshida, S.; Niwa, S.; Bissell, M.J.

1997-10-13T23:59:59.000Z

387

Tulenovo field holds key to new drilling in Bulgaria  

SciTech Connect (OSTI)

Tulenovo oil field is located on the Bulgarian Black Sea coast, 60 km northeast of the port of Varna and 25 km south of the Romanian border. The accumulation, second largest in Bulgaria, has several unusual technical features: shallow depth ({+-}350 m); cavernous porosity, giving excellent reservoir quality, oil recovery, and production flow rates; an effective chalk seal; controversial and unproven source rock; a secondary gas cap; and extensive well coverage yielding detailed reservoir data. The field`s gas cap is reported to contain 94% methane and > 5% nitrogen. The gas is not in equilibrium with the underlying oil and is interpreted to represent a secondary feature resulting from more recent thermal or biogenic gas generation. Carbon isotope analysis of the gas is not available to resolve this matter. The most likely source of the gas is the fore-deep to the Balkan mountains (the Kamchia depression), located south of the field. The paper describes the reservoir, its seal, oil and gas characteristics, structure, production performance, and development plans.

Bottomley, S.; Pritchard, G. [Balkan Explorers (Bulgaria) Ltd., London (United Kingdom)

1998-03-02T23:59:59.000Z

388

Keys to success: Ten case studies of effective weatherization programs  

SciTech Connect (OSTI)

In 1990, DOE initiated a nationwide evaluation of its Weatherization Program, with assistance from Oak Ridge National Laboratory and an advisory group of 40 weatherization professionals, program managers, and researchers. The evaluation is comprised of three impact studies covering the Program`s major market segments: Single-family homes, mobile homes, and dwellings in small (2 to 4-unit) multifamily buildings (the Single-Family Study), Single-family homes heated primarily with fuel oil (the Fuel-Oil Study), and Dwellings in buildings with five or more units (the Multifamily Study). The Single-Family Study, the subject of this report, is a critical part of this coordinated evaluation effort. Its focus on single-family dwellings, mobile homes, and dwellings in small multifamily buildings covers 83% of the income-eligible population and 96% of the dwellings weatherized during Program Year 1989. The first phase of the Single-Family Study involved the analysis of a massive data base of information collected from 368 local weatherization agencies and 543 electric and gas utilities. This analysis resulted in energy-saving and cost-effectiveness estimates for the Weatherization Program and the identification of a set of ten high-performing agencies located throughout the country. The second phase, which is the subject of this report, involves a ``process`` evaluation of these ten high performers, aimed at identifying those weatherization practices that explain their documented success.

Brown, M.A.; Berry, L.G.; Kolb, J.O.; White, D.L. [Oak Ridge National Lab., TN (United States); Kinney, L.F.; Wilson, T. [Synertech Systems Corp., Syracuse, NY (United States)

1993-11-01T23:59:59.000Z

389

Key Distillation and the Secret-Bit Fraction  

E-Print Network [OSTI]

We consider distillation of secret bits from partially secret noisy correlations P_ABE, shared between two honest parties and an eavesdropper. The most studied distillation scenario consists of joint operations on a large number of copies of the distribution (P_ABE)^N, assisted with public communication. Here we consider distillation with only one copy of the distribution, and instead of rates, the 'quality' of the distilled secret bits is optimized, where the 'quality' is quantified by the secret-bit fraction of the result. The secret-bit fraction of a binary distribution is the proportion which constitutes a secret bit between Alice and Bob. With local operations and public communication the maximal extractable secret-bit fraction from a distribution P_ABE is found, and is denoted by Lambda[P_ABE]. This quantity is shown to be nonincreasing under local operations and public communication, and nondecreasing under eavesdropper's local operations: it is a secrecy monotone. It is shown that if Lambda[P_ABE]>1/2 then P_ABE is distillable, thus providing a sufficient condition for distillability. A simple expression for Lambda[P_ABE] is found when the eavesdropper is decoupled, and when the honest parties' information is binary and the local operations are reversible. Intriguingly, for general distributions the (optimal) operation requires local degradation of the data.

Nick S. Jones; Lluis Masanes

2008-05-12T23:59:59.000Z

390

The key to minimizing minesite versus utility laboratory analyses on Powder River Basin coals  

SciTech Connect (OSTI)

Powder River Basin (PRB) coals are continuing to expand their areas of use into regions previously reserved for higher ranked coals. PRB coals are subbituminous by rank. Inherent moisture values of 25 to 30 percent are the norm. PRB coals, being lower rank in nature, also tend to oxidize very easily. These factors combined produce a coal which can cause analysis problems for laboratories unaccustomed to PRB coals. In fact, even laboratories that deal with this type of coal on a daily basis can experience analytical difficulties. Special care needs to be taken by both minesite laboratory and the utility laboratory to ensure accurate analyses. Cooperation between both parties is the key to reproducible analyses. Only by working together can parties fully analyze the situation and develop analytical methods acceptable to both. This paper will describe the methods employed by the Caballo Rojo Mine (CRM) and the Georgia Power Company (GPC) to resolve laboratory analysis differences found during shipments by CRM to GPC beginning in 1994. The following topics are discussed: initial comparative results, analytical investigations, the cooperative process, recent comparative results, and conclusions.

Rexin, M.G.

1995-08-01T23:59:59.000Z

391

Major Long Haul Truck Idling Generators in Key States ELECTRIC POWER RESEARCH INSTITUTE  

E-Print Network [OSTI]

Major Long Haul Truck Idling Generators in Key States 1013776 #12;#12;ELECTRIC POWER RESEARCH-0813 USA 800.313.3774 650.855.2121 askepri@epri.com www.epri.com Major Long Haul Truck Idling Generators Haul Truck Idling Generators in Key States. EPRI, Palo Alto, CA: 2008. 1013776. #12;#12;v PRODUCT

392

The Continental Margin is a Key Source of Iron to the HNLC North Pacific Ocean  

E-Print Network [OSTI]

The Continental Margin is a Key Source of Iron to the HNLC North Pacific Ocean Phoebe J. Lam1 concentrations in the upper 500m of the Western Subarctic Pacific, an iron-limited High Nutrient Low Chlorophyll a key source of bioavailable Fe to the HNLC North Pacific. Keywords: iron, continental margin, HNLC 1

393

A Trustful Authentication and Key Exchange Scheme (TAKES) for Ad Hoc Networks  

E-Print Network [OSTI]

A Trustful Authentication and Key Exchange Scheme (TAKES) for Ad Hoc Networks Tony Cheneau National public key distribution scheme adapted to ad hoc networks called TAKES for Trustful Authentication, or even implementing a light naming system can be enabled on top of ad hoc networks. TAKES is formally

Paris-Sud XI, Université de

394

Granite Recrystallization The Key to an Alternative Strategy for HLW Disposal? Fergus G.F. Gibb  

E-Print Network [OSTI]

Granite Recrystallization ­ The Key to an Alternative Strategy for HLW Disposal? Fergus G.F. Gibb, and hence the key to the entire strategy, depends on whether sufficient melting of granite host rock can-temperature, high-pressure experiments reported here demonstrate that granite can be partially melted and completely

Sheffield, University of

395

A Single-Key Attack on 6-Round KASUMI Teruo Saito1  

E-Print Network [OSTI]

A Single-Key Attack on 6-Round KASUMI Teruo Saito1 NEC Software Hokuriku, Ltd. 1, Anyoji, Hakusan. In 2010, a related-key attack on full KASUMI was reported. The attack was very powerful and worked in practical complexity. However the attack was not a direct threat to full KASUMI because of the impractical

396

Band structures Optical absorption Summary Key concepts in Density Functional Theory (II)  

E-Print Network [OSTI]

Band structures Optical absorption Summary Key concepts in Density Functional Theory (II) Kohn, Belfast Key concepts in Density Functional Theory (II) Silvana Botti #12;Band structures Optical in Density Functional Theory (II) Silvana Botti #12;Band structures Optical absorption Summary Outline 1 From

Botti, Silvana

397

An efficient certificateless two-party authenticated key agreement scheme from  

E-Print Network [OSTI]

-based cryptography. Key agreement(KA) schemes are designed to provide secure communications between two or more proposed. However, these schemes need to compute at least one pairing on-line. In order to improve to finished the key agreement. Our scheme's overhead is lower than that of previous schemes [3

398

Modified Bennett-Brassard 1984 Quantum Key Distribution With Two-way Classical Communications  

E-Print Network [OSTI]

The quantum key distribution protocol without public announcement of bases is equipped with a two-way classical communication symmetric entanglement purification protocol. This modified key distribution protocol is unconditionally secure and has a higher tolerable error rate of 20%, which is higher than previous scheme without public announcement of bases.

Kai Wen; Gui Lu Long

2005-08-27T23:59:59.000Z

399

Linkages between coastal runoff and the Florida Keys ecosystem: A study of a dark plume event  

E-Print Network [OSTI]

of a dark water plume from near Charlotte Harbor, Florida, to the Dry Tortugas in the Florida Keys in mid, respectively. The dark color became increasingly dominated by colored dissolved organic matter, toward the DryLinkages between coastal runoff and the Florida Keys ecosystem: A study of a dark plume event

400

Public Key Encryption that Allows PIR Queries Dan Boneh # Eyal Kushilevitz + Rafail Ostrovsky #  

E-Print Network [OSTI]

Public Key Encryption that Allows PIR Queries Dan Boneh # Eyal Kushilevitz + Rafail Ostrovsky a public­key encryption scheme for Alice that allows PIR searching over encrypted documents. Our solution­trivially small communication complexity. The main technique of our solution also allows for Single­Database PIR

Note: This page contains sample records for the topic "d1 key results" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Energy Efficiency of Symmetric Key Cryptographic Algorithms in Wireless Sensor Networks  

E-Print Network [OSTI]

Energy Efficiency of Symmetric Key Cryptographic Algorithms in Wireless Sensor Networks Xueying-- In this paper, we examine the energy efficiency of symmetric key cryptographic algorithms applied in wireless energy efficiency with a level of security suitable for wireless sensor networks. Keywords - wireless

Heys, Howard

402

A Method for Obtaining Digital Signatures and PublicKey Cryptosystems  

E-Print Network [OSTI]

re vealing an encryption key does not thereby reveal the corresponding decryption key. This has two, or the entire work requires specific permission as does republication, or systematic or multiple reproduction . Formally, D(E(M) = M: (1) (b) Both E and D are easy to compute. (c) By publicly revealing E the user does

Goldwasser, Shafi

403

Direct quadrature phase shift keying modulator using six-port technology  

E-Print Network [OSTI]

Direct quadrature phase shift keying modulator using six-port technology Y. Zhao, C. Viereck, J.F. Frigon, R.G. Bosisio and K. Wu A direct quadrature phase shift keying modulator based on six-port technology is presented. The modulator comprises a six-port circuit, a switch matrix and open and short

Frigon, Jean-François

404

Final Hazard Categorization for the Remediation of the 118-D-1, 118-D-2, 118-D-3, 118-H-1, 118-H-2 and 118-H-3 Solid Waste Burial Grounds  

SciTech Connect (OSTI)

This report presents the final hazard categorization for the remediation of the 118-D-1, 118-D-2, and 118-D-3 Burial Grounds located within the 100-D/DR Area of the Hanford Site and the 118-H-1, 118-H-2, and 118-H-3 Burial Grounds located within the 100-H Area of the Hanford Site.

K. L. Vialetti

2008-05-20T23:59:59.000Z

405

Final Hazard Categorization for the Remediation of the 118-D-1, 118-D-2, 118-D-3, 118-H-1, 118-H-2, and 118-H-3 Solid Waste Burial Grounds  

SciTech Connect (OSTI)

This report presents the final hazard categorization (FHC) for the remediation of the 118-D-1, 118-D-2, and 118-D-3 Burial Grounds located within the 100-D/DR Area of the Hanford Site and the 118-H-1, 118-H-2, and 118-H-3 Burial Grounds located within the 100-H Area of the Hanford Site.

T. J. Rodovsky

2007-04-12T23:59:59.000Z

406

Final Hazard Categorization for the Remediation of the 118-D-1, 118-D-2, 118-D-3, 118-H-1, 118-H-2, and 118-H-3 Solid Waste Burial Grounds  

SciTech Connect (OSTI)

This report presents the final hazard categorization (FHC) for the remediation of the 118-D-1, 118-D-2, and 118-D-3 Burial Grounds located within the 100-D/DR Area of the Hanford Site and the 118-H-1, 118-H-2, and 118-H-3 Burial Grounds located within the 100-H Area of the Hanford Site.

T. J. Rodovsky

2006-12-06T23:59:59.000Z

407

Conversion of Human Steroid 5[beta]-Reductase (AKR1D1) into 3[beta]-Hydroxysteroid Dehydrogenase by Single Point Mutation E120H: Example of Perfect Enzyme Engineering  

SciTech Connect (OSTI)

Human aldo-keto reductase 1D1 (AKR1D1) and AKR1C enzymes are essential for bile acid biosynthesis and steroid hormone metabolism. AKR1D1 catalyzes the 5{beta}-reduction of {Delta}{sup 4}-3-ketosteroids, whereas AKR1C enzymes are hydroxysteroid dehydrogenases (HSDs). These enzymes share high sequence identity and catalyze 4-pro-(R)-hydride transfer from NADPH to an electrophilic carbon but differ in that one residue in the conserved AKR catalytic tetrad, His120 (AKR1D1 numbering), is substituted by a glutamate in AKR1D1. We find that the AKR1D1 E120H mutant abolishes 5{beta}-reductase activity and introduces HSD activity. However, the E120H mutant unexpectedly favors dihydrosteroids with the 5{alpha}-configuration and, unlike most of the AKR1C enzymes, shows a dominant stereochemical preference to act as a 3{beta}-HSD as opposed to a 3{alpha}-HSD. The catalytic efficiency achieved for 3{beta}-HSD activity is higher than that observed for any AKR to date. High resolution crystal structures of the E120H mutant in complex with epiandrosterone, 5{beta}-dihydrotestosterone, and {Delta}{sup 4}-androstene-3,17-dione elucidated the structural basis for this functional change. The glutamate-histidine substitution prevents a 3-ketosteroid from penetrating the active site so that hydride transfer is directed toward the C3 carbonyl group rather than the {Delta}{sup 4}-double bond and confers 3{beta}-HSD activity on the 5{beta}-reductase. Structures indicate that stereospecificity of HSD activity is achieved because the steroid flips over to present its {alpha}-face to the A-face of NADPH. This is in contrast to the AKR1C enzymes, which can invert stereochemistry when the steroid swings across the binding pocket. These studies show how a single point mutation in AKR1D1 can introduce HSD activity with unexpected configurational and stereochemical preference.

Chen, Mo; Drury, Jason E.; Christianson, David W.; Penning, Trevor M. (UPENN)

2012-10-10T23:59:59.000Z

408

Structured Codes Improve the Bennett-Brassard-84 Quantum Key Rate  

E-Print Network [OSTI]

A central goal in information theory and cryptography is finding simple characterizations of optimal communication rates subject to various restrictions and security requirements. Ideally, the optimal key rate for a quantum key distribution (QKD) protocol would be given by {\\em single-letter formula} involving a simple optimization over a single use of an effective channel. We explore the possibility of such a formula for one of the simplest and most widely used QKD protocols--Bennett-Brassard-84 (BB84) with one way classical post-processing. We show that a conjectured single-letter key-rate formula is false, uncovering a deep ignorance about asymptotically good private codes and pointing towards unfortunate complications in the theory of QKD. These complications are not without benefit--with added complexity comes better key rates than previously thought possible. We improve the threshold for secure key generation from a bit error rate of 0.124 to 0.129.

Graeme Smith; Joseph M. Renes; John A. Smolin

2008-04-28T23:59:59.000Z

409

Correction of beam wander for a free-space quantum key distribution system operating in urban environment  

E-Print Network [OSTI]

Free-space quantum key distribution links in urban environment have demanding operating needs, such as functioning in daylight and under atmospheric turbulence, which can dramatically impact their performance. Both effects are usually mitigated with a careful design of the field of view of the receiver. However, a trade-off is often required, since a narrow field of view improves background noise rejection but it is linked to an increase in turbulence-related losses. In this paper, we present a high-speed automatic tracking system to overcome these limitations. Both a reduction in the field-of-view to decrease the background noise and the mitigation of the losses caused by atmospheric turbulence are addressed. Two different designs are presented and discussed, along with technical considerations for the experimental implementation. Finally, preliminary experimental results of beam wander correction are used to estimate the potential improvement of both the quantum bit error rate and secret key rate of a free space quantum key distribution system.

Alberto Carrasco-Casado; Natalia Denisenko; Veronica Fernandez

2014-11-13T23:59:59.000Z

410

Phase-remapping attack in practical quantum-key-distribution systems  

SciTech Connect (OSTI)

Quantum key distribution (QKD) can be used to generate secret keys between two distant parties. Even though QKD has been proven unconditionally secure against eavesdroppers with unlimited computation power, practical implementations of QKD may contain loopholes that may lead to the generated secret keys being compromised. In this paper, we propose a phase-remapping attack targeting two practical bidirectional QKD systems (the 'plug-and-play' system and the Sagnac system). We showed that if the users of the systems are unaware of our attack, the final key shared between them can be compromised in some situations. Specifically, we showed that, in the case of the Bennett-Brassard 1984 (BB84) protocol with ideal single-photon sources, when the quantum bit error rate (QBER) is between 14.6% and 20%, our attack renders the final key insecure, whereas the same range of QBER values has been proved secure if the two users are unaware of our attack; also, we demonstrated three situations with realistic devices where positive key rates are obtained without the consideration of Trojan horse attacks but in fact no key can be distilled. We remark that our attack is feasible with only current technology. Therefore, it is very important to be aware of our attack in order to ensure absolute security. In finding our attack, we minimize the QBER over individual measurements described by a general POVM, which has some similarity with the standard quantum state discrimination problem.

Fung, Chi-Hang Fred; Qi, Bing; Lo, Hoi-Kwong [Center for Quantum Information and Quantum Control, Department of Electrical and Computer Engineering and Department of Physics, University of Toronto, Toronto, Ontario (Canada); Tamaki, Kiyoshi [NTT Basic Research Laboratories, NTT Corporation, 3-1, Morinosato Wakamiya Atsugi-Shi, Kanagawa 243-0198, Japan and CREST, JST Agency, 4-1-8 Honcho, Kawaguchi, Saitama 332-0012 (Japan)

2007-03-15T23:59:59.000Z

411

Security analysis of the decoy method with the Bennett-Brassard 1984 protocol for finite key lengths  

E-Print Network [OSTI]

This paper provides a formula for the sacrifice bit-length for privacy amplification with the Bennett-Brassard 1984 protocol for finite key lengths when we employ the decoy method. Using the formula, we can guarantee the security parameter for realizable quantum key distribution system. The key generation rates with finite key lengths are numerically evaluated. The proposed method improves the existing key generation rate even in the asymptotic setting.

Masahito Hayashi; Ryota Nakayama

2013-11-19T23:59:59.000Z

412

Quantum key distribution over 25 km with an all-fiber continuous-variable system  

E-Print Network [OSTI]

We report on the implementation of a reverse-reconciliated coherent-state continuous-variable quantum key distribution system, with which we generated secret keys at a rate of more than 2 kb/s over 25 km of optical fiber. Time multiplexing is used to transmit both the signal and phase reference in the same optical fiber. Our system includes all experimental aspects required for a field implementation of a quantum key distribution setup. Real-time reverse reconciliation is achieved by using fast and efficient LDPC error correcting codes.

Jerome Lodewyck; Matthieu Bloch; Raul Garcia-Patron; Simon Fossier; Evgueni Karpov; Eleni Diamanti; Thierry Debuisschert; Nicolas J. Cerf; Rosa Tualle-Brouri; Steven W. McLaughlin; Philippe Grangier

2007-09-04T23:59:59.000Z

413

First-principles flocculation as the key to low energy algal biofuels processing.  

SciTech Connect (OSTI)

This document summarizes a three year Laboratory Directed Research and Development (LDRD) program effort to improve our understanding of algal flocculation with a key to overcoming harvesting as a techno-economic barrier to algal biofuels. Flocculation is limited by the concentrations of deprotonated functional groups on the algal cell surface. Favorable charged groups on the surfaces of precipitates that form in solution and the interaction of both with ions in the water can favor flocculation. Measurements of algae cell-surface functional groups are reported and related to the quantity of flocculant required. Deprotonation of surface groups and complexation of surface groups with ions from the growth media are predicted in the context of PHREEQC. The understanding of surface chemistry is linked to boundaries of effective flocculation. We show that the phase-space of effective flocculation can be expanded by more frequent alga-alga or floc-floc collisions. The collision frequency is dependent on the floc structure, described in the fractal sense. The fractal floc structure is shown to depend on the rate of shear mixing. We present both experimental measurements of the floc structure variation and simulations using LAMMPS (Large-scale Atomic/Molecular Massively Parallel Simulator). Both show a densification of the flocs with increasing shear. The LAMMPS results show a combined change in the fractal dimension and a change in the coordination number leading to stronger flocs.

Hewson, John C.; Wyatt, Nicholas B.; Pierce, Flint; Brady, Patrick Vane; Dwyer, Brian P.; Grillet, Anne Mary; Hankins, Matthew G; Hughes, Lindsey Gloe; Lechman, Jeremy B.; Mondy, Lisa Ann; Murton, Jaclyn K.; O'Hern, Timothy J; Parchert, Kylea Joy; Pohl, Phillip Isabio; Williams, Cecelia Victoria; Zhang, Xuezhi [Arizona State University, Mesa, AZ; Hu, Qiang [Arizona State University, Mesa, AZ; Amendola, Pasquale [Arizona State University, Mesa, AZ; Reynoso, Monica [Arizona State University, Mesa, AZ; Sommerfeld, Milton [Arizona State University, Mesa, AZ

2012-09-01T23:59:59.000Z

414

Sequential attack with intensity modulation on the differential-phase-shift quantum-key-distribution protocol  

SciTech Connect (OSTI)

In this paper, we discuss the security of the differential-phase-shift quantum-key-distribution (DPSQKD) protocol by introducing an improved version of the so-called sequential attack, which was originally discussed by Waks et al. [Phys. Rev. A 73, 012344 (2006)]. Our attack differs from the original form of the sequential attack in that the attacker Eve modulates not only the phases but also the amplitude in the superposition of the single-photon states which she sends to the receiver. Concentrating especially on the 'discretized Gaussian' intensity modulation, we show that our attack is more effective than the individual attack, which had been the best attack up to present. As a result of this, the recent experiment with communication distance of 100 km reported by Diamanti et al. [Opt. Express 14, 13073 (2006)] turns out to be insecure. Moreover, it can be shown that in a practical experimental setup which is commonly used today, the communication distance achievable by the DPSQKD protocol is less than 95 km.

Tsurumaru, Toyohiro [Mitsubishi Electric Corporation, Information Technology R and D Center, 5-1-1 Ofuna, Kamakura-shi, Kanagawa, 247-8501 (Japan)

2007-06-15T23:59:59.000Z

415

Failure Impact Analysis of Key Management in AMI Using Cybernomic Situational Assessment (CSA)  

SciTech Connect (OSTI)

In earlier work, we presented a computational framework for quantifying the security of a system in terms of the average loss a stakeholder stands to sustain as a result of threats to the system. We named this system, the Cyberspace Security Econometrics System (CSES). In this paper, we refine the framework and apply it to cryptographic key management within the Advanced Metering Infrastructure (AMI) as an example. The stakeholders, requirements, components, and threats are determined. We then populate the matrices with justified values by addressing the AMI at a higher level, rather than trying to consider every piece of hardware and software involved. We accomplish this task by leveraging the recently established NISTR 7628 guideline for smart grid security. This allowed us to choose the stakeholders, requirements, components, and threats realistically. We reviewed the literature and selected an industry technical working group to select three representative threats from a collection of 29 threats. From this subset, we populate the stakes, dependency, and impact matrices, and the threat vector with realistic numbers. Each Stakeholder s Mean Failure Cost is then computed.

Abercrombie, Robert K [ORNL] [ORNL; Sheldon, Frederick T [ORNL] [ORNL; Hauser, Katie R [ORNL] [ORNL; Lantz, Margaret W [ORNL] [ORNL; Mili, Ali [New Jersey Insitute of Technology] [New Jersey Insitute of Technology

2013-01-01T23:59:59.000Z

416

Scintillation has minimal impact on far-field Bennett-Brassard 1984 protocol quantum key distribution  

SciTech Connect (OSTI)

The effect of scintillation, arising from propagation through atmospheric turbulence, on the sift and error probabilities of a quantum key distribution (QKD) system that uses the weak-laser-pulse version of the Bennett-Brassard 1984 (BB84) protocol is evaluated. Two earth-space scenarios are examined: satellite-to-ground and ground-to-satellite transmission. Both lie in the far-field power-transfer regime. This work complements previous analysis of turbulence effects in near-field terrestrial BB84 QKD [J. H. Shapiro, Phys. Rev. A 67, 022309 (2003)]. More importantly, it shows that scintillation has virtually no impact on the sift and error probabilities in earth-space BB84 QKD, something that has been implicitly assumed in prior analyses for that application. This result contrasts rather sharply with what is known for high-speed laser communications over such paths, in which deep, long-lived scintillation fades present a major challenge to high-reliability operation.

Shapiro, Jeffrey H. [Research Laboratory of Electronics, Massachusetts Institute of Technology, Cambridge, Massachusetts 02139 (United States)

2011-09-15T23:59:59.000Z

417

Key Collections  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-SeriesFlickrinformationPostdocs & Graduates > TheFoxLeads DOE's E-gov

418

Color Key 1/25/2012 4.1.1 PTCS and Heat Pump Measures  

E-Print Network [OSTI]

Color Key 1/25/2012 4.1.1 PTCS and Heat Pump Measures Staff Summary of Ecotope Recommendation: Staff Response and Recommended Action: 4.1.3 Ductless Heat Pumps Staff Summary of Ecotope Recommendation

419

Exploiting KeyNote in WebCom: Architecture Neutral Glue for Trust Management  

E-Print Network [OSTI]

Exploiting KeyNote in WebCom: Architecture Neutral Glue for Trust Management Simon N. Foley, Thomas B. Quillinan, John P. Morrison, David A. Power, James J. Kennedy. Department of Computer Science

Foley, Simon

420

Broadband marine MT exploration of the East Pacific Rise at 9500 Kerry Key and Steven Constable  

E-Print Network [OSTI]

Broadband marine MT exploration of the East Pacific Rise at 9°°500 N Kerry Key and Steven Constable., and S. Constable, Broadband marine MT exploration of the East Pacific Rise at 9°500 N, Geophys. Res

Key, Kerry

Note: This page contains sample records for the topic "d1 key results" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Test Scanning Request Form Please complete one form for each test and key.  

E-Print Network [OSTI]

Test Scanning Request Form Please complete one form for each test and key. This Section: Test Name: Contact Person: Email Regarding This Scan Date Received Time Initials Number of Tests Scored: / / : A.M. P

Pantaleone, Jim

422

Environmental Activism as Collective Action Key words: Environmental activism, environmental behavior, collective action,  

E-Print Network [OSTI]

Environmental Activism as Collective Action Key words: Environmental activism, environmental behavior, collective action, environmentalism, collective interest model. Mark Lubell Department The literature on environmental activism has failed to produce a model of individual decision- making explicitly

Lubell, Mark

423

Vit Plant receives and sets key air filtration equipment for Low Activity Waste Facility  

Broader source: Energy.gov [DOE]

WTP lifted a nearly 100-ton carbon bed absorber into the Low-Activity Waste Facility. This key piece of air-filtration equipment will remove mercury and acidic gases before air is channeled through...

424

HES Human Environmental Sciences KEY: # = new course * = course changed = course dropped  

E-Print Network [OSTI]

HES Human Environmental Sciences KEY: # = new course * = course changed = course dropped SchoolofHumanEnvironmentalSciences HES 100 AN INTRODUCTION TO PROFESSIONS IN HUMAN ENVIRONMENTAL SCIENCES. (1) An orientation to human environmental sciences, its history, contemporary issues and philosophy

MacAdam, Keith

425

Security of the Quantum Key Distribution with Blind Polarization Bases against Impersonation Attack  

E-Print Network [OSTI]

In this paper, we briefly show how the quantum key distribution with blind polarization bases [Kye et al., Phys. Rev. Lett. 95, 040501 (2005)] can be made secure against the impersonation attack.

Won-Ho Kye; M. S. Kim

2006-02-24T23:59:59.000Z

426

Security against the Invisible Photon Attack for the Quantum Key Distribution with Blind Polarization Bases  

E-Print Network [OSTI]

In this paper, we briefly show how the quantum key distribution with blind polarization bases [Kye et al., Phys. Rev. Lett. 95, 040501 (2005)] can be made secure against the invisible photon attack.

Won-Ho Kye; M. S. Kim

2005-08-03T23:59:59.000Z

427

Concise and Tight Security Analysis of the Bennett-Brassard 1984 Protocol with Finite Key Lengths  

E-Print Network [OSTI]

We present a tight security analysis of the Bennett-Brassard 1984 protocol taking into account the finite size effect of key distillation, and achieving unconditional security. We begin by presenting a concise analysis utilizing the normal approximation of the hypergeometric function. Then next we show that a similarly tight bound can also be obtained by a rigorous argument without relying on any approximation. In particular, for the convenience of experimentalists who wish to evaluate the security of their QKD systems, we also give explicit procedures of our key distillation, and also show how to calculate the secret key rate and the security parameter from a given set of experimental parameters. Besides the exact values of key rates and security parameters, we also present how to obtain their rough estimates using the normal approximation.

Masahito Hayashi; Toyohiro Tsurumaru

2012-05-17T23:59:59.000Z

428

Scintillation has minimal impact on far-field Bennett-Brassard 1984 protocol quantum key distribution  

E-Print Network [OSTI]

The effect of scintillation, arising from propagation through atmospheric turbulence, on the sift and error probabilities of a quantum key distribution (QKD) system that uses the weak-laser-pulse version of the Bennett-Brassard ...

Shapiro, Jeffrey H.

429

A key extensional metamorphic complex reviewed and restored: The Menderes Massif of western Turkey  

E-Print Network [OSTI]

A key extensional metamorphic complex reviewed and restored: The Menderes Massif of western Turkey of the Menderes Massif in western Turkey, and subsequently a map-view restoration of its Neogene unroofing history

Utrecht, Universiteit

430

A Comparison of Key PV Backsheet and Module Properties from Fielded...  

Broader source: Energy.gov (indexed) [DOE]

of Key PV Backsheet and Module Properties from Fielded Module Exposures and Accelerated Test Conditions W. Gambogi 1 , O. Fu 2 , Y. Heta 3 , K. Hashimoto 3 , J. Kopchick 1...

431

V-159: RSA SecurID Agent Discloses Node Secret Encryption Key...  

Broader source: Energy.gov (indexed) [DOE]

Key to Local Users PLATFORM: RSA Authentication API versions prior to 8.1 SP1 RSA Web Agent for Apache Web Server versions prior to 5.3.5 RSA Web Agent for IIS versions...

432

Technology, Knowledge, Culture, and Management: the keys The shift from industrial societies to information societies  

E-Print Network [OSTI]

Technology, Knowledge, Culture, and Management: the keys to success Abstract The shift from to success: technology, knowledge, culture and management. Organizations employ technology with the goal of improving efficiency and reducing operational costs. Hence technology structures within organizations must

Kopec, Danny

433

Public Sector Digest | July 2010 | www.publicsectordigest.com Key Aspects of the Deliberative Democracy Movement  

E-Print Network [OSTI]

Public Sector Digest | July 2010 | www.publicsectordigest.com Key Aspects of the Deliberative Digest | July 2010 | www.publicsectordigest.com underlying tensions and tough choices inherent to most

434

Redox states of Desulfovibrio vulgaris DsrC, a key protein in...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Venceslau SS, JR Cort, ES Baker, RK Chu, EW Robinson, C Dahl, LM Saraiva, and IA Pereira.2013."Redox states of Desulfovibrio vulgaris DsrC, a key protein in dissimilatory...

435

Tritium inventory control in ITER Charles Skinner with key contributions from  

E-Print Network [OSTI]

Tritium inventory control in ITER Charles Skinner with key contributions from Charles Gentile permitted" Tritium inventory control Worrisome issue: Once at the tritium limit there won't be any more

Princeton Plasma Physics Laboratory

436

Faculty & Information Centres Building Car Park Key Facilities Building Car Park  

E-Print Network [OSTI]

10 ORANGE A PURPLE Navitas 2 ORANGE A ORANGE North Australian Centre for Oil and Gas 7 PINK B PURPLE7 WATER TANK 5 4 18 S Faculty & Information Centres Building Car Park Key Facilities Building Car

437

Demand Response in the U.S.- Key trends and federal facility participation  

Broader source: Energy.gov [DOE]

Presentationgiven at the Federal Utility Partnership Working Group (FUPWG) Fall 2008 meetingprovides demand response (DR) definition, current status of DR in the United States, key DR trends, and federal participation issues.

438

Centralized Cryptographic Key Management and Critical Risk Assessment - CRADA Final Report For CRADA Number NFE-11-03562  

SciTech Connect (OSTI)

The Department of Energy Office of Electricity Delivery and Energy Reliability (DOE-OE) Cyber Security for Energy Delivery Systems (CSEDS) industry led program (DE-FOA-0000359) entitled "Innovation for Increasing Cyber Security for Energy Delivery Systems (12CSEDS)," awarded a contract to Sypris Electronics LLC to develop a Cryptographic Key Management System for the smart grid (Scalable Key Management Solutions for Critical Infrastructure Protection). Oak Ridge National Laboratory (ORNL) and Sypris Electronics, LLC as a result of that award entered into a CRADA (NFE-11-03562) between ORNL and Sypris Electronics, LLC. ORNL provided its Cyber Security Econometrics System (CSES) as a tool to be modified and used as a metric to address risks and vulnerabilities in the management of cryptographic keys within the Advanced Metering Infrastructure (AMI) domain of the electric sector. ORNL concentrated our analysis on the AMI domain of which the National Electric Sector Cyber security Organization Resource (NESCOR) Working Group 1 (WG1) has documented 29 failure scenarios. The computational infrastructure of this metric involves system stakeholders, security requirements, system components and security threats. To compute this metric, we estimated the stakes that each stakeholder associates with each security requirement, as well as stochastic matrices that represent the probability of a threat to cause a component failure and the probability of a component failure to cause a security requirement violation. We applied this model to estimate the security of the AMI, by leveraging the recently established National Institute of Standards and Technology Interagency Report (NISTIR) 7628 guidelines for smart grid security and the International Electrotechnical Commission (IEC) 63351, Part 9 to identify the life cycle for cryptographic key management, resulting in a vector that assigned to each stakeholder an estimate of their average loss in terms of dollars per day of system operation. To further address probabilities of threats, information security analysis can be performed using game theory implemented in dynamic Agent Based Game Theoretic (ABGT) simulations. Such simulations can be verified with the results from game theory analysis and further used to explore larger scale, real world scenarios involving multiple attackers, defenders, and information assets. The strategy for the game was developed by analyzing five electric sector representative failure scenarios contained in the AMI functional domain from NESCOR WG1. From these five selected scenarios, we characterized them into three specific threat categories affecting confidentiality, integrity and availability (CIA). The analysis using our ABGT simulation demonstrated how to model the AMI functional domain using a set of rationalized game theoretic rules decomposed from the failure scenarios in terms of how those scenarios might impact the AMI network with respect to CIA.

Abercrombie, R. K. [ORNL] [ORNL; Peters, Scott [Sypris Electronics, LLC] [Sypris Electronics, LLC

2014-05-28T23:59:59.000Z

439

Practical free-space quantum key distribution over 10 km in daylight and at night  

E-Print Network [OSTI]

We have demonstrated quantum key distribution (QKD) over a 10-km, 1-airmass atmospheric range during daylight and at night. Secret random bit sequences of the quality required for the cryptographic keys used to initialize secure communications devices were transferred at practical rates with realistic security. By identifying the physical parameters that determine the system's secrecy efficiency, we infer that free-space QKD will be practical over much longer ranges under these and other atmospheric and instrumental conditions.

Richard J. Hughes; Jane E. Nordholt; Derek Derkacs; Charles G. Peterson

2002-06-14T23:59:59.000Z

440

A study of an optimum filter for a random phase-shift keyed signal  

E-Print Network [OSTI]

59 62 77 BIBLIOGRAPHY 85 LIST OF FIGURES Figure Page 1. Phase-shift key modulation 2, The filter problem 3. Block diagram representation of a delay modulator 12 4. A conceptual delay modulator for a phase- shift keyed signal 5. Random... PSK signal from the corruption of white noise. The fact that the PSK signal is random necessitates the use of a statistical theory of linear systems which was originated by Norbert Wiener. 3 The statistical filter problem is illustrated in Figure...

Barr, Frederick James

1968-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "d1 key results" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Hazard analysis results report  

SciTech Connect (OSTI)

This document describes and defines the Hazard Analysis Results for the Tank Waste Remediation System Final Safety Analysis Report.

Niemi, B.J., Westinghouse Hanford

1996-09-30T23:59:59.000Z

442

Final Hazard Categorization and Auditable Safety Analysis for the Remediation of the 118-D-1, 118-D-2, 118-D-3, 118-H-1, 118-H-2 and 118-H-3 Solid Waste Burial Grounds  

SciTech Connect (OSTI)

This report presents the initial hazard categorization, final hazard categorization and auditable safety analysis for the remediation of the 118-D-1, 118-D-2, and 118-D-3 Burial Grounds located within the 100-D/DR Area of the Hanford Site and the 118-H-1, 118-H-2, and 118-H-3 Burial Grounds located within the 100-H Area of the Hanford Site.

T. J. Rodovsky

2006-03-01T23:59:59.000Z

443

Final Hazard Categorization for the Remediation of the 118-D-1, 118-D-2, 118-D-3, 118-H-1, 118-H-2, and 118-H-3 Solid Waste Burial Grounds  

SciTech Connect (OSTI)

This report presents the final hazard categorization for the remediation of the 118-D-1, 118-D-2, 118-D-3 Burial Grounds located within the 100-D/DR Area of the Hanford Site and the 118-H-1, 118-H-2, and 118-H-3 Burial Grounds located within the 100-H Area of the Hanford Site. A material at risk calculation was performed that determined the radiological inventory for each burial ground to be Hazard Category 3.

J.D. Ludowise

2009-06-17T23:59:59.000Z

444

Overview of ALICE results  

E-Print Network [OSTI]

The ALICE detector was designed to study the physics of matter under extreme conditions of high energy density. Different results were reported by the experiment using data from the successful run I of the LHC. The goal of the present work is to present an overview of recent ALICE results. This comprises selected results from several analyses of pp, p-pb and Pb-Pb data at the LHC energies.

Antonio Ortiz; for the ALICE Collaboration

2015-01-22T23:59:59.000Z

445

Overview of ALICE results  

E-Print Network [OSTI]

The ALICE detector was designed to study the physics of matter under extreme conditions of high energy density. Different results were reported by the experiment using data from the successful run I of the LHC. The goal of the present work is to present an overview of recent ALICE results. This comprises selected results from several analyses of pp, p-pb and Pb-Pb data at the LHC energies.

Ortiz, Antonio

2015-01-01T23:59:59.000Z

446

Testbed: Published Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Testbed Results Current Testbed Research Proposal Process Terms and Conditions Dark Fiber Testbed Performance (perfSONAR) Software & Tools Development Partnerships...

447

Similarities and Differences between Coronal Holes and the Quiet Sun: Are Loop Statistics the Key?  

E-Print Network [OSTI]

Coronal holes (CH) emit significantly less at coronal temperatures than quiet-Sun regions (QS), but can hardly be distinguished in most chromospheric and lower transition region lines. A key quantity for the understanding of this phenomenon is the magnetic field. We use data from SOHO/MDI to reconstruct the magnetic field in coronal holes and the quiet Sun with the help of a potential magnetic model. Starting from a regular grid on the solar surface we then trace field lines, which provide the overall geometry of the 3D magnetic field structure. We distinguish between open and closed field lines, with the closed field lines being assumed to represent magnetic loops. We then try to compute some properties of coronal loops. The loops in the coronal holes (CH) are found to be on average flatter than in the QS. High and long closed loops are extremely rare, whereas short and low-lying loops are almost as abundant in coronal holes as in the quiet Sun. When interpreted in the light of loop scaling laws this result suggests an explanation for the relatively strong chromospheric and transition region emission (many low-lying, short loops), but the weak coronal emission (few high and long loops) in coronal holes. In spite of this contrast our calculations also suggest that a significant fraction of the cool emission in CHs comes from the open flux regions. Despite these insights provided by the magnetic field line statistics further work is needed to obtain a definite answer to the question if loop statistics explain the differences between coronal holes and the quiet Sun.

T. Wiegelmann; S. K. Solanki

2008-02-01T23:59:59.000Z

448

Diffraction Results from CDF  

SciTech Connect (OSTI)

We present final results by the CDF II collaboration on diffractive W and Z production, report on the status of ongoing analyses on diffractive dijet production and on rapidity gaps between jets, and briefly summarize results obtained on exclusive production pointing to their relevance to calibrating theoretical models used to predict exclusive Higgs-boson production at the LHC.

Goulianos, Konstantin

2012-04-01T23:59:59.000Z

449

Recent results from TRISTAN  

SciTech Connect (OSTI)

TRISTAN results on {gamma}{gamma} physics from 1994 to 1995 are reviewed in this report. We have systematically investigated jet production, the {gamma}-structure function, and charm pair production in {gamma}{gamma} processes. The results are discussed, and future prospects are presented.

Enomoto, Ryoji [National Laboratory for High Energy Physics, Ibaraki (Japan)

1997-01-01T23:59:59.000Z

450

Building Chairs & Alternates by Building May 2014 Bldg/Key Name/Dept Location Email/EHS Contact  

E-Print Network [OSTI]

by Building May 2014 Bldg/Key Name/Dept Location Email/EHS Contact Hefter Conference Tom Bjornstad Hefter

Saldin, Dilano

451

Wellcome Trust SUBMISSION OF EVIDENCE Wellcome Trust response to Department for Education: Reforming Key Stage 4 qualifications  

E-Print Network [OSTI]

: Reforming Key Stage 4 qualifications December 2012 Department for Education: Reforming Key Stage 4 science skills. 2. We are pleased to have the opportunity to respond to the consultation on reforms to Key consultations on the reform to curriculum and assessment at various stages of schooling. There is an opportunity

Rambaut, Andrew

452

Deterministic quantum-public-key encryption: forward search attack and randomization  

E-Print Network [OSTI]

In the classical setting, public-key encryption requires randomness in order to be secure against a forward search attack, whereby an adversary compares the encryption of a guess of the secret message with that of the actual secret message. We show that this is also true in the information-theoretic setting -- where the public keys are quantum systems -- by defining and giving an example of a forward search attack for any deterministic quantum-public-key bit-encryption scheme. However, unlike in the classical setting, we show that any such deterministic scheme can be used as a black box to build a randomized bit-encryption scheme that is no longer susceptible to this attack.

Georgios M. Nikolopoulos; Lawrence M. Ioannou

2009-03-27T23:59:59.000Z

453

Electroweak results from CDF  

SciTech Connect (OSTI)

Inclusive W and Z production cross-sections have been measured by CDF and certain electroweak parameters extracted with high precision from these measurements. New results on diboson production at the Tevatron are also presented.

D. S. Waters

2004-06-02T23:59:59.000Z

454

Recent results from Belle  

E-Print Network [OSTI]

The review on experimental results on charmonium and charmonium-like spectroscopy from B-factories is presented. Main theoretical interpretations, such as conventional charmonium, molecular state, hybrids, tetraquarks and others are discussed.

T. Uglov

2010-11-15T23:59:59.000Z

455

Recent MEG results  

E-Print Network [OSTI]

New results of a search for the ultra-rare decay $\\mu \\to e \\gamma$ by the MEG collaboration are reported in this contribution. The data were taken during 2009 and correspond to approximately 6.5 10$^{13}$ muon stopped on target. A maximum likelihood analysis sets an upper limit at 90\\% C.L. on the branching ratio, BF($\\mu \\to e \\gamma$) $< $1.5 10$^{-11}$. The results presented here are preliminary.

G. Cavoto

2010-12-09T23:59:59.000Z

456

Efficient heralding of O-band passively spatial-multiplexed photons for noise-tolerant quantum key distribution  

E-Print Network [OSTI]

When implementing O-band quantum key distribution on optical fiber transmission lines carrying C-band data traffic, noise photons that arise from spontaneous Raman scattering or insufficient filtering of the classical data channels could cause the quantum bit-error rate to exceed the security threshold. In this case, a photon heralding scheme may be used to reject the uncorrelated noise photons in order to restore the quantum bit-error rate to a low level. However, the secure key rate would suffer unless one uses a heralded photon source with sufficiently high heralding rate and heralding efficiency. In this work we demonstrate a heralded photon source that has a heralding efficiency that is as high as 74.5%. One disadvantage of a typical heralded photon source is that the long deadtime of the heralding detector results in a significant drop in the heralding rate. To counter this problem, we propose a passively spatial-multiplexed configuration at the heralding arm. Using two heralding detectors in this configuration, we obtain an increase in the heralding rate by 37% and a corresponding increase in the heralded photon detection rate by 16%. We transmitted the O-band photons over 10 km of noisy optical fiber to observe the relation between quantum bit-error rate and noise-degraded second-order correlation function of the transmitted photons. The effects of afterpulsing when we shorten the deadtime of the heralding detectors are also observed and discussed.

Mao Tong Liu; Han Chuen Lim

2014-08-07T23:59:59.000Z

457

Unveiling Microbial Carbon Cycling Processes in Key U.S. Soils using Omics  

SciTech Connect (OSTI)

Soils process and store large amounts of C; however, considerable uncertainty still exists about the details of that influence microbial partitioning of C into soil C pools, and what are the main influential forces that control the fraction of the C input that is stabilized. The soil microbial community is genotypically and phenotypically diverse. Despite our ability to predict the kinds of regional environmental changes that will accompany global climate change, it is not clear how the microbial community will respond to climate-induced modification of precipitation and inter-precipitation intervals, and if this response will affect the fate of C deposited into soil by the local plant community. Part of this uncertainty lies with our ignorance of how the microbial community adapts genotypically and physiologically to changes in soil moisture brought about by shifts in precipitation. Our overarching goal is to harness the power of multiple meta-omics tools to gain greater understanding of the functioning of whole-soil microbial communities and their role in C cycling. We will do this by meeting the following three objectives: 1. Further develop and optimize a combination of meta-omics approaches to study how environmental factors affect microbially-mediated C cycling processes. 2. Determine the impacts of long-term changes in precipitation timing on microbial C cycling using an existing long-term field manipulation of a tallgrass prairie soil. 3. Conduct laboratory experiments that vary moisture and C inputs to confirm field observations of the linkages between microbial communities and C cycling processes. We took advantage of our state-of-the-art expertise in community omics to better understand the functioning soil C cycling within the Great Prairie ecosystem, including our ongoing Konza Prairie soil metagenome flagship project at JGI and the unique rainfall manipulation plots (RaMPs) established at this site more than a decade ago. We employed a systems biology approach, considering the complex soil microbial community as a functioning system and using state-of-the-art metatranscriptomic, metaproteomic, and metabolomic approaches. These omics tools were refined, applied to field experiments, and confirmed with controlled laboratory studies. Our experiments were designed to specifically identify microbial community members and processes that are instrumental players in processing of C in the prairie soils and how these processes are impacted by wetting and drying events. This project addresses a key ecosystem in the United States that current climate models predict will be subjected to dramatic changes in rainfall patterns as a result of global warming. Currently Mollisols, such as those of the tallgrass prairie, are thought to sequester more C than is released into the atmosphere, but it is not known what changes in rainfall patterns will have on future C fluxes. Through an analysis of the molecular response of the soil microbial community to shifts in precipitation cycles that are accompanied by phenologically driven changes in quality of plant C rhizodeposits, we gained deeper insight into how the metabolism of microbes has adapted to different precipitation regimes and the impact of this adaption on the fate of C deposited into soil. In doing so, we addressed key questions about the microbial cycling of C in soils that have been identified by the DOE.

Myrold, David D. [Oregon State University; Bottomely, Peter J. [Oregon State University; Jumpponen, Ari [Kansas State University; Rice, Charles W. [Kansas State University; Zeglin, Lydia H. [Kansas State University; David, Maude M. [Lawrence Berkeley National Laboratory; Jansson, Janet K. [Lawrence Berkeley National Laboratory; Prestat, Emmanuel [Lawrence Berkeley National Laboratory; Hettich, Robert L. [Oak Ridge National Laboratory

2014-09-17T23:59:59.000Z

458

Double blinding-attack on entanglement-based quantum key distribution protocols  

E-Print Network [OSTI]

We propose a double blinding-attack on entangled-based quantum key distribution protocols. The principle of the attack is the same as in existing blinding attack except that instead of blinding the detectors on one side only, Eve is blinding the detectors of both Alice and Bob. In the BBM92 protocol, the attack allows Eve to get a full knowledge of the key and remain undetected even if Alice and Bob are using 100% efficient detectors. The attack can be easily extended to Ekert protocol, with an efficiency as high as 85.3%.

Guillaume Adenier; Irina Basieva; Andrei Yu. Khrennikov; Masanori Ohya; Noboru Watanabe

2011-06-14T23:59:59.000Z

459

Optimum design for BB84 quantum key distribution in tree-type passive optical networks  

E-Print Network [OSTI]

We show that there is a tradeoff between the useful key distribution bit rate and the total length of deployed fiber in tree-type passive optical networks for BB84 quantum key distribution applications. A two stage splitting architecture where one splitting is carried in the central office and a second in the outside plant and figure of merit to account for the tradeoff are proposed. We find that there is an optimum solution for the splitting ratios of both stages in the case of Photon Number Splitting (PNS) attacks and Decoy State transmission. We then analyze the effects of the different relevant physical parameters of the PON on the optimum solution.

Jose Capmany; Carlos R. Fernandez-Pousa

2011-03-24T23:59:59.000Z

460

A 24 km fiber-based discretely signaled continuous variable quantum key distribution system  

E-Print Network [OSTI]

We report a continuous variable key distribution system that achieves a final secure key rate of 3.45 kb/sec over a distance of 24.2 km of optical fiber. The protocol uses discrete signaling and post-selection to improve reconciliation speed and quantifies security by means of quantum state tomography. Polarization multiplexing and a frequency translation scheme permit transmission of a continuous wave local oscillator and suppression of noise from guided acoustic wave Brillouin scattering by more than 27 dB.

Quyen Dinh Xuan; Zheshen Zhang; Paul L. Voss

2009-10-06T23:59:59.000Z

Note: This page contains sample records for the topic "d1 key results" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

U.S. Geothermal Announces More Test Results from the Neal Hot...  

Open Energy Info (EERE)

Announces More Test Results from the Neal Hot Springs Production Well and a Key Addition to Senior Staff Jump to: navigation, search OpenEI Reference LibraryAdd to library Report:...

462

E-Print Network 3.0 - aluminum alloy aa Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

the CCC protection of polished AA7xxx- T6... of polar- ization and EIS results to salt spray testing is also addressed. KEY WORDS: ... Source: Ohio State University,...

463

Plans, Implementation, and Results  

Broader source: Energy.gov [DOE]

The Bioenergy Technologies Office carries out technology research, development, and deployment through an ongoing process of planning and analysis, implementation, and review. This Web page includes links to documents that support and document the program management process, and the results and public benefits that derive from it.

464

Fluctuation Results from PHENIX  

E-Print Network [OSTI]

The PHENIX Experiment at the Relativistic Heavy Ion Collider has made measurements of event-by-event fluctuations in the net charge, the mean transverse momentum, and the charged particle multiplicity as a function of collision energy, centrality, and transverse momentum in heavy ion collisions. The results of these measurements will be reviewed and discussed.

J. T. Mitchell

2005-11-18T23:59:59.000Z

465

Level of Preparedness for Pandemic Influenza among Key Leaders in Brazos County  

E-Print Network [OSTI]

With the outbreak of the 2009 pandemic influenza A (H1N1) comes the need to evaluate the preparedness level of government entities that had preparedness plans. This study looks at the preparedness level for pandemic influenza among key leaders...

Kaster, Elizabeth

2012-02-14T23:59:59.000Z

466

Key to images: [1] Model system: fission yeast [2] Cryo-EM structure  

E-Print Network [OSTI]

Key to images: [1] Model system: fission yeast [2] Cryo-EM structure of the MCM helicase [3 combing [8] Model system: Xenopus [9] Extreme environments [10] Model system: C.elegans. Background image of the evolution of the replication machinery highlighted. BSRC B306 Email: sam31@st-and.ac.uk 1 2 3 4 5 6 7 8 9 10

Brierley, Andrew

467

Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems , Jinsong Han2  

E-Print Network [OSTI]

Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems Li Lu1 , Jinsong Han2 an emerging requirement ­ protecting user privacy [13] in RFID authentications. In most RFID systems, tags sensitive information. For example, without pri- vacy protection, any reader can identify a consumer's ID

Liu, Yunhao

468

Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems , Jinsong Han2  

E-Print Network [OSTI]

- sitive information. For example, without privacy pro- tection, any reader can identify a consumer's IDDynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems Li Lu1 , Jinsong Han2 an emerging requirement ­ protecting user privacy [13] in RFID authentications. In most RFID systems, tags

Liu, Yunhao

469

Confidence Valuation in a Public-Key Infrastructure based on Uncertain Evidence  

E-Print Network [OSTI]

Confidence Valuation in a Public-Key Infrastructure based on Uncertain Evidence Reto Kohlas Ueli an uncertain piece of evidence and have proposed ad hoc methods, sometimes referred to as trust management and the valuation of confidence values in the general context of reasoning based on uncertain evidence. Second, we

Maurer, Ueli

470

Confidence Valuation in a PublicKey Infrastructure based on Uncertain Evidence  

E-Print Network [OSTI]

Confidence Valuation in a PublicKey Infrastructure based on Uncertain Evidence Reto Kohlas Ueli an uncertain piece of evidence and have proposed ad hoc methods, sometimes referred to as trust management and the valuation of confidence values in the general context of reasoning based on uncertain evidence. Second, we

Maurer, Ueli

471

STUDENT FINANCE ENGLAND INFORMATION & KEY DATES FOR CONTINUING STUDENTS 2013/14  

E-Print Network [OSTI]

STUDENT FINANCE ENGLAND INFORMATION & KEY DATES FOR CONTINUING STUDENTS 2013/14 Are you returning to a full-time course at university or college in the autumn? If you applied for student finance that did NOT depend on your household income last year (non means tested) you should wait to hear from Student Finance

Dixon, Peter

472

STUDENT FINANCE ENGLAND INFORMATION & KEY DATES FOR NEW STUDENTS 2013/14  

E-Print Network [OSTI]

STUDENT FINANCE ENGLAND INFORMATION & KEY DATES FOR NEW STUDENTS 2013/14 Are you starting a full-time course at university or college in the autumn? · Find out what student finance is available to you finance. Apply online by 31 May 2013. · Giving Student Finance England your UK passport number and your

Dixon, Peter

473

STUDENT FINANCE ENGLAND INFORMATION & KEY DATES FOR CONTINUING STUDENTS 2012/13  

E-Print Network [OSTI]

STUDENT FINANCE ENGLAND INFORMATION & KEY DATES FOR CONTINUING STUDENTS 2012/13 Are you returning to a full-time course at university or college in the autumn? If you applied for student finance that did NOT depend on your household income last year (non means tested) you should wait to hear from Student Finance

Oakley, Jeremy

474

Key factors governing uncertainty in the response to sunshade geoengineering from a comparison  

E-Print Network [OSTI]

Key factors governing uncertainty in the response to sunshade geoengineering from a comparison of solar geoengineering are central to evaluating whether such approaches may help to reduce the harmful impacts of global warming. In this study we compare the sunshade solar geoengineering response

Robock, Alan

475

Capacity Development, Education & Training Integrated and sustained action is the key  

E-Print Network [OSTI]

Capacity Development, Education & Training Integrated and sustained action is the key Thematic Background Paper January 2004 Author: John Christensen Global Network on Energy for Sustainable Development to sustainable energy development. The rapid development of individual RE technologies along with basic changes

476

BUSINESSES AS ONE OF THE KEY ELEMENTS OF A REGION'S SUSTAINABLE DEVELOPMENT  

E-Print Network [OSTI]

BUSINESSES AS ONE OF THE KEY ELEMENTS OF A REGION'S SUSTAINABLE DEVELOPMENT of sustainable development should be taken into account by these actors. Businesses (especially SMEs) whose aim-words : sustainable development, territory, businesses, governance, stakeholders Mots-cls : dveloppement durable

477

TERRESTRIAL ROCK VARNISH: A KEY TO UNDERSTANDING THE SURFACE COMPOSITION OF MARS. J. G. Ward1  

E-Print Network [OSTI]

TERRESTRIAL ROCK VARNISH: A KEY TO UNDERSTANDING THE SURFACE COMPOSITION OF MARS. J. G. Ward1 , L produces a strong spectral band contrast. This also gives varnish its shiny appearance. On Earth rock varnish may have a microbial origin [3]. Clays are transported from an external source and deposited

Kirkland, Laurel

478

A new key recovery attack on the ANSI retail MAC Chris J. Mitchell  

E-Print Network [OSTI]

A new key recovery attack on the ANSI retail MAC Chris J. Mitchell Information Security Group circumstances, enables a more efficient attack than was previously known to be launched against the ANSI retail with the message. 1.1 The ANSI retail MAC The ANSI retail MAC scheme [1], otherwise known as CBC-MAC-Y or ISO

Mitchell, Chris

479

Red Algae Lose Key Mitochondrial Genes in Response to Becoming Parasitic  

E-Print Network [OSTI]

Red Algae Lose Key Mitochondrial Genes in Response to Becoming Parasitic Lillian Hancock1 , Lynda independently evolved hundreds of times among the floridiophyte red algae. Much is known about the life history class of red algae, Plocamiocolax puvinata, has lost the atp8 gene entirely, indicating that this gene

Lane, Chris

480

Contributory Group Key Agreement Protocols, Revisited for Mobile Ad-Hoc Groups  

E-Print Network [OSTI]

Contributory Group Key Agreement Protocols, Revisited for Mobile Ad-Hoc Groups Mark Manulis Horst of various group-oriented applications for mo- bile ad-hoc groups requires a group secret shared between all- and wide-area wired networks, can also be used in ad-hoc sce- narios because of the similar security

Manulis, Mark

Note: This page contains sample records for the topic "d1 key results" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Better Technologies Key to Addressing Climate Change Energy Department official explains U.S. initiatives  

E-Print Network [OSTI]

policies and business models to create self-sustaining markets for financing energy efficiency, renewable on leveraging resources through partnerships with businesses, academia, and other countries. Therefore.S. initiatives 17 December 2004 More energy-efficient technologies will be key to reducing greenhouse gas

482

New species of Anthostomella on fynbos, with a key to the genus in South Africa  

E-Print Network [OSTI]

New species of Anthostomella on fynbos, with a key to the genus in South Africa Seonju LEE, South Africa. E-mail : slee@maties.sun.ac.za Received 3 April 2002; accepted 18 November 2002. A study of saprobic fungi occurring on the fynbos of the Western Cape Province of South Africa yielded four unknown

483

Differential-phase-shift quantum key distribution with segmented pulse trains  

SciTech Connect (OSTI)

We present a modified scheme of differential-phase-shift (DPS) quantum key distribution (QKD) for improving its performance. A transmitter sends a weak coherent pulse train segmented with vacant pulses. Then, a receiver can find eavesdropping by monitoring the photon detection rate at particular time slots. Simulations show that the proposed scheme is robust against a sequential attack and a general individual attack.

Kawahara, Hiroki; Inoue, Kyo [Osaka University, Osaka 565-0871 (Japan)

2011-06-15T23:59:59.000Z

484

Length Based Attack and Braid Groups: Cryptanalysis of Anshel-Anshel-Goldfeld Key  

E-Print Network [OSTI]

Length Based Attack and Braid Groups: Cryptanalysis of Anshel-Anshel-Goldfeld Key Exchange Protocol of Technology, Hoboken, New Jersey, USA, 07030 {amyasnik,aushakov}@stevens.edu Abstract. The length based attack and Tannenbaum in [9]. Several attempts have been made to implement the attack [6], but none of them had produced

Myasnikov, Aleksey

485

Wavelength attack on practical continuous-variable quantum-key-distribution system with a heterodyne protocol  

E-Print Network [OSTI]

We present the wavelength attack on a practical continuous-variable quantum-key-distribution system with a heterodyne protocol, in which the transmittance of beam splitters at Bob's station is wavelength-dependent. Our strategy is proposed independent of but analogous to that of Huang et al. [arXiv: 1206.6550v1 [quant-ph

Xiang-Chun Ma; Shi-Hai Sun; Mu-Sheng Jiang; Lin-Mei Liang

2014-03-04T23:59:59.000Z

486

Attack on Private Signature Keys of the OpenPGP format, PGPTM  

E-Print Network [OSTI]

- 1 - Attack on Private Signature Keys of the OpenPGP format, PGPTM programs and other applications Prague, t.rosa@decros.cz Abstract. The article describes an attack on OpenPGP format, which leads these applications must undergo the same revision as the actual program PGPTM . The success of the attack

487

Fish and Wildlife Management Questions and RM&E Strategies Key Management Questions  

E-Print Network [OSTI]

1 Fish and Wildlife Management Questions and RM&E Strategies Key Management Questions 1. Are we meeting biological and programmatic performance objectives established within the Columbia Basin Fish implemented and accomplished as proposed? Strategic Category: Fish Population Status Monitoring The following

488

SSL/TLS Session-Aware User Authentication Using a GAA Bootstrapped Key  

E-Print Network [OSTI]

SSL/TLS Session-Aware User Authentication Using a GAA Bootstrapped Key Chunhua Chen1 , Chris J.mitchell@rhul.ac.uk Abstract. Most SSL/TLS-based electronic commerce (e-commerce) ap- plications (including Internet banking a server effectively, and because user authentication methods are typi- cally decoupled from SSL

Sheldon, Nathan D.

489

Towards Fresh Re-Keying with Leakage-Resilient PRFs: Cipher Design Principles and Analysis  

E-Print Network [OSTI]

-resilient cryptography is its significant performance overheads, it naturally suggests an intermediate line of re- searchTowards Fresh Re-Keying with Leakage-Resilient PRFs: Cipher Design Principles and Analysis Sonia advantage of our analysis to extract new design principles for block ciphers to be used in leakage

490

Poster Sessions Friday, 18 April 2008 183 Identification of key breast cancer phenotypes  

E-Print Network [OSTI]

in node positive, hormone positive breast cancer patients. Materials and Methods: We have conductedPoster Sessions Friday, 18 April 2008 183 445 Poster Identification of key breast cancer phenotypes for class membership. Material and Methods: Expression of twenty-five proteins, with known relevance

Aickelin, Uwe

491

64 IRE TRANSACTIONS ON ENGINEERING MANAGEMENT July Systenas Engineering-Key to Modern Development  

E-Print Network [OSTI]

to ascertain the current output of this phase is the creative idea that marks the status of systems engineering64 IRE TRANSACTIONS ON ENGINEERING MANAGEMENT July Systenas Engineering-Key to Modern Development, integration, emphasis on the field of systems engineering. Though and evaluation. In a sense, these terms

Rhoads, James

492

Manure Harvesting Frequency: The Key to Feedyard Dust Control in a Summer Drought  

E-Print Network [OSTI]

Summer drought can make dust control in feedyards more challenging than usual. Supplemental water may not keep pace with daily evaporation. The key to dust control is managing the depth of dry manure in the pens by harvesting manure more frequently...

Auvermann, Brent W.; Parker, David B.; Sweeten, John M.

2000-11-27T23:59:59.000Z

493

NREL builds community and industry support by addressing concerns voiced by key standards organizations.  

E-Print Network [OSTI]

NREL builds community and industry support by addressing concerns voiced by key standards standards developed through consensus processes. Because U.S. PV module safety stan- dards are not aligned with international standards, manufacturers must test their modules twice--and sometimes maintain separate product

494

Heart Failure Symposium: Promoting Knowledge and Self-Care: The Keys to  

E-Print Network [OSTI]

Heart Failure Symposium: Promoting Knowledge and Self-Care: The Keys to a Woman's Healthy Heart This is the Fourth Annual UConn Health Center Heart Failure Symposium. This year we will focus on women and heart disease. The program will include presentations on heart disease and healthy living for women

Kim, Duck O.

495

Adaptive Multiparty Non-interactive Key Exchange Without Setup In The Standard Model  

E-Print Network [OSTI]

proceed, let us review at a high level the utility and security of multiparty NIKE. We consider a setting a public value. Utility: Consider any subset of the parties who wish to derive a common secret key in the ensuing. - Query the challenger to register an honest party ­ upon this query, the challenger outputs

496

E-Business Value Creation in Jordanian Banking Services Industry: An Empirical Analysis of Key Factors  

E-Print Network [OSTI]

E-Business Value Creation in Jordanian Banking Services Industry: An Empirical Analysis of Key an extended conceptual research model for assessing the value of e-business at the bank level environment) that may affect value creation of carrying out e- business in Jordanian banking sector. Survey

497

E-Banking Diffusion in the Jordanian Banking Services Sector: An Empirical Analysis of Key Factors  

E-Print Network [OSTI]

E-Banking Diffusion in the Jordanian Banking Services Sector: An Empirical Analysis of Key Factors influence e- banking adoption in Jordanian banks. This article added some constructs to (TOE) framework, availability of online revenues, competition intensity or pressure, and regulatory support environment) while e

498

The Gender-Brand Effect of Key Phrases on User Clicks in Sponsored  

E-Print Network [OSTI]

to the positive attitude and customer loyalty generated by brand image. Author Keywords Search Engine MarketingThe Gender-Brand Effect of Key Phrases on User Clicks in Sponsored Search Abstract In this research-phrases, and (3) the occurrence of branded terms in those queries. The aim of this research is increased

Jansen, James

499

Towards prospective Life Cycle Assessment: how to identify key parameters inducing most  

E-Print Network [OSTI]

of Life Cycle Assessments (LCA) have been undertaken, attempting to give a quantitative assessmentTowards prospective Life Cycle Assessment: how to identify key parameters inducing most Blanc1 MINES ParisTech, O.I.E. center, Sophia Antipolis, France Abstract. Prospective Life Cycle

Paris-Sud XI, Universit de

500

Growing Green As part of its strategic plan to foster growth and development in key  

E-Print Network [OSTI]

reconstruction, nuclear waste containment and disposal, and photochemical deconstruction of pollutants Key remediation technologies for hazardous industrial pollutants in soil and groundwater · Geotechnical Research contamination and remediation, and management of mine wastes For more information, please visit: www.uwo.ca/enviro

Denham, Graham