Powered by Deep Web Technologies
Note: This page contains sample records for the topic "destination definitions key" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

NGNP: High Temperature Gas-Cooled Reactor Key Definitions, Plant Capabilities, and Assumptions  

SciTech Connect (OSTI)

This document provides key definitions, plant capabilities, and inputs and assumptions related to the Next Generation Nuclear Plant to be used in ongoing efforts related to the licensing and deployment of a high temperature gas-cooled reactor. These definitions, capabilities, and assumptions were extracted from a number of NGNP Project sources such as licensing related white papers, previously issued requirement documents, and preapplication interactions with the Nuclear Regulatory Commission (NRC).

Wayne Moe

2013-05-01T23:59:59.000Z

2

NGNP: High Temperature Gas-Cooled Reactor Key Definitions, Plant Capabilities, and Assumptions  

SciTech Connect (OSTI)

This document is intended to provide a Next Generation Nuclear Plant (NGNP) Project tool in which to collect and identify key definitions, plant capabilities, and inputs and assumptions to be used in ongoing efforts related to the licensing and deployment of a high temperature gas-cooled reactor (HTGR). These definitions, capabilities, and assumptions are extracted from a number of sources, including NGNP Project documents such as licensing related white papers [References 1-11] and previously issued requirement documents [References 13-15]. Also included is information agreed upon by the NGNP Regulatory Affairs group's Licensing Working Group and Configuration Council. The NGNP Project approach to licensing an HTGR plant via a combined license (COL) is defined within the referenced white papers and reference [12], and is not duplicated here.

Phillip Mills

2012-02-01T23:59:59.000Z

3

Origin State Destination State  

Annual Energy Outlook 2013 [U.S. Energy Information Administration (EIA)]

7. Estimated truck transportation rates for coal, state to state, EIA data Origin State Destination State 2008 2009 2010 2008-2010 2009-2010 Alabama Alabama W W W W W Alabama...

4

ARM - Destination of Atmospheric Carbon  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcal Documentation DataDatastreamswacrspeccmaskcopolDatastreamsxsacrslrAlaskaDefensive Shotgun - RemingtonDestination

5

The Effect of Destination Personality and Self-destination Congruity on Visitors' Intentions  

E-Print Network [OSTI]

This research was initiated from two questions: what personality San Antonio has as a tourist destination despite its being an inanimate object and what relationships there are among destination personality, self-congruity, and visitors’ intentions...

Lim, Seonghwan

2013-03-28T23:59:59.000Z

6

FUPWG Meeting Agenda - Destin, FL | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Destin, FL FUPWG Meeting Agenda - Destin, FL Going coastal for energy efficiency. FUPWG. April 15-16, 2008, Destin, Florida Gulf Power: A Southern Company FEMP logo April 15-16,...

7

Visual Representations of Puerto Rico in Destination Marketing Materials  

E-Print Network [OSTI]

the perceptions that local residents have of their own countries as tourist destinations. Local residents can provide valuable information about their countries as tourism destinations and can help tourism marketers determine how to represent local culture in more...

Davila Rodriguez, Mary Ann

2012-10-19T23:59:59.000Z

8

Tourism destinations as digital business ecosystems  

E-Print Network [OSTI]

Tourism has been experiencing very relevant changes since when Information and Communication Technologies (ICTs), in all their forms, have started to pervade the industry and the market. In the last decade, a new concept gained the attention of both researchers and practitioners, that of Digital Business Ecosystem (DBE). It can be considered as a technological infrastructure aimed at creating a digital environment to support and enhance networking between enterprises and stakeholders operating within a sector. Aim of this paper is to assess the extent to which the technological connection has affected the structural configuration of the tourism system and, specifically, of tourism destinations. The present study argues that two components can be considered when assessing the relationships among stakeholders within a tourism destination: a real and a virtual one. Further it shows how these two components are structurally strongly coupled and co-evolve forming a single system.

Baggio, Rodolfo

2012-01-01T23:59:59.000Z

9

2010 Manufacturing Energy and Carbon Footprints: Definitions...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Definitions and Assumptions 2010 Manufacturing Energy and Carbon Footprints: Definitions and Assumptions This 13-page document defines key terms and details assumptions and...

10

Research Destination Turkey: Workshop Series on "European and  

E-Print Network [OSTI]

Research Destination Turkey: Workshop Series on "European and National Funding Opportunities in Turkish. #12;Research Destination Turkey : Workshop Series on "European and National Funding Opportunities Council of Turkey (TÃ?BTAK) will organize workshop on January 24, 2014 in Berlin, Germany. The event aims

Hasýrcý, Vasýf

11

Amyloid Treatment and Research Program key research findings: Definition of the electron microscopic structure and x-ray diffraction pattern of amyloid  

E-Print Network [OSTI]

, which for the first time defined the biochemical nature and source of the amyloid fibril in this form microscopic structure and x-ray diffraction pattern of amyloid fibrils in 1967, providing key insight of amyloidosis. Characterization of the protein deposits in dialysis-associated amyloidosis as 2- microglobulin

Finzi, Adrien

12

Impacts of a popular motion picture on destination images  

E-Print Network [OSTI]

The influence of popular motion pictures upon the formation of destination perceptions has received some attention in the tourism literature. Previous empirical studies have examined the effects of movies on visitation to places they depict...

Kim, Hyounggon

2012-06-07T23:59:59.000Z

13

Communication Definitions... general definition  

E-Print Network [OSTI]

Communication Definitions... general definition "the process of conveying information from a sender to a receiver with the use of a medium in which the communicated information is understood the same way by both sender and receiver" (Wikipedia)! Biological communication Action by one organism (individual

Jones, Ian L.

14

ECO-GATEWAY! AUCKLAND'S EMERGING ROLE AS AN ECOTOURISM DESTINATION  

E-Print Network [OSTI]

1 ECO-GATEWAY! AUCKLAND'S EMERGING ROLE AS AN ECOTOURISM DESTINATION Chloe K. H. Lau* and Charles S.johnston@aut.ac.nz INTRODUCTION According to the World Tourism Organization (WTO), ecotourism is the fastest growing market within well documented is the growth of the supply of ecotourism resources and products. New Zealand

15

2012 Graduate Destination Report for ANU College of Engineering & Computer  

E-Print Network [OSTI]

-long professions and objectives. Please note that completion of the AGS is voluntary and the statistics do Higher degree research 22 Overall - Total 160 2012 Graduate Destination Report for CECS 1 #12;Employment employment, and whether they were working full time or seeking full-time employment at the time of the survey

16

Definition and Validation of the Key  

E-Print Network [OSTI]

of information and computing sciences, utrecht university technical report UU-CS-2005-041 www.cs.uu.nl #12 Sciences Utrecht University Utrecht, The Netherlands slinger.jansen@cs.uu.nl Sjaak Brinkkemper Institute for Information and Computing Sciences Utrecht University Utrecht, The Netherlands s.brinkkemper@cs.uu.nl ABSTRACT

Utrecht, Universiteit

17

Knowledge transfer in a tourism destination: the effects of a network structure  

E-Print Network [OSTI]

Tourism destinations have a necessity to innovate to remain competitive in an increasingly global environment. A pre-requisite for innovation is the understanding of how destinations source, share and use knowledge. This conceptual paper examines the nature of networks and how their analysis can shed light upon the processes of knowledge sharing in destinations as they strive to innovate. The paper conceptualizes destinations as networks of connected organizations, both public and private, each of which can be considered as a destination stakeholder. In network theory they represent the nodes within the system. The paper shows how epidemic diffusion models can act as an analogy for knowledge communication and transfer within a destination network. These models can be combined with other approaches to network analysis to shed light on how destination networks operate, and how they can be optimized with policy intervention to deliver innovative and competitive destinations. The paper closes with a practical tou...

Baggio, R

2009-01-01T23:59:59.000Z

18

Origin State Destination State STB EIA STB EIA Alabama  

Gasoline and Diesel Fuel Update (EIA)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) " ,"ClickPipelines About U.S.30Natural Gas,095,3628,527 9,029 8,794 2011-2013DecadeDelawareState Destination

19

E-Print Network 3.0 - assist device destination Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Box Platform for Home Media Applications Contributed Paper Summary: , and then the system filters and presents compatible potential destinations in a menu. Fig. 3. When multiple...

20

Salt tectonism and seismic stratigraphy of the Upper Jurassic in the Destin Dome Region, northeastern Gulf of Mexico  

E-Print Network [OSTI]

in the Norphlet Formation (Bearden and Mink, 1989). Comprehensive high-quality multifold seismic reflection data have not previously been available for detailed seismic stratigraphic analysis in the Destin Dome region. Establishment of a seismic stratigraphic... DD-2 Destin Dome Exxon 162 17 938 P, V, G, S, SP, R, D DD-3 Destin Dome Sun Oil 166 17 608 P, V, G, S, SP, D DD-4 Destin Dome Gulf 360 20 988 P, V, G, S, SP, R, D DD-5 Destin Dome Chevron 422 22 222 V, G, S, SP, R, D DD-6 Destin Dome Sohio...

MacRae, Grant

1990-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "destination definitions key" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Destinations Directory The directory of more than 8,000 universities, agencies  

E-Print Network [OSTI]

TOEFL® Destinations Directory The directory of more than 8,000 universities, agencies and other institutions that accept TOEFL scores. #12;In the TOEFL Destinations Directory you'll find a list of more than programs This directory is updated and published quarterly. For the most recent listings and to view

Takada, Shoji

22

A maximum entropy-least squares estimator for elastic origin-destination trip matrix estimation  

E-Print Network [OSTI]

A maximum entropy-least squares estimator for elastic origin- destination trip matrix estimation propose a combined maximum entropy-least squares (ME-LS) estimator, by which O- D flows are distributed-destination trip table; elastic demand; maximum entropy; least squares; subnetwork analysis; convex combination

Kockelman, Kara M.

23

The relationship of travel agents and consumer travel magazines concerning the travel destinations of tourists using travel agencies  

E-Print Network [OSTI]

important. Also important are travel agents, those professionals who may play a large role in helping tourists determine their travel destinations. Another potentially important factor in determining travel destinations is consumer travel magazines...

Tomlinson, Beverly

2013-02-22T23:59:59.000Z

24

Investigating the Use of Destination Math in an Urban School District  

E-Print Network [OSTI]

INVESTIGATING THE USE OF DESTINATION MATH IN AN URBAN SCHOOL DISTRICT A Dissertation by WILLIAM DAVID TELFORD, JR. Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree... of DOCTOR OF PHILOSOPHY August 2011 Major Subject: Educational Administration INVESTIGATING THE USE OF DESTINATION MATH IN AN URBAN SCHOOL DISTRICT A Dissertation by WILLIAM DAVID TELFORD, JR. Submitted to the Office of Graduate Studies of Texas A&M...

Telford, William David

2011-10-21T23:59:59.000Z

25

Search thousands of travel therapy destinations at: http://www.advanced-medical.net  

E-Print Network [OSTI]

Search thousands of travel therapy destinations at: http://www.advanced-medical.net Why do new grads travel with Advanced Medical? Mentorship: With accomplished mentors, new grad friendly facilities, and robust clinical support, trust Advanced Medical to take your professional growth seriously. Advanced

Weber, David J.

26

Multiple-Source and Multiple-Destination Charge Migration in Hybrid Electrical Energy Storage Systems*  

E-Print Network [OSTI]

Multiple-Source and Multiple-Destination Charge Migration in Hybrid Electrical Energy Storage massimo.poncino@polito.it Abstract-- Hybrid electrical energy storage (HEES) systems consist of multiple banks of heterogeneous electrical energy storage (EES) elements that are connected to each other through

Pedram, Massoud

27

Minimizing Pathogen Transmission at Primate Ecotourism Destinations: The Need for Input from Travel Medicine  

E-Print Network [OSTI]

I SM T 229 EDITORIAL Minimizing Pathogen Transmission at Primate Ecotourism Destinations: The Need. Ecotourism is a sustainable version of nature tourism with the following components: · Contributes for rural people (p. 10).3 Ecotourism accounts for a significant proportion of all international tourism

Muehlenbein, Michael

28

1 A MAXIMUM ENTROPY METHOD FOR SUBNETWORK ORIGIN-DESTINATION 2 TRIP MATRIX ESTIMATION  

E-Print Network [OSTI]

1 A MAXIMUM ENTROPY METHOD FOR SUBNETWORK ORIGIN-DESTINATION 2 TRIP MATRIX ESTIMATION 3 4 Chi Xie 5, maximum entropy, linearization 36 algorithm, column generation 37 #12;C. Xie, K.M. Kockelman and S is the trip matrix of the simplified network. This paper discusses a5 maximum entropy method

Kockelman, Kara M.

29

Public Key Cryptography and Key Management  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The use and management of certificate-based public key cryptography for the Department of Energy (DOE) requires the establishment of a public key infrastructure (PKI). This chapter defines the policy related to roles, requirements, and responsibilities for establishing and maintaining a DOE PKI and the documentation necessary to ensure that all certificates are managed in a manner that maintains the overall trust required to support a viable PKI. Canceled by DOE N 251.112.

2000-02-15T23:59:59.000Z

30

Key Milestones/Outlook  

Broader source: Energy.gov [DOE]

Key Milestones/Outlook per the Department of Energy 2015 Congressional Budget Request, Environmental Management, March 2014

31

Rcolte des piments par les femmes destination du march national, pour la production de harissa  

E-Print Network [OSTI]

notamment. La plaine de Kairouan abrite des cultures irriguées très diversifiées : maraîchage, arboriculture et fourrage destinés au marché national et international. Le Merguellil et la plaine de Kairouan En'exploiter les eaux de la retenue pour développer l'irrigation de la plaine de Kairouan, en aval. Très vite, du

32

Quantum dense key distribution  

SciTech Connect (OSTI)

This paper proposes a protocol for quantum dense key distribution. This protocol embeds the benefits of a quantum dense coding and a quantum key distribution and is able to generate shared secret keys four times more efficiently than the Bennet-Brassard 1984 protocol. We hereinafter prove the security of this scheme against individual eavesdropping attacks, and we present preliminary experimental results, showing its feasibility.

Degiovanni, I.P.; Ruo Berchera, I.; Castelletto, S.; Rastello, M.L.; Bovino, F.A.; Colla, A.M.; Castagnoli, G. [Istituto Elettrotecnico Nazionale G. Ferraris, Strada delle Cacce 91, 10135 Torino (Italy); ELSAG SpA, Via Puccini 2, 16154, Genova (Italy)

2004-03-01T23:59:59.000Z

33

The Web Services Vision Definition of Web Services  

E-Print Network [OSTI]

1 The Web Services Vision Overview Definition of Web Services Key concepts Difference from traditional web model Context Service-oriented architecture Distributed computing Overview Microsoft .NET vision Web Services Difference from traditional web model Context Service-oriented architecture

Cheverst, Keith

34

Key Events Timeline  

Broader source: Energy.gov [DOE]

This document lists key events beginning with the April 20 fire on the Deepwater Horizon through July 28th. Updated July 28, 2010.

35

Definitions of dwelling  

E-Print Network [OSTI]

Home is an elusive concept. In one manner it is highly specific and individual in its definition, and in other aspects it is ubiquitous, present in our every act. In this thesis I explore several possible definitions of ...

Olgyay, Victor W. (Victor Wayne)

1986-01-01T23:59:59.000Z

36

Optical key system  

DOE Patents [OSTI]

An optical key system comprises a battery-operated optical key and an isolated lock that derives both its operating power and unlock signals from the correct optical key. A light emitting diode or laser diode is included within the optical key and is connected to transmit a bit-serial password. The key user physically enters either the code-to-transmit directly, or an index to a pseudorandom number code, in the key. Such person identification numbers can be retained permanently, or ephemeral. When a send button is pressed, the key transmits a beam of light modulated with the password information. The modulated beam of light is received by a corresponding optical lock with a photovoltaic cell that produces enough power from the beam of light to operate a password-screen digital logic. In one application, an acceptable password allows a two watt power laser diode to pump ignition and timing information over a fiberoptic cable into a sealed engine compartment. The receipt of a good password allows the fuel pump, spark, and starter systems to each operate. Therefore, bypassing the lock mechanism as is now routine with automobile thieves is pointless because the engine is so thoroughly disabled.

Hagans, Karla G. (Livermore, CA); Clough, Robert E. (Danville, CA)

2000-01-01T23:59:59.000Z

37

TICKS: KEY TO GENERA IN UNITED STATES Harry D. Pratt  

E-Print Network [OSTI]

·38 TICKS: KEY TO GENERA IN UNITED STATES Harry D. Pratt I Capitulum inferior; scutum absent. without definite sutural line. anus, indistinct, or absent. j ~ I lated .... ~ :. / ORNITHODOROS I ment Mouthparts much longer than ..~".'LJv--_, .0",,,,L } }_..., ---'~':r,.-.__.{ Mouthparts as long as basis

38

Cryptographic Key Management System  

SciTech Connect (OSTI)

This report summarizes the outcome of U.S. Department of Energy (DOE) contract DE-OE0000543, requesting the design of a Cryptographic Key Management System (CKMS) for the secure management of cryptographic keys for the energy sector infrastructure. Prime contractor Sypris Electronics, in collaboration with Oak Ridge National Laboratories (ORNL), Electric Power Research Institute (EPRI), Valicore Technologies, and Purdue University's Center for Education and Research in Information Assurance and Security (CERIAS) and Smart Meter Integration Laboratory (SMIL), has designed, developed and evaluated the CKMS solution. We provide an overview of the project in Section 3, review the core contributions of all contractors in Section 4, and discuss bene#12;ts to the DOE in Section 5. In Section 6 we describe the technical construction of the CKMS solution, and review its key contributions in Section 6.9. Section 7 describes the evaluation and demonstration of the CKMS solution in different environments. We summarize the key project objectives in Section 8, list publications resulting from the project in Section 9, and conclude with a discussion on commercialization in Section 10 and future work in Section 11.

No, author

2014-02-21T23:59:59.000Z

39

Demand Response in the U.S.- Key trends and federal facility participation  

Broader source: Energy.gov [DOE]

Presentation—given at the Federal Utility Partnership Working Group (FUPWG) Fall 2008 meeting—provides demand response (DR) definition, current status of DR in the United States, key DR trends, and federal participation issues.

40

ARM - Key Science Questions  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc Documentation RUC : XDCResearch Related Information Collaborations Meetings ofgovScienceKey

Note: This page contains sample records for the topic "destination definitions key" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Modelling of a 400m2 steam based Paraboloidal Dish Siangsukone & Lovegrove ANZSES 2003 Destination Renewables 79 copyright  

E-Print Network [OSTI]

cavity receiver, steam line and steam engine. These component models are based on transient model using dish "BigDish" with a 50 kWe steam engine completed on the ANU campus in 1994. Dish-based Solar ThermalModelling of a 400m2 steam based Paraboloidal Dish Siangsukone & Lovegrove ANZSES 2003 Destination

42

NETL: Key Staff  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recovery challengeMultiscaleLogos NERSCJeffreyKey Actions forEnergy Systems

43

Key recycling in authentication  

E-Print Network [OSTI]

In their seminal work on authentication, Wegman and Carter propose that to authenticate multiple messages, it is sufficient to reuse the same hash function as long as each tag is encrypted with a one-time pad. They argue that because the one-time pad is perfectly hiding, the hash function used remains completely unknown to the adversary. Since their proof is not composable, we revisit it using a composable security framework. It turns out that the above argument is insufficient: if the adversary learns whether a corrupted message was accepted or rejected, information about the hash function is leaked, and after a bounded finite amount of rounds it is completely known. We show however that this leak is very small: Wegman and Carter's protocol is still $\\epsilon$-secure, if $\\epsilon$-almost strongly universal$_2$ hash functions are used. This implies that the secret key corresponding to the choice of hash function can be reused in the next round of authentication without any additional error than this $\\epsilon$. We also show that if the players have a mild form of synchronization, namely that the receiver knows when a message should be received, the key can be recycled for any arbitrary task, not only new rounds of authentication.

Christopher Portmann

2014-09-29T23:59:59.000Z

44

Key-shift transmission  

SciTech Connect (OSTI)

A key-shift transmission is described, characterized by the speed-change shaft being divided into a pair of trough-shaped shaft halves each having an arched inner surface which defines a part of a cylindrical bore extending axially through the speed-change shaft thereby the shaft being formed into a hollow shaft, and by each of the shaft halves including a pair of flattened end surfaces which extend axially of each shaft half at both sides of the inner surface, one of the end surfaces having thereon an axially elongated projection and the other of the end surfaces having herein an axially elongated recess of a depth smaller than the height of the projection. The pair of shaft halves are engaged to each other co-rotatably by fitting the projections of the respective shaft halves into the recesses of the respective shaft halves so as to form in an outer surface of the speed-change shaft a pair of elongated axial grooves which are located radially outwardly of the elongated projections of the respective shaft halves and between the flattened end surfaces of the respective shaft halves. A pair of the shift keys are disposed within the pair of elongated axial grooves.

Nemoto, S.

1989-03-07T23:59:59.000Z

45

Product definition for future electricity supply auctions: the 2006 Illinois experience  

SciTech Connect (OSTI)

Much of the discussion about new markets for electricity contracts focuses on the auction format to be used. Far less attention has been paid to the contract definition itself. An analysis of the 2006 Illinois Electricity Auction shows how a poorly formulated product definition can erode the performance of such markets. The authors propose an improved product definition to overcome the key problems they have identified. (author)

de Castro, Luciano; Negrete-Pincetic, Matias; Gross, George

2008-08-15T23:59:59.000Z

46

3 Library Regulations Definitions  

E-Print Network [OSTI]

3 Library Regulations Definitions In Regulation 3: 'Library' means the University Library as defined in Regulation 3.1; 'Library staff' means the staff of the University Library; 'Librarian' means the University Librarian and Head of Information Resources Directorate or nominee; `Library Committee' means

Mottram, Nigel

47

Definitions Numbered Space  

E-Print Network [OSTI]

Definitions · Numbered Space ­ a single space marked with a number and reserved for a single permit 24/7 · Unnumbered Space ­ a space which can be used by any customer allowed to park in that lot. High Low Average Question 4: If I buy a staff permit for an UNNUMBERED* space in a non-gated surface

Behmer, Spencer T.

48

Power/Privilege Definitions  

E-Print Network [OSTI]

Major; People's Institute for Survival and Beyond, New Orleans 2. Power is the ability to define reality and to convince other people that it is their definition. ~ Dr. Wade Nobles 3. Power is the capacity to act. 4 different cultures. [JL] RACISM Racism is race prejudice plus power [See Racist]. People's Institute calls

Sheridan, Jennifer

49

Definition Is it real?  

E-Print Network [OSTI]

Times) ­ "The price of oil and the pace of freedom always move in opposite directions in oil01-1 · Definition · Is it real? · Consequences MinE 422: Peak Oil Background · How an oil field works ... decline curve #12;01-2 Peak Oil, the Hubbert Peak · Consider an amalgamation of many wells

Boisvert, Jeff

50

Table Definitions, Sources, and Explanatory Notes  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security AdministrationcontrollerNanocrystallineForeign ObjectOUR Table 1.Number ofExports Definitions Key Terms

51

Table Definitions, Sources, and Explanatory Notes  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security AdministrationcontrollerNanocrystallineForeign ObjectOUR Table 1.Number ofExports Definitions Key

52

Table Definitions, Sources, and Explanatory Notes  

Annual Energy Outlook 2013 [U.S. Energy Information Administration (EIA)]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) " ,"ClickPipelines AboutDecemberSteamYear Jan FebThousand CubicinResidual FuelYield Definitions Key Terms

53

Table Definitions, Sources, and Explanatory Notes  

Annual Energy Outlook 2013 [U.S. Energy Information Administration (EIA)]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) " ,"ClickPipelines AboutDecemberSteamYear Jan FebThousand CubicinResidual FuelYield Definitions Key

54

Quantum key distribution with key extracted from basis information  

E-Print Network [OSTI]

In conventional quantum key distribution protocols, the secure key is normally extracted from the measurement outcomes of the system. Here, a different approach is proposed, where the secure key is extracted from the measurement bases, rather than outcomes. Compared to the original Bennett-Brassard-1984 protocol, the proposed protocol involves no hardware change but modifications in data postprocessing. We show that this protocol is more robust against detector efficiency attacks and photon-number-splitting attacks when practical detectors and photon sources are used.

Xiongfeng Ma

2014-10-20T23:59:59.000Z

55

Tomography increases key rates of quantum-key-distribution protocols  

E-Print Network [OSTI]

We construct a practically implementable classical processing for the BB84 protocol and the six-state protocol that fully utilizes the accurate channel estimation method, which is also known as the quantum tomography. Our proposed processing yields at least as high key rate as the standard processing by Shor and Preskill. We show two examples of quantum channels over which the key rate of our proposed processing is strictly higher than the standard processing. In the second example, the BB84 protocol with our proposed processing yields a positive key rate even though the so-called error rate is higher than the 25% limit.

Shun Watanabe; Ryutaroh Matsumoto; Tomohiko Uyematsu

2008-07-22T23:59:59.000Z

56

Definitions: Types of Commissioning  

E-Print Network [OSTI]

Workshop on the Continuous Commissioning® Process Joseph T. Martinez, PCC Carlos Yagua, PE Hiroko Masuda, Juan-Carlos Baltazar, PhD, PE Ahmet Ugursal, PhD Clean Air Through Energy Efficiency (CATEE) Conference, Dallas, Texas. November 18, 2014... 5. Continuous Commissioning Measures 6. Measurement and Verification ESL-KT-14-11-41 CATEE 2014: Clean Air Through Efficiency Conference, Dallas, Texas Nov. 18-20 Definitions: Types of Commissioning Joseph T. Martinez, PCC Carlos Yagua, PE Hiroko...

Martinez, J. T.

2014-01-01T23:59:59.000Z

57

The LOFAR Transients Key Project  

E-Print Network [OSTI]

LOFAR, the Low Frequency Array, is a new radio telescope under construction in the Netherlands, designed to operate between 30 and 240 MHz. The Transients Key Project is one of the four Key Science Projects which comprise the core LOFAR science case. The remit of the Transients Key Project is to study variable and transient radio sources detected by LOFAR, on timescales from milliseconds to years. This will be achieved via both regular snapshot monitoring of historical and newly-discovered radio variables and, most radically, the development of a `Radio Sky Monitor' which will survey a large fraction of the northern sky on a daily basis.

Rob Fender; Robert Braun; Ben Stappers; Ralph Wijers; Michael Wise; Thijs Coenen; Heino Falcke; Jean-Mathias Griessmeier; Michiel van Haarlem; Peter Jonker; Casey Law; Sera Markoff; Joseph Masters; James Miller-Jones; Rachel Osten; Bart Scheers; Hanno Spreeuw; John Swinbank; Corina Vogt; Rudy Wijnands; Philippe Zarka

2006-11-09T23:59:59.000Z

58

Key Issues | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:YearRound-UpHeatMulti-Dimensionalthe10 DOEWashington, DC 20585on253.16582104)Key Issues Key Issues

59

Key Activities | Department of Energy  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGY TAX POLICIES7.pdfFuel2007 | Department7JanuaryWASTE-TO-ENERGY:About » KeyKey

60

Key Activities | Department of Energy  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGY TAX POLICIES7.pdfFuel2007 | Department7JanuaryWASTE-TO-ENERGY:About » KeyKeyAbout the

Note: This page contains sample records for the topic "destination definitions key" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Monroe County Extension Services Key West Office  

E-Print Network [OSTI]

Energy Services: 305-295-1010 Florida Keys Electric Co-op: 305-852-2431 Monroe County Roads & Bridges-292-4501 http://monroe.ifas.ufl.edu Key Largo Office: 102050 Overseas Highway, Room 244 City and County Tree Lower Keys: 305-797-4929 Upper Keys: 305-852-7161 Contact local tree services throughout the Keys

Jawitz, James W.

62

Key-Insulated Symmetric Key Cryptography and Mitigating Attacks against Cryptographic Cloud Software  

E-Print Network [OSTI]

Key-Insulated Symmetric Key Cryptography and Mitigating Attacks against Cryptographic Cloud- sociated cryptographic keys in their entirety. In this paper, we investigate key-insulated symmetric key. To illustrate the feasibility of key-insulated symmetric key cryptography, we also report a proof

Dodis, Yevgeniy

63

Development of an alternate pathway for materials destined for disposition to WIPP  

SciTech Connect (OSTI)

The Los Alamos National Laboratory currently has an inventory of process residues that may be viable candidates for disposition to the Waste Isolation Pilot Project (WIPP) located at Carlsbad, New Mexico. A recent 'Attractiveness Level D' exemption allows for the discard of specified intractable materials regardless of the percent plutonium. However, the limits with respect to drum loadings must be met. Cementation is a key component of the aqueous nitrate flowsheet and serves as a 'bleed-off' stream for impurities separated from the plutonium during processing operations. The main 'feed' to the cementation operations are the 'bottoms' from the evaporation process. In the majority of cases, the cemented bottoms contain less than the allowed amount per drum for WIPP acceptance. This project would expand the route to WIPP for items that have no defined disposition path, are difficult to process, have been through multiple passes, have no current recovery operations available to recover the plutonium and that are amenable to cementation. This initial work will provide the foundation for a full scale disposition pathway of the candidate materials. Once the pathway has been expanded and a cementation matrix developed, routine discard activities will be initiated.

Ayers, Georgette Y [Los Alamos National Laboratory; Mckerley, Bill [Los Alamos National Laboratory; Veazey, Gerald W [Los Alamos National Laboratory; Ricketts, Thomas E [Los Alamos National Laboratory

2010-01-01T23:59:59.000Z

64

Brain Receptor Structures Key to Future Therapeutics  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Brain Receptor Structures Key to Future Therapeutics Brain Receptor Structures Key to Future Therapeutics Print Wednesday, 28 January 2015 00:00 With an aging population in...

65

Key Activities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGYWomen OwnedofDepartment ofJared Temanson - Project LeaderDepartment's DirectivesKey

66

Key Activities | Department of Energy  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGY TAX POLICIES7.pdfFuel2007 | Department7JanuaryWASTE-TO-ENERGY:About » Key

67

Public/private key certification authority and key distribution. Draft  

SciTech Connect (OSTI)

Traditional encryption, which protects messages from prying eyes, has been used for many decades. The present concepts of encryption are built from that heritage. Utilization of modern software-based encryption techniques implies much more than simply converting files to an unreadable form. Ubiquitous use of computers and advances in encryption technology coupled with the use of wide-area networking completely changed the reasons for utilizing encryption technology. The technology demands a new and extensive infrastructure to support these functions. Full understanding of these functions, their utility and value, and the need for an infrastructure, takes extensive exposure to the new paradigm. This paper addresses issues surrounding the establishment and operation of a key management system (i.e., certification authority) that is essential to the successful implementation and wide-spread use of encryption.

Long, J.P.; Christensen, M.J.; Sturtevant, A.P.; Johnston, W.E.

1995-09-25T23:59:59.000Z

68

COLLEGE AVE CAMPUS (CAC) KEY PICK UP  

E-Print Network [OSTI]

COLLEGE AVE CAMPUS (CAC) KEY PICK UP NOTE TO ALL STUDENTS: ONLY YOU CAN PICK UP YOUR KEY. You in and key pick up. If you are unable to pick up your key by 5:00 p.m. on September 1st , please make prior in Clothier Hall on CAC. Keys not picked up during the above-noted hours can be picked up at the Housing

69

DEFINITIONS / KEY WORDS POSSIBLE DUTIES EXAMPLE TITLE NAMES A person who works to someone else's  

E-Print Network [OSTI]

these types of jobs are identified using only Custodian, Janitor, Housekeeper, etc. 1,2 Apprentice Apprentice Woodworker, Apprentice Weaver, Apprentice Blacksmith, etc 1,2 Office / Admin. Manage ment assist in training an apprentice or managing other workers. A highly skilled workman, artisan

Baltisberger, Jay H.

70

The position of the Rio Grande Valley relative to competing winter destinations from the perspectives of prospective, first time and repeat visitors  

E-Print Network [OSTI]

of an active information search; and (3) refinement of the induced image into a complex image which emerges after a first-hand experience at the destination. The results of the factor analysis and ANOVAs revealed that temperature and security, social... assisted with information and ideas for this study. Their priceless contribution is genuinely appreciated. Dr. John L. Crompton, my Committee Chairman, deserves special thanks. His talents as an excellent professor, brilliant writer, and great...

Fakeye, Paul Cocou

1989-01-01T23:59:59.000Z

71

Answering Key Fuel Cycle Questions  

SciTech Connect (OSTI)

The Advanced Fuel Cycle Initiative (AFCI) program has both “outcome” and “process” goals because it must address both waste already accumulating as well as completing the fuel cycle in connection with advanced nuclear power plant concepts. The outcome objectives are waste geological repository capacity and cost, energy security and sustainability, proliferation resistance, fuel cycle economics, and safety. The process objectives are readiness to proceed and adaptability and robustness in the face of uncertainties. A classic decision-making approach to such a multi-attribute problem would be to weight individual quantified criteria and calculate an overall figure of merit. This is inappropriate for several reasons. First, the goals are not independent. Second, the importance of different goals varies among stakeholders. Third, the importance of different goals is likely to vary with time, especially the “energy future.” Fourth, some key considerations are not easily or meaningfully quantifiable at present. Instead, at this point, we have developed 16 questions the AFCI program should answer and suggest an approach of determining for each whether relevant options improve meeting each of the program goals. We find that it is not always clear which option is best for a specific question and specific goal; this helps identify key issues for future work. In general, we suggest attempting to create as many win-win decisions (options that are attractive or neutral to most goals) as possible. Thus, to help clarify why the program is exploring the options it is, and to set the stage for future narrowing of options, we have developed 16 questions, as follows: · What are the AFCI program goals? · Which potential waste disposition approaches do we plan for? · What are the major separations, transmutation, and fuel options? · How do we address proliferation resistance? · Which potential energy futures do we plan for? · What potential external triggers do we plan for? · Should we separate uranium? · If we separate uranium, should we recycle it, store it or dispose of it? · Is it practical to plan to fabricate and handle “hot” fuel? · Which transuranic elements (TRU) should be separated and transmuted? · Of those TRU separated, which should be transmuted together? · Should we separate and/or transmute Cs and Sr isotopes that dominate near-term repository heating? · Should we separate and/or transmute very long-lived Tc and I isotopes? · Which separation technology? · What mix of transmutation technologies? · What fuel technology best supports the above decisions?

Steven J. Piet; Brent W. Dixon; J. Stephen Herring; David E. Shropshire; Mary Lou Dunzik-Gougar

2003-10-01T23:59:59.000Z

72

Lightweight Key Establishment for Distributed Networking Environments  

E-Print Network [OSTI]

/ COSIC Seminar 2007 Keith Martin #12;Lightweight Key Establishment/Introduction The plan 1. Wireless sensor networks 2. A key establishment framework 3. Key establishment for grids COSIC Seminar 2007 Keith Establishment/Wireless sensor networks The "classical" scenario COSIC Seminar 2007 Keith Martin #12;Lightweight

Martin, Keith

73

Entropy and Energy: Toward a Definition of Physical Sustainability  

E-Print Network [OSTI]

usefulness of entropy-energy definition of sustainability asEntropy and Energy: Toward a Definition of Physicaland energy should be included in the desired definition of

Hermanowicz, Slawomir W

2005-01-01T23:59:59.000Z

74

conference clips DESTINATION  

E-Print Network [OSTI]

-winning Gallery at Snyder/Phillips for $50 per day when they stay four weeks or longer. Owen Hall is centrally. The Gallery at Snyder/Phillips is close by and provides guests with exceptional, all-you-care-to-eat dining Venue at Shaw Hall, rendering of the renovated Armstrong Hall #12;Welcome, Odyssey of the Mind

75

Origin State Destination State  

Gasoline and Diesel Fuel Update (EIA)

-4.9 -3.3 Illinois Pennsylvania - - W - - Illinois Tennessee 4.21 3.54 W W W Illinois West Virginia W 14.15 W W W Illinois Wisconsin - - W - - Indiana Alabama W 18.38 20.54...

76

By Coal Destination State  

Annual Energy Outlook 2013 [U.S. Energy Information Administration (EIA)]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) " ,"ClickPipelines AboutDecemberSteam Coal Import CostsLiquidsYearReserves (Billion5:July 22, 20131Detailed0

77

By Coal Destination State  

Annual Energy Outlook 2013 [U.S. Energy Information Administration (EIA)]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) " ,"ClickPipelines AboutDecemberSteam Coal Import CostsLiquidsYearReserves (Billion5:July 22,

78

By Coal Destination State  

Annual Energy Outlook 2013 [U.S. Energy Information Administration (EIA)]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) " ,"ClickPipelines AboutDecemberSteam Coal Import CostsLiquidsYearReserves (Billion5:July 22,0 U.S. Energy

79

By Coal Destination State  

Annual Energy Outlook 2013 [U.S. Energy Information Administration (EIA)]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) " ,"ClickPipelines AboutDecemberSteam Coal Import CostsLiquidsYearReserves (Billion5:July 22,0 U.S. Energy0

80

By Coal Destination State  

Annual Energy Outlook 2013 [U.S. Energy Information Administration (EIA)]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) " ,"ClickPipelines AboutDecemberSteam Coal Import CostsLiquidsYearReserves (Billion5:July 22,0 U.S. Energy01

Note: This page contains sample records for the topic "destination definitions key" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

By Coal Destination State  

Annual Energy Outlook 2013 [U.S. Energy Information Administration (EIA)]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) " ,"ClickPipelines AboutDecemberSteam Coal Import CostsLiquidsYearReserves (Billion5:July 22,0 U.S.

82

By Coal Destination State  

Annual Energy Outlook 2013 [U.S. Energy Information Administration (EIA)]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) " ,"ClickPipelines AboutDecemberSteam Coal Import CostsLiquidsYearReserves (Billion5:July 22,0 U.S.1 U.S.

83

By Coal Destination State  

Annual Energy Outlook 2013 [U.S. Energy Information Administration (EIA)]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) " ,"ClickPipelines AboutDecemberSteam Coal Import CostsLiquidsYearReserves (Billion5:July 22,0 U.S.1 U.S.1

84

By Coal Destination State  

Annual Energy Outlook 2013 [U.S. Energy Information Administration (EIA)]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) " ,"ClickPipelines AboutDecemberSteam Coal Import CostsLiquidsYearReserves (Billion5:July 22,0 U.S.1 U.S.12

85

Origin State Destination State  

Gasoline and Diesel Fuel Update (EIA)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) " ,"ClickPipelines About U.S.30 2013 Macroeconomicper ThousandResidentialElements) GasYeara. Real

86

Origin State Destination State  

Gasoline and Diesel Fuel Update (EIA)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) " ,"ClickPipelines About U.S.30 2013 Macroeconomicper ThousandResidentialElements) GasYeara. Realb. Real

87

Origin State Destination State  

Gasoline and Diesel Fuel Update (EIA)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) " ,"ClickPipelines About U.S.30 2013 Macroeconomicper ThousandResidentialElements) GasYeara. Realb.

88

Origin State Destination State  

Gasoline and Diesel Fuel Update (EIA)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) " ,"ClickPipelines About U.S.30Natural Gas,095,3628,527 9,029 8,794 2011-2013DecadeDelaware W $28.495.

89

Origin State Destination State  

Gasoline and Diesel Fuel Update (EIA)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) " ,"ClickPipelines About U.S.30Natural Gas,095,3628,527 9,029 8,794 2011-2013DecadeDelaware W $28.495.6.

90

Origin State Destination State  

Gasoline and Diesel Fuel Update (EIA)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) " ,"ClickPipelines About U.S.30Natural Gas,095,3628,527 9,029 8,794 2011-2013DecadeDelaware W $28.495.6.7.

91

Origin State Destination State  

Gasoline and Diesel Fuel Update (EIA)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) " ,"ClickPipelines About U.S.30Natural Gas,095,3628,527 9,029 8,794 2011-2013DecadeDelaware W $28.495.6.7.8.

92

Origin State Destination State  

Gasoline and Diesel Fuel Update (EIA)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) " ,"ClickPipelines About U.S.30Natural Gas,095,3628,527 9,029 8,794 2011-2013DecadeDelaware W

93

Origin State Destination State  

Gasoline and Diesel Fuel Update (EIA)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) " ,"ClickPipelines About U.S.30Natural Gas,095,3628,527 9,029 8,794 2011-2013DecadeDelaware W4. Estimated

94

Origin State Destination State  

Gasoline and Diesel Fuel Update (EIA)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) " ,"ClickPipelines About U.S.30Natural Gas,095,3628,527 9,029 8,794 2011-2013DecadeDelaware W4. Estimated5.

95

Origin State Destination State  

Gasoline and Diesel Fuel Update (EIA)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) " ,"ClickPipelines About U.S.30Natural Gas,095,3628,527 9,029 8,794 2011-2013DecadeDelaware W4.

96

Origin State Destination State  

Gasoline and Diesel Fuel Update (EIA)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) " ,"ClickPipelines About U.S.30Natural Gas,095,3628,527 9,029 8,794 2011-2013DecadeDelaware W4.Estimated

97

Origin State Destination State  

Gasoline and Diesel Fuel Update (EIA)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) " ,"ClickPipelines About U.S.30Natural Gas,095,3628,527 9,029 8,794 2011-2013DecadeDelaware W4.Estimated8.

98

Basin Destination State  

Gasoline and Diesel Fuel Update (EIA)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) " ,"ClickPipelines About U.S.30Natural Gas Glossary529 633 622 566 8021 1 2 22008662 564 1,1460

99

Basin Destination State  

Gasoline and Diesel Fuel Update (EIA)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) " ,"ClickPipelines About U.S.30Natural Gas Glossary529 633 622 566 8021 1 2 22008662 564 1,1460$0.0323

100

Basin Destination State  

Gasoline and Diesel Fuel Update (EIA)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) " ,"ClickPipelines About U.S.30Natural Gas Glossary529 633 622 566 8021 1 2 22008662 564 1,1460$0.032343

Note: This page contains sample records for the topic "destination definitions key" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Basin Destination State  

Gasoline and Diesel Fuel Update (EIA)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) " ,"ClickPipelines About U.S.30Natural Gas Glossary529 633 622 566 8021 1 2 22008662 564 1,1460$0.0323433.

102

Basin Destination State  

Gasoline and Diesel Fuel Update (EIA)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) " ,"ClickPipelines About U.S.30Natural Gas Glossary529 633 622 566 8021 1 2 22008662 564 1,1460$0.0323433.4.

103

Basin Destination State  

Gasoline and Diesel Fuel Update (EIA)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) " ,"ClickPipelines About U.S.30Natural Gas Glossary529 633 622 566 8021 1 2 22008662 564 1,1460$0.0323433.4.

104

By Coal Destination State  

Gasoline and Diesel Fuel Update (EIA)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) " ,"ClickPipelines About U.S.30Natural Gas Glossary529 633 622 566 8021 1 2 22008662 564CubicAnnual Coal

105

DESTINATION: STRIVING TO REDUCE  

E-Print Network [OSTI]

,700 employees require significant consumption of resources ­ water, fuel, electricity and all manner has earned her the National Historic Preservation Medal from the National Society of the Daughters

Hutcheon, James M.

106

Manufacturing Energy and Carbon Footprint Definitions and Assumptions...  

Broader source: Energy.gov (indexed) [DOE]

Definitions and Assumptions, October 2012 Manufacturing Energy and Carbon Footprint Definitions and Assumptions, October 2012 footprintsassumptionsdefinitions2012.pdf More...

107

Brain Receptor Structures Key to Future Therapeutics  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Brain Receptor Structures Key to Future Therapeutics Print With an aging population in America, it is more important than ever to discover ways to treat or prevent diseases...

108

Violations & Enforcement Parking Violation Definitions  

E-Print Network [OSTI]

Vehicles parked on a grade should have the emergency brake set. Keys should never be left in the ignition - · Improper parking and failure to park within lines Improper parking includes parking compact vehicles

Hong, Jason I.

109

Monroe County Extension Services Key West Office  

E-Print Network [OSTI]

-292-4501 http://monroe.ifas.ufl.edu Key Largo Office: 102050 Overseas Highway, Room 244 City and County Tree Energy Services: 305-295-1010 Florida Keys Electric Co-op: 305-852-2431 Monroe County Roads & Bridges conditions based on USDA zone, water and light requirements, soil conditions, salt and wind tolerance

Florida, University of

110

Master EM Project Definition Rating Index - Environmental Restoration Definitions  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector General Office0-72.pdfGeorgeDoesn't32 Master EM Project Definition Rating Index - Environmental

111

Master EM Project Definition Rating Index - Facility Disposition Definitions  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector General Office0-72.pdfGeorgeDoesn't32 Master EM Project Definition Rating Index - Environmental43

112

Master EM Project Definition Rating Index - Traditional (Conventional) Definitions  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector General Office0-72.pdfGeorgeDoesn't32 Master EM Project Definition Rating Index - Environmental43

113

Definitions  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation Proposed Newcatalyst phasesData Files Data Files 1B&W Y-12studies in

114

Definitions  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series to UserProduct: CrudeOffice ofINLNuclear Security |CreatingA Sign In About

115

Captured key electrical safety lockout system  

DOE Patents [OSTI]

A safety lockout apparatus for an electrical circuit includes an electrical switch, a key, a lock and a blocking mechanism. The electrical switch is movable between an ON position at which the electrical circuit is energized and an OFF position at which the electrical circuit is deactivated. The lock is adapted to receive the key and is rotatable among a plurality of positions by the key. The key is only insertable and removable when the lock is at a preselected position. The lock is maintained in the preselected position when the key is removed from the lock. The blocking mechanism physically maintains the switch in its OFF position when the key is removed from the lock. The blocking mechanism preferably includes a member driven by the lock between a first position at which the electrical switch is movable between its ON and OFF positions and a second position at which the member physically maintains the electrical switch in its OFF position. Advantageously, the driven member`s second position corresponds to the preselected position at which the key can be removed from and inserted into the lock. 7 figs.

Darimont, D.E.

1995-10-31T23:59:59.000Z

116

Captured key electrical safety lockout system  

SciTech Connect (OSTI)

A safety lockout apparatus for an electrical circuit includes an electrical switch, a key, a lock and a blocking mechanism. The electrical switch is movable between an ON position at which the electrical circuit is energized and an OFF position at which the electrical circuit is deactivated. The lock is adapted to receive the key and is rotatable among a plurality of positions by the key. The key is only insertable and removable when the lock is at a preselected position. The lock is maintained in the preselected position when the key is removed from the lock. The blocking mechanism physically maintains the switch in its OFF position when the key is removed from the lock. The blocking mechanism preferably includes a member driven by the lock between a first position at which the electrical switch is movable between its ON and OFF positions and a second position at which the member physically maintains the electrical switch in its OFF position. Advantageously, the driven member's second position corresponds to the preselected position at which the key can be removed from and inserted into the lock.

Darimont, Daniel E. (Aurora, IL)

1995-01-01T23:59:59.000Z

117

Experimental study of high speed polarization-coding quantum key distribution with sifted-key  

E-Print Network [OSTI]

and links 1. C. H. Bennet and G. Brassard, "Quantum cryptography: Public key distribution and coin tossing

118

Key Implications of the Global Economic Environment  

E-Print Network [OSTI]

Key Implications of the Global Economic Environment For PCT Filings: A Survey of the Issues DMI...............................................................................9 Annex 1: Incentives for Patent Filing: The Analytical Framework...........................11 I-1 Intellectual property, innovation, and economic growth.................................13 2-2 Individual

Lansky, Joshua

119

Extracting secret keys from integrated circuits  

E-Print Network [OSTI]

Modern cryptographic protocols are based on the premise that only authorized participants can obtain secret keys and access to information systems. However, various kinds of tampering methods have been devised to extract ...

Lim, Daihyun, 1976-

2004-01-01T23:59:59.000Z

120

Research Summary Key Ingredients of Collaborative Management  

E-Print Network [OSTI]

, wildlife management and water catchments. This project, developed in discussion with stakeholders, soughtResearch Summary Key Ingredients of Collaborative Management It is widely accepted that collaboration amongst stakeholders can lead to more sustainable land-management. Voluntary collaboration

Note: This page contains sample records for the topic "destination definitions key" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Definition RX Evaluate Kernels K-2d K-1d Change By definition undefined  

E-Print Network [OSTI]

Definition RX Evaluate Kernels K-2d K-1d Change By def·i·ni·tion undefined Adventures in anomaly Alamos National Laboratory Research supported by the United States Department of Energy through the Los Alamos Laboratory Directed Research and Development (LDRD) Program. #12;Theiler LA-UR-14-24429 Definition

Theiler, James

122

MEASUREMENT OF IMPEDANCE CHARACTERISTICS OF COMPUTER KEYBOARD KEYS1  

E-Print Network [OSTI]

of computer keyboard keys are commonly used: rubber-dome and coil-spring keys. As indicated by their names, a rubber-dome key has a rubber dome under the keycap whereas a coil-spring key has a coil spring under of keys. From a user's perspective, the rubber-dome and coil-spring keys feel different. The properties

Nagurka, Mark L.

123

Environmental labelling of green electricity with LCA key parameter models  

E-Print Network [OSTI]

Since the opening of European electricity markets, companies are launching green electricity products. In Switzerland the privately initiated eco-label “naturemade star ” ensures the environmental and ecological quality of electricity from renewable energy sources on a local scale and from a life cycle perspective. For the life cycle perspective, a simplified and partly site-specific life cycle assessment (LCA) is applied using the Eco-indicator 99 (Hierachist perspective) impact assessment method. In a first step, detailed LCAs case studies are made for power plants and technologies that are candidates for the „naturemade star “ label. They allow identifying technology-specific parameters that dominate the outcome of the LCA and for which data are available for the owner or operator of the power plant at issue. Based on this knowledge, key parameter models for photovoltaic, wind and hydroelectric power and electricity from biogas have been established on a spreadsheet-basis. With the help of the parameter models, operators of power plants can carry out the required LCA within a few hours. At the same time, they can check whether the plant fulfils the “naturemade star ” threshold or not, which has been set to 50 % of the environmental impact of a gas combined cycle power plant. Within a few months since the introduction of the labelling scheme, companies successfully applied the parameter models on nearly 50 photovoltaic and on several hydroelectric power plants. LCA is, in combination with other tools, a useful method for the definition of standards for environmental labelling of green electricity.

unknown authors

124

Mediated Semi-Quantum Key Distribution  

E-Print Network [OSTI]

In this paper, we design a new quantum key distribution protocol, allowing two limited semi-quantum or "classical" users to establish a shared secret key with the help of a fully quantum server. A semi-quantum user can only prepare and measure qubits in the computational basis and so must rely on this quantum server to produce qubits in alternative bases and also to perform alternative measurements. However, we assume that the sever is untrusted and we prove the unconditional security of our protocol even in the worst case: when this quantum server is an all-powerful adversary. We also compute a lower bound of the key rate of our protocol, in the asymptotic scenario, as a function of the observed error rate in the channel allowing us to compute the maximally tolerated error of our protocol. Our results show that a semi-quantum protocol may hold similar security to a fully quantum one.

Walter O. Krawec

2014-11-21T23:59:59.000Z

125

Public key infrastructure for DOE security research  

SciTech Connect (OSTI)

This document summarizes the Department of Energy`s Second Joint Energy Research/Defence Programs Security Research Workshop. The workshop, built on the results of the first Joint Workshop which reviewed security requirements represented in a range of mission-critical ER and DP applications, discussed commonalties and differences in ER/DP requirements and approaches, and identified an integrated common set of security research priorities. One significant conclusion of the first workshop was that progress in a broad spectrum of DOE-relevant security problems and applications could best be addressed through public-key cryptography based systems, and therefore depended upon the existence of a robust, broadly deployed public-key infrastructure. Hence, public-key infrastructure ({open_quotes}PKI{close_quotes}) was adopted as a primary focus for the second workshop. The Second Joint Workshop covered a range of DOE security research and deployment efforts, as well as summaries of the state of the art in various areas relating to public-key technologies. Key findings were that a broad range of DOE applications can benefit from security architectures and technologies built on a robust, flexible, widely deployed public-key infrastructure; that there exists a collection of specific requirements for missing or undeveloped PKI functionality, together with a preliminary assessment of how these requirements can be met; that, while commercial developments can be expected to provide many relevant security technologies, there are important capabilities that commercial developments will not address, due to the unique scale, performance, diversity, distributed nature, and sensitivity of DOE applications; that DOE should encourage and support research activities intended to increase understanding of security technology requirements, and to develop critical components not forthcoming from other sources in a timely manner.

Aiken, R.; Foster, I.; Johnston, W.E. [and others

1997-06-01T23:59:59.000Z

126

On the Security of Public Key Protocols  

E-Print Network [OSTI]

Recently the use of public key encryption to provide secure network communication has received considerable attention. Such public key systems are usually effective against passive eavesdroppers, who merely tap the lines and try to decipher the message. It has been pointed out, however, that an improperly designed protocol could be vulnerable to an active saboteur, one who may impersonate another user or alter the message being transmitted. Several models are formulated in which the security of protocols can be discussed precisely. Algorithms and characteri-zations that can be used to determine protocol security in these models are given.

Danny Dolev; et al.

1983-01-01T23:59:59.000Z

127

Quantum Metrology: Towards an alternative definition for the meter  

E-Print Network [OSTI]

The motivation for this article came from an attempt to give an alternative definition for the meter, the SI unit for measuring length. As a starting point towards this goal, in this piece of work we present the underlying theory behind our approach which uses ideas from quantum field theory and noncommutative geometry, in particular the notion of an odd K-cycle which is based on the Dirac operator (and its inverse, the Dirac propagator). Using (the perhaps more familiar) physics terminology, the key point in our strategy is this: instead of measuring length directly in space-time we measure the "algebraic (spectral) length" in the space of the corresponding quantum states of some particle (fermion) acted upon by the Dirac propagator. This approach shares the spirit of the unanimus vote of the 24th General Conference of Standards and Measures (21st October 2011) in Serves, France for the redefinition of the fundamental units using Planck's constant.

Ioannis P. Zois

2012-03-05T23:59:59.000Z

128

Pushing the Frontier of High-Definition Ion Mobility Spectrometry...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

the Frontier of High-Definition Ion Mobility Spectrometry Using FAIMS. Pushing the Frontier of High-Definition Ion Mobility Spectrometry Using FAIMS. Abstract: Differential ion...

129

Key facts about Argonne National Laboratory  

E-Print Network [OSTI]

Key facts about Argonne National Laboratory Argonne National Laboratory occupies 1,500 wooded acres in southeast DuPage County near Chicago. Mission Argonne's mission is to apply a unique blend of world needs of our nation. Argonne conducts R&D in many areas of basic and applied science and engineering

Kemner, Ken

130

CHEMICAL ABBREVIATION KEY ABBREVIATION CHEMICAL NAME HAZARDS  

E-Print Network [OSTI]

Corrosive - base LiCl Lithium chloride Harmful MeOH Methanol Flammable #12;CHEMICAL ABBREVIATION KEY Irritant destain Methanol,acetic acid,H2O Flammable, Corrosive - acid DI H2O Deionized water DCM FeCl3 Iron(III) chloride Corrosive - acid FeSO4 Iron(II) sulfate Toxic H2O Water HCl Hydrochloric

Pawlowski, Wojtek

131

Roadmap for selected key measurements of LHCb  

E-Print Network [OSTI]

Six of the key physics measurements that will be made by the LHCb experiment, concerning CP asymmetries and rare B decays, are discussed in detail. The "road map" towards the precision measurements is presented, including the use of control channels and other techniques to understand the performance of the detector with the first data from the LHC.

The LHCb Collaboration; B. Adeva; M. Adinolfi; A. Affolder; Z. Ajaltouni; J. Albrecht; F. Alessio; M. Alexander; P. Alvarez Cartelle; A. A. Alves Jr; S. Amato; Y. Amhis; J. Amoraal; J. Anderson; O. Aquines Gutierrez; L. Arrabito; M. Artuso; E. Aslanides; G. Auriemma; S. Bachmann; Y. Bagaturia; D. S. Bailey; V. Balagura; W. Baldini; MdC. Barandela Pazos; R. J. Barlow; S. Barsuk; A. Bates; C. Bauer; Th. Bauer; A. Bay; I. Bediaga; K. Belous; I. Belyaev; M. Benayoun; G. Bencivenni; R. Bernet; M. -O. Bettler; A. Bizzeti; T. Blake; F. Blanc; C. Blanks; J. Blouw; S. Blusk; A. Bobrov; V. Bocci; A. Bondar; N. Bondar; W. Bonivento; S. Borghi; A. Borgia; E. Bos; T. J. V. Bowcock; C. Bozzi; J. Bressieux; S. Brisbane; M. Britsch; N. H. Brook; H. Brown; A. Büchler-Germann; J. Buytaert; J. -P. Cachemiche; S. Cadeddu; J. M. Caicedo Carvajal; O. Callot; M. Calvi; M. Calvo Gomez; A. Camboni; W. Cameron; P. Campana; A. Carbone; G. Carboni; A. Cardini; L. Carson; K. Carvalho Akiba; G. Casse; M. Cattaneo; M. Charles; Ph. Charpentier; A. Chlopik; P. Ciambrone; X. Cid Vidal; P. J. Clark; P. E. L. Clarke; M. Clemencic; H. V. Cliff; J. Closier; C. Coca; V. Coco; J. Cogan; P. Collins; F. Constantin; G. Conti; A. Contu; G. Corti; G. A. Cowan; B. D'Almagne; C. D'Ambrosio; D. G. d'Enterria; W. Da Silva; P. David; I. De Bonis; S. De Capua; M. De Cian; F. De Lorenzi; J. M. De Miranda; L. De Paula; P. De Simone; H. De Vries; D. Decamp; H. Degaudenzi; M. Deissenroth; L. Del Buono; C. Deplano; O. Deschamps; F. Dettori; J. Dickens; H. Dijkstra; M. Dima; S. Donleavy; A. C. dos Reis; A. Dovbnya; T. Du Pree; P. -Y. Duval; L. Dwyer; R. Dzhelyadin; C. Eames; S. Easo; U. Egede; V. Egorychev; F. Eisele; S. Eisenhardt; L. Eklund; D. Esperante Pereira; L. Estève; S. Eydelman; E. Fanchini; C. Färber; G. Fardell; C. Farinelli; S. Farry; V. Fave; V. Fernandez Albor; M. Ferro-Luzzi; S. Filippov; C. Fitzpatrick; F. Fontanelli; R. Forty; M. Frank; C. Frei; M. Frosini; J. L. Fungueirino Pazos; S. Furcas; A. Gallas Torreira; D. Galli; M. Gandelman; Y. Gao; J-C. Garnier; L. Garrido; C. Gaspar; N. Gauvin; M. Gersabeck; T. Gershon; Ph. Ghez; V. Gibson; Yu. Gilitsky; V. V. Gligorov; C. Göbel; D. Golubkov; A. Golutvin; A. Gomes; M. Grabalosa Gándara; R. Graciani Diaz; L. A. Granado Cardoso; E. Graugés; G. Graziani; A. Grecu; G. Guerrer; E. Gushchin; Yu. Guz; Z. Guzik; T. Gys; F. Hachon; G. Haefeli; S. C. Haines; T. Hampson; S. Hansmann-Menzemer; R. Harji; N. Harnew; P. F. Harrison; J. He; K. Hennessy; P. Henrard; J. A. Hernando Morata; A. Hicheur; E. Hicks; W. Hofmann; K. Holubyev; P. Hopchev; W. Hulsbergen; P. Hunt; T. Huse; R. S. Huston; D. Hutchcroft; V. Iakovenko; C. Iglesias Escudero; J. Imong; R. Jacobsson; M. Jahjah Hussein; E. Jans; F. Jansen; P. Jaton; B. Jean-Marie; M. John; C. R. Jones; B. Jost; F. Kapusta; T. M. Karbach; J. Keaveney; U. Kerzel; T. Ketel; A. Keune; S. Khalil; B. Khanji; Y. M. Kim; M. Knecht; J. Knopf; S. Koblitz; A. Konoplyannikov; P. Koppenburg; I. Korolko; A. Kozlinskiy; M. Krasowski; L. Kravchuk; P. Krokovny; K. Kruzelecki; M. Kucharczyk; I. Kudryashov; T. Kvaratskheliya; D. Lacarrere; A. Lai; R. W. Lambert; G. Lanfranchi; C. Langenbruch; T. Latham; R. Le Gac; R. Lefevre; A. Leflat; J. Lefrançois; O. Leroy; K. Lessnoff; L. Li; Y. Y. Li; J. Libby; M. Lieng; R. Lindner; S. Lindsey; C. Linn; B. Liu; G. Liu; J. H. Lopes; E. Lopez Asamar; J. Luisier; F. Machefert; I. Machikhiliyan; F. Maciuc; O. Maev; J. Magnin; A. Maier; R. M. D. Mamunur; G. Manca; G. Mancinelli; N. Mangiafave; U. Marconi; F. Marin; J. Marks; G. Martellotti; A. Martens; L. Martin; D. Martinez Santos; Z. Mathe; C. Matteuzzi; V. Matveev; A. Mazurov; G. McGregor; B. Mcharek; C. Mclean; R. McNulty; M. Merk; J. Merkel; M. Merkin; R. Messi; F. C. D. Metlica; J. Michalowski; S. Miglioranzi; M. -N. Minard; S. Monteil; D. Moran; J. V. Morris; R. Mountain; I. Mous; F. Muheim; R. Muresan; F. Murtas; B. Muryn; M. Musy; J. Mylroie-Smith; P. Naik; T. Nakada; R. Nandakumar; J. Nardulli; Z. Natkaniec; M. Nedos; M. Needham; N. Neufeld; L. Nicolas; S. Nies; V. Niess; N. Nikitin; A. Noor; A. Oblakowska-Mucha; V. Obraztsov; S. Oggero; O. Okhrimenko; R. Oldeman; M. Orlandea; A. Ostankov; J. Palacios; M. Palutan; J. Panman; A. Papadelis; A. Papanestis; M. Pappagallo; C. Parkes; G. Passaleva; G. D. Patel; M. Patel; S. K. Paterson; G. N. Patrick; E. Pauna; C. Pauna; C. Pavel; A. Pazos Alvarez; A. Pellegrino; G. Penso; M. Pepe Altarelli; S. Perazzini; D. L. Perego; A. Pérez-Calero Yzquierdo; E. Perez Trigo; P. Perret; G. Pessina; A. Petrella; A. Petrolini; B. Pietrzyk; D. Pinci; S. Playfer; M. Plo Casasus; G. Polok; A. Poluektov; E. Polycarpo; D. Popov; B. Popovici; S. Poss; C. Potterat; A. Powell; S. Pozzi; V. Pugatch; A. Puig Navarro; W. Qian; J. H. Rademacker; B. Rakotomiaramanana; I. Raniuk; G. Raven; S. Redford; W. Reece

2010-11-23T23:59:59.000Z

132

www.defra.gov.uk Environmental Key  

E-Print Network [OSTI]

that good environmental performance makes good business sense. Environmental risks and uncertainties impact. These Guidelines seek to help companies report their environmental impacts in a meaningful and cost-effective waywww.defra.gov.uk Environmental Key Performance Indicators Reporting Guidelines for UK Business #12

133

2 Key Achievements 7 Greenhouse Gas Reduction  

E-Print Network [OSTI]

Princeton University Reports Contents 2 Key Achievements 7 Greenhouse Gas Reduction Campus Energy was established in 2008, the University has invested $5.3 million in energy-savings projects, resulting in annual of a 5.2-megawatt solar collector field. · Audit the remaining 20 of the top 50 energy- consuming

134

Rangeland ecology: Key global research issues & questions  

E-Print Network [OSTI]

1 Rangeland ecology: Key global research issues & questions Robin Reid and Maria Fernandez-Gimenez This paper discusses developments in our understanding about rangeland ecology and rangeland dynamics in the last 20 years. Before the late 1980's, the mainstream view in range ecology was that livestock

135

Rangeland ecology: Key global research issues & questions  

E-Print Network [OSTI]

1 Rangeland ecology: Key global research issues & questions Robin Reid1 and Maria Fernandez Ecology Lab 2Associate Professor Colorado State University, Fort Collins, Colorado, USA Global Issues and Questions in Rangeland Ecology · Despite the focus here on global issues, we need to recognize that Mongolia

136

Key Management Challenges in Smart Grid  

SciTech Connect (OSTI)

Agenda Awarded in February 2011 Team of industry and research organizations Project Objectives Address difficult issues Complexity Diversity of systems Scale Longevity of solution Participate in standards efforts and working groups Develop innovative key management solutions Modeling and simulation ORNL Cyber Security Econometric Enterprise System Demonstrate effectiveness of solution Demonstrate scalability

Sheldon, Frederick T [ORNL] [ORNL; Duren, Mike [Sypris Electronics, LLC] [Sypris Electronics, LLC

2012-01-01T23:59:59.000Z

137

Experimental quantum key distribution with finite-key security analysis for noisy channels  

E-Print Network [OSTI]

In quantum key distribution implementations, each session is typically chosen long enough so that the secret key rate approaches its asymptotic limit. However, this choice may be constrained by the physical scenario, as in the perspective use with satellites, where the passage of one terminal over the other is restricted to a few minutes. Here we demonstrate experimentally the extraction of secure keys leveraging an optimal design of the prepare-and-measure scheme, according to recent finite-key theoretical tight-bounds. The experiment is performed in different channel conditions, and assuming two distinct attack models: individual attacks, or general quantum attacks. The request on the number of exchanged qubits is then obtained as a function of the key size and of the ambient quantum bit error rate. The results indicate that viable conditions for effective symmetric, and even one-time-pad, cryptography are achievable.

Davide Bacco; Matteo Canale; Nicola Laurenti; Giuseppe Vallone; Paolo Villoresi

2014-06-17T23:59:59.000Z

138

Department of Bioengineering Definition of Biomedical Engineering  

E-Print Network [OSTI]

Department of Bioengineering Definition of Biomedical Engineering Biomedical engineering cross-disciplinary activities that integrate the engineering sciences with the biomedical sciences are the Specialty Areas? Some of the well established specialty areas within the field of biomedical engineering

139

Definition of a 'Zero Net Energy' Community  

SciTech Connect (OSTI)

This document provides a definition for a net zero-energy community. A community that offsets all of its energy use from renewables available within the community's built environment.

Carlisle, N.; Van Geet, O.; Pless, S.

2009-11-01T23:59:59.000Z

140

Chemical and Petroleum Engineering Key and Lab Space Agreement  

E-Print Network [OSTI]

Chemical and Petroleum Engineering Key and Lab Space Agreement Key Holder Information Last Name and Petroleum Engineering remain the property of the Department. I agree to pay a deposit for the keys

Calgary, University of

Note: This page contains sample records for the topic "destination definitions key" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Key Physical Mechanisms in Nanostructured Solar Cells  

SciTech Connect (OSTI)

The objective of the project was to study both theoretically and experimentally the excitation, recombination and transport properties required for nanostructured solar cells to deliver energy conversion efficiencies well in excess of conventional limits. These objectives were met by concentrating on three key areas, namely, investigation of physical mechanisms present in nanostructured solar cells, characterization of loss mechanisms in nanostructured solar cells and determining the properties required of nanostructured solar cells in order to achieve high efficiency and the design implications.

Dr Stephan Bremner

2010-07-21T23:59:59.000Z

142

Three key elements necessary for successful testing  

SciTech Connect (OSTI)

Real-time surface readout during data acquisition, downhole shutting, and appropriate pressure gauges are three key elements for successful well tests. These elements are often overlooked in designing and implementing a successful well test. This second in a series of three articles on well testing shows how these elements affected the testing of an example well. Also reviewed are the capabilities of several new testing tools and techniques.

Ehlig-Economides, C.A.; Hegeman, P. (Schlumberger Oilfield Services, Houston, TX (United States)); Clark, G. (Schlumberger Oilfield Services, Aberdeen (United Kingdom))

1994-07-25T23:59:59.000Z

143

Midstream Infrastructure Improvements Key to Realizing Full Potential...  

Office of Environmental Management (EM)

Midstream Infrastructure Improvements Key to Realizing Full Potential of Domestic Natural Gas Midstream Infrastructure Improvements Key to Realizing Full Potential of Domestic...

144

Vehicle Electrification is Key to Reducing Petroleum Dependency...  

Broader source: Energy.gov (indexed) [DOE]

Vehicle Electrification is Key to Reducing Petroleum Dependency and Greenhouse Gas Emission Vehicle Electrification is Key to Reducing Petroleum Dependency and Greenhouse Gas...

145

analysis material key: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Temperature(C) 200 2 Finite key analysis for symmetric attacks in quantum key distribution Quantum Physics (arXiv) Summary: We introduce a constructive method to calculate...

146

Sandia National Laboratories: Direct Measurement of Key Molecule...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Modeling & SimulationDirect Measurement of Key Molecule Will Increase Accuracy of Combustion Models Direct Measurement of Key Molecule Will Increase Accuracy of Combustion...

147

Tips for Key Maps / Inset Maps How Do I Add a Key Maps or Inset Maps  

E-Print Network [OSTI]

Tips for Key Maps / Inset Maps How Do I Add a Key Maps or Inset Maps You need a new data frame o the properties/look of the extent rectangle Tips Index Map o Should be a simplified version of the map o Should cover at least 5X the area of the main map o Should have its own scale/coordinates/title o Main coverage

Brownstone, Rob

148

Rigorous and General Definition of Thermodynamic Entropy  

E-Print Network [OSTI]

The physical foundations of a variety of emerging technologies --- ranging from the applications of quantum entanglement in quantum information to the applications of nonequilibrium bulk and interface phenomena in microfluidics, biology, materials science, energy engineering, etc. --- require understanding thermodynamic entropy beyond the equilibrium realm of its traditional definition. This paper presents a rigorous logical scheme that provides a generalized definition of entropy free of the usual unnecessary assumptions which constrain the theory to the equilibrium domain. The scheme is based on carefully worded operative definitions for all the fundamental concepts employed, including those of system, property, state, isolated system, environment, process, separable system, system uncorrelated from its environment, and parameters of a system. The treatment considers also systems with movable internal walls and/or semipermeable walls, with chemical reactions and/or external force fields, and with small numbers of particles. The definition of reversible process is revised by introducing the new concept of scenario. The definition of entropy involves neither the concept of heat nor that of quasistatic process; it applies to both equilibrium and nonequilibrium states. The role of correlations on the domain of definition and on the additivity of energy and entropy is discussed: it is proved that energy is defined and additive for all separable systems, while entropy is defined and additive only for separable systems uncorrelated from their environment; decorrelation entropy is defined. The definitions of energy and entropy are extended rigorously to open systems. Finally, to complete the discussion, the existence of the fundamental relation for stable equilibrium states is proved, in our context, for both closed and open systems.

Gian Paolo Beretta; Enzo Zanchini

2010-10-05T23:59:59.000Z

149

Quantum key distribution with entangled photon sources  

E-Print Network [OSTI]

A parametric down-conversion (PDC) source can be used as either a triggered single photon source or an entangled photon source in quantum key distribution (QKD). The triggering PDC QKD has already been studied in the literature. On the other hand, a model and a post-processing protocol for the entanglement PDC QKD are still missing. In this paper, we fill in this important gap by proposing such a model and a post-processing protocol for the entanglement PDC QKD. Although the PDC model is proposed to study the entanglement-based QKD, we emphasize that our generic model may also be useful for other non-QKD experiments involving a PDC source. Since an entangled PDC source is a basis independent source, we apply Koashi-Preskill's security analysis to the entanglement PDC QKD. We also investigate the entanglement PDC QKD with two-way classical communications. We find that the recurrence scheme increases the key rate and Gottesman-Lo protocol helps tolerate higher channel losses. By simulating a recent 144km open-air PDC experiment, we compare three implementations -- entanglement PDC QKD, triggering PDC QKD and coherent state QKD. The simulation result suggests that the entanglement PDC QKD can tolerate higher channel losses than the coherent state QKD. The coherent state QKD with decoy states is able to achieve highest key rate in the low and medium-loss regions. By applying Gottesman-Lo two-way post-processing protocol, the entanglement PDC QKD can tolerate up to 70dB combined channel losses (35dB for each channel) provided that the PDC source is placed in between Alice and Bob. After considering statistical fluctuations, the PDC setup can tolerate up to 53dB channel losses.

Xiongfeng Ma; Chi-Hang Fred Fung; Hoi-Kwong Lo

2007-03-14T23:59:59.000Z

150

Keyes, California: Energy Resources | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia: Energy Resources Jump to:46 - 429 Throttled (botOpen6Kentwood, Michigan: EnergyKesona PowerStatistics-2010Keyes,

151

Key Renewable Energy Opportunities for Oklahoma Tribes  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGY TAX POLICIES7.pdfFuel2007 | Department7JanuaryWASTE-TO-ENERGY:About »KEY RENEWABLE

152

Fermilab | Science | Particle Physics | Key Discoveries  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation Desert Southwest Region service area. TheEPSCI Home ItDarkDiscoveries WorldwideDarkKey

153

Another key Y-12 General Foreman remembered  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth (AOD)ProductssondeadjustsondeadjustAbout theOFFICEAmes Laboratory Site|Andrea4»Another key Y-12 General

154

Key Agency Targets Summary _FY 2012_.doc  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation ProposedUsingFunInfraredJeffersonJonathan PershingrelocatesKaye D.Ken T.NA>Kevlar andKey5 B

155

Pottebaum et al. Event Definition for Intelligent Resource Management Event Definition for the Application of Event  

E-Print Network [OSTI]

of resource management (use case and demand side) and event processing (technology and supply side). MethodsPottebaum et al. Event Definition for Intelligent Resource Management Event Definition for the Application of Event Processing to Intelligent Resource Management Jens Pottebaum University of Paderborn, C

Paliouras, George

156

Quantum key distribution with entangled photon sources  

E-Print Network [OSTI]

A parametric down-conversion (PDC) source can be used as either a triggered single photon source or an entangled photon source in quantum key distribution (QKD). The triggering PDC QKD has already been studied in the literature. On the other hand, a model and a post-processing protocol for the entanglement PDC QKD are still missing. In this paper, we fill in this important gap by proposing such a model and a post-processing protocol for the entanglement PDC QKD. Although the PDC model is proposed to study the entanglement-based QKD, we emphasize that our generic model may also be useful for other non-QKD experiments involving a PDC source. Since an entangled PDC source is a basis independent source, we apply Koashi-Preskill's security analysis to the entanglement PDC QKD. We also investigate the entanglement PDC QKD with two-way classical communications. We find that the recurrence scheme increases the key rate and Gottesman-Lo protocol helps tolerate higher channel losses. By simulating a recent 144km open-a...

Ma, X; Lo, H K; Ma, Xiongfeng; Fung, Chi-Hang Fred; Lo, Hoi-Kwong

2007-01-01T23:59:59.000Z

157

2014 Manufacturing Energy and Carbon Footprints: Definitions...  

Broader source: Energy.gov (indexed) [DOE]

and Assumptions A number of key terms are used to interpret the manufacturing energy and carbon footprints. The terms associated with the energy footprint analysis are...

158

The impacts of congestion on time-definitive urban freight distribution networks CO2 emission levels: Results from a case study in Portland,  

E-Print Network [OSTI]

The impacts of congestion on time-definitive urban freight distribution networks CO2 emission Accepted 29 November 2010 Keywords: Vehicle routing Time-dependent travel time speed GHG or CO2 emissions pressures to limit the impacts associated with CO2 emissions are mounting rapidly. A key challenge

Bertini, Robert L.

159

The Impacts of Congestion on Time-definitive Urban Freight Distribution1 Networks CO2 Emission Levels: results from a case study in Portland,2  

E-Print Network [OSTI]

1 The Impacts of Congestion on Time-definitive Urban Freight Distribution1 Networks CO2 Emission pressures to limit the impacts13 associated with CO2 emissions are mounting rapidly. A key challenge on CO2 emissions are hindered by the complexities of vehicle routing18 problems with time

Bertini, Robert L.

160

Development of a Humid Climate Definition  

E-Print Network [OSTI]

located in humid climates. The draft standard included a definition of humid climate: where, during the warmest six consecutive months of a typical year, the wetbulb temperature is 19°C (67°F) or higher for 3500 hours or more, or 23°C (73°F) or higher...

Hedrick, R. L.; Shirey, D. B.

1998-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "destination definitions key" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Pink Eye Conjunctivitis Definition, Symptoms and Causes  

E-Print Network [OSTI]

Pink Eye ­ Conjunctivitis Definition, Symptoms and Causes Pink eye is the common name given to inflammation of the conjunctiva of the eye. It is otherwise called conjunctivitis. The conjunctiva is the transparent membrane that lines the eyelids and covers the whites of the eyes. Very small, superficial blood

Suzuki, Masatsugu

162

JOINT DEGREE PROGRAMS DEFINITION AND POLICY  

E-Print Network [OSTI]

1 JOINT DEGREE PROGRAMS DEFINITION AND POLICY: Within the fields of medicine and law, dual training for such complementary training can be demonstrated, the creation of a formal "Joint" degree program in which students or MD) offered at Penn State may be warranted. Such Joint degree programs enhance the educational

Omiecinski, Curtis

163

GENERAL PROVISIONS Section 1-1 Definitions.  

E-Print Network [OSTI]

for Research; and University General Counsel and Vice President for Legal Affairs. i. "Chancellors" means1-1 CHAPTER 1 GENERAL PROVISIONS Section 1-1 Definitions. The words and phrases in the Board of these principles, laws and policies once approved by the Board. Therefore, the interpretation of all Board policies

164

Business Practice Manual for Definitions & Acronyms  

E-Print Network [OSTI]

Janaury 21, 2011 #12;CAISO Business Practice Manual BPM for Definitions & Acronyms Version 76 Last Revised: March 31, 2009 BPM Owner: Mike Dozier BPM Owner's Title: Senior Counsel Revision History Version Date Description 2 2009-12-18 Incorporating payment acceleration language submitted in BPM PRR 122

Tesfatsion, Leigh

165

Coal Supply Basin Destination State  

Annual Energy Outlook 2013 [U.S. Energy Information Administration (EIA)]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) " ,"ClickPipelines AboutDecemberSteam Coal Import96 4.87 1967-2010 ImportsCubic Feet) Oil3Q 20093Q4QReal

166

Coal Supply Basin Destination State  

Annual Energy Outlook 2013 [U.S. Energy Information Administration (EIA)]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) " ,"ClickPipelines AboutDecemberSteam Coal Import96 4.87 1967-2010 ImportsCubic Feet) Oil3Q

167

Coal Supply Basin Destination State  

Annual Energy Outlook 2013 [U.S. Energy Information Administration (EIA)]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) " ,"ClickPipelines AboutDecemberSteam Coal Import96 4.87 1967-2010 ImportsCubic Feet) Oil3Qc. Real

168

Compression station key to Texas pipeline project  

SciTech Connect (OSTI)

This was probably the largest pipeline project in the US last year, and the largest in Texas in the last decade. The new compressor station is a key element in this project. TECO, its servicing dealer, and compression packager worked closely throughout the planning and installation stages of the project. To handle the amount of gas required, TECO selected the GEMINI F604-1 compressor, a four-throw, single-stage unit with a six-inch stroke manufactured by Weatherford Enterra Compression Co. (WECC) in Corpus Christi, TX. TECO also chose WECC to package the compressors. Responsibility for ongoing support of the units will be shared among TECO, the service dealer and the packager. TECO is sending people to be trained by WECC, and because the G3600 family of engines is still relatively new, both the Caterpillar dealer and WECC sent people for advanced training at Caterpillar facilities in Peoria, IL. As part of its service commitment to TECO, the servicing dealer drew up a detailed product support plan, encompassing these five concerns: Training, tooling; parts support; service support; and commissioning.

NONE

1996-10-01T23:59:59.000Z

169

The impacts of urbanization on endangered florida key deer  

E-Print Network [OSTI]

for resources between man and wildlife continues, it is important to understand the effects of urbanization on species. Endangered Key deer (Odocoileus virginianus clavium) are endemic to the Florida Keys archipelago stretching southwest off the southern tip...

Harveson, Patricia Moody

2006-04-12T23:59:59.000Z

170

actual key success: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

key exchange over an insecure channel. The security of the proposed algorithm grows as NPm, where M, P are the size of the key and the computational commplexity fo the linear...

171

Updated distribution and reintroduction of the Lower Keys marsh rabbit  

E-Print Network [OSTI]

Listed as federally-endangered in 1990, the Lower Keys marsh rabbit (LKMR, Sylvilagus palustris hefneri) exists as a metapopulation in patches of wetland habitat in Florida?s Lower Keys. This study sought to address 2 priority actions identified...

Faulhaber, Craig Alan

2005-02-17T23:59:59.000Z

172

authenticated key agreement: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

desirable attributes. Index Terms--Mutual Authentication; Key Management; SRP; Security; Smart Meter; Smart Leung, Victor C.M. 53 On the security of some password-based key...

173

Exploring the context : a small hotel in Key West  

E-Print Network [OSTI]

This thesis develops a personal method and approach for designing in a delicate context such as the Key West Historic District. This thesis is composed of two parts. The first part presents observations of Key West, focusing ...

VanBeuzekom, Edrick

1984-01-01T23:59:59.000Z

174

Definitional Reflection and the Completion Peter Schroeder-Heister *  

E-Print Network [OSTI]

/11-1, and by Esprit Basic Research Working Group 7232 (GENTZEN). #12;334 which is the completed definition

Schroeder-Heister, Peter

175

Residential Energy Efficiency Financing: Key Elements of Program Design  

Broader source: Energy.gov [DOE]

Presents key programmatic elements and context of financing initiatives, including contractor support, rebates, quality assurance, and more.

176

Formal definition of POTENTIAL ENERGY (valid for conservative forces only)  

E-Print Network [OSTI]

page - 16 Formal definition of POTENTIAL ENERGY (valid for conservative forces only) Given one type of conservative force F UB - UA= - = - Definition of 'Potential energy difference" conserv #12;page - 17 the definition of the "potential energy difference UB - UA " as equal to negative value of the work W done

177

A Full Key Recovery Attack on HMAC-AURORA-512  

E-Print Network [OSTI]

A Full Key Recovery Attack on HMAC-AURORA-512 Yu Sasaki NTT Information Sharing Platform.yu@lab.ntt.co.jp Abstract. In this note, we present a full key recovery attack on HMAC- AURORA-512 when 512-bit secret keys is 2259 AURORA-512 operations, which is significantly less than the complexity of the exhaustive search

178

System definition and analysis gas-fired industrial advanced turbine systems  

SciTech Connect (OSTI)

The objective is to define and analyze an engine system based on the gas fuel Advanced Turbine from Task 3. Using the cycle results of Task 3, a technical effort was started for Task 6 which would establish the definition of the engine flowpath and the key engine component systems. The key engine systems are: gas turbine engine overall flowpath; booster (low pressure compressor); intercooler; high pressure compressor; combustor; high pressure turbine; low pressure turbine and materials; engine system packaging; and power plant configurations. The design objective is to use the GE90 engine as the platform for the GE Industrial Advanced Turbine System. This objective sets the bounds for the engine flowpath and component systems.

Holloway, G.M.

1997-05-01T23:59:59.000Z

179

K:\\Operations\\Forms\\201 Key or Vendor Card Request.pdf Rev ASU DPc Key/Vendor Card Request  

E-Print Network [OSTI]

K:\\Operations\\Forms\\201 Key or Vendor Card Request.pdf Rev ASU DPc Key/Vendor Card Request Complete/Staff Undergrad Grad Asst Other Department or Vendor PO # or Agency/ORG Mail Code Affiliation (place X in one box am personally accountable for all ASU keys/vendor cards issued to me. I understand that only I am

Rhoads, James

180

Fake state attack on practically decoy state quantum key distribution  

E-Print Network [OSTI]

In this paper, security of practically decoy state quantum key distribution under fake state attack is considered. If quantum key distribution is insecure under this type of attack, decoy sources can not also provide it with enough security. Strictly analysis shows that Eve should eavesdrop with the aid of photon-number-resolving instruments. In practical implementation of decoy state quantum key distribution where statistical fluctuation is considered, however, Eve can attack it successfully with threshold detectors.

Yong-gang Tan

2012-02-15T23:59:59.000Z

Note: This page contains sample records for the topic "destination definitions key" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

QKD with finite resources: secret key rates via Rényi entropies  

E-Print Network [OSTI]

A realistic Quantum Key Distribution (QKD) protocol necessarily deals with finite resources, such as the number of signals exchanged by the two parties. We derive a bound on the secret key rate which is expressed as an optimization problem over R\\'enyi entropies. Under the assumption of collective attacks by an eavesdropper, a computable estimate of our bound for the six-state protocol is provided. This bound leads to improved key rates in comparison to previous results.

Silvestre Abruzzo; Hermann Kampermann; Markus Mertz; Dagmar Bruß

2011-05-27T23:59:59.000Z

182

Climate Action Planning: A Review of Best Practices, Key Elements...  

Open Energy Info (EERE)

Planning: A Review of Best Practices, Key Elements, and Common Climate Strategies for Signatories to the American College & University Presidents' Climate Commitment Jump to:...

183

TEC Working Group Topic Groups Rail Key Documents Radiation Monitoring...  

Broader source: Energy.gov (indexed) [DOE]

Radiation Monitoring Subgroup TEC Working Group Topic Groups Rail Key Documents Radiation Monitoring Subgroup Radiation Monitoring Subgroup Draft Work Plan - February 4, 2008 More...

184

LANL breaks ground on key sediment control project  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Sediment control project LANL breaks ground on key sediment control project Called "grade-control" structures, the approximately 2 million features are up to eight feet high and...

185

Hydrodynamic experiment provides key data for Stockpile Stewardship  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

predictively model and assess weapon performance in the absence of full-scale underground nuclear testing," said Webster. Los Alamos hydrodynamic experiment provides key data for...

186

Worldwide Trends in Energy Use and Efficiency: Key Insights from...  

Open Energy Info (EERE)

Efficiency: Key Insights from International Energy Agency (IEA) Indicator Analysis in Support of the Group of Eight (G8) Plan of Action Jump to: navigation, search Tool Summary...

187

Water dynamics clue to key residues in protein folding  

SciTech Connect (OSTI)

A computational method independent of experimental protein structure information is proposed to recognize key residues in protein folding, from the study of hydration water dynamics. Based on all-atom molecular dynamics simulation, two key residues are recognized with distinct water dynamical behavior in a folding process of the Trp-cage protein. The identified key residues are shown to play an essential role in both 3D structure and hydrophobic-induced collapse. With observations on hydration water dynamics around key residues, a dynamical pathway of folding can be interpreted.

Gao, Meng [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Zhu, Huaiqiu, E-mail: hqzhu@pku.edu.cn [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Yao, Xin-Qiu [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China) [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Department of Biophysics, Kyoto University, Sakyo Kyoto 606-8502 (Japan); She, Zhen-Su, E-mail: she@pku.edu.cn [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)

2010-01-29T23:59:59.000Z

188

Pantex Plant Achieves Key Safety Milestone Ahead of Schedule...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Achieves Key Safety Milestone Ahead of Schedule | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

189

Key Practical Issues in Strengthening Safety Culture, INSAG-15  

Broader source: Energy.gov [DOE]

Key Pratical Issues in Strengthening Safety Culture, INSAG-15. A report by the International Nuclear Safety Advisory Gorup, International Atomic Energy Agency, Vienna, 2002.

190

EIA - Natural Gas Pipeline Network - Regional Definitions  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation Proposed NewcatalystNeutron scattering characterizesAnalysis &MapMajorDefinitions Map

191

Table Definitions, Sources, and Explanatory Notes  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security AdministrationcontrollerNanocrystallineForeign ObjectOUR Table 1.Number ofExports DefinitionsImports by

192

Table Definitions, Sources, and Explanatory Notes  

Annual Energy Outlook 2013 [U.S. Energy Information Administration (EIA)]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) " ,"ClickPipelines AboutDecemberSteamYear Jan FebThousand Cubicin NorthShale Gas Proved Reserves Definitions

193

Table Definitions, Sources, and Explanatory Notes  

Annual Energy Outlook 2013 [U.S. Energy Information Administration (EIA)]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) " ,"ClickPipelines AboutDecemberSteamYear Jan FebThousand CubicinResidual Fuel Oil by End Use Definitions

194

Table Definitions, Sources, and Explanatory Notes  

Annual Energy Outlook 2013 [U.S. Energy Information Administration (EIA)]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) " ,"ClickPipelines AboutDecemberSteamYear Jan FebThousand CubicinResidual FuelYield Definitions

195

Table Definitions, Sources, and Explanatory Notes  

Annual Energy Outlook 2013 [U.S. Energy Information Administration (EIA)]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) " ,"ClickPipelines AboutDecemberSteamYear Jan FebThousand CubicinResidual FuelYield DefinitionsUtilization

196

Template:Definition | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 No revisionEnvReviewNonInvasiveExplorationUT-gTaguspark Jump to: navigation,Telluric SurveyCite Jump to:'Definition'

197

Category:ISGAN Definitions | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of InspectorConcentrating SolarElectricEnergyCTBarreis aCallahanWind FarmAdd a newISGAN Definitions Jump to:

198

Property:Definition | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 No revision hasInformationInyoCoolingTowerWaterUseSummerConsumed Jump to:DOEInvolve Jump to:DtAddDefinition Jump

199

Definition et unites Sources d'energie primaire  

E-Print Network [OSTI]

D´efinition et unit´es Sources d'´energie primaire L'´energie dans une perspective historique Etat Laboratoire DynFluid, Arts et M´etiers-ParisTech 19 f´evrier 2014 F. Ravelet Energies #12;D´efinition et unit Energies #12;D´efinition et unit´es Sources d'´energie primaire L'´energie dans une perspective historique

Ravelet, Florent

200

Energy Security: A Key Requirement forSustainable Development  

E-Print Network [OSTI]

1 Energy Security: A Key Requirement forSustainable Development Perspective and Action Plan Robert Card Under Secretary US Department of Energy August 30, 2002 Session One: Maintaining Energy Security WSSD Side Event Energy for Sustainable Development IEA/UNEP/Eskom #12;2 Energy Security is a Key

Note: This page contains sample records for the topic "destination definitions key" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Prairie Fruit Summary, 2010 Some key considerations for the homeowner  

E-Print Network [OSTI]

1 Prairie Fruit Summary, 2010 Some key considerations for the homeowner by Bob Bors The following list highlights some key positive (+), negative (-) and variable ( ± ) attributes for growing fruit into account. For more info visit: www.fruit.usask.ca Haskap/Blue Honeysuckle: - All varieties are very cold

Peak, Derek

202

Efficient Hybrid Key Agreement Protocol for Wireless Ad Hoc Networks  

E-Print Network [OSTI]

Efficient Hybrid Key Agreement Protocol for Wireless Ad Hoc Networks Xiang-Yang Li Yu Wang Ophir important aspects in ad-hoc wireless networks. To ensure the security, several cryptography protocols must efficient when applied to wireless ad-hoc networks. In this paper, we propose a key agreement protocol

Wang, Yu

203

Reflective cracking of shear keys in multi-beam bridges  

E-Print Network [OSTI]

..............................................2 Figure 2: PCI 33? Box Girder with Shear Keys................................................................5 Figure 3: TxDOT 34? Box Girder with Shear Keys .........................................................5 Figure 4: Test Specimen... Under Tension.........................................................................12 Figure 5: Test Specimen in Bending ...............................................................................12 Figure 6: Test Specimen in Shear...

Sharpe, Graeme Peter

2009-06-02T23:59:59.000Z

204

Public Key Encryption that Allows PIR Queries Eyal Kushilevitz  

E-Print Network [OSTI]

Public Key Encryption that Allows PIR Queries Dan Boneh Eyal Kushilevitz Rafail Ostrovsky William E to create a public- key encryption scheme for Alice that allows PIR searching over encrypted documents. Our allows for Single-Database PIR writing with sublinear communication complexity, which we consider

205

Public Key Encryption that Allows PIR Queries Eyal Kushilevitz  

E-Print Network [OSTI]

Public Key Encryption that Allows PIR Queries Dan Boneh Eyal Kushilevitz Rafail Ostrovsky William E. In this paper, we show how to create a public-key encryption scheme for Alice that allows PIR searching over allows for Single-Database PIR writing with sublinear communication complexity, which we consider

Ostrovsky, Rafail

206

Electricity and Development: Global Trends and Key Challenges  

E-Print Network [OSTI]

Electricity and Development: Global Trends and Key Challenges Romeo Pacudan, PhD Risoe National · Prospects for electricity development · Investment requirements · Key challenges · Final remarks #12 and the transport burden in Tanzania. Source: Modi, 2004 #12;2. Energy and Human Development Access to electricity

207

Key ornamental innovations facilitate diversification in an avian radiation  

E-Print Network [OSTI]

Key ornamental innovations facilitate diversification in an avian radiation Rafael Maiaa,1 , Dustin novel ways of interacting with the en- vironment (key innovations) play a fundamental role in promoting evolution of orna- mental traits. Because selection can operate only on existing vari- ation, the tendency

Rubenstein, Dustin R.

208

Practical Key-Recovery for All Possible Parameters of SFLASH  

E-Print Network [OSTI]

function over a finite field. However, unlike RSA this power function is an easy-to-invert bijec- tion a new practical key-recovery attack on the SFLASH signature scheme. SFLASH is a derivative of the older from the public-key. The attack uses new crypt- analytic tools, most notably pencils of matrices

Fouque, Pierre-Alain

209

Offshore Wind Power Experiences, Potential and Key Issues for  

E-Print Network [OSTI]

Offshore Wind Power Experiences, Potential and Key Issues for Deployment Jørgen Lemming, Poul Erik-Erik Clausen Title: Offshore Wind Power Experiences, Potential and Key Issues for Deployment Division: VEA, SYS Risø-R-1673(EN) January 2008 Abstract: Wind power has been growing at spectacular rates. Today

210

Modified definition of group velocity and electromagnetic energy conservation equation  

E-Print Network [OSTI]

The classical definition of group velocity has two flaws: (a) the group velocity can be greater than the phase velocity in a non-dispersive, lossless, non-conducting, anisotropic uniform medium; (b) the definition is not consistent with the principle of relativity for a plane wave in a moving isotropic uniform medium. To remove the flaws, a modified definition is proposed. A criterion is set up to identify the justification of group velocity definition. A "superluminal power flow" is constructed to show that the electromagnetic energy conservation equation cannot uniquely define the power flow if the principle of Fermat is not taken into account.

Changbiao Wang

2015-01-19T23:59:59.000Z

211

Apparatus, system, and method for synchronizing a timer key  

DOE Patents [OSTI]

A timer key relating to monitoring a countdown time of a countdown routine of an electronic device is disclosed. The timer key comprises a processor configured to respond to a countdown time associated with operation of the electronic device, a display operably coupled with the processor, and a housing configured to house at least the processor. The housing has an associated structure configured to engage with the electronic device to share the countdown time between the electronic device and the timer key. The processor is configured to begin a countdown routine based at least in part on the countdown time, wherein the countdown routine is at least substantially synchronized with a countdown routine of the electronic device when the timer key is removed from the electronic device. A system and method for synchronizing countdown routines of a timer key and an electronic device are also disclosed.

Condit, Reston A; Daniels, Michael A; Clemens, Gregory P; Tomberlin, Eric S; Johnson, Joel A

2014-04-22T23:59:59.000Z

212

Definition of heavy oil and natural bitumen  

SciTech Connect (OSTI)

Definition and categorization of heavy oils and natural bitumens are generally based on physical or chemical attributes or on methods of extraction. Ultimately, the hydrocarbon's chemical composition will govern both its physical state and the extraction technique applicable. These oils and bitumens closely resemble the residuum from wholecrude distillation to about 1,000/degree/F; if the residuum constitutes at least 15% of the crude, it is considered to be heavy. In this material is concentrated most of the trace elements, such as sulfur, oxygen, and nitrogen, and metals, such as nickel and vanadium. A widely used definition separates heavy oil from natural bitumen by viscosity, crude oil being less, and bitumen more viscous than 10,000 cp. Heavy crude then falls in the range 10/degree/-20/degree/ API inclusive and extra-heavy oil less than 10/degree/ API. Most natural bitumen is natural asphalt (tar sands, oil sands) and has been defined as rock containing hydrocarbons more viscous than 10,000 cp or else hydrocarbons that may be extracted from mined or quarried rock. Other natural bitumens are solids, such as gilsonite, grahamite, and ozokerite, which are distinguished by streak, fusibility, and solubility. The upper limit for heavy oil may also be set at 18/degree/ API, the approximate limit for recovery by waterflood.

Meyer, R.F.

1988-08-01T23:59:59.000Z

213

1.0 Introduction 1.1 Definition of Nanotechnology  

E-Print Network [OSTI]

1 1.0 Introduction 1.1 Definition of Nanotechnology Nanotechnology is the art and science improvements in technologies for protecting the environment. While many definitions for nanotechnology exist Nanotechnology Initiative (NNI), a U.S. Government research and development (R&D) program established

214

ARIES-CS MAINTENANCE SYSTEM DEFINITION AND ANALYSIS  

E-Print Network [OSTI]

ARIES-CS MAINTENANCE SYSTEM DEFINITION AND ANALYSIS LESTER M. WAGANER* and RICHARD J. PEIPERT, Jr in the electronic version. I. INTRODUCTION The ARIES studies, sponsored by the U.S. Depart- ment of Energy and led how the physics and coil definition determine and influence the power core elements. Especially

215

EXTENDING THE DEFINITION OF ENTROPY TO NONEQUILIBRIUM STEADY STATES.  

E-Print Network [OSTI]

## of #. Our definition is based on energy exchanged, uses the microscopic dynamics of the system, and agreesEXTENDING THE DEFINITION OF ENTROPY TO NONEQUILIBRIUM STEADY STATES. by David Ruelle* Abstract. We forces # and maintained at fixed kinetic energy (Hoover­Evans isokinetic thermostat). We assume

216

Reactive Support and Voltage Control Service: Key Issues and Challenges  

E-Print Network [OSTI]

reactive support and voltage control services. Keywords ­ Competitive Electricity Markets, Reactive PowerReactive Support and Voltage Control Service: Key Issues and Challenges George Gross^, Paolo Marannino° and Gianfranco Chicco* ^ Department of Electrical and Computer Engineering, University

Gross, George

217

Detailed Description of Key NIF Milestones for NNSA Description  

E-Print Network [OSTI]

1 Detailed Description of Key NIF Milestones for NNSA Short Description NIC EP Rev 4.0 Approved = Milestone Reporting Tool, which NNSA uses to support quarterly status reporting of NIC Level 1-2 milestones

218

Key Factors in Displacement Ventilation Systems for Better IAQ  

E-Print Network [OSTI]

This paper sets up a mathematical model of three-dimensional steady turbulence heat transfer in an air-conditioned room of multi-polluting heat sources. Numerical simulation helps identify key factors in displacement ventilation systems that affect...

Wang, X.; Chen, J.; Li, Y.; Wang, Z.

2006-01-01T23:59:59.000Z

219

NREL: News - NREL Scientists Find Key Function for Ferredoxins...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

614 NREL Scientists Find Key Function for Ferredoxins in Algae Hydrogen Production Two of six iron-rich proteins shown to have role in algae metabolism; discovery could lead to...

220

Daylight quantum key distribution over 1.6 km  

E-Print Network [OSTI]

Quantum key distribution (QKD) has been demonstrated over a point-to-point transmission distance brings QKD a step closer to surface-to-satellite and other long-distance applications.

Buttler, W T; Lamoreaux, S K; Morgan, G L; Nordholt, J E; Peterson, C G

2000-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "destination definitions key" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Building America Expert Meeting: Key Innovations for Adding Energy...  

Broader source: Energy.gov (indexed) [DOE]

This report describes an expert meeting hosted by the Building America research team NAHB Research Center, which was held on February 8, 2012, in Orlando, Florida. The topic, Key...

222

Families First: Keys to Successful Family Functioning Communication  

E-Print Network [OSTI]

Families First: Keys to Successful Family Functioning Communication Rick Peterson, Extension Specialist and Assistant Professor, Department of Human Development, Virginia Tech Stephen Green, Department of Human Development, Virginia Tech www.ext.vt.edu Produced by Communications and Marketing, College

Liskiewicz, Maciej

223

Self-referenced continuous-variable quantum key distribution  

E-Print Network [OSTI]

We introduce a new continuous-variable quantum key distribution (CV-QKD) protocol, self-referenced CV-QKD, that eliminates the need for transmission of a high-power local oscillator between the communicating parties. In this protocol, each signal pulse is accompanied by a reference pulse (or a pair of twin reference pulses), used to align Alice's and Bob's measurement bases. We present a proof-of-principle, fiber-based experimental demonstration of the protocol and quantify the expected secret key rates by expressing them in terms of experimental parameters. Our analysis of the secret key rate fully takes into account the inherent uncertainty associated with the quantum nature of the reference pulse(s) and quantifies the limit at which the theoretical key rate approaches that of the respective conventional protocol that requires local oscillator transmission. The self-referenced protocol greatly simplifies the hardware required for CV-QKD, especially for potential integrated photonics implementations of trans...

Soh, Daniel B S; Coles, Patrick J; Lütkenhaus, Norbert; Camacho, Ryan M; Urayama, Junji; Sarovar, Mohan

2015-01-01T23:59:59.000Z

224

Nano Lect 1 Questions and Keypoints Key Points  

E-Print Network [OSTI]

Nano Lect 1 ­ Questions and Keypoints Key Points 1. What is nano technology: a. Very small technology with device in the 1nm to 100nm lots of useful properties Questions 1. Define nanotechnology. Is an nano

Smy, Tom

225

Input from Key Stakeholders in the National Security Technology Incubator  

SciTech Connect (OSTI)

This report documents the input from key stakeholders of the National Security Technology Incubator (NSTI) in developing a new technology incubator and related programs for southern New Mexico. The technology incubator is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes identification of key stakeholders as well as a description and analysis of their input for the development of an incubator.

None

2008-01-31T23:59:59.000Z

226

Romania Tarnita-Lapustesti and Olt River hydroelectric projects. Definitional mission. Export trade information  

SciTech Connect (OSTI)

The Romanian Electricity Authority (RENEL) requested the assistance of the U.S. Trade and Development Program (TDP) in the form of a grant to support an Engineering/Economic Feasibility Study. The study would address the requirements to finance two large projects: The Tarnita-Lapustesti pumped storage project (1,000 MW) and the Olt five hydroelectric power plants (147.5 MW) located in the river sector Cornetu-Avrig. The report contains the findings and recommendations of the Definitional Mission (DM) team, the terms of reference for the study and recommended contractor selection procedure. The report also contains some background information which will help firms bidding and executing the study. The DM was to review and ascertain the merits of the proposed project, considering such key issues as technical feasibility, cost, project economics, project financing and social considerations.

Not Available

1992-08-05T23:59:59.000Z

227

Software solutions manage the definition, operation, maintenance and configuration control of the National Ignition Facility  

SciTech Connect (OSTI)

The National Ignition Facility (NIF) is the world's largest laser composed of millions of individual parts brought together to form one massive assembly. Maintaining control of the physical definition, status and configuration of this structure is a monumental undertaking yet critical to the validity of the shot experiment data and the safe operation of the facility. The NIF business application suite of software provides the means to effectively manage the definition, build, operation, maintenance and configuration control of all components of the National Ignition Facility. State of the art Computer Aided Design software applications are used to generate a virtual model and assemblies. Engineering bills of material are controlled through the Enterprise Configuration Management System. This data structure is passed to the Enterprise Resource Planning system to create a manufacturing bill of material. Specific parts are serialized then tracked along their entire lifecycle providing visibility to the location and status of optical, target and diagnostic components that are key to assessing pre-shot machine readiness. Nearly forty thousand items requiring preventive, reactive and calibration maintenance are tracked through the System Maintenance & Reliability Tracking application to ensure proper operation. Radiological tracking applications ensure proper stewardship of radiological and hazardous materials and help provide a safe working environment for NIF personnel.

Dobson, D; Churby, A; Krieger, E; Maloy, D; White, K

2011-07-25T23:59:59.000Z

228

Phase Space and Jet Definitions in SCET  

E-Print Network [OSTI]

We discuss consistent power counting for integrating soft and collinear degrees of freedom over arbitrary regions of phase space in the soft-collinear effective theory (SCET), and illustrate our results at one loop with several jet algorithms: JADE, Sterman-Weinberg and k_T. Consistently applying SCET power-counting in phase space, along with non-trivial zero-bin subtractions, prevents double-counting of final states. The resulting phase-space integrals over soft and collinear regions are individually ultraviolet divergent, but the phase-space ultraviolet divergences cancel in the sum. Whether the soft and collinear contributions are individually infrared safe depends on the jet definition. We show that while this is true at one loop for JADE and Sterman-Weinberg, the k_T algorithm does not factorize into individually infrared safe soft and collinear pieces in dimensional regularization. We point out that this statement depends on the ultraviolet regulator, and that in a cutoff scheme the soft functions are infrared safe.

William Man-Yin Cheung; Michael Luke; Saba Zuberi

2009-10-13T23:59:59.000Z

229

Quantum-Secure Authentication with a Classical Key  

E-Print Network [OSTI]

Authentication provides the trust people need to engage in transactions. The advent of physical keys that are impossible to copy promises to revolutionize this field. Up to now, such keys have been verified by classical challenge-response protocols. Such protocols are in general susceptible to emulation attacks. Here we demonstrate Quantum-Secure Authentication ("QSA") of an unclonable classical physical key in a way that is inherently secure by virtue of quantum-physical principles. Our quantum-secure authentication operates in the limit of a large number of channels, represented by the more than thousand degrees of freedom of an optical wavefront shaped with a spatial light modulator. This allows us to reach quantum security with weak coherent pulses of light containing dozens of photons, too few for an adversary to determine their complex spatial shapes, thereby rigorously preventing emulation.

Sebastianus A. Goorden; Marcel Horstmann; Allard P. Mosk; Boris Škori?; Pepijn W. H. Pinkse

2014-06-03T23:59:59.000Z

230

Field Test of Measurement-Device-Independent Quantum Key Distribution  

E-Print Network [OSTI]

A main type of obstacles of practical applications of quantum key distribution (QKD) network is various attacks on detection. Measurement-device-independent QKD (MDIQKD) protocol is immune to all these attacks and thus a strong candidate for network security. Recently, several proof-of-principle demonstrations of MDIQKD have been performed. Although novel, those experiments are implemented in the laboratory with secure key rates less than 0.1 bps. Besides, they need manual calibration frequently to maintain the system performance. These aspects render these demonstrations far from practicability. Thus, justification is extremely crucial for practical deployment into the field environment. Here, by developing an automatic feedback MDIQKD system operated at a high clock rate, we perform a field test via deployed fiber network of 30 km total length, achieving a 16.9 bps secure key rate. The result lays the foundation for a global quantum network which can shield from all the detection-side attacks.

Yan-Lin Tang; Hua-Lei Yin; Si-Jing Chen; Yang Liu; Wei-Jun Zhang; Xiao Jiang; Lu Zhang; Jian Wang; Li-Xing You; Jian-Yu Guan; Dong-Xu Yang; Zhen Wang; Hao Liang; Zhen Zhang; Nan Zhou; Xiongfeng Ma; Teng-Yun Chen; Qiang Zhang; Jian-Wei Pan

2014-08-11T23:59:59.000Z

231

Security Proof of a Semi-Quantum Key Distribution Protocol  

E-Print Network [OSTI]

Semi-quantum key distribution protocols are designed to allow two users to establish a secure secret key when one of the two users is limited to performing certain "classical" operations. There have been several such protocols developed recently, however, due to their reliance on a two-way quantum communication channel (and thus, the attacker's opportunity to interact with the qubit twice), their security analysis is difficult and little is known concerning how secure they are compared to their fully quantum counterparts. In this paper we prove the unconditional security of a particular semi-quantum protocol. We derive an expression for the key rate of this protocol, in the asymptotic scenario, as a function of the quantum channel's noise. Finally, we will show that this semi-quantum protocol can tolerate a maximal noise level comparable to certain fully quantum protocols.

Walter O. Krawec

2014-11-30T23:59:59.000Z

232

Key Dates | U.S. DOE Office of Science (SC)  

Office of Science (SC) Website

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched5 IndustrialIsadore Perlman, 1960 The Ernest OrlandoJohn B.Jorge LuisKayeKey DatesKey

233

Key Dates | U.S. DOE Office of Science (SC)  

Office of Science (SC) Website

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched5 IndustrialIsadore Perlman, 1960 The Ernest OrlandoJohn B.Jorge LuisKayeKeyKey Dates

234

Key Dates | U.S. DOE Office of Science (SC)  

Office of Science (SC) Website

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched5 IndustrialIsadore Perlman, 1960 The Ernest OrlandoJohn B.Jorge LuisKayeKeyKey

235

Key Parameters Affecting DPF Performance Degradation and Impact on Lifetime  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:YearRound-UpHeatMulti-Dimensionalthe10 DOEWashington, DC 20585on253.16582104)Key Issues Key

236

Key Concepts in Project Development and Financing in Alaska  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGY TAX POLICIES7.pdfFuel2007 | Department7JanuaryWASTE-TO-ENERGY:About » KeyKeyAbout

237

CircleKs DEFINITIVE vim Reference Version: 1.0  

E-Print Network [OSTI]

CircleKs DEFINITIVE vim Reference Version: 1.0 Major rules: 1. Vim has 2 modes: insert and command inserting text s! Cut character under cursor and start inserting text After youre in insert mode, vim

238

President's Commission on Sustainability Charter Article I Purpose and Definitions  

E-Print Network [OSTI]

sustainability for public institutions of higher education. To creatively address sustainability, the PCS natural resources, and to integrate sustainability into existing educational, operational, researchPresident's Commission on Sustainability Charter Article I ­ Purpose and Definitions Section 1

Duchowski, Andrew T.

239

‘Model’ or ‘tool’? New definitions for translational research  

E-Print Network [OSTI]

The term ‘model’ often describes non-human biological systems that are used to obtain a better understanding of human disorders. According to the most stringent definition, an animal ‘model’ would display exactly the same ...

Sive, Hazel

240

BUSCH CAMPUS KEY PICK UP INSTRUCTIONS: ALL STUDENTS: ONLY YOU CAN PICK UP YOUR KEY. You will be required to present photo  

E-Print Network [OSTI]

BUSCH CAMPUS KEY PICK UP INSTRUCTIONS: ALL STUDENTS: ONLY YOU CAN PICK UP YOUR KEY. You at the Housing and Residence Life Office, 581 Taylor Road, Busch Campus. If you are unable to pick up your key. _____________________________________________________________________________________ FIRST-YEAR STUDENTS MOVE-IN DAY KEY PICK UP BUSCH CAMPUS SATURDAY, AUGUST 28th 8:00 a.m. ­ 2:00 p

Note: This page contains sample records for the topic "destination definitions key" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Double Shell Tank (DST) Process Waste Sampling Subsystem Definition Report  

SciTech Connect (OSTI)

This report defines the Double-Shell Tank (DST) Process Waste Sampling Subsystem (PWSS). This subsystem definition report fully describes and identifies the system boundaries of the PWSS. This definition provides a basis for developing functional, performance, and test requirements (i.e., subsystem specification), as necessary, for the PWSS. The resultant PWSS specification will include the sampling requirements to support the transfer of waste from the DSTs to the Privatization Contractor during Phase 1 of Waste Feed Delivery.

RASMUSSEN, J.H.

2000-04-25T23:59:59.000Z

242

Cedar Key Aquaculture Workshop Sulfide Concentrations in Sediments  

E-Print Network [OSTI]

Cedar Key Aquaculture Workshop Sulfide Concentrations in Sediments and Water: Influence on Hard;ObjectivesObjectives Examine sediment sulfide levels in the SuwanneeExamine sediment sulfide levels of sulfide on hard clam survivalsurvival #12;MethodsMethods SedimentSediment porewaterporewater samples

Florida, University of

243

Dictionaries Using Variable-Length Keys and Data, with Applications *  

E-Print Network [OSTI]

(Isil- logn, 1) + Itil) and Isil is the length of bit string si. We assume a word length w > log m. We present string Isil > 1, Itil > 1 for all bit-strings si and ti. Fox' fixed-length keys the dictionary problem

Blelloch, Guy E.

244

news and views A key issue for hydrogen storage materi-  

E-Print Network [OSTI]

news and views A key issue for hydrogen storage materi- als is that the hydrogenation and dehydro be possible to discover stable hydrogen hydrates with higher storage Hydrogen Posture Plan www.eere.energy.gov/hydrogenandfuelcells/pdfs/ hydrogen_posture_plan.pdf 7. Kuhs, W

Palumbi, Stephen

245

Using Key Performance Indicators to Manage Energy Costs  

E-Print Network [OSTI]

-effective to collect much more data than ever before, many energy managers find themselves drowning in the volume of data generated. Business information systems faced a similar challenge a decade ago, and it is now common practice to use Key Performance Indicators...

Van Gorp, J. C.

2005-01-01T23:59:59.000Z

246

Page 1 of 4 Creating and Submitting a Key Request  

E-Print Network [OSTI]

of employees. Enter search criteria in the search fields available and select the down red arrow to filter the terms. #12;Page 3 of 4 13. On the Key Request Form - Room List windowpane, select Add New. 14 use the Select Drawing button after entering the building and floor to display the floor plan

Howitt, Ivan

247

Cold Boot Key Recovery by Solving Polynomial Systems with Noise  

E-Print Network [OSTI]

Cold Boot Key Recovery by Solving Polynomial Systems with Noise Martin Albrecht and Carlos Cid 1 proposed in [9]; the technique was called Cold Boot attacks. When considering block ciphers Cold Boot attacks, was proposed in [9] and also provided an insight into the strength of a particular

Sheldon, Nathan D.

248

The Seven Keys to Success in Energy Management and Conservation  

E-Print Network [OSTI]

This paper is a summary of the seven key elements of the Deere & Company Energy Management and Conservation Program. These elements have been found to be essential for the ultimate success of any company-wide energy management program. The process...

Darby, D. F.

1984-01-01T23:59:59.000Z

249

SETTING INITIAL SECRET KEYS IN A MOBILE AD HOC NETWORK  

E-Print Network [OSTI]

SETTING INITIAL SECRET KEYS IN A MOBILE AD HOC NETWORK Murat Cihan1 and C¸etin Kaya Ko¸c2,3 1 I@eecs.oregonstate.edu Abstract. Mobile ad hoc networks require specialized authentication protocols due to the mobility of users and lack of always-available trusted servers. There are a variety of mobile ad hoc authentication protocols

250

Termites, elephants and fire are key drivers of tree mortality  

E-Print Network [OSTI]

mortality: 2 dominated by elephant damage, 2 by termite attack and 1 by fire. Wind and human activity wereTermites, elephants and fire are key drivers of tree mortality 5 plots suffered substantial tree not major causes of tree mortality. Sample sizes are too small to reasonably determine the most significant

251

Daylight quantum key distribution over 1.6 km  

E-Print Network [OSTI]

Quantum key distribution (QKD) has been demonstrated over a point-to-point $\\sim1.6$-km atmospheric optical path in full daylight. This record transmission distance brings QKD a step closer to surface-to-satellite and other long-distance applications.

W. T. Buttler; R. J. Hughes; S. K. Lamoreaux; G. L. Morgan; J. E. Nordholt; C. G. Peterson

2000-01-25T23:59:59.000Z

252

Key words: STREAMLINE, yeast, scale up, automation, sanitization.  

E-Print Network [OSTI]

adsorption by defining a realistic process example at small scale and taking it all the way up to a fullyKey words: STREAMLINE, yeast, scale up, automation, sanitization. Abstract This application note was evaluated by performing a sanitization study in which the column and system were challenged with culture

Lebendiker, Mario

253

Highly Efficient Quantum Key Distribution Immune to All Detector Attacks  

E-Print Network [OSTI]

Vulnerabilities and imperfections of single-photon detectors have been shown to compromise security for quantum key distribution (QKD). The measurement-device-independent QKD (MDI-QKD) appears to be the most appealing solution to solve the issues. However, in practice one faces severe obstacles of having significantly lower key generation rate, difficult two photon interferences, and remote synchronization etc. In this letter, we propose a highly efficient and simple quantum key distribution scheme to remove all of these drawbacks. Our proposal can be implemented with only small modifications over the standard decoy BB84 system. Remarkably it enjoys both the advantages of high key generation rate (being almost two orders of magnitude higher than that based on conventional MDI-QKD) comparable to the normal decoy system, and security against any detector side channel attacks. Most favorably one can achieve complete Bell state measurements with resort to single photon interference, which reduces significantly experimental costs. Our approach enables utilization of high speed and efficient secure communication, particularly in real-life scenario of both metropolitan and intercity QKD network, with an attack free fashion from arbitrary detector side channels.

Wen-Fei Cao; Yi-Zheng Zhen; Yu-Lin Zheng; Zeng-Bing Chen; Nai-Le Liu; Kai Chen; Jian-Wei Pan

2014-10-10T23:59:59.000Z

254

Essentials of Energy Key concepts for the day  

E-Print Network [OSTI]

Essentials of Energy 4/14/05 Key concepts for the day Markets monopoly Substitution volatility Energy intensity Levelized costs externalities I. Market essentials Are there working energy markets · international geo-political issues Speculation Long lead times for development so supply is not very responsive

255

PEM FUEL CELL TECHNOLOGY Key Research Needs and Approaches  

E-Print Network [OSTI]

Developer University #12;8 FUEL CELL RESEARCH NEEDS MEA optimization should focus on new materials Pt (full1 PEM FUEL CELL TECHNOLOGY Key Research Needs and Approaches Tom Jarvi UTC Power South Windsor, CT 06074 23 January 2008 #12;2 UTC POWER MARKET FOCUS Transportation Fuel Cells On-Site Power Solutions #12

256

BERNAL and RESTREPO Key issues for decentralization in municipal  

E-Print Network [OSTI]

BERNAL and RESTREPO Key issues for decentralization in municipal wastewater treatment Diana Paola, the inadequate management and disposal of wastewater and the implementation of sophisticated treatment systems is the decentralisation in wastewater treatment. In this article, it is proposed an overview of the state of the art

Boyer, Edmond

257

Public-Key Locally-Decodable Codes Brett Hemenway  

E-Print Network [OSTI]

Semantically-Secure Public Key En- cryption (SS-PKE) and any Private Information Retrieval (PIR) protocol. Since Homomorphic encryption implies PIR, we also show a reduction from any Homomorphic encryption protocol to PKLDC. Applying our construction to the best known PIR protocol (that of Gentry and Ramzan), we

Ostrovsky, Rafail

258

In 2010 a group of key forestry players  

E-Print Network [OSTI]

Forestry Skills Action Plan #12;Summary #12;In 2010 a group of key forestry players came together to start a movement across the sector to upskill the current, and train the future, forestry workforce. #12;In May 2010 Forestry Commission England convened a small cross- sector task and finish group

259

The U.S. ISO Key Project on Quasars  

E-Print Network [OSTI]

Observations for the U.S. key project on quasars using ISO were completed in April when the satellite's cryogen supply expired. This proceeding presents an update of the project, including information on the final sample, a discussion of some of the data reduction challenges and current efforts to meet them, plus a comparison of preliminary results with IRAS fluxes.

Eric Hooper; Belinda Wilkes; Kim McLeod; Jonathan McDowell; Martin Elvis; Matthew Malkan; Carol Lonsdale; Chris Impey

1998-09-22T23:59:59.000Z

260

Architecture of the Secoqc Quantum Key Distribution network  

E-Print Network [OSTI]

The European projet Secoqc (Secure Communication based on Quantum Cryptography) aims at developing a global network for unconditionally secure key distribution. This paper specifies the requirements and presents the principles guiding the design of this network, and relevant to its architecture and protocols.

Mehrdad Dianati; Romain Alleaume

2006-10-25T23:59:59.000Z

Note: This page contains sample records for the topic "destination definitions key" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

The Design of a Group Key Agreement API Giuseppe Ateniese  

E-Print Network [OSTI]

and communication-independent API. The rest of this paper is organized as follows. We be- gin with the notationThe Design of a Group Key Agreement API Giuseppe Ateniese Computer Science Department Johns Hopkins describes a protocol suite and an API geared for securing collab- orative applications. The API is based

Kim, Dae-Shik

262

Cryptanalysis of two knapsack public-key cryptosystems  

E-Print Network [OSTI]

Han1 {jguobi,hanlidong}@sdu.edu.cn mengxm@sdfi.edu.cn 1 Key Laboratory of Cryptologic Technology is useless to the security of the cryptosystem. Because of the special super increasing structure, we can. We show that the permutation algorithm is useless to avoid the low-density attack and the density

263

Putting cancer in focusPathologists key to picking the  

E-Print Network [OSTI]

Putting cancer in focusPathologists key to picking the right path to a cure momentum IN THIS ISSUE without cancer. #12;EDITOR Heather Newman DESIGN Diana Duren DIRECTOR OF PUBLICATIONS Wayne Wood ASSOCIATE / Photo Researchers, Inc. EDITORIAL OFFICE Vanderbilt-Ingram Cancer Center 691 Preston Building Nashville

Eichman, Brandt F.

264

Efficient Algorithms for Implementing Elliptic Curve PublicKey Schemes  

E-Print Network [OSTI]

Efficient Algorithms for Implementing Elliptic Curve Public­Key Schemes by Dan Beauregard A Thesis Cyganski Thesis Advisor Thesis Committee Dr. Stanley Selkow Dr. John Orr Thesis Committee Department Head #12; Preface This thesis describes the research which I conducted while completing my graduate work

265

Key issues of FED/INTOR impurity control system  

SciTech Connect (OSTI)

A key part of the FED/INTOR activity over the past year has focused on examining the critical issues and developing credible physics and engineering solutions for the impurity control system. The primary emphasis of the work was on the edge-region physics, plasma-wall interaction, materials, engineering and magnetic considerations of the poloidal divertor and pump limiter.

Abdou, M.A.

1982-10-01T23:59:59.000Z

266

The Key Coal Producers ONLINE SUPPORTING MATERIALS to  

E-Print Network [OSTI]

The Key Coal Producers ONLINE SUPPORTING MATERIALS to A Global Coal Production Forecast with Multi's most important coal-producing area is North-Central China. The provinces of Inner Mongolia, Ningxia, Shaanxi and Shanxi together accounted for 83 percent of China's proven coal reserves in 2000, and Shanxi

Patzek, Tadeusz W.

267

Key-Insulated Signcryption (Science and Technology on Communication Security Laboratory,  

E-Print Network [OSTI]

Key-Insulated Signcryption Jia Fan 1 (Science and Technology on Communication Security Laboratory addresses the issue of key exposure by proposing a key-insulated signcryption technique. We define a security model for key-insulated signcryption and prove that the key- insulated signcryption technique

Zheng, Yuliang

268

Public key Steganography Using Discrete Cross-Coupled Chaotic Maps  

E-Print Network [OSTI]

By cross-coupling two logistic maps a novel method is proposed for the public key steganography in JPEG image. Chaotic maps entail high complexity in the used algorithm for embedding secret data in a medium. In this paper, discrete cross- coupled chaotic maps are used to specifying the location of the different parts of the secret data in the image. Modifying JPEG format during compressing and decompressing, and also using public key enhanced difficulty of the algorithm. Simulation results show that in addition to excessive capacity, this method has high robustness and resistance against hackers and can be applicable in secret communication. Also the PSNR value is high compared to the other works.

Sodeif Ahadpour; Mahdiyeh Majidpour; Yaser Sadra

2012-11-01T23:59:59.000Z

269

I t=106sec3a 10 Energy key) 10'  

E-Print Network [OSTI]

. Optics for EUV, X-Ray, and Gamma-Ray Astronomy II, edited by Oberto Citterio, Stephen L. O'Dell, ProcRXTE HE& I t=106sec3a - AEIEH/2 a =10 - 10 Energy key) 10' IBIS NuSTAR Hard X-ray Optics Jason ESTAR will be the first satellite mission to employ focusing optics in the hard X-ray band (8- 80 keV). Its design

270

Economy key to 1992 U. S. oil, gas demand  

SciTech Connect (OSTI)

This paper provides a forecast US oil and gas markets and industry in 1992. An end to economic recession in the U.S. will boost petroleum demand modestly in 1992 after 2 years of decline. U.S. production will resume its slide after a fractional increase in 1991. Drilling in the U.S. will set a record low. Worldwide, the key questions are economic growth and export volumes from Iraq, Kuwait, and former Soviet republics.

Beck, R.J.

1992-01-27T23:59:59.000Z

271

City of Key West, Florida (Utility Company) | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartmentAUDITOhio (UtilityHolyrood, Kansas (Utility Company)JohnsonKennett, MissouriKey

272

New Approach to Quantum Key Distribution Via Quantum Encryption  

E-Print Network [OSTI]

In this Paper, we investigate the security of Zhang, Li and Guo quantum key distribution via quantum encryption protocol [$\\text{Phys. Rev. A} \\textbf{64}, 24302 (2001)$] and show that it is not secure against some of Eve's attacks and with the probability one half she gets all of keys without being detected by the two parties. The main defect in this protocol is that there is an attack strategy by which Eve can change the previously shared Bell state between Alice and Bob to two Bell states among herself and Alice and Bob. Hence, we show that with probability $1/d$ its generalization to $d$-dimension systems is not secure and show that its extension to the case of more partners based on the reusable GHZ states is not secure and with probability one half Eve gets all of keys without being detected by the two parties. In what follows, we show how in going to higher dimensions those protocols can be repaired.

A. Fahmi

2006-04-25T23:59:59.000Z

273

Similarities and Differences between Coronal Holes and the Quiet Sun: Are Loop Statistics the Key?  

E-Print Network [OSTI]

Coronal holes (CH) emit significantly less at coronal temperatures than quiet-Sun regions (QS), but can hardly be distinguished in most chromospheric and lower transition region lines. A key quantity for the understanding of this phenomenon is the magnetic field. We use data from SOHO/MDI to reconstruct the magnetic field in coronal holes and the quiet Sun with the help of a potential magnetic model. Starting from a regular grid on the solar surface we then trace field lines, which provide the overall geometry of the 3D magnetic field structure. We distinguish between open and closed field lines, with the closed field lines being assumed to represent magnetic loops. We then try to compute some properties of coronal loops. The loops in the coronal holes (CH) are found to be on average flatter than in the QS. High and long closed loops are extremely rare, whereas short and low-lying loops are almost as abundant in coronal holes as in the quiet Sun. When interpreted in the light of loop scaling laws this result suggests an explanation for the relatively strong chromospheric and transition region emission (many low-lying, short loops), but the weak coronal emission (few high and long loops) in coronal holes. In spite of this contrast our calculations also suggest that a significant fraction of the cool emission in CHs comes from the open flux regions. Despite these insights provided by the magnetic field line statistics further work is needed to obtain a definite answer to the question if loop statistics explain the differences between coronal holes and the quiet Sun.

T. Wiegelmann; S. K. Solanki

2008-02-01T23:59:59.000Z

274

E-Print Network 3.0 - access technologies key Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

electronic identifier (IdentiKey) including access and password requirements, account lockout... that are accessed using a university electronic identifier or IdentiKey. The...

275

A Comparison of Key PV Backsheet and Module Properties from Fielded...  

Broader source: Energy.gov (indexed) [DOE]

of Key PV Backsheet and Module Properties from Fielded Module Exposures and Accelerated Test Conditions A Comparison of Key PV Backsheet and Module Properties from Fielded...

276

Practical Training in Microalgae Utilization with Key Industry Engineering Group Key Industry Engineering Group s.r.o. has developed a biotechnology for the production of an animal  

E-Print Network [OSTI]

Practical Training in Microalgae Utilization with Key Industry Engineering Group Key Industry on a suspension of Planktochlorella microalgae. The product consists of a suspension of algae in the growing

277

Zero Energy Buildings: A Critical Look at the Definition; Preprint  

SciTech Connect (OSTI)

A net zero-energy building (ZEB) is a residential or commercial building with greatly reduced energy needs through efficiency gains such that the balance of energy needs can be supplied with renewable technologies. Despite the excitement over the phrase ''zero energy'', we lack a common definition, or even a common understanding, of what it means. In this paper, we use a sample of current generation low-energy buildings to explore the concept of zero energy: what it means, why a clear and measurable definition is needed, and how we have progressed toward the ZEB goal.

Torcellini, P.; Pless, S.; Deru, M.; Crawley, D.

2006-06-01T23:59:59.000Z

278

Key results from SB8 simulant flowsheet studies  

SciTech Connect (OSTI)

Key technically reviewed results are presented here in support of the Defense Waste Processing Facility (DWPF) acceptance of Sludge Batch 8 (SB8). This report summarizes results from simulant flowsheet studies of the DWPF Chemical Process Cell (CPC). Results include: Hydrogen generation rate for the Sludge Receipt and Adjustment Tank (SRAT) and Slurry Mix Evaporator (SME) cycles of the CPC on a 6,000 gallon basis; Volume percent of nitrous oxide, N2O, produced during the SRAT cycle; Ammonium ion concentrations recovered from the SRAT and SME off-gas; and, Dried weight percent solids (insoluble, soluble, and total) measurements and density.

Koopman, D. C.

2013-04-26T23:59:59.000Z

279

Orthogonal-state-based protocols of quantum key agreement  

E-Print Network [OSTI]

Two orthogonal-state-based protocols of quantum key agreement (QKA) are proposed. The first protocol of QKA proposed here is designed for two-party QKA, whereas the second protocol is designed for multi-party QKA. Security of these orthogonal-state-based protocols arise from monogamy of entanglement. This is in contrast to the existing protocols of QKA where security arises from the use of non-orthogonal state (non-commutativity principle). Further, it is shown that all the quantum systems that are useful for implementation of quantum dialogue and most of the protocols of secure direct quantum communication can be modified to implement protocols of QKA.

Chitra Shukla; Nasir Alam; Anirban Pathak

2013-10-05T23:59:59.000Z

280

2014 CATEE: Collaboration is the Key- Public/Private Partnerships  

E-Print Network [OSTI]

, Texas Nov. 18-20 HGOC Education and Outreach ? District Meetings ? Peer Exchange ? Workshops ? Webinars ? One-on-One Trainings ? Newsletters ? Social media ESL-KT-14-11-24 CATEE 2014: Clean Air Through Efficiency Conference, Dallas, Texas Nov. 18...2014 CATEE Collaboration is the Key - Public/Private Partnerships November 19, 2014 Lisa Lin, Sustainability Manager, City of Houston ESL-KT-14-11-24 CATEE 2014: Clean Air Through Efficiency Conference, Dallas, Texas Nov. 18-20 City of Houston...

Lin, L.

2014-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "destination definitions key" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

LEDSGP/Transportation Toolkit/Key Actions | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia: Energy Resources Jump to:46 - 429 ThrottledInformation KumasiTools < LEDSGP‎ | DIA-Toolkit Jump<Key

282

NERSC Played Key Role in Nobel Laureate's Discovery  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recovery challengeMultiscaleLogos NERSC Logos NERSC logos arePlayed Key Role in Nobel

283

NNSA Administrator, Three Lab Directors Tour Key Weapons Facility |  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recovery challengeMultiscaleLogos NERSCJeffreyKey ActionsThe NextAwards

284

Key Dates | U.S. DOE Office of Science (SC)  

Office of Science (SC) Website

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched5 IndustrialIsadore Perlman, 1960 The Ernest OrlandoJohn B.Jorge LuisKayeKey Dates

285

Key Dates | U.S. DOE Office of Science (SC)  

Office of Science (SC) Website

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched5 IndustrialIsadore Perlman, 1960 The Ernest OrlandoJohn B.Jorge LuisKayeKey

286

A Key Enzyme to the Potency of an Anticancer Agent  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLasDelivered‰PNGExperience hands-onASTROPHYSICSHe β-Research andA Hollow-IonHybridA Key

287

A Key Enzyme to the Potency of an Anticancer Agent  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLasDelivered‰PNGExperience hands-onASTROPHYSICSHe β-Research andA Hollow-IonHybridA KeyA

288

A Key Enzyme to the Potency of an Anticancer Agent  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLasDelivered‰PNGExperience hands-onASTROPHYSICSHe β-Research andA Hollow-IonHybridA KeyAA

289

A Key Enzyme to the Potency of an Anticancer Agent  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLasDelivered‰PNGExperience hands-onASTROPHYSICSHe β-Research andA Hollow-IonHybridA KeyAAA

290

Iron is the Key to Preserving Dinosaur Soft Tissue  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-SeriesFlickrinformation for andFuel-Efficient Engines |Iron is the Key to

291

Iron is the Key to Preserving Dinosaur Soft Tissue  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-SeriesFlickrinformation for andFuel-Efficient Engines |Iron is the Key toIron is

292

Key Activities in Energy Efficiency | Department of Energy  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGY TAX POLICIES7.pdfFuel2007 | Department7JanuaryWASTE-TO-ENERGY:About » Key Activities

293

GE Key Partner in Innovation Institutes | GE Global Research  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation ProposedUsingFun with Big Sky Learning Fun with Big SkyDIII-D Performance ToolsGlobalIs Key

294

Key Activities in Wind Energy | Department of Energy  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |EnergyonSupport0.pdf5 OPAM SEMIANNUAL REPORT TOJaredKansas City DataKen Salazar AboutKey

295

Key Activities of the Geothermal Technologies Office | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists'Montana.ProgramJulietipDepartmentJuneWhen IAjani Stewart was close toKeri FultonKey

296

Catalysis Center for Energy Innovation KEY ACCOMPLISHMENTS AND CORE CAPABILITIES  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation InInformationCenterResearchCASL Symposium:and Technical Information Catalogue ofKEY

297

Florida Keys El Coop Assn, Inc | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of InspectorConcentrating Solar Power Basics (TheEtelligence (SmartHome Kyoung's pictureFlint ElectricKeys El

298

US Green Building Council Keys Branch Presents: Designing Mosquito Free Cisterns  

E-Print Network [OSTI]

Higgins, Sustainability Director - City of Key West Rainwater Harvesting from Roof Collection through

Watson, Craig A.

299

Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys  

E-Print Network [OSTI]

Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys Beno^it Libert1 in Identity-Based Encryption. In this model, if the Private Key Generator (PKG) maliciously re' public keys are public identifiers (e.g. email addresses) and the matching private keys are derived

Paris-Sud XI, Université de

300

Encryption Key Search using Java-based ALiCE Grid  

E-Print Network [OSTI]

Encryption Key Search is a compute-intensive operation that consists of a brute-force search of a particular key in a given key space. Sequential execution time for a 56-bit encryption key search is approximately 200,000 ...

Virkar, Ameya

Note: This page contains sample records for the topic "destination definitions key" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

DEFINITIONS OF COMPACTNESS AND THE AXIOM OF CHOICE ...  

E-Print Network [OSTI]

Apr 17, 2001 ... the United States and in France: using nets (Birkhoff, building on work by E. H. Moore and H. L. Smith), and ..... no countably infinite subset, and neither does its power set. It follows that (A, ...... [ho] P. Howard, Definitions of compactness, J. Symbolic Logic 55 (1990) 645–655. ... University of Northern Iowa.

1910-20-32T23:59:59.000Z

302

Seismic Tomography: Definitions Lapo Boschi (lapo@erdw.ethz.ch)  

E-Print Network [OSTI]

Seismic Tomography: Definitions Lapo Boschi (lapo@erdw.ethz.ch) September 14, 2009 Seismic Tomography Seismic tomography is the science of interpreting seismic measurements (seismograms) to derive information about the structure of the Earth. This course does not cover the techniques of seismic observation

Boschi, Lapo

303

Virtual Chassis for Snake Robots: Definition and Applications  

E-Print Network [OSTI]

Full paper Virtual Chassis for Snake Robots: Definition and Applications David Rollinson*, Austin Buchan and Howie Choset The Robotics Institute, Carnegie Mellon University, 5000 Forbes Avenue the motion of a snake robot is difficult. This is in part because the internal shape changes that the robot

Choset, Howie

304

The development of high definition television : an ecology of games  

E-Print Network [OSTI]

This study is an analysis of the forces that shaped the overall character of a new US television system, high definition or HDTV, between the early 1980s and 2010, with a primary focus on the period leading up the Federal ...

Neil, Suzanne Chambliss

2010-01-01T23:59:59.000Z

305

Patent License for OpenSSL 1. Definitions  

E-Print Network [OSTI]

Patent License for OpenSSL 1. Definitions 1.1 "Licensor" means Phillip Rogaway. orOne Shields Avenue, Davis, CA 95616-8562. 1.2 "Licensed Patents" means any patent that claims priority to United States Patent Application No. 09/918,615 entitled "Method and Apparatus for Facilitating Efficient

Rogaway, Phillip

306

A SIMPLE ALGORITHM FOR IDENTIFYING ABBREVIATION DEFINITIONS IN BIOMEDICAL TEXT  

E-Print Network [OSTI]

A SIMPLE ALGORITHM FOR IDENTIFYING ABBREVIATION DEFINITIONS IN BIOMEDICAL TEXT ARIEL S. SCHWARTZ of biomedical text is growing at a fast rate, creating challenges for humans and computer systems alike. One of these challenges arises from the frequent use of novel abbreviations in these texts, thus requiring that biomedical

Hearst, Marti

307

EECS 495: Randomized Algorithms Lecture 10 Semi-definite Programming  

E-Print Network [OSTI]

eigen- value is violating constraint Rounding the SDP Goal: Want (i, j) to be cut when (1-vi·vj)/2EECS 495: Randomized Algorithms Lecture 10 Semi-definite Programming Reading: Text: Williamson a graph with small max cut but large LP value, e.g., square plus diagonal. Can strengthen with more

Immorlica, Nicole

308

Key Response Planning Factors for the Aftermath of Nuclear Terrorism  

SciTech Connect (OSTI)

Despite hundreds of above-ground nuclear tests and data gathered from Hiroshima and Nagasaki, the effects of a ground-level, low-yield nuclear detonation in a modern urban environment are still the subject of considerable scientific debate. Extensive review of nuclear weapon effects studies and discussions with nuclear weapon effects experts from various federal agencies, national laboratories, and technical organizations have identified key issues and bounded some of the unknowns required to support response planning for a low-yield, ground-level nuclear detonation in a modern U.S. city. This study, which is focused primarily upon the hazards posed by radioactive fallout, used detailed fallout predictions from the advanced suite of three-dimensional (3-D) meteorology and plume/fallout models developed at Lawrence Livermore National Laboratory (LLNL), including extensive global Key Response Planning Factors for the Aftermath of Nuclear Terrorism geographical and real-time meteorological databases to support model calculations. This 3-D modeling system provides detailed simulations that account for complex meteorology and terrain effects. The results of initial modeling and analysis were presented to federal, state, and local working groups to obtain critical, broad-based review and feedback on strategy and messaging. This effort involved a diverse set of communities, including New York City, National Capitol Regions, Charlotte, Houston, Portland, and Los Angeles. The largest potential for reducing casualties during the post-detonation response phase comes from reducing exposure to fallout radiation. This can be accomplished through early, adequate sheltering followed by informed, delayed evacuation.B The response challenges to a nuclear detonation must be solved through multiple approaches of public education, planning, and rapid response actions. Because the successful response will require extensive coordination of a large number of organizations, supplemented by appropriate responses by local responders and the general population within the hazard zones, regional planning is essential to success. The remainder of this Executive Summary provides summary guidance for response planning in three areas: (1) Public Protection Strategy details the importance of early, adequate shelter followed by informed evacuation. (2) Responder Priorities identify how to protect response personnel, perform regional situational assessment, and support public safety. (3) Key Planning Considerations refute common myths and provide important information on planning how to respond in the aftermath of nuclear terrorism.

Buddemeier, B R; Dillon, M B

2009-01-21T23:59:59.000Z

309

Sandia photovoltaic systems definition and application experiment projects  

SciTech Connect (OSTI)

A compilation is given of the abstracts and visual material used in presentation at the Fourth Photovoltaic Systems Definition and Applications Projects Integration Meeting held at the Marriott Hotel, April 12-14, 1983, in Albuquerque, New Mexico. The meeting provided a forum for detailed analyses on recently completed and current activities. These activities include systems research, balance-of-system technology development, residential experimentation, and evaluation of intermediate-sized applications.

Jones, G.

1983-04-01T23:59:59.000Z

310

Risk and Performance Technologies: Identifying the Keys to Successful Implementation  

SciTech Connect (OSTI)

The nuclear power industry has been utilizing risk and performance based technologies for over thirty years. Applications of these technologies have included risk assessment (e.g. Individual Plant Examinations), burden reduction (e.g. Risk-Informed Inservice Inspection, RI-ISI) and risk management (Maintenance Rule, 10CFR50.65). Over the last five to ten years the number of risk-informed (RI) burden reduction initiatives has increased. Unfortunately, the efficiencies of some of these applications have been questionable. This paper investigates those attributes necessary to support successful, cost-effective RI-applications. The premise to this paper is that by understanding the key attributes that support one successful application, insights can be gleaned that will streamline/coordinate future RI-applications. This paper is an extension to a paper presented at the Pressure Vessel and Piping (PVP-2001) Conference. In that paper, a number issues and opportunities were identified that needed to be assessed in order to support future (and efficient) RI-applications. It was noted in the paper that a proper understanding and resolution of these issues will facilitate implementation of risk and performance technology in the operation, maintenance and design disciplines. In addition, it will provide the foundation necessary to support regulatory review and approval. (authors)

McClain, Lynn [Niagara Mohawk (United States); Smith, Art [Entergy Operations (United States); O'Regan, Patrick [Electric Power Research Institute - EPRI, 3420 Hillview Avenue, Palo Alto, California 94304 (United States)

2002-07-01T23:59:59.000Z

311

Key Geomechanics Issues at the Waste Isolation Pilot Plant Geomechanics  

SciTech Connect (OSTI)

Mechanical and hydrological properties of rock salt provide excellent bases for geological isolation of hazardous materials. Regulatory compliance determinations for the Waste Isolation Pilot Plant (WIPP) stand as testament to the widely held conclusion that salt provides excellent isolation properties. The WIPP saga began in the 1950s when the U.S. National Academy of Sciences (NAS) recommended a salt vault as a promising solution to the national problem of nuclear waste disposal. For over 20 years, the Scientific basis for the NAS recommendation has been fortified by Sandia National Laboratories through a series of large scale field tests and laboratory investigations of salt properties. These scientific investigations helped develop a comprehensive understanding of salt's 4 reformational behavior over an applicable range of stresses and temperatures. Sophisticated constitutive modeling, validated through underground testing, provides the computational ability to model long-term behavior of repository configurations. In concert with advancement of the mechanical models, fluid flow measurements showed not only that the evaporite lithology was essentially impermeable but that the WIPP setting was hydrologically inactive. Favorable mechanical properties ensure isolation of materials placed in a salt geological setting. Key areas of the geomechanics investigations leading to the certification of WIPP are in situ experiments, laboratory tests, and shaft seal design.

HANSEN,FRANCIS D.

1999-09-01T23:59:59.000Z

312

Recent Progress in the Definition of Thermodynamic Entropy  

E-Print Network [OSTI]

The principal methods for the definition of thermodynamic entropy are discussed with special reference to those developed by Carath\\'eodory, the Keenan School, Lieb and Yngvason, and the present authors. An improvement of the latter method is then presented. Seven basic axioms are employed: three Postulates, which are considered as having a quite general validity, and four Assumptions, which identify the domains of validity of the definitions of energy (Assumption 1) and entropy (Assumptions 2, 3, 4). The domain of validity of the present definition of entropy is not restricted to stable equilibrium states. For collections of simple systems, it coincides with that of the proof of existence and uniqueness of an entropy function which characterizes the relation of adiabatic accessibility proposed by Lieb and Yngvason. However, our treatment does not require the formation of scaled copies so that it applies not only to collections of simple systems, but also to systems contained in electric or magnetic fields and to small and few-particle systems.

Enzo Zanchini; Gian Paolo Beretta

2014-03-23T23:59:59.000Z

313

Lowest Engine-Out Emissions as the Key to the Future of the Heavy...  

Broader source: Energy.gov (indexed) [DOE]

Lowest Engine-Out Emissions as the Key to the Future of the Heavy-Duty Diesel Engine: New Development Rersults Lowest Engine-Out Emissions as the Key to the Future of the...

314

Evaluation of the effects of a highway improvement project on Key deer  

E-Print Network [OSTI]

assessed the potential impacts of the US 1 corridor project to Key deer movements by comparing (1) radio-collared Key deer annual ranges (2) radio-collared deer corridor movements, and (3) assessing Key deer underpass and corridor use. Female and male...

Braden, Anthony Wayne

2006-10-30T23:59:59.000Z

315

Weak-Key Analysis of POET Mohamed Ahmed Abdelraheem, Andrey Bogdanov, and Elmar Tischhauser  

E-Print Network [OSTI]

Weak-Key Analysis of POET Mohamed Ahmed Abdelraheem, Andrey Bogdanov, and Elmar Tischhauser,anbog,ewti}@dtu.dk Abstract. We evaluate the security of the recently proposed authenticated encryption scheme POET. We give explicit constructions for weak key classes not covered by POET's weak key testing strategy

316

Weakness of two ID-based remote mutual authentication with key agreement protocols for mobile devices  

E-Print Network [OSTI]

to achieve explicit key confirmation. We also point out Wu's scheme decreases efficiency by using the double by the traditional public-key cryptography (Rivest et al., 1978; ElGama, l985). The computation ability and battery the number of users is increased, KAC needs a large storage space to store users' public keys

317

Imnaha Subbasin Assessment May 2004259 1.2.10.3 Key Environmental Correlates  

E-Print Network [OSTI]

, such as roads, buildings, and pollution. Including these fine-scale attributes of an animal's environment whenImnaha Subbasin Assessment May 2004259 1.2.10.3 Key Environmental Correlates Key environmental conditions. Key environmental correlates are the finest scale features that help to define wildlife habitat

318

Origin of a complex key innovation in an obligate insectplant mutualism  

E-Print Network [OSTI]

Origin of a complex key innovation in an obligate insect­plant mutualism Olle Pellmyr* and Harald W, and approved January 30, 2002 (received for review November 2, 2001) Evolutionary key innovations give for studies of coevolution, and it relies on the key innovation in the moths of complex tentacles used

Krenn, Harald W.

319

Private Key Recovery Combination Attacks: On Extreme Fragility of Popular Bitcoin  

E-Print Network [OSTI]

Private Key Recovery Combination Attacks: On Extreme Fragility of Popular Bitcoin Key Management and practical operational security in bitcoin digital currency storage systems. We study the security two most used bitcoin HD Wallet key management solutions (e.g. in BIP032 and in earlier systems). These systems

320

Distribution and abundance of endangered Florida Key deer on outer islands  

E-Print Network [OSTI]

parameters has limited status assessment and management of Key deer on outer islands. Traditional survey techniques for Key deer on Big Pine and No Name keys include road-counts, strip-counts, and mark-recapture methods. However, practical limitations render...

Watts, Dominque Elijah

2007-04-25T23:59:59.000Z

Note: This page contains sample records for the topic "destination definitions key" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

A Key Technology Evaluation Case Study: Applying a New Middleware Architecture on the  

E-Print Network [OSTI]

A Key Technology Evaluation Case Study: Applying a New Middleware Architecture on the Enterprise, fgoedickejuzdung@informatik.uni-essen.de Abstract Decisions for key technologies, like middleware, for large scale projects are hard, because the impact and relevance of key technologies go beyond their core technological

Zdun, Uwe

322

Societal-Equity-Enhancing Criteria and Facility-Host Incentives Supporting Five Key Elements in the January 2012 Blue Ribbon Commission Report - 13015  

SciTech Connect (OSTI)

In February 2009, the Obama Administration announced it would abandon USA's only candidate SNF/HLW-disposal facility since 1987. In 2010, all related activities were stopped and the Blue Ribbon Commission on America's Nuclear Future was established 'to recommend a new strategy for managing the back end of the nuclear fuel cycle', which it did in January 2012, emphasizing eight key elements. However, Key Element 1, 'A new, consent-based approach to siting future nuclear facilities', is qualitative/indeterminate rather than quantitative/measurable. It is thus highly-susceptible to semantic permutations that could extend rather than, as intended, expedite the siting of future nuclear facilities unless it also defines: a) Whose consent is needed?; and b) What constitutes consent? The following 'generic', radiation-risk- and societal-equity-based criteria address these questions: 1. Identify areas affected by projected radiation and other health risks from: a. The proposed nuclear facility (facility stakeholders); and b. The related nuclear-materials-transportation routes (transportation stakeholders); then 2. Surround each stakeholder area with a buffer zone and use this enlarged foot print to identify: a. Stakeholder hosts; and b. Areas not hosting any stakeholder category (interested parties). 3. Define 'consent-based' as being at least 60 percent of the 'population' in the respective stakeholder category and apply this yardstick to both 'in favor' and 'against' votes. Although criteria 1 and 2 also need facility-based definitions to make Key Element 1 measurable, the described siting approach, augmented by related facility-host incentives, would expedite the schedule and reduce the cost for achieving Key Elements 4-6 and 8, politics permitting. (authors)

Eriksson, Leif G. [Nuclear Waste Dispositions, 535 N. Interlachen Avenue, Unit 303, Winter Park, Florida 32789 (United States)] [Nuclear Waste Dispositions, 535 N. Interlachen Avenue, Unit 303, Winter Park, Florida 32789 (United States); Dials, George E. [B and W Conversion Services LLC, 1020 Monarch Road, Suite 300, Lexington, Kentucky 40513 (United States)] [B and W Conversion Services LLC, 1020 Monarch Road, Suite 300, Lexington, Kentucky 40513 (United States); George, Critz H. [Retired DOE and Consultant, 1218 Countryside Lane, Albuquerque, New Mexico, 87114 (United States)] [Retired DOE and Consultant, 1218 Countryside Lane, Albuquerque, New Mexico, 87114 (United States)

2013-07-01T23:59:59.000Z

323

The generation of shared cryptographic keys through channel impulse response estimation at 60 GHz.  

SciTech Connect (OSTI)

Methods to generate private keys based on wireless channel characteristics have been proposed as an alternative to standard key-management schemes. In this work, we discuss past work in the field and offer a generalized scheme for the generation of private keys using uncorrelated channels in multiple domains. Proposed cognitive enhancements measure channel characteristics, to dynamically change transmission and reception parameters as well as estimate private key randomness and expiration times. Finally, results are presented on the implementation of a system for the generation of private keys for cryptographic communications using channel impulse-response estimation at 60 GHz. The testbed is composed of commercial millimeter-wave VubIQ transceivers, laboratory equipment, and software implemented in MATLAB. Novel cognitive enhancements are demonstrated, using channel estimation to dynamically change system parameters and estimate cryptographic key strength. We show for a complex channel that secret key generation can be accomplished on the order of 100 kb/s.

Young, Derek P.; Forman, Michael A.; Dowdle, Donald Ryan

2010-09-01T23:59:59.000Z

324

Secure Cryptographic Key Management System (CKMS) Considerations for Smart Grid Devices  

SciTech Connect (OSTI)

In this paper, we examine some unique challenges associated with key management in the Smart Grid and concomitant research initiatives: 1) effectively model security requirements and their implementations, and 2) manage keys and key distribution for very large scale deployments such as Smart Meters over a long period of performance. This will set the stage to: 3) develop innovative, low cost methods to protect keying material, and 4) provide high assurance authentication services. We will present our perspective on key management and will discuss some key issues within the life cycle of a cryptographic key designed to achieve the following: 1) control systems designed, installed, operated, and maintained to survive an intentional cyber assault with no loss of critical function, and 2) widespread implementation of methods for secure communication between remote access devices and control centers that are scalable and cost-effective to deploy.

Abercrombie, Robert K [ORNL] [ORNL; Sheldon, Frederick T [ORNL] [ORNL; Aldridge, Hal [ORNL] [ORNL; Duren, Mike [Sypris Electronics, LLC] [Sypris Electronics, LLC; Ricci, Tracy [Sypris Electronics, LLC] [Sypris Electronics, LLC; Bertino, Elisa [ORNL] [ORNL; Kulatunga, Athula [Purdue University] [Purdue University; Navaratne, Uditha Sudheera [Purdue University] [Purdue University

2011-01-01T23:59:59.000Z

325

EIAs Proposed Definitions for Natural Gas Liquids  

Annual Energy Outlook 2013 [U.S. Energy Information Administration (EIA)]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) " ,"ClickPipelines AboutDecemberSteam Coal Import96Nebraska Nuclear ProfileReport Released:Definitions for

326

Facility design philosophy: Tank Waste Remediation System Process support and infrastructure definition  

SciTech Connect (OSTI)

This report documents the current facility design philosophy for the Tank Waste Remediation System (TWRS) process support and infrastructure definition. The Tank Waste Remediation System Facility Configuration Study (FCS) initially documented the identification and definition of support functions and infrastructure essential to the TWRS processing mission. Since the issuance of the FCS, the Westinghouse Hanford Company (WHC) has proceeded to develop information and requirements essential for the technical definition of the TWRS treatment processing programs.

Leach, C.E.; Galbraith, J.D. [Westinghouse Hanford Co., Richland, WA (United States); Grant, P.R.; Francuz, D.J.; Schroeder, P.J. [Fluor Daniel, Inc., Richland, WA (United States)

1995-11-01T23:59:59.000Z

327

E-Print Network 3.0 - appalachia variable definition Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

climate change... . The first component of the definition involves ... Source: McCarl, Bruce A. - Department of Agricultural Economics, Texas A&M University Collection:...

328

Montana MCA 75-20-104, Policy and General Provisions Definitions...  

Open Energy Info (EERE)

4, Policy and General Provisions Definitions for Major Facility Siting Jump to: navigation, search OpenEI Reference LibraryAdd to library Legal Document- RegulationRegulation:...

329

E-Print Network 3.0 - alternative prostate definition Sample...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

prostate definition Page: << < 1 2 3 4 5 > >> 1 2nd Annual Multidisciplinary Prostate Cancer Symposium Planning and Assessment of New Prostate Cancer Therapies CME Summary: of the...

330

Secure multi-party communication with quantum key distribution managed by trusted authority  

DOE Patents [OSTI]

Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD are extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.

Nordholt, Jane Elizabeth; Hughes, Richard John; Peterson, Charles Glen

2013-07-09T23:59:59.000Z

331

Daylight operation of a free space, entanglement-based quantum key distribution system  

E-Print Network [OSTI]

Many quantum key distribution (QKD) implementations using a free space transmission path are restricted to operation at night time in order to distinguish the signal photons used for a secure key establishment from background light. Here, we present a lean entanglement-based QKD system overcoming that imitation. By implementing spectral, spatial and temporal filtering techniques, we were able to establish a secure key continuously over several days under varying light and weather conditions.

Peloso, Matthew P; Ho, Caleb; Lamas-Linares, Antia; Kurtsiefer, Christian

2008-01-01T23:59:59.000Z

332

Daylight operation of a free space, entanglement-based quantum key distribution system  

E-Print Network [OSTI]

Many quantum key distribution (QKD) implementations using a free space transmission path are restricted to operation at night time in order to distinguish the signal photons used for a secure key establishment from background light. Here, we present a lean entanglement-based QKD system overcoming that imitation. By implementing spectral, spatial and temporal filtering techniques, we were able to establish a secure key continuously over several days under varying light and weather conditions.

Matthew P. Peloso; Ilja Gerhardt; Caleb Ho; Antia Lamas-Linares; Christian Kurtsiefer

2008-12-10T23:59:59.000Z

333

E-Print Network 3.0 - apoptosis key players Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Summary: -publication: http:www.landesbioscience.comjournalsccabstract.php?id3262 KEY WORDS cyclin A, apoptosis, Xenopus... is Sufficient but not Required for the...

334

E-Print Network 3.0 - address key issues Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

term schedule. Summary: to their rental fees, before they obtain their locker key. Lockout situations can only be addressed through... of the renter to clean out hisher locker...

335

Modeling Metal Fatigue As a Key Step in PV Module Life Time Prediction (Presentation)  

SciTech Connect (OSTI)

This presentation covers modeling metal fatigue as a key step in photovoltaic (PV) module lifetime predictions. Described are time-dependent and time-independent case studies.

Bosco, N.

2012-02-01T23:59:59.000Z

336

Your biodiversity in my backyard : key local stakeholders' perceptions of biodiversity conservation in Gorontalo, Indonesia.  

E-Print Network [OSTI]

??The establishment of protected areas (PAs) has been the key national strategy in biodiversity conservation, through preserving the unique wildlife and ecosystems in Indonesia. As… (more)

Kartikasari, Sri Nurani

2008-01-01T23:59:59.000Z

337

Universally Composable PasswordBased Key Exchange Ran Canetti # Shai Halevi # Jonathan Katz + Yehuda Lindell #  

E-Print Network [OSTI]

that it is impossible to satisfy our definition in the ``plain'' model (e.g., without a common reference string and Trusted Computing grant #0310751. # Dept. of Computer Science, Bar­Ilan University, Israel. lindell@cs.biu.ac.il . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 6 Password­Based Secure Channels 26 7 Impossibility of Realizing F pwKE in the Plain Model 29

Katz, Jonathan

338

Appendix S1. Definitions of Acronyms 3rdG: 3rd Generation Technologies  

E-Print Network [OSTI]

Appendix S1. Definitions of Acronyms 3rdG: 3rd Generation Technologies CCS: Carbon Capture and Storage CDF: Cumulative Distribution Function ChemL: Chemical Looping DICE: Dynamic Integrated Model-combustion Carbon Capture PreC: Pre-Combustion Carbon Capture #12;Appendix S2. Definitions of Variables

Massachusetts at Amherst, University of

339

Lecture 16 : Definitions, theorems, proofs MTH299 Transition to Formal Mathematics Michigan State University 1 / 8  

E-Print Network [OSTI]

). MTH299 Transition to Formal Mathematics Michigan State University 2 / 8 #12;Group Axioms Definition299 Transition to Formal Mathematics Michigan State University 3 / 8 #12;Group Axioms Definition Is Z with + a group? MTH299 Transition to Formal Mathematics Michigan State University 3 / 8 #12;Group

Magyar, Peter

340

A dynamical definition of quasibound molecular clusters Sarah A. Harris and Ian J. Forda)  

E-Print Network [OSTI]

A dynamical definition of quasibound molecular clusters Sarah A. Harris and Ian J. Forda of a quasibound cluster are identified through a retrospective dynamical definition. The trajectory of a molecular is satisfied, however, at the instant that the energy of the departing molecule in the center of mass frame

Ford, Ian

Note: This page contains sample records for the topic "destination definitions key" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

The definition of reaction coordinates for reaction-path dynamics Gregory A. Natanson  

E-Print Network [OSTI]

The definition of reaction coordinates for reaction-path dynamics Gregory A. Natanson Computer only small-amplitude deviations from a minimum-energy path (MEP) through nuclear coordinate space. Thus. In choosing the coordinate system, the critical issue is the definition of the reaction coordinate. Along

Truong, Thanh N.

342

High Definition Dynamic Reservoir Characterization for CO2 Management, Delhi Field, Louisiana  

E-Print Network [OSTI]

#12;High Definition Dynamic Reservoir Characterization for CO2 Management, Delhi Field, Louisiana Characterization Project (RCP) proposes Phase XIII: a research study to conduct high definition dynamic reservoir energy supply, while associated sequestration is important to the environment in which we live. As part

343

Abduction in Logic Programming: A New Definition and an Abductive Procedure Based on Rewriting  

E-Print Network [OSTI]

Abduction in Logic Programming: A New Definition and an Abductive Procedure Based on Rewriting, Canada T6G 2H1 Abstract We propose a new definition of abduction in logic programming, and contrast Abduction in logic programming In general, given a background theory T , and an observation q to explain

Lin, Fangzhen

344

Project definition study for research facility access and science education  

SciTech Connect (OSTI)

This UTA/SMU project definition study describes critical customer services and research programs which draw upon SSC assets to meet regional needs in two major components: Science Education; Academic/Small Business R and D Facility Access. The location of the SSC in Texas constituted a significant stimulus to R and D activities in Texas, encouraging new initiatives in high energy physics, as well as stimulating other areas of physics and related sciences. An important aspect of maximizing the utility of the investment in the SSC should be to re-allocate SSC assets in ways that maintain that momentum. This study addresses several ways to achieve that end, extending benefits to all of physics, the sciences in general and particularly, to science education.

Rosen, S.P. [Univ. of Texas, Arlington, TX (United States). Coll. of Science; Teplitz, V.L. [Southern Methodist Univ., Dallas, TX (United States). Physics Dept.

1994-10-01T23:59:59.000Z

345

Atmospheric coherence times in interferometry: definition and measurement  

E-Print Network [OSTI]

Current and future ground-based interferometers require knowledge of the atmospheric time constant t_0, but this parameter has diverse definitions. Moreover, adequate techniques for monitoring t_0 still have to be implemented. We derive a new formula for the structure function of the fringe phase (piston) in a long-baseline interferometer, and review available techniques for measuring the atmospheric time constant and the shortcomings. It is shown that the standard adaptive-optics atmospheric time constant is sufficient for quantifying the piston coherence time, with only minor modifications. The residual error of a fast fringe tracker and the loss of fringe visibility in a finite exposure time are calculated in terms of the same parameter. A new method based on the fast variations of defocus is proposed. The formula for relating the defocus speed to the time constant is derived. Simulations of a 35-cm telescope demonstrate the feasibility of this new technique for site testing.

A. Kellerer; A. Tokovinin

2006-10-06T23:59:59.000Z

346

Building America Research Benchmark Definition: Updated December 20, 2007  

SciTech Connect (OSTI)

To track progress toward aggressive multi-year whole-house energy savings goals of 40-70% and onsite power production of up to 30%, DOE's Residential Buildings Program and NREL developed the Building America Research Benchmark in consultation with the Building America industry teams. The Benchmark is generally consistent with mid-1990s standard practice, as reflected in the Home Energy Rating System (HERS) Technical Guidelines (RESNET 2002), with additional definitions that allow the analyst to evaluate all residential end-uses, an extension of the traditional HERS rating approach that focuses on space conditioning and hot water. Unlike the reference homes used for HERS, EnergyStar, and most energy codes, the Benchmark represents typical construction at a fixed point in time so it can be used as the basis for Building America's multi-year energy savings goals without the complication of chasing a 'moving target'.

Hendron, R.

2008-01-01T23:59:59.000Z

347

Building America Research Benchmark Definition, Updated December 15, 2006  

SciTech Connect (OSTI)

To track progress toward aggressive multi-year whole-house energy savings goals of 40-70% and onsite power production of up to 30%, DOE's Residential Buildings Program and NREL developed the Building America Research Benchmark in consultation with the Building America industry teams. The Benchmark is generally consistent with mid-1990s standard practice, as reflected in the Home Energy Rating System (HERS) Technical Guidelines (RESNET 2002), with additional definitions that allow the analyst to evaluate all residential end-uses, an extension of the traditional HERS rating approach that focuses on space conditioning and hot water. Unlike the reference homes used for HERS, EnergyStar, and most energy codes, the Benchmark represents typical construction at a fixed point in time so it can be used as the basis for Building America's multi-year energy savings goals without the complication of chasing a ''moving target''.

Hendron, R.

2007-01-01T23:59:59.000Z

348

Building America Research Benchmark Definition: Updated August 15, 2007  

SciTech Connect (OSTI)

To track progress toward aggressive multi-year whole-house energy savings goals of 40-70% and onsite power production of up to 30%, DOE's Residential Buildings Program and NREL developed the Building America Research Benchmark in consultation with the Building America industry teams. The Benchmark is generally consistent with mid-1990s standard practice, as reflected in the Home Energy Rating System (HERS) Technical Guidelines (RESNET 2002), with additional definitions that allow the analyst to evaluate all residential end-uses, an extension of the traditional HERS rating approach that focuses on space conditioning and hot water. Unlike the reference homes used for HERS, EnergyStar, and most energy codes, the Benchmark represents typical construction at a fixed point in time so it can be used as the basis for Building America's multi-year energy savings goals without the complication of chasing a 'moving target'.

Hendron, R.

2007-09-01T23:59:59.000Z

349

Building America Research Benchmark Definition, Updated December 29, 2004  

SciTech Connect (OSTI)

To track progress toward aggressive multi-year whole-house energy savings goals of 40-70% and onsite power production of up to 30%, the U.S. Department of Energy (DOE) Residential Buildings Program and the National Renewable Energy Laboratory (NREL) developed the Building America Research Benchmark in consultation with the Building America industry teams. The Benchmark is generally consistent with mid-1990s standard practice, as reflected in the Home Energy Rating System (HERS) Technical Guidelines (RESNET 2002), with additional definitions that allow the analyst to evaluate all residential end-uses, an extension of the traditional HERS rating approach that focuses on space conditioning and hot water. A series of user profiles, intended to represent the behavior of a ''standard'' set of occupants, was created for use in conjunction with the Benchmark.

Hendron, R.

2005-02-01T23:59:59.000Z

350

Major Long Haul Truck Idling Generators in Key States ELECTRIC POWER RESEARCH INSTITUTE  

E-Print Network [OSTI]

Major Long Haul Truck Idling Generators in Key States 1013776 #12;#12;ELECTRIC POWER RESEARCH-0813 USA 800.313.3774 650.855.2121 askepri@epri.com www.epri.com Major Long Haul Truck Idling Generators Haul Truck Idling Generators in Key States. EPRI, Palo Alto, CA: 2008. 1013776. #12;#12;v PRODUCT

351

The Continental Margin is a Key Source of Iron to the HNLC North Pacific Ocean  

E-Print Network [OSTI]

The Continental Margin is a Key Source of Iron to the HNLC North Pacific Ocean Phoebe J. Lam1 concentrations in the upper 500m of the Western Subarctic Pacific, an iron-limited High Nutrient Low Chlorophyll a key source of bioavailable Fe to the HNLC North Pacific. Keywords: iron, continental margin, HNLC 1

352

A Trustful Authentication and Key Exchange Scheme (TAKES) for Ad Hoc Networks  

E-Print Network [OSTI]

A Trustful Authentication and Key Exchange Scheme (TAKES) for Ad Hoc Networks Tony Cheneau National public key distribution scheme adapted to ad hoc networks called TAKES for Trustful Authentication, or even implementing a light naming system can be enabled on top of ad hoc networks. TAKES is formally

Paris-Sud XI, Université de

353

Granite Recrystallization The Key to an Alternative Strategy for HLW Disposal? Fergus G.F. Gibb  

E-Print Network [OSTI]

Granite Recrystallization ­ The Key to an Alternative Strategy for HLW Disposal? Fergus G.F. Gibb, and hence the key to the entire strategy, depends on whether sufficient melting of granite host rock can-temperature, high-pressure experiments reported here demonstrate that granite can be partially melted and completely

Sheffield, University of

354

A Single-Key Attack on 6-Round KASUMI Teruo Saito1  

E-Print Network [OSTI]

A Single-Key Attack on 6-Round KASUMI Teruo Saito1 NEC Software Hokuriku, Ltd. 1, Anyoji, Hakusan. In 2010, a related-key attack on full KASUMI was reported. The attack was very powerful and worked in practical complexity. However the attack was not a direct threat to full KASUMI because of the impractical

355

Band structures Optical absorption Summary Key concepts in Density Functional Theory (II)  

E-Print Network [OSTI]

Band structures Optical absorption Summary Key concepts in Density Functional Theory (II) Kohn, Belfast Key concepts in Density Functional Theory (II) Silvana Botti #12;Band structures Optical in Density Functional Theory (II) Silvana Botti #12;Band structures Optical absorption Summary Outline 1 From

Botti, Silvana

356

An efficient certificateless two-party authenticated key agreement scheme from  

E-Print Network [OSTI]

-based cryptography. Key agreement(KA) schemes are designed to provide secure communications between two or more proposed. However, these schemes need to compute at least one pairing on-line. In order to improve to finished the key agreement. Our scheme's overhead is lower than that of previous schemes [3

357

Modified Bennett-Brassard 1984 Quantum Key Distribution With Two-way Classical Communications  

E-Print Network [OSTI]

The quantum key distribution protocol without public announcement of bases is equipped with a two-way classical communication symmetric entanglement purification protocol. This modified key distribution protocol is unconditionally secure and has a higher tolerable error rate of 20%, which is higher than previous scheme without public announcement of bases.

Kai Wen; Gui Lu Long

2005-08-27T23:59:59.000Z

358

Linkages between coastal runoff and the Florida Keys ecosystem: A study of a dark plume event  

E-Print Network [OSTI]

of a dark water plume from near Charlotte Harbor, Florida, to the Dry Tortugas in the Florida Keys in mid, respectively. The dark color became increasingly dominated by colored dissolved organic matter, toward the DryLinkages between coastal runoff and the Florida Keys ecosystem: A study of a dark plume event

359

Public Key Encryption that Allows PIR Queries Dan Boneh # Eyal Kushilevitz + Rafail Ostrovsky #  

E-Print Network [OSTI]

Public Key Encryption that Allows PIR Queries Dan Boneh # Eyal Kushilevitz + Rafail Ostrovsky a public­key encryption scheme for Alice that allows PIR searching over encrypted documents. Our solution­trivially small communication complexity. The main technique of our solution also allows for Single­Database PIR

360

Energy Efficiency of Symmetric Key Cryptographic Algorithms in Wireless Sensor Networks  

E-Print Network [OSTI]

Energy Efficiency of Symmetric Key Cryptographic Algorithms in Wireless Sensor Networks Xueying-- In this paper, we examine the energy efficiency of symmetric key cryptographic algorithms applied in wireless energy efficiency with a level of security suitable for wireless sensor networks. Keywords - wireless

Heys, Howard

Note: This page contains sample records for the topic "destination definitions key" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

A Method for Obtaining Digital Signatures and PublicKey Cryptosystems  

E-Print Network [OSTI]

re­ vealing an encryption key does not thereby reveal the corresponding decryption key. This has two, or the entire work requires specific permission as does republication, or systematic or multiple reproduction . Formally, D(E(M) = M: (1) (b) Both E and D are easy to compute. (c) By publicly revealing E the user does

Goldwasser, Shafi

362

Direct quadrature phase shift keying modulator using six-port technology  

E-Print Network [OSTI]

Direct quadrature phase shift keying modulator using six-port technology Y. Zhao, C. Viereck, J.F. Frigon, R.G. Bosisio and K. Wu A direct quadrature phase shift keying modulator based on six-port technology is presented. The modulator comprises a six-port circuit, a switch matrix and open and short

Frigon, Jean-François

363

Structured Codes Improve the Bennett-Brassard-84 Quantum Key Rate  

E-Print Network [OSTI]

A central goal in information theory and cryptography is finding simple characterizations of optimal communication rates subject to various restrictions and security requirements. Ideally, the optimal key rate for a quantum key distribution (QKD) protocol would be given by {\\em single-letter formula} involving a simple optimization over a single use of an effective channel. We explore the possibility of such a formula for one of the simplest and most widely used QKD protocols--Bennett-Brassard-84 (BB84) with one way classical post-processing. We show that a conjectured single-letter key-rate formula is false, uncovering a deep ignorance about asymptotically good private codes and pointing towards unfortunate complications in the theory of QKD. These complications are not without benefit--with added complexity comes better key rates than previously thought possible. We improve the threshold for secure key generation from a bit error rate of 0.124 to 0.129.

Graeme Smith; Joseph M. Renes; John A. Smolin

2008-04-28T23:59:59.000Z

364

A QUICK KEY TO THE SUBFAMILIES AND GENERA OF ANTS OF THE SAVANNAH RIVER SITE  

SciTech Connect (OSTI)

This taxonomic key was devised to support development of a Rapid Bioassessment Protocol using ants at the Savannah River Site. The emphasis is on 'rapid' and, because the available keys contained a very large number of genera not known to occur at the Savannah River Site, we found that the available keys were unwieldy. Because these keys contained many more genera than we would ever encounter and because this larger number of genera required more couplets in the key and often required examination of characters that are difficult to assess without higher magnifications (60X or higher), more time was required to process samples. In developing this set of keys I emphasized character states that are easier for nonspecialists to recognize. I recognize that the character sets used may lead to some errors but I believe that the error rate will be small and, for the purpose of rapid bioassessment, this error rate will be acceptable provided that overall sample sizes are adequate. Oliver and Beattie (1996a, 1996b) found that for rapid assessment of biodiversity the same results were found when identifications were done to morphospecies by people with minimal expertise as when the same data sets were identified by subject matter experts. Basset et al. (2004) concluded that it was not as important to correctly identify all species as it was to be sure that the study included as many functional groups as possible. If your study requires high levels of accuracy, it is highly recommended that, when you key out a specimen and have any doubts concerning the identification, you should refer to keys in Bolton (1994) or to the other keys used to develop this area specific taxonomic key.

Martin, D

2007-09-04T23:59:59.000Z

365

Phase-remapping attack in practical quantum-key-distribution systems  

SciTech Connect (OSTI)

Quantum key distribution (QKD) can be used to generate secret keys between two distant parties. Even though QKD has been proven unconditionally secure against eavesdroppers with unlimited computation power, practical implementations of QKD may contain loopholes that may lead to the generated secret keys being compromised. In this paper, we propose a phase-remapping attack targeting two practical bidirectional QKD systems (the 'plug-and-play' system and the Sagnac system). We showed that if the users of the systems are unaware of our attack, the final key shared between them can be compromised in some situations. Specifically, we showed that, in the case of the Bennett-Brassard 1984 (BB84) protocol with ideal single-photon sources, when the quantum bit error rate (QBER) is between 14.6% and 20%, our attack renders the final key insecure, whereas the same range of QBER values has been proved secure if the two users are unaware of our attack; also, we demonstrated three situations with realistic devices where positive key rates are obtained without the consideration of Trojan horse attacks but in fact no key can be distilled. We remark that our attack is feasible with only current technology. Therefore, it is very important to be aware of our attack in order to ensure absolute security. In finding our attack, we minimize the QBER over individual measurements described by a general POVM, which has some similarity with the standard quantum state discrimination problem.

Fung, Chi-Hang Fred; Qi, Bing; Lo, Hoi-Kwong [Center for Quantum Information and Quantum Control, Department of Electrical and Computer Engineering and Department of Physics, University of Toronto, Toronto, Ontario (Canada); Tamaki, Kiyoshi [NTT Basic Research Laboratories, NTT Corporation, 3-1, Morinosato Wakamiya Atsugi-Shi, Kanagawa 243-0198, Japan and CREST, JST Agency, 4-1-8 Honcho, Kawaguchi, Saitama 332-0012 (Japan)

2007-03-15T23:59:59.000Z

366

Security analysis of the decoy method with the Bennett-Brassard 1984 protocol for finite key lengths  

E-Print Network [OSTI]

This paper provides a formula for the sacrifice bit-length for privacy amplification with the Bennett-Brassard 1984 protocol for finite key lengths when we employ the decoy method. Using the formula, we can guarantee the security parameter for realizable quantum key distribution system. The key generation rates with finite key lengths are numerically evaluated. The proposed method improves the existing key generation rate even in the asymptotic setting.

Masahito Hayashi; Ryota Nakayama

2013-11-19T23:59:59.000Z

367

Resume of definitions of "tangent vector" Let M be a manifold, m M, and X = (X1  

E-Print Network [OSTI]

Resum´e of definitions of "tangent vector" Let M be a manifold, m M, and X = (X1 , · · ·Xd ) : U Joel Feldman. 2008. All rights reserved. September 30, 2008 Resum´e of definitions of "tangent vector rights reserved. September 30, 2008 Resum´e of definitions of "tangent vector" 2 #12;

Feldman, Joel

368

Quantum key distribution over 25 km with an all-fiber continuous-variable system  

E-Print Network [OSTI]

We report on the implementation of a reverse-reconciliated coherent-state continuous-variable quantum key distribution system, with which we generated secret keys at a rate of more than 2 kb/s over 25 km of optical fiber. Time multiplexing is used to transmit both the signal and phase reference in the same optical fiber. Our system includes all experimental aspects required for a field implementation of a quantum key distribution setup. Real-time reverse reconciliation is achieved by using fast and efficient LDPC error correcting codes.

Jerome Lodewyck; Matthieu Bloch; Raul Garcia-Patron; Simon Fossier; Evgueni Karpov; Eleni Diamanti; Thierry Debuisschert; Nicolas J. Cerf; Rosa Tualle-Brouri; Steven W. McLaughlin; Philippe Grangier

2007-09-04T23:59:59.000Z

369

Key Collections  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-SeriesFlickrinformationPostdocs & Graduates > TheFoxLeads DOE's E-gov

370

U.S. Department of Energy Project Definition Rating Index Guide  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Guide assists individuals and teams involved in conducting assessments of project definition (i.e., how well front-end planning has been conducted to define project scope) using a numerical project management tool developed by the Construction Industry Institute (CII), tailored for DOE use. Called the Project Definition Rating Index (PDRI), the PDRI is a simple but powerful tool that facilitates the measurement of the degree of scope definition for completeness for traditional construction projects, both nuclear and non-nuclear. No cancellations.

2010-07-22T23:59:59.000Z

371

Color Key 1/25/2012 4.1.1 PTCS and Heat Pump Measures  

E-Print Network [OSTI]

Color Key 1/25/2012 4.1.1 PTCS and Heat Pump Measures Staff Summary of Ecotope Recommendation: Staff Response and Recommended Action: 4.1.3 Ductless Heat Pumps Staff Summary of Ecotope Recommendation

372

Exploiting KeyNote in WebCom: Architecture Neutral Glue for Trust Management  

E-Print Network [OSTI]

Exploiting KeyNote in WebCom: Architecture Neutral Glue for Trust Management Simon N. Foley, Thomas B. Quillinan, John P. Morrison, David A. Power, James J. Kennedy. Department of Computer Science

Foley, Simon

373

Broadband marine MT exploration of the East Pacific Rise at 9500 Kerry Key and Steven Constable  

E-Print Network [OSTI]

Broadband marine MT exploration of the East Pacific Rise at 9°°500 N Kerry Key and Steven Constable., and S. Constable, Broadband marine MT exploration of the East Pacific Rise at 9°500 N, Geophys. Res

Key, Kerry

374

Test Scanning Request Form Please complete one form for each test and key.  

E-Print Network [OSTI]

Test Scanning Request Form Please complete one form for each test and key. This Section: Test Name: Contact Person: Email Regarding This Scan Date Received Time Initials Number of Tests Scored: / / : A.M. P

Pantaleone, Jim

375

Environmental Activism as Collective Action Key words: Environmental activism, environmental behavior, collective action,  

E-Print Network [OSTI]

Environmental Activism as Collective Action Key words: Environmental activism, environmental behavior, collective action, environmentalism, collective interest model. Mark Lubell Department The literature on environmental activism has failed to produce a model of individual decision- making explicitly

Lubell, Mark

376

Vit Plant receives and sets key air filtration equipment for Low Activity Waste Facility  

Broader source: Energy.gov [DOE]

WTP lifted a nearly 100-ton carbon bed absorber into the Low-Activity Waste Facility. This key piece of air-filtration equipment will remove mercury and acidic gases before air is channeled through...

377

HES Human Environmental Sciences KEY: # = new course * = course changed = course dropped  

E-Print Network [OSTI]

HES Human Environmental Sciences KEY: # = new course * = course changed = course dropped SchoolofHumanEnvironmentalSciences HES 100 AN INTRODUCTION TO PROFESSIONS IN HUMAN ENVIRONMENTAL SCIENCES. (1) An orientation to human environmental sciences, its history, contemporary issues and philosophy

MacAdam, Keith

378

Security of the Quantum Key Distribution with Blind Polarization Bases against Impersonation Attack  

E-Print Network [OSTI]

In this paper, we briefly show how the quantum key distribution with blind polarization bases [Kye et al., Phys. Rev. Lett. 95, 040501 (2005)] can be made secure against the impersonation attack.

Won-Ho Kye; M. S. Kim

2006-02-24T23:59:59.000Z

379

Security against the Invisible Photon Attack for the Quantum Key Distribution with Blind Polarization Bases  

E-Print Network [OSTI]

In this paper, we briefly show how the quantum key distribution with blind polarization bases [Kye et al., Phys. Rev. Lett. 95, 040501 (2005)] can be made secure against the invisible photon attack.

Won-Ho Kye; M. S. Kim

2005-08-03T23:59:59.000Z

380

Concise and Tight Security Analysis of the Bennett-Brassard 1984 Protocol with Finite Key Lengths  

E-Print Network [OSTI]

We present a tight security analysis of the Bennett-Brassard 1984 protocol taking into account the finite size effect of key distillation, and achieving unconditional security. We begin by presenting a concise analysis utilizing the normal approximation of the hypergeometric function. Then next we show that a similarly tight bound can also be obtained by a rigorous argument without relying on any approximation. In particular, for the convenience of experimentalists who wish to evaluate the security of their QKD systems, we also give explicit procedures of our key distillation, and also show how to calculate the secret key rate and the security parameter from a given set of experimental parameters. Besides the exact values of key rates and security parameters, we also present how to obtain their rough estimates using the normal approximation.

Masahito Hayashi; Toyohiro Tsurumaru

2012-05-17T23:59:59.000Z

Note: This page contains sample records for the topic "destination definitions key" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Scintillation has minimal impact on far-field Bennett-Brassard 1984 protocol quantum key distribution  

E-Print Network [OSTI]

The effect of scintillation, arising from propagation through atmospheric turbulence, on the sift and error probabilities of a quantum key distribution (QKD) system that uses the weak-laser-pulse version of the Bennett-Brassard ...

Shapiro, Jeffrey H.

382

A key extensional metamorphic complex reviewed and restored: The Menderes Massif of western Turkey  

E-Print Network [OSTI]

A key extensional metamorphic complex reviewed and restored: The Menderes Massif of western Turkey of the Menderes Massif in western Turkey, and subsequently a map-view restoration of its Neogene unroofing history

Utrecht, Universiteit

383

A Comparison of Key PV Backsheet and Module Properties from Fielded...  

Broader source: Energy.gov (indexed) [DOE]

of Key PV Backsheet and Module Properties from Fielded Module Exposures and Accelerated Test Conditions W. Gambogi 1 , O. Fu 2 , Y. Heta 3 , K. Hashimoto 3 , J. Kopchick 1...

384

V-159: RSA SecurID Agent Discloses Node Secret Encryption Key...  

Broader source: Energy.gov (indexed) [DOE]

Key to Local Users PLATFORM: RSA Authentication API versions prior to 8.1 SP1 RSA Web Agent for Apache Web Server versions prior to 5.3.5 RSA Web Agent for IIS versions...

385

Technology, Knowledge, Culture, and Management: the keys The shift from industrial societies to information societies  

E-Print Network [OSTI]

Technology, Knowledge, Culture, and Management: the keys to success Abstract The shift from to success: technology, knowledge, culture and management. Organizations employ technology with the goal of improving efficiency and reducing operational costs. Hence technology structures within organizations must

Kopec, Danny

386

Public Sector Digest | July 2010 | www.publicsectordigest.com Key Aspects of the Deliberative Democracy Movement  

E-Print Network [OSTI]

Public Sector Digest | July 2010 | www.publicsectordigest.com Key Aspects of the Deliberative Digest | July 2010 | www.publicsectordigest.com underlying tensions and tough choices inherent to most

387

Redox states of Desulfovibrio vulgaris DsrC, a key protein in...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Venceslau SS, JR Cort, ES Baker, RK Chu, EW Robinson, C Dahl, LM Saraiva, and IA Pereira.2013."Redox states of Desulfovibrio vulgaris DsrC, a key protein in dissimilatory...

388

Tritium inventory control in ITER Charles Skinner with key contributions from  

E-Print Network [OSTI]

Tritium inventory control in ITER Charles Skinner with key contributions from Charles Gentile permitted" Tritium inventory control Worrisome issue: Once at the tritium limit there won't be any more

Princeton Plasma Physics Laboratory

389

Faculty & Information Centres Building Car Park Key Facilities Building Car Park  

E-Print Network [OSTI]

10 ORANGE A PURPLE Navitas 2 ORANGE A ORANGE North Australian Centre for Oil and Gas 7 PINK B PURPLE7 WATER TANK 5 4 18 S Faculty & Information Centres Building Car Park Key Facilities Building Car

390

Identification and definition of unbundled electric generation and transmission services  

SciTech Connect (OSTI)

State and federal regulators, private and public utilities, large and small customers, power brokers and marketers, and others are engaged in major debates about the future structure of the electric industry. Although the outcomes are far from certain, it seems clear that customers will have much greater choices about the electric services they purchase and from whom they buy these services. This report examines the ``ancillary`` services that are today buried within the typical vertically integrated utility. These ancillary services support and make possible the provision of the basic services of generating capacity, energy supply, and power delivery. These ancillary services include: Management of generating units; reserve generating capacity to follow variations in customer loads, to provide capacity and energy when generating units or transmission lines suddenly fall, to maintain electric-system stability, and to provide local-area security; transmission-system monitoring and control; replacement of real power and energy losses; reactive-power management and voltage regulation; transmission reserves; repair and maintenance of the transmission network; metering, billing, and communications; and assurance of appropriate levels of power quality. Our focus in this report, the first output from a larger Oak Ridge National Laboratory project, is on identification and definition of these services. Later work in this project will examine more closely the costs and pricing options for each service.

Kirby, B.; Hirst, E.; Vancoevering, J.

1995-03-01T23:59:59.000Z

391

Practical free-space quantum key distribution over 10 km in daylight and at night  

E-Print Network [OSTI]

We have demonstrated quantum key distribution (QKD) over a 10-km, 1-airmass atmospheric range during daylight and at night. Secret random bit sequences of the quality required for the cryptographic keys used to initialize secure communications devices were transferred at practical rates with realistic security. By identifying the physical parameters that determine the system's secrecy efficiency, we infer that free-space QKD will be practical over much longer ranges under these and other atmospheric and instrumental conditions.

Richard J. Hughes; Jane E. Nordholt; Derek Derkacs; Charles G. Peterson

2002-06-14T23:59:59.000Z

392

A study of an optimum filter for a random phase-shift keyed signal  

E-Print Network [OSTI]

59 62 77 BIBLIOGRAPHY 85 LIST OF FIGURES Figure Page 1. Phase-shift key modulation 2, The filter problem 3. Block diagram representation of a delay modulator 12 4. A conceptual delay modulator for a phase- shift keyed signal 5. Random... PSK signal from the corruption of white noise. The fact that the PSK signal is random necessitates the use of a statistical theory of linear systems which was originated by Norbert Wiener. 3 The statistical filter problem is illustrated in Figure...

Barr, Frederick James

1968-01-01T23:59:59.000Z

393

Satellite power system concept development and evaluation program system definition technical assessment report  

SciTech Connect (OSTI)

The results of the system definition studies conducted by NASA as a part of the Department of Energy/National Aeronautics and Space Administration SPS Concept Development and Evaluation Program are summarized. The purpose of the system definition efforts was to identify and define candidate SPS concepts and to evaluate the concepts in terms of technical and cost factors. Although the system definition efforts consisted primarily of evaluation and assessment of alternative technical approaches, a reference system was also defined to facilitate economic, environmental, and societal assessments by the Department of Energy. This reference system was designed to deliver 5 GW of electrical power to the utility grid. Topics covered include system definition; energy conversion and power management; power transmission and reception; structures, controls, and materials; construction and operations; and space transportation.

Not Available

1980-12-01T23:59:59.000Z

394

Definition of the Brittle-Ductile Transition in the Coso Geothermal...  

Open Energy Info (EERE)

Brittle-Ductile Transition in the Coso Geothermal Field East-Central California USA Jump to: navigation, search OpenEI Reference LibraryAdd to library Conference Paper: Definition...

395

Colorado 4 CCR 723-3001, Definitions for Rules Regulating Electric...  

Open Energy Info (EERE)

CCR 723-3001, Definitions for Rules Regulating Electric Utilities Jump to: navigation, search OpenEI Reference LibraryAdd to library Legal Document- RegulationRegulation: Colorado...

396

Page 7 of 37 *See Section 12 for definitions of italicized words*  

E-Print Network [OSTI]

Page 7 of 37 *See Section 12 for definitions of italicized words* 4.0 ETHICS A. Conflict the Director of Business Operations as far in advance as possible but at least ten (10) business days prior

397

Outage Rate Regions for the MISO Interference Channel: Definitions and Interpretations  

E-Print Network [OSTI]

We consider the slow-fading two-user multiple-input single-output (MISO) interference channel (IC), where the receivers treat the interference as additive Gaussian noise. We study the rate points that can be achieved, allowing a non-zero outage probability. The points which meet the outage probability specification constitute a so-called outage rate region. There exist several definitions of the outage rate regions for the IC, as for the broadcast and the multiple-access channels. We give four definitions for the outage region of the MISO IC. The definitions differ on whether the rates are declared in outage jointly or individually and whether there is instantaneous or statistical channel state information (CSI) at the transmitters. For the statistical CSI scenario, we discuss how to find the outage probabilities in closed form. We provide interpretations of the definitions and compare the corresponding regions via analytical and numerical results.

Lindblom, Johannes; Larsson, Erik G

2011-01-01T23:59:59.000Z

398

On the definiteness of associated energy-momentum tensors to a class of general variation problems  

E-Print Network [OSTI]

We show the point-wise definiteness and some other properties of the energy-momentum tensor for a certain class of Euler-Lagrange equations under quite general conditions.

Kurt Pagani

2013-05-31T23:59:59.000Z

399

Seismic Safety Margins Research Program. Phase I. Interim definition of terms  

SciTech Connect (OSTI)

This report documents interim definitions of terms in the Seismic Safety Margins Research Program (SSMRP). Intent is to establish a common-based terminology integral to the probabilistic methods that predict more realistically the behavior of nuclear power plants during an earthquake. These definitions are a response to a request by the Nuclear Regulatory Commission Advisory Committee on Reactor Safeguards at its meeting held November 15-16, 1979.

Smith, P.D.; Dong, R.G.

1980-12-19T23:59:59.000Z

400

Curvature dark energy reconstruction through different cosmographic distance definitions  

E-Print Network [OSTI]

In the context of $f(\\mathcal{R})$ gravity, dark energy is a geometrical fluid with negative equation of state. Since the function $f(\\mathcal{R})$ is not known \\emph{a priori}, the need of a model independent reconstruction of its shape represents a relevant technique to determine which $f(\\mathcal{R})$ model is really favored with respect to others. To this aim, we relate cosmography to a generic $f(\\mathcal R)$ and its derivatives in order to provide a model independent investigation at redshift $z \\sim 0$. Our analysis is based on the use of three different cosmological distance definitions, in order to alleviate the duality problem, i.e. the problem of which cosmological distance to use with specific cosmic data sets. We therefore consider the luminosity, $d_L$, flux, $d_F$, and angular, $d_A$, distances and we find numerical constraints by the Union 2.1 supernovae compilation and measurement of baryonic acoustic oscillations, at $z_{BAO}=0.35$. We notice that all distances reduce to the same expression, i.e. $d_{L;F;A}\\sim\\frac{1}{\\mathcal H_0}z$, at first order. Thus, to fix the cosmographic series of observables, we impose the initial value of $H_0$ by fitting $\\mathcal H_0$ through supernovae only, in the redshift regime $ztheoretical bounds, while its variation, namely the jerk parameter, is compatible with $j_0>1$. Finally, we infer the functional form of $f(\\mathcal{R})$ by means of a truncated polynomial approximation, in terms of fourth order scale factor $a(t)$.

Salvatore Capozziello; Mariafelicia De Laurentis; Orlando Luongo

2014-06-26T23:59:59.000Z

Note: This page contains sample records for the topic "destination definitions key" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

A definition of thermodynamic entropy valid for non-equilibrium states and few-particle systems  

E-Print Network [OSTI]

From a new rigorous formulation of the general axiomatic foundations of thermodynamics we derive an operational definition of entropy that responds to the emergent need in many technological frameworks to understand and deploy thermodynamic entropy well beyond the traditional realm of equilibrium states of macroscopic systems. The new definition is achieved by avoiding to resort to the traditional concepts of "heat" (which restricts $a$ $priori$ the traditional definitions of entropy to the equilibrium domain) and of "thermal reservoir" (which restricts $in$ $practice$ our previous definitions of non-equilibrium entropy to the many-particle domain). The measurement procedure that defines entropy is free from intrinsic limitations and can be applied, $in$ $principle$, even to non-equilibrium states of few-particle systems, provided they are separable and uncorrelated. The construction starts from a previously developed set of carefully worded operational definitions for all the basic concepts. Then, through a new set of fully spelled-out fundamental hypotheses (four postulates and five assumptions) we derive the definitions of energy and entropy of any state, and of temperature of any stable equilibrium state. Finally, we prove the principle of entropy non-decrease, the additivity of entropy differences, the maximum entropy principle, and the impossibility of existence of a thermal reservoir.

Gian Paolo Beretta; Enzo Zanchini

2014-11-19T23:59:59.000Z

402

Weaknesses in the Key Scheduling Algorithm of Scott Fluhrer1, Itsik Mantin2, and Adi Shamir2  

E-Print Network [OSTI]

Weaknesses in the Key Scheduling Algorithm of RC4 Scott Fluhrer1, Itsik Mantin2, and Adi Shamir2 1 and previous results about its security. In Section 3 we consider a slightly mod- i ed variant of the Key

Sirer, Emin Gun

403

Building Chairs & Alternates by Building May 2014 Bldg/Key Name/Dept Location Email/EHS Contact  

E-Print Network [OSTI]

by Building May 2014 Bldg/Key Name/Dept Location Email/EHS Contact Hefter Conference Tom Bjornstad Hefter

Saldin, Dilano

404

Wellcome Trust SUBMISSION OF EVIDENCE Wellcome Trust response to Department for Education: Reforming Key Stage 4 qualifications  

E-Print Network [OSTI]

: Reforming Key Stage 4 qualifications December 2012 Department for Education: Reforming Key Stage 4 science skills. 2. We are pleased to have the opportunity to respond to the consultation on reforms to Key consultations on the reform to curriculum and assessment at various stages of schooling. There is an opportunity

Rambaut, Andrew

405

Deterministic quantum-public-key encryption: forward search attack and randomization  

E-Print Network [OSTI]

In the classical setting, public-key encryption requires randomness in order to be secure against a forward search attack, whereby an adversary compares the encryption of a guess of the secret message with that of the actual secret message. We show that this is also true in the information-theoretic setting -- where the public keys are quantum systems -- by defining and giving an example of a forward search attack for any deterministic quantum-public-key bit-encryption scheme. However, unlike in the classical setting, we show that any such deterministic scheme can be used as a black box to build a randomized bit-encryption scheme that is no longer susceptible to this attack.

Georgios M. Nikolopoulos; Lawrence M. Ioannou

2009-03-27T23:59:59.000Z

406

Determination of key parameters of SEU occurrence using 3-D full cell SRAM simulations  

SciTech Connect (OSTI)

A 3-D entire SRAM cell, based on a 0.35-{micro}m current CMOS technology, is simulated in this work with a DEVICE simulator. The transient current, resulting from a heavy ion strike in the most sensitive region of the cell, is studied as a function of the LET value, the cell layout and the ion penetration depth. A definition of the critical charge is proposed and two new methods are presented to compute this basic amount of charge only using SPICE simulations. Numerical applications are performed with two different generations of submicron CMOS technologies, including the determination of the sensitive thicknesses.

Roche, P.; Palau, J.M.; Bruguier, G.; Tavernier, C.; Ecoffet, R.; Gasiot, J.

1999-12-01T23:59:59.000Z

407

May 19, 2011, HSS/Union Focus Group Meeting - Key Milestone Status Chart  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector General Office0-72.pdfGeorgeDoesn't32 Master EM Project Definition RatingHCCIEngine DRAFT HSS0 HSS

408

Double blinding-attack on entanglement-based quantum key distribution protocols  

E-Print Network [OSTI]

We propose a double blinding-attack on entangled-based quantum key distribution protocols. The principle of the attack is the same as in existing blinding attack except that instead of blinding the detectors on one side only, Eve is blinding the detectors of both Alice and Bob. In the BBM92 protocol, the attack allows Eve to get a full knowledge of the key and remain undetected even if Alice and Bob are using 100% efficient detectors. The attack can be easily extended to Ekert protocol, with an efficiency as high as 85.3%.

Guillaume Adenier; Irina Basieva; Andrei Yu. Khrennikov; Masanori Ohya; Noboru Watanabe

2011-06-14T23:59:59.000Z

409

Optimum design for BB84 quantum key distribution in tree-type passive optical networks  

E-Print Network [OSTI]

We show that there is a tradeoff between the useful key distribution bit rate and the total length of deployed fiber in tree-type passive optical networks for BB84 quantum key distribution applications. A two stage splitting architecture where one splitting is carried in the central office and a second in the outside plant and figure of merit to account for the tradeoff are proposed. We find that there is an optimum solution for the splitting ratios of both stages in the case of Photon Number Splitting (PNS) attacks and Decoy State transmission. We then analyze the effects of the different relevant physical parameters of the PON on the optimum solution.

Jose Capmany; Carlos R. Fernandez-Pousa

2011-03-24T23:59:59.000Z

410

A 24 km fiber-based discretely signaled continuous variable quantum key distribution system  

E-Print Network [OSTI]

We report a continuous variable key distribution system that achieves a final secure key rate of 3.45 kb/sec over a distance of 24.2 km of optical fiber. The protocol uses discrete signaling and post-selection to improve reconciliation speed and quantifies security by means of quantum state tomography. Polarization multiplexing and a frequency translation scheme permit transmission of a continuous wave local oscillator and suppression of noise from guided acoustic wave Brillouin scattering by more than 27 dB.

Quyen Dinh Xuan; Zheshen Zhang; Paul L. Voss

2009-10-06T23:59:59.000Z

411

Chromidio: an interface for color tracking with key frames in Max and Nato  

E-Print Network [OSTI]

11 QuickTime Movie Input 11 Interactive Color Picking 12 Key Frames 12 Useful Output 14 File Management 16 C.play I 6 IV I M P L E M E N T A T I O N A N D RESULTS 17 Chromidio User Interface 17 QuickTime Movie Display and Playback 22 vi i... CHAPTER Page Interactive Color Picking 26 Key Frame Management 27 Data Analysis and Output 32 Project File Management 36 C.play 39 User Interface 39 Mathematical Functions and F ilters 41 MIDI Implementations 44 Output : 46 Results Using C...

Tucker, Amy Rebecca

2002-01-01T23:59:59.000Z

412

Level of Preparedness for Pandemic Influenza among Key Leaders in Brazos County  

E-Print Network [OSTI]

With the outbreak of the 2009 pandemic influenza A (H1N1) comes the need to evaluate the preparedness level of government entities that had preparedness plans. This study looks at the preparedness level for pandemic influenza among key leaders...

Kaster, Elizabeth

2012-02-14T23:59:59.000Z

413

Key to images: [1] Model system: fission yeast [2] Cryo-EM structure  

E-Print Network [OSTI]

Key to images: [1] Model system: fission yeast [2] Cryo-EM structure of the MCM helicase [3 combing [8] Model system: Xenopus [9] Extreme environments [10] Model system: C.elegans. Background image of the evolution of the replication machinery highlighted. BSRC B306 Email: sam31@st-and.ac.uk 1 2 3 4 5 6 7 8 9 10

Brierley, Andrew

414

Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems , Jinsong Han2  

E-Print Network [OSTI]

Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems Li Lu1 , Jinsong Han2 an emerging requirement ­ protecting user privacy [13] in RFID authentications. In most RFID systems, tags sensitive information. For example, without pri- vacy protection, any reader can identify a consumer's ID

Liu, Yunhao

415

Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems , Jinsong Han2  

E-Print Network [OSTI]

- sitive information. For example, without privacy pro- tection, any reader can identify a consumer's IDDynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems Li Lu1 , Jinsong Han2 an emerging requirement ­ protecting user privacy [13] in RFID authentications. In most RFID systems, tags

Liu, Yunhao

416

Confidence Valuation in a Public-Key Infrastructure based on Uncertain Evidence  

E-Print Network [OSTI]

Confidence Valuation in a Public-Key Infrastructure based on Uncertain Evidence Reto Kohlas Ueli an uncertain piece of evidence and have proposed ad hoc methods, sometimes referred to as trust management and the valuation of confidence values in the general context of reasoning based on uncertain evidence. Second, we

Maurer, Ueli

417

Confidence Valuation in a PublicKey Infrastructure based on Uncertain Evidence  

E-Print Network [OSTI]

Confidence Valuation in a Public­Key Infrastructure based on Uncertain Evidence Reto Kohlas Ueli an uncertain piece of evidence and have proposed ad hoc methods, sometimes referred to as trust management and the valuation of confidence values in the general context of reasoning based on uncertain evidence. Second, we

Maurer, Ueli

418

STUDENT FINANCE ENGLAND INFORMATION & KEY DATES FOR CONTINUING STUDENTS 2013/14  

E-Print Network [OSTI]

STUDENT FINANCE ENGLAND INFORMATION & KEY DATES FOR CONTINUING STUDENTS 2013/14 Are you returning to a full-time course at university or college in the autumn? If you applied for student finance that did NOT depend on your household income last year (non means tested) you should wait to hear from Student Finance

Dixon, Peter

419

STUDENT FINANCE ENGLAND INFORMATION & KEY DATES FOR NEW STUDENTS 2013/14  

E-Print Network [OSTI]

STUDENT FINANCE ENGLAND INFORMATION & KEY DATES FOR NEW STUDENTS 2013/14 Are you starting a full-time course at university or college in the autumn? · Find out what student finance is available to you finance. Apply online by 31 May 2013. · Giving Student Finance England your UK passport number and your

Dixon, Peter

420

STUDENT FINANCE ENGLAND INFORMATION & KEY DATES FOR CONTINUING STUDENTS 2012/13  

E-Print Network [OSTI]

STUDENT FINANCE ENGLAND INFORMATION & KEY DATES FOR CONTINUING STUDENTS 2012/13 Are you returning to a full-time course at university or college in the autumn? If you applied for student finance that did NOT depend on your household income last year (non means tested) you should wait to hear from Student Finance

Oakley, Jeremy

Note: This page contains sample records for the topic "destination definitions key" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Key factors governing uncertainty in the response to sunshade geoengineering from a comparison  

E-Print Network [OSTI]

Key factors governing uncertainty in the response to sunshade geoengineering from a comparison of solar geoengineering are central to evaluating whether such approaches may help to reduce the harmful impacts of global warming. In this study we compare the sunshade solar geoengineering response

Robock, Alan

422

Capacity Development, Education & Training Integrated and sustained action is the key  

E-Print Network [OSTI]

Capacity Development, Education & Training Integrated and sustained action is the key Thematic Background Paper January 2004 Author: John Christensen Global Network on Energy for Sustainable Development to sustainable energy development. The rapid development of individual RE technologies along with basic changes

423

BUSINESSES AS ONE OF THE KEY ELEMENTS OF A REGION'S SUSTAINABLE DEVELOPMENT  

E-Print Network [OSTI]

BUSINESSES AS ONE OF THE KEY ELEMENTS OF A REGION'S SUSTAINABLE DEVELOPMENT of sustainable development should be taken into account by these actors. Businesses (especially SMEs) whose aim-words : sustainable development, territory, businesses, governance, stakeholders Mots-clés : développement durable

424

TERRESTRIAL ROCK VARNISH: A KEY TO UNDERSTANDING THE SURFACE COMPOSITION OF MARS. J. G. Ward1  

E-Print Network [OSTI]

TERRESTRIAL ROCK VARNISH: A KEY TO UNDERSTANDING THE SURFACE COMPOSITION OF MARS. J. G. Ward1 , L produces a strong spectral band contrast. This also gives varnish its shiny appearance. On Earth rock varnish may have a microbial origin [3]. Clays are transported from an external source and deposited

Kirkland, Laurel

425

A new key recovery attack on the ANSI retail MAC Chris J. Mitchell  

E-Print Network [OSTI]

A new key recovery attack on the ANSI retail MAC Chris J. Mitchell Information Security Group circumstances, enables a more efficient attack than was previously known to be launched against the ANSI retail with the message. 1.1 The ANSI retail MAC The ANSI retail MAC scheme [1], otherwise known as CBC-MAC-Y or ISO

Mitchell, Chris

426

Red Algae Lose Key Mitochondrial Genes in Response to Becoming Parasitic  

E-Print Network [OSTI]

Red Algae Lose Key Mitochondrial Genes in Response to Becoming Parasitic Lillian Hancock1 , Lynda independently evolved hundreds of times among the floridiophyte red algae. Much is known about the life history class of red algae, Plocamiocolax puvinata, has lost the atp8 gene entirely, indicating that this gene

Lane, Chris

427

Contributory Group Key Agreement Protocols, Revisited for Mobile Ad-Hoc Groups  

E-Print Network [OSTI]

Contributory Group Key Agreement Protocols, Revisited for Mobile Ad-Hoc Groups Mark Manulis Horst of various group-oriented applications for mo- bile ad-hoc groups requires a group secret shared between all- and wide-area wired networks, can also be used in ad-hoc sce- narios because of the similar security

Manulis, Mark

428

Better Technologies Key to Addressing Climate Change Energy Department official explains U.S. initiatives  

E-Print Network [OSTI]

policies and business models to create self-sustaining markets for financing energy efficiency, renewable on leveraging resources through partnerships with businesses, academia, and other countries. Therefore.S. initiatives 17 December 2004 More energy-efficient technologies will be key to reducing greenhouse gas

429

New species of Anthostomella on fynbos, with a key to the genus in South Africa  

E-Print Network [OSTI]

New species of Anthostomella on fynbos, with a key to the genus in South Africa Seonju LEE, South Africa. E-mail : slee@maties.sun.ac.za Received 3 April 2002; accepted 18 November 2002. A study of saprobic fungi occurring on the fynbos of the Western Cape Province of South Africa yielded four unknown

430

Differential-phase-shift quantum key distribution with segmented pulse trains  

SciTech Connect (OSTI)

We present a modified scheme of differential-phase-shift (DPS) quantum key distribution (QKD) for improving its performance. A transmitter sends a weak coherent pulse train segmented with vacant pulses. Then, a receiver can find eavesdropping by monitoring the photon detection rate at particular time slots. Simulations show that the proposed scheme is robust against a sequential attack and a general individual attack.

Kawahara, Hiroki; Inoue, Kyo [Osaka University, Osaka 565-0871 (Japan)

2011-06-15T23:59:59.000Z

431

Length Based Attack and Braid Groups: Cryptanalysis of Anshel-Anshel-Goldfeld Key  

E-Print Network [OSTI]

Length Based Attack and Braid Groups: Cryptanalysis of Anshel-Anshel-Goldfeld Key Exchange Protocol of Technology, Hoboken, New Jersey, USA, 07030 {amyasnik,aushakov}@stevens.edu Abstract. The length based attack and Tannenbaum in [9]. Several attempts have been made to implement the attack [6], but none of them had produced

Myasnikov, Aleksey

432

Wavelength attack on practical continuous-variable quantum-key-distribution system with a heterodyne protocol  

E-Print Network [OSTI]

We present the wavelength attack on a practical continuous-variable quantum-key-distribution system with a heterodyne protocol, in which the transmittance of beam splitters at Bob's station is wavelength-dependent. Our strategy is proposed independent of but analogous to that of Huang et al. [arXiv: 1206.6550v1 [quant-ph

Xiang-Chun Ma; Shi-Hai Sun; Mu-Sheng Jiang; Lin-Mei Liang

2014-03-04T23:59:59.000Z

433

Attack on Private Signature Keys of the OpenPGP format, PGPTM  

E-Print Network [OSTI]

- 1 - Attack on Private Signature Keys of the OpenPGP format, PGPTM programs and other applications Prague, t.rosa@decros.cz Abstract. The article describes an attack on OpenPGP format, which leads these applications must undergo the same revision as the actual program PGPTM . The success of the attack

434

Fish and Wildlife Management Questions and RM&E Strategies Key Management Questions  

E-Print Network [OSTI]

1 Fish and Wildlife Management Questions and RM&E Strategies Key Management Questions 1. Are we meeting biological and programmatic performance objectives established within the Columbia Basin Fish implemented and accomplished as proposed? Strategic Category: Fish Population Status Monitoring The following

435

SSL/TLS Session-Aware User Authentication Using a GAA Bootstrapped Key  

E-Print Network [OSTI]

SSL/TLS Session-Aware User Authentication Using a GAA Bootstrapped Key Chunhua Chen1 , Chris J.mitchell@rhul.ac.uk Abstract. Most SSL/TLS-based electronic commerce (e-commerce) ap- plications (including Internet banking a server effectively, and because user authentication methods are typi- cally decoupled from SSL

Sheldon, Nathan D.

436

Towards Fresh Re-Keying with Leakage-Resilient PRFs: Cipher Design Principles and Analysis  

E-Print Network [OSTI]

-resilient cryptography is its significant performance overheads, it naturally suggests an intermediate line of re- searchTowards Fresh Re-Keying with Leakage-Resilient PRFs: Cipher Design Principles and Analysis Sonia advantage of our analysis to extract new design principles for block ciphers to be used in leakage

437

Poster Sessions Friday, 18 April 2008 183 Identification of key breast cancer phenotypes  

E-Print Network [OSTI]

in node positive, hormone positive breast cancer patients. Materials and Methods: We have conductedPoster Sessions Friday, 18 April 2008 183 445 Poster Identification of key breast cancer phenotypes for class membership. Material and Methods: Expression of twenty-five proteins, with known relevance

Aickelin, Uwe

438

64 IRE TRANSACTIONS ON ENGINEERING MANAGEMENT July Systenas Engineering-Key to Modern Development  

E-Print Network [OSTI]

to ascertain the current output of this phase is the creative idea that marks the status of systems engineering64 IRE TRANSACTIONS ON ENGINEERING MANAGEMENT July Systenas Engineering-Key to Modern Development, integration, emphasis on the field of systems engineering. Though and evaluation. In a sense, these terms

Rhoads, James

439

Manure Harvesting Frequency: The Key to Feedyard Dust Control in a Summer Drought  

E-Print Network [OSTI]

Summer drought can make dust control in feedyards more challenging than usual. Supplemental water may not keep pace with daily evaporation. The key to dust control is managing the depth of dry manure in the pens by harvesting manure more frequently...

Auvermann, Brent W.; Parker, David B.; Sweeten, John M.

2000-11-27T23:59:59.000Z

440

NREL builds community and industry support by addressing concerns voiced by key standards organizations.  

E-Print Network [OSTI]

NREL builds community and industry support by addressing concerns voiced by key standards standards developed through consensus processes. Because U.S. PV module safety stan- dards are not aligned with international standards, manufacturers must test their modules twice--and sometimes maintain separate product

Note: This page contains sample records for the topic "destination definitions key" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Heart Failure Symposium: Promoting Knowledge and Self-Care: The Keys to  

E-Print Network [OSTI]

Heart Failure Symposium: Promoting Knowledge and Self-Care: The Keys to a Woman's Healthy Heart This is the Fourth Annual UConn Health Center Heart Failure Symposium. This year we will focus on women and heart disease. The program will include presentations on heart disease and healthy living for women

Kim, Duck O.

442

Adaptive Multiparty Non-interactive Key Exchange Without Setup In The Standard Model  

E-Print Network [OSTI]

proceed, let us review at a high level the utility and security of multiparty NIKE. We consider a setting a public value. Utility: Consider any subset of the parties who wish to derive a common secret key in the ensuing. - Query the challenger to register an honest party ­ upon this query, the challenger outputs

443

E-Business Value Creation in Jordanian Banking Services Industry: An Empirical Analysis of Key Factors  

E-Print Network [OSTI]

E-Business Value Creation in Jordanian Banking Services Industry: An Empirical Analysis of Key an extended conceptual research model for assessing the value of e-business at the bank level environment) that may affect value creation of carrying out e- business in Jordanian banking sector. Survey

444

E-Banking Diffusion in the Jordanian Banking Services Sector: An Empirical Analysis of Key Factors  

E-Print Network [OSTI]

E-Banking Diffusion in the Jordanian Banking Services Sector: An Empirical Analysis of Key Factors influence e- banking adoption in Jordanian banks. This article added some constructs to (TOE) framework, availability of online revenues, competition intensity or pressure, and regulatory support environment) while e

445

The Gender-Brand Effect of Key Phrases on User Clicks in Sponsored  

E-Print Network [OSTI]

to the positive attitude and customer loyalty generated by brand image. Author Keywords Search Engine MarketingThe Gender-Brand Effect of Key Phrases on User Clicks in Sponsored Search Abstract In this research-phrases, and (3) the occurrence of branded terms in those queries. The aim of this research is increased

Jansen, James

446

Towards prospective Life Cycle Assessment: how to identify key parameters inducing most  

E-Print Network [OSTI]

of Life Cycle Assessments (LCA) have been undertaken, attempting to give a quantitative assessmentTowards prospective Life Cycle Assessment: how to identify key parameters inducing most Blanc1 MINES ParisTech, O.I.E. center, Sophia Antipolis, France Abstract. Prospective Life Cycle

Paris-Sud XI, Université de

447

Growing Green As part of its strategic plan to foster growth and development in key  

E-Print Network [OSTI]

reconstruction, nuclear waste containment and disposal, and photochemical deconstruction of pollutants Key remediation technologies for hazardous industrial pollutants in soil and groundwater · Geotechnical Research contamination and remediation, and management of mine wastes For more information, please visit: www.uwo.ca/enviro

Denham, Graham

448

Simplified authenticated key exchange based on the q(th) root problem  

SciTech Connect (OSTI)

Finding a q{sup th} root in GF(p), where p and q are prunes, q is large and q{sup 2} divides (p{minus}1) is a difficult problem equivalent to the discrete logarithm problem using an element of order q as the base. This paper describes an authenticated key exchange algorithm utilizing this hard problem.

JOHNSTON,ANNA M.; GEMMELL,PETER S.

2000-02-29T23:59:59.000Z

449

PublicKey LocallyDecodable Codes Brett Hemenway # Rafail Ostrovsky +  

E-Print Network [OSTI]

Semantically­Secure Public Key En­ cryption (SS­PKE) and any Private Information Retrieval (PIR) protocol. Since Homomorphic encryption implies PIR, we also show a reduction from any Homomorphic encryption protocol to PKLDC. Applying our construction to the best known PIR protocol (that of Gentry and Ramzan), we

Ostrovsky, Rafail

450

Environmental Impact of Wastewater Disposal in the Florida Keys, Monroe County Tom Higginbotham  

E-Print Network [OSTI]

Environmental Impact of Wastewater Disposal in the Florida Keys, Monroe County Tom Higginbotham University of Florida Soil and Water Science #12;Environmental Impact of Wastewater Disposal in the Florida affecting the normally oligotrophic marine waters. Typical methods of wastewater disposal include large

Ma, Lena

451

College of Fine Arts KEY: # = new course * = course changed = course dropped  

E-Print Network [OSTI]

College of Fine Arts TAD Dance KEY: # = new course * = course changed = course dropped University of Kentucky 2013-2014 Undergraduate Bulletin 1 *TAD 140 INTRODUCTION TO DANCE. (3) This course will provide of the semester. TAD 141 MODERN DANCE I. (2) Foundationscourseinbasicmovementconceptsoftime

MacAdam, Keith

452

Use of Nested Certificates for Efficient, Dynamic and Trust Preserving Public Key Infrastructure  

E-Print Network [OSTI]

Use of Nested Certificates for Efficient, Dynamic and Trust Preserving Public Key Infrastructure the certificates on this path recursively. This is the classical methodology. Nested certification is a novel nested certificates ­ for other certificates. Nested certificates can be used together with classical

Levi, Albert

453

Use of Nested Certificates for Efficient, Dynamic and Trust Preserving Public Key Infrastructure  

E-Print Network [OSTI]

Use of Nested Certificates for Efficient, Dynamic and Trust Preserving Public Key Infrastructure), and verify the certificates on this path recursively. This is the classical methodology. Nested certification certificates ­ called nested certificates ­ for other certificates. Nested certificates can be used together

454

Establishing the School of Engineering and Applied Sciences: Rationale and Key Issues  

E-Print Network [OSTI]

Establishing the School of Engineering and Applied Sciences: Rationale and Key Issues Science and engineering, ever changing, are becoming increasingly coupled. Their interplay is leading to dramatic progress transformations. They are driving economic development, underpinning cultural changes, and helping meet societal

455

Visualizing Key Words and Trends in a Subset of the US Patent Database Andrew B. Godbehere  

E-Print Network [OSTI]

Visualizing Key Words and Trends in a Subset of the US Patent Database Andrew B. Godbehere Laurent of an interactive content visualization tool as applied to a subset of the US Patent Database pertaining to clean ed word is an associated list of patents from the given time window mentioning both the query terms

Sekhon, Jasjeet S.

456

Stratospheric ozone depletion: a key driver of recent precipitation trends in South Eastern South America  

E-Print Network [OSTI]

. In this paper we focus on South Eastern South America (SESA), a region that has exhibited one of the largest South America 1 Introduction The depletion of ozone in the polar Antarctic strato- sphere (i.e. `theStratospheric ozone depletion: a key driver of recent precipitation trends in South Eastern South

457

Formalization and Verification of PLC Timers in Coq Key Lab for ISS of MOE,  

E-Print Network [OSTI]

Formalization and Verification of PLC Timers in Coq Hai Wan Key Lab for ISS of MOE, School used in embedded systems. A timer plays a pivotal role in PLC real-time applications. The paper presents a formalization of TON-timers of PLC programs in the theorem proving system Coq. The behavior

Paris-Sud XI, Université de

458

Enzymatically based cellulosic ethanol production technology was selected as a key area for biomass  

E-Print Network [OSTI]

Enzymatically based cellulosic ethanol production technology was selected as a key area for biomass cellulosic ethanol com- petitive. Improvements in dilute acid pretreatment and cellulase produced by Trichoderma reesei discov- ered during World War II led to most of the historic cellulosic ethanol cost

California at Riverside, University of

459

Protocol choice and parameter optimization in decoy-state measurement-device-independent quantum key distribution  

E-Print Network [OSTI]

Measurement-device-independent quantum key distribution (MDI-QKD) has been demonstrated in both laboratories and field-tests using attenuated lasers combined with the decoy-state technique. Although researchers have studied various decoy-state MDI-QKD protocols with two or three decoy states, a clear comparison between these protocols is still missing. This invokes the question of how many types of decoy states are needed for practical MDI-QKD. Moreover, the system parameters to implement decoy-state MDI-QKD are only partially optimized in all previous works, which casts doubt on the actual performance of former demonstrations. Here, we present analytical and numerical decoy-state methods with one, two and three decoy states. We provide a clear comparison among these methods and find that two decoy states already enable a near optimal estimation and more decoy states cannot improve the key rate much in either asymptotic or finite-data settings. Furthermore, we perform a full optimization of system parameters and show that full optimization can significantly improve the key rate in the finite-data setting. By simulating a real experiment, we find that full optimization can increase the key rate by more than one order of magnitude compared to non-optimization. A local search method to optimize efficiently the system parameters is proposed. This method can be four orders of magnitude faster than a trivial exhaustive search to achieve a similar optimal key rate. We expect that this local search method could be valuable for general fields in physics.

Feihu Xu; He Xu; Hoi-Kwong Lo

2014-06-01T23:59:59.000Z

460

Fuel Cycle Scenario Definition, Evaluation, and Trade-offs  

SciTech Connect (OSTI)

This report aims to clarify many of the issues being discussed within the AFCI program, including Inert Matrix Fuel (IMF) versus Mixed Oxide (MOX) fuel, single-pass versus multi-pass recycling, thermal versus fast reactors, potential need for transmutation of technetium and iodine, and the value of separating cesium and strontium. It documents most of the work produced by INL, ANL, and SNL personnel under their Simulation, Evaluation, and Trade Study (SETS) work packages during FY2005 and the first half of FY2006. This report represents the first attempt to calculate a full range of metrics, covering all four AFCI program objectives - waste management, proliferation resistance, energy recovery, and systematic management/economics/safety - using a combination of "static" calculations and a system dynamic model, DYMOND. In many cases, we examine the same issue both dynamically and statically to determine the robustness of the observations. All analyses are for the U.S. reactor fleet. This is a technical report, not aimed at a policy-level audience. A wide range of options are studied to provide the technical basis for identifying the most attractive options and potential improvements. Option improvement could be vital to accomplish before the AFCI program publishes definitive cost estimates. Information from this report will be extracted and summarized in future policy-level reports. Many dynamic simulations of deploying those options are included. There are few "control knobs" for flying or piloting the fuel cycle system into the future, even though it is dark (uncertain) and controls are sluggish with slow time response: what types of reactors are built, what types of fuels are used, and the capacity of separation and fabrication plants. Piloting responsibilities are distributed among utilities, government, and regulators, compounding the challenge of making the entire system work and respond to changing circumstances. We identify four approaches that would increase our ability to pilot the fuel cycle system: (1) have a recycle strategy that could be implemented before the 2030-2050 approximate period when current reactors retire so that replacement reactors fit into the strategy, (2) establish an option such as multi-pass blended-core IMF as a downward plutonium control knob and accumulate waste management benefits early, (3) establish fast reactors with flexible conversion ratio as a future control knob that slowly becomes available if/when fast reactors are added to the fleet, and (4) expand exploration of blended assemblies and cores, which appear to have advantages and agility. Initial results suggest multi-pass full-core MOX appears to be a less effective way than multi-pass blended core IMF to manage the fuel cycle system because it requires higher TRU throughput while more slowly accruing waste management benefits. Single-pass recycle approaches for LWRs (we did not study the VHTR) do not meet AFCI program objectives and could be considered a "dead end". Fast reactors appear to be effective options but a significant number of fast reactors must be deployed before the benefit of such strategies can be observed.

Steven J. Piet; Gretchen E. Matthern; Jacob J. Jacobson; Christopher T. Laws; Lee C. Cadwallader; Abdellatif M. Yacout; Robert N. Hill; J. D. Smith; Andrew S. Goldmann; George Bailey

2006-08-01T23:59:59.000Z

Note: This page contains sample records for the topic "destination definitions key" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Gigahertz quantum key distribution with InGaAs avalanche photodiodes  

E-Print Network [OSTI]

We report a demonstration of quantum key distribution (QKD) at GHz clock rates with InGaAs avalanche photodiodes (APDs) operating in a self-differencing mode. Such a mode of operation allows detection of extremely weak avalanches so that the detector afterpulse noise is sufficiently suppressed. The system is characterized by a secure bit rate of 2.37 Mbps at 5.6 km and 27.9 kbps at 65.5 km when the fiber dispersion is not compensated. After compensating the fiber dispersion, the QKD distance is extended to 101 km, resulting in a secure key rate of 2.88 kbps. Our results suggest that InGaAs APDs are very well suited to GHz QKD applications.

Z. L. Yuan; A. R. Dixon; J. F. Dynes; A. W. Sharpe; A. J. Shields

2008-05-22T23:59:59.000Z

462

Grid Parity for Residential Photovoltaics in the United States: Key Drivers and Sensitivities; Preprint  

SciTech Connect (OSTI)

In this report, we analyze PV break-even costs for U.S. residential customers. We evaluate some key drivers of grid parity both regionally and over time. We also examine the impact of moving from flat to time-of-use (TOU) rates, and we evaluate individual components of the break-even cost, including effect of rate structure and various incentives. Finally, we examine how PV markets might evolve on a regional basis considering the sensitivity of the break-even cost to four major drivers: technical performance, financing parameters, electricity prices and rates, and policies. We find that electricity price rather than technical parameters are in general the key drivers of the break-even cost of PV. Additionally, this analysis provides insight about the potential viability of PV markets.

Ong, S.; Denholm, P.; Clark, N.

2012-08-01T23:59:59.000Z

463

The ISO/NASA Key Project on AGN Spectral Energy Distributions (Characteristics of the ISO Data)  

E-Print Network [OSTI]

The U.S. ISO Key Project on quasar spectral energy distributions seeks to better understand the very broad-band emission features of quasars from radio to X-rays. A key element of this project is observations of 72 quasars with the ISOPHOT instrument at 8 bands, from 5 to 200 microns. The sample was chosen to span a wide range of redshifts and quasar types. This paper presents an overview of the analysis and reduction techniques, as well as general trends within the data set (comparisons with IRAS fluxes, uncertainties as a function of background sky brightness, and an analysis of vignetting corrections in chopped observing mode). A more detailed look at a few objects in the sample is presented in Wilkes et al. 1999, astro-ph/9902084.

Eric J. Hooper; Belinda J. Wilkes; Kim K. McLeod; Martin S. Elvis; Chris D. Impey; Carol J. Lonsdale; Matt A. Malkan; Jonathan C. McDowell

1999-02-05T23:59:59.000Z

464

Device-independent quantum key distribution with generalized two-mode Schrödinger cat states  

E-Print Network [OSTI]

We show how weak non-linearities can be used in a device-independent quantum key distribution (QKD) protocol using generalized two-mode Schr\\"odinger cat states. The QKD protocol is therefore shown to be secure against collective attacks and for some coherent attacks. We derive analytical formulas for the optimal values of the Bell parameter, the quantum bit error rate, and the device- independent secret key rate in the noiseless lossy bosonic channel. Additionally, we give the filters and measurements which achieve these optimal values. We find that over any distance in this channel the quantum bit error rate is identically zero, in principle, and the states in the protocol are always able to violate a Bell inequality. The protocol is found to be superior in some regimes to a device-independent QKD protocol based on polarization entangled states in a depolarizing channel. Finally, we propose an implementation for the optimal filters and measurements.

Curtis J. Broadbent; Kevin Marshall; Christian Weedbrook; John C. Howell

2015-03-05T23:59:59.000Z

465

Developing a decision model to describe levels of self-directedness based upon the key assumptions of andragogy  

E-Print Network [OSTI]

.................................................................................76 22 Students? Level of Self-Directedness Compared with Students? Level of Agreement with the Key Assumptions of Andragogy for Course A................78 23 Students? Level of Self-Directedness Compared with Students? Level of Agreement... with the Key Assumptions of Andragogy in Course B..................79 24 Students? Level of Self-Directedness Compared with Students? Level of Agreement with the Key Assumptions of Andragogy in Course C..................80 25 Students? Level of Self...

Richards, Lance Jonathan

2005-11-01T23:59:59.000Z

466

Short period fluctuations of sea level in the West Florida Keys  

E-Print Network [OSTI]

of Sea Level in the West Florida Keys (December, 1978) Sangem Hsu, B. S. , Taiwan Provincial College of Marine and Oceanic Technology. Chairman of Advisory Committee: Dr. Takashi Ichiye In addition to oscillations of astronomical origin, tidal... records often contain shorter or longer period oscillations. Short period oscillations usually have very small amplitudes and often cannot be recognized in the tidal records except near crests or troughs at days of calm weather. The purposes...

Hsu, Sangem

1978-01-01T23:59:59.000Z

467

Eavesdropping Attack with Hong-Ou-Mandel Interferometer and Random Basis Shuffling in Quantum Key Distribution  

E-Print Network [OSTI]

We introduce new sophisticated attacks with a Hong-Ou-Mandel interferometer against quantum key distribution (QKD) and propose a new QKD protocol grafted with random basis shuffling to block up those attacks. When the polarization basis is randomly and independently shuffled by sender and receiver, the new protocol can overcome the attacks even for not-so-weak coherent pulses. We estimate the number of photons to guarantee the security of the protocol.

Chil-Min Kim; Yun Jin Choi; Young-Jai Park

2006-03-02T23:59:59.000Z

468

Differential-phase-shift quantum key distribution with phase modulation to combat sequential attacks  

SciTech Connect (OSTI)

Phase-modulated differential-phase-shift (DPS) quantum key distribution (QKD) is presented for combating sequential attacks that most severely restrict the DPS-QKD system distance. Slow phase modulation imposed onto the DPS signal obstructs the optimum unambiguous state discrimination measurement conducted in the sequential attack and improves the QKD distance as a result. The condition with which the phase modulation does not degrade the DPS-QKD system performance is also described.

Kawahara, Hiroki; Oka, Toru; Inoue, Kyo [Osaka University, Osaka 565-0871 (Japan)

2011-11-15T23:59:59.000Z

469

Dissipation attack on Bennett-Brassard 1984 protocol in practical quantum key distribution system  

E-Print Network [OSTI]

We propose a new kind of individual attack, based on randomly selected dissipation, on Bennett-Brassard 1984 protocol of practical quantum key distribution (QKD) system with lossy and noisy quantum channel. Since an adversary with super quantum channel can disguise loss and errors induced by his attack as that of the system, he can obtain innegligible amount of information for a practical QKD system, without being detected by legal participants.

Li Yang; Bing Zhu

2013-05-24T23:59:59.000Z

470

A Differential Phase Shift Scheme for Quantum Key Distribution in Passive Optical Networks  

E-Print Network [OSTI]

We propose a scheme for quantum key distribution (QKD) in a passive optical network (PON) based on differential phase shift (DPS) coding. A centralized station including all expensive components serves many users, making it suitable for a true multi-user network in a local environment with moderate distances on the order of a few kilometers. The emphasis lies on an asymmetric design for cost effective implementation of network end points.

Michael Hentschel; Andreas Poppe; Bernhard Schrenk; Momtchil Peev; Edwin Querasser; Roland Lieger

2014-12-19T23:59:59.000Z

471

Expert Meeting Report: Key Innovations for Adding Energy Efficiency to Maintenance Projects  

SciTech Connect (OSTI)

This report describes an expert meeting hosted by the Building America research team NAHB Research Center, which was held on February 8, 2012, in Orlando, Florida. The topic, Key Innovations for Adding Energy Efficiency to Maintenance Projects, was intended to provide direction to more focused efforts to increase the efficiency of existing homes; in this meeting, the focus was specifically for re-roofing and the opportunities for adding energy efficiency upgrades during this major home repair activity.

Wood, A.; Wiehagen, J.

2012-09-01T23:59:59.000Z

472

Hydrogen Fuel Cell Performance in the Key Early Markets of Material Handling Equipment and Backup Power (Presentation)  

SciTech Connect (OSTI)

This presentation summarizes the results of NREL's analysis of hydrogen fuel cell performance in the key early markets of material handling equipment (MHE) and backup power.

Kurtz, J.; Sprik, S.; Ramsden, T.; Saur, G.; Ainscough, C.; Post, M.; Peters, M.

2013-10-01T23:59:59.000Z

473

RESIDENT ALIEN VS NONRESIDENT ALIEN STATUS Immigration And Tax Law Definitions  

E-Print Network [OSTI]

RESIDENT ALIEN VS NONRESIDENT ALIEN STATUS Immigration And Tax Law Definitions This handout. IMMIGRATION LAW: A nonresident alien is a person who is not a citizen or permanent resident of the U.S. who. A resident alien, for IMMIGRATION purposes, is the same as an immigrant, or a "greed card" holder--a non

Kasman, Alex

474

NWS Product Definition Document (PDD) for: Refinement of SPC Experimental Enhanced Resolution Thunderstorm Outlook  

E-Print Network [OSTI]

NWS Product Definition Document (PDD) for: Refinement of SPC Experimental Enhanced Resolution replaces an existing PDD, whose evaluation period expired on 15 February 2008, and revises the current SPC will also evaluate changes in the distribution of SPC forecaster workload and the ability to maintain

475

Time Asymmetric Boundary Conditions and the Definition of Mass and Width for Relativistic Resonances  

E-Print Network [OSTI]

The definition of mass and width of relativistic resonances and in particular of the $Z$-boson is discussed. For this we use the theory based on time asymmetric boundary conditions given by Hardy class spaces ${\\mathbf \\Phi}_-$ and ${\\mathbf \\Phi}_+$ for prepared in-states and detected out-states respectively, rather than time symmetric Hilbert space theory. This Hardy class boundary condition is a mathematically rigorous form of the singular Lippmann-Schwinger equation. In addition to the rigorous definition of the Lippmann-Schwinger kets $|[j,{\\mathsf s}]^{\\pm}>$ as functionals on the spaces ${\\mathbf \\Phi}_{\\mp}$, one obtains Gamow kets $|[j,{\\mathsf s}_R]^- >$ with complex centre-of-mass energy value ${\\mathsf s}_R=(M_R-i\\Gamma_R/2)^2$. The Gamow kets have an exponential time evolution given by $\\exp{(-iM_Rt-\\Gamma_Rt/2)}$ which suggests that $(M_R,\\Gamma_R)$ is the right definition of the mass and width of a resonance. This is different from the two definitions of the $Z$-boson mass and width used in the Particle Data Table and leads to a numerical value of $M_R=(91.1626\\pm 0.0031) {\\rm GeV}$ from the $Z$-boson lineshape data.

A. R. Bohm; R. de la Madrid; B. A. Tay; P. Kielanowski

2001-01-18T23:59:59.000Z

476

Service Oriented Architecture Definition Using Composition of BusinessDriven Fragments  

E-Print Network [OSTI]

Service Oriented Architecture Definition Using Composition of Business­Driven Fragments S. Services Oriented Architecture are built through the compo- sition of services (e.g. Web Services to implement scalable Soa (Services Oriented Architecture, [2]) under the Wsoa acronym (Web Services Oriented

Paris-Sud XI, Université de

477

Phonons in thin optically irradiated superconductors ; spectrum and possible definition of a phonon temperature  

E-Print Network [OSTI]

615 Phonons in thin optically irradiated superconductors ; spectrum and possible definition supraconducteur en présence d'une irradiation optique pour différentes intensités de la lumière. Nous effec- tuons of the coupled-quasiparticle pair phonon system in a superconducting film in the présence of an optical

Boyer, Edmond

478

Scuola Normale Superiore -Pisa September 1988 A Variational Definition of the Strain Energy  

E-Print Network [OSTI]

.1) is a natural regularity assumption, (2.2) has the important physical meaning that the energy becomes infinite when the volume locally vanishes; finally, (2.3) and (2.4) are growth assumptions on the energy. WeScuola Normale Superiore - Pisa September 1988 A Variational Definition of the Strain Energy

Acerbi, Emilio

479

Antitrust Evaluation of Horizontal Mergers: An Economic Alternative to Market Definition  

E-Print Network [OSTI]

Antitrust Evaluation of Horizontal Mergers: An Economic Alternative to Market Definition 25 between the two firm's products. We argue that our approach is well grounded in economics, workable, Economics and Regulation at Northwestern University and the FTC First Annual Microeconomic Conference

Sadoulet, Elisabeth

480

Compiling Language Definitions: The ASF+SDF M. G. J. VAN DEN BRAND  

E-Print Network [OSTI]

Compiling Language Definitions: The ASF+SDF Compiler M. G. J. VAN DEN BRAND CWI and Vrije Universiteit J. HEERING CWI P. KLINT CWI and University of Amsterdam and P. A. OLIVIER CWI The ASF+SDF Meta of the rewrite rule implementation. The ASF+SDF rewrite rule compiler generates C code, thus taking advantage

Klint, Paul

Note: This page contains sample records for the topic "destination definitions key" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Definition and First Year of a New International Master in Industrial Processes Automation  

E-Print Network [OSTI]

Definition and First Year of a New International Master in Industrial Processes Automation Emmanuel on industrial processes automation (IPA), proposed by University Joseph Fourier (UJF) / University of Grenoble automation, with clear specifications towards engineering and industry. The local and in- ternational

Paris-Sud XI, Université de

482

Definition, Expansion and Screening of Architectures for Planetary Exploration Class Nuclear Electric Propulsion and Power Systems  

E-Print Network [OSTI]

Nuclear Electric Propulsion and Power Systems By Bryan K. Smith Submitted to the System Design, expansion and screening of Nuclear Electric Propulsion and Power concepts capable of achieving planetaryDefinition, Expansion and Screening of Architectures for Planetary Exploration Class Nuclear

483

SOCIAL SUSTAINABILITY AT THE UNIVERSITY OF BRITISH COLUMBIA SUGGESTED DEFINITION AND PERFORMANCE GOALS  

E-Print Network [OSTI]

SOCIAL SUSTAINABILITY AT THE UNIVERSITY OF BRITISH COLUMBIA SUGGESTED DEFINITION AND PERFORMANCE such as the University of British Columbia (UBC). In an effort to envision what Social Sustainability would look like Hermansen & Lorna Seppala 4 February 2009 2 SOCIAL SUSTAINABILITY AT THE UNIVERSITY OF BRITISH COLUMBIA

484

Abduction in Logic Programming: A New Definition and an Abductive Procedure Based on Rewriting  

E-Print Network [OSTI]

Abduction in Logic Programming: A New Definition and an Abductive Procedure Based on Rewriting #3, Canada T6G 2E8 Abstract A long outstanding problem for abduction in logic programming has been on how minimality might be defined. Without minimality, an abductive procedure is often re­ quired to generate

Wu, Dekai

485

Transform Analysis Using the definition of the Laplace transform, Laplace transform properties, and the integral  

E-Print Network [OSTI]

Transform Analysis QUESTION 1 Using the definition of the Laplace transform, Laplace transform properties, and the integral tables on the course website, determine the Laplace transforms of the functions - = (3) QUESTION 2 Determine the inverse Laplace transform for the functions in equations (1)­(4). ( ) 3

Landers, Robert G.

486

ZooKeys, unlocking Earth’s incredible biodiversity and building a sustainable bridge into the public domain: From “print-based” to “web-based” taxonomy, systematics, and natural history. ZooKeys Editorial Opening Paper  

E-Print Network [OSTI]

and print journal in zoological taxonomy and systematics, which aims to quickly respond and adapt to the newest developments in taxonomic publishing. Open Access is accepted as mandatory for ZooKeys. Th e rationale for and concept of ZooKeys is discussed...

Penev, Lyubomir; Erwin, Terry; Thompson, F. Christian; Sues, Hans-Dieter; Engel, Michael S.; Agosti, Donat; Pyle, Richard; Ivie, Michael; Assmann, Thorsten; Henry, Thomas; Miller, Jeremy; Ananjeva, Natalia; Casale, Achille; Lourenco, Wilson; Golovatch, Sergei; Fagerholm, Hans-Peter; Taiti, Stefano; Alonso-Zarazaga, Miguel; Nieukerken, Erik van

2008-07-04T23:59:59.000Z

487

Shells of crabs like these may be the key to prolonging the life of microbial fuel cells that  

E-Print Network [OSTI]

Shells of crabs like these may be the key to prolonging the life of microbial fuel cells that power/06/ 070604123858.htm Marine Sediment Microbial Fuel Cells Get A Nutritional Boost ScienceDaily (June 11, 2007) -- Discarded crab and lobster shells may be the key to prolonging the life of microbial fuel cells that power

488

Public-Key Cryptography Standards: PKCS Yongge Wang, Ph.D., University of North Carolina at Charlotte  

E-Print Network [OSTI]

;· ISO/IEC. The International Organization for Standardization (ISO) and the International Electrotech. The major standards organizations that have been involved in public key cryptographic techniques are: 1 #12Public-Key Cryptography Standards: PKCS Yongge Wang, Ph.D., University of North Carolina

Wang, Yongge

489

Public Key Encryption that Allows PIR Queries Dan Boneh # Eyal Kushilevitz + Rafail Ostrovsky # William E. Skeith III  

E-Print Network [OSTI]

Public Key Encryption that Allows PIR Queries Dan Boneh # Eyal Kushilevitz + Rafail Ostrovsky a public­key encryption scheme for Alice that allows PIR searching over encrypted documents. Our solution­trivially small communication complexity. The main technique of our solution also allows for Single­Database PIR

Ostrovsky, Rafail

490

Exploiting the randomness of the measurement basis in quantum cryptography: Secure Quantum Key Growing without Privacy Amplification  

E-Print Network [OSTI]

We suggest that the randomness of the choices of measurement basis by Alice and Bob provides an additional important resource for quantum cryptography. As a specific application, we present a novel protocol for quantum key distribution (QKD) which enhances the BB84 scheme by encrypting the information sent over the classical channel during key sifting. We show that, in the limit of long keys, this process prevents an eavesdropper from reproducing the sifting process carried out by the legitimate users. The inability of the eavesdropper to sift the information gathered by tapping the quantum channel reduces the amount of information that an eavesdropper can gain on the sifted key. We further show that the protocol proposed is self sustaining, and thus allows the growing of a secret key.

Hannes R. Böhm; Paul S. Böhm; Markus Aspelmeyer; ?aslav Brukner; Anton Zeilinger

2004-08-30T23:59:59.000Z

491

arXiv:1401.0597v1[math.DG]3Jan2014 ON THE VALIDITY OF THE DEFINITION OF ANGULAR  

E-Print Network [OSTI]

in comparison to translat- ing Killing field used in the definition of the ADM energy-momentum vector, soarXiv:1401.0597v1[math.DG]3Jan2014 ON THE VALIDITY OF THE DEFINITION OF ANGULAR MOMENTUM IN GENERAL of the definition of the ADM angular momentum without the parity assumption. Explicit examples of asymp- totically

Wang, Mu-Tao

492

Science with the Square Kilometer Array: Motivation, Key Science Projects, Standards and Assumptions  

E-Print Network [OSTI]

The Square Kilometer Array (SKA) represents the next major, and natural, step in radio astronomical facilities, providing two orders of magnitude increase in collecting area over existing telescopes. In a series of meetings, starting in Groningen, the Netherlands (August 2002) and culminating in a `science retreat' in Leiden (November 2003), the SKA International Science Advisory Committee (ISAC), conceived of, and carried-out, a complete revision of the SKA science case (to appear in New Astronomy Reviews). This preface includes: (i) general introductory material, (ii) summaries of the key science programs, and (iii) a detailed listing of standards and assumptions used in the revised science case.

C. Carilli; S. Rawlings

2004-09-12T23:59:59.000Z

493

Unconditional security of the Bennett 1992 quantum key-distribution scheme with strong reference pulse  

E-Print Network [OSTI]

We prove the unconditional security of the original Bennett 1992 protocol with strong reference pulse. We show that we may place a projection onto suitably defined qubit spaces before the receiver, which makes the analysis as simple as qubit-based protocols. Unlike the single-photon-based qubits, the qubits identified in this scheme are almost surely detected by the receiver even after a lossy channel. This leads to the key generation rate that is proportional to the channel transmission rate for proper choices of experimental parameters.

Kiyoshi Tamaki; Norbert Lütkenhaus; Masato Koashi; Jamie Batuwantudawe

2009-09-03T23:59:59.000Z

494

Some Physics And System Issues In The Security Analysis Of Quantum Key Distribution Protocols  

E-Print Network [OSTI]

In this paper we review a number of issues on the security of quantum key distribution (QKD) protocols that bear directly on the relevant physics or mathematical representation of the QKD cryptosystem. It is shown that the cryptosystem representation itself may miss out many possible attacks which are not accounted for in the security analysis and proofs. Hence the final security claims drawn from such analysis are not reliable, apart from foundational issues about the security criteria that are discussed elsewhere. The cases of continuous-variable QKD and multi-photon sources are elaborated upon.

Horace P. Yuen

2014-05-07T23:59:59.000Z

495

KEY DESIGN REQUIREMENTS FOR THE HIGH TEMPERATURE GAS-COOLED REACTOR NUCLEAR HEAT SUPPLY SYSTEM  

SciTech Connect (OSTI)

Key requirements that affect the design of the high temperature gas-cooled reactor nuclear heat supply system (HTGR-NHSS) as the NGNP Project progresses through the design, licensing, construction and testing of the first of a kind HTGR based plant are summarized. These requirements derive from pre-conceptual design development completed to-date by HTGR Suppliers, collaboration with potential end users of the HTGR technology to identify energy needs, evaluation of integration of the HTGR technology with industrial processes and recommendations of the NGNP Project Senior Advisory Group.

L.E. Demick

2010-09-01T23:59:59.000Z

496

Office Civilian Waste Management Transportation Institutional Program Update on Collaborative Efforts with Key Stakeholders  

SciTech Connect (OSTI)

The Department of Energy's (DOE) Office of Civilian Radioactive Waste Management (OCRWM) created the Office of National Transportation in 2003 recognizing the need to revitalize and accelerate development of the transportation system. The Department has made a commitment to work through a collaborative planning process before developing specific policies and procedures and making transportation decisions. OCRWM has begun to build the institutional framework to support development of this transportation system. Interactions with stakeholders have been initiated. The authors describe the key stakeholders, identified issues, regional and national planning activities, and mechanisms for interaction.

E. Saris; P. Austin; J.J. Offner

2004-12-29T23:59:59.000Z

497

Quantum Key Ditribution Based on Quantum Intensity Correlation of Twin Beams  

E-Print Network [OSTI]

A new and simple quantum key distribution scheme based on the quantum intensity correlation of optical twin beams and the directly local measurements of intensity noise of single optical beam is presented and experimentally demonstrated. Using the twin beams with the quantum intensity correlation of 5dB the effective bit rate of $2\\times 10^7bits/s$ is completed. The noncloning of quantum systems and the sensitivity of the existing correlations to losses provide the physical mechamism for the security against eavesdropping. In the presented scheme the signal modulation and homodyne detection are not needed.

Xiaojun Jia; Xiaolong Su; Qing Pan; Kunchi Peng; Changde Xie

2005-04-08T23:59:59.000Z

498

Photon counting for quantum key distribution with Peltier cooled InGaAs/InP APD's  

E-Print Network [OSTI]

The performance of three types of InGaAs/InP avalanche photodiodes is investigated for photon counting at 1550 nm in the temperature range of thermoelectric cooling. The best one yields a dark count probability of $% 2.8\\cdot 10^{-5}$ per gate (2.4 ns) at a detection efficiency of 10% and a temperature of -60C. The afterpulse probability and the timing jitter are also studied. The results obtained are compared with those of other papers and applied to the simulation of a quantum key distribution system. An error rate of 10% would be obtained after 54 kilometers.

Damien Stucki; Grégoire Ribordy; André Stefanov; Hugo Zbinden; John G. Rarity; Tom Wall

2001-06-01T23:59:59.000Z

499

Photon counting for quantum key distribution with Peltier cooled InGaAs/InP APD's  

E-Print Network [OSTI]

The performance of three types of InGaAs/InP avalanche photodiodes is investigated for photon counting at 1550 nm in the temperature range of thermoelectric cooling. The best one yields a dark count probability of $% 2.8\\cdot 10^{-5}$ per gate (2.4 ns) at a detection efficiency of 10% and a temperature of -60C. The afterpulse probability and the timing jitter are also studied. The results obtained are compared with those of other papers and applied to the simulation of a quantum key distribution system. An error rate of 10% would be obtained after 54 kilometers.

Stucki, D; Stefanov, A; Zbinden, H; Rarity, J G; Wall, T; Stucki, Damien; Ribordy, Gr\\'{e}goire; Stefanov, Andr\\'{e}; Zbinden, Hugo; Rarity, John G.; Wall, Tom

2001-01-01T23:59:59.000Z

500

NERSC Played Key Role in Nobel Laureates Discovery  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recovery challengeMultiscaleLogos NERSC Logos NERSC logos arePlayed Key Role in